Presenting a survey of a variety of methods and systems for formal hardware verification, this work emphasizes the presentation of approaches that have matured into tools and systems usable for the actual verification of nontrivial circuits. It describes the approaches supplying the theoretical foundations as well as taking into account the application viewpoint. By applying all methods and systems presented to the same set of IFIP WG10.5 hardware verification examples, the book aims to provide a fair analysis of the strengths and weaknesses of the various approaches given.
Presenting a survey of a variety of methods and systems for formal hardware verification, this work emphasizes the presentation of approaches that hav...
Given the broad popularity of Internet technology, even in its present immature state, and also the recent progress made towards a human-centered view of information technology, the time now seems ripe to essentially extend the scope and power of enterprise information systems. This carefully arranged book concentrates on the relationships between coordination technology and business application requirements and introduces general elements of a cooperative infrastructure allowing for the construction of collaborative applications. It is essential reading for research and development...
Given the broad popularity of Internet technology, even in its present immature state, and also the recent progress made towards a human-centered view...
These are the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '99, held in Prague, Czech Republic in May 1999. The 32 revised full papers presented were selected during a competitive reviewing process. The book is divided in topical sections on cryptanalysis, hash functions, foundations, public key cryptosystems, watermarking and fingerprinting, elliptic curves, new schemes, block ciphers, distributed cryptography, tools from related areas, and broadcast and multicast.
These are the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '99, held in P...
This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs for several applications related to the RSA cryptosystem, including RSA enciphering and deciphering, prime number generation, and factoring. The book is well-written and easily accessible to the non-expert. The work is an appealing combination of...
This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application p...
This volume constitutes the proceedings of the 22nd Interna- tional Colloquium on Automata, Languages, and Programming, held under the sponsorship of EATCS in Szeged, Hungary in July 1995. The volume presents four invited papers and 53 full revised research papers selected from a total of 111 submissions. ICALP traditionally covers the whole area of theoretical computer science; among the topics addressed in the volume are concurrency, automata, formal languages, algorithms, communication protocols, computational complexity, computability, foundations of programming, learning and coding,...
This volume constitutes the proceedings of the 22nd Interna- tional Colloquium on Automata, Languages, and Programming, held under the sponsorship of ...
This book constitutes the refereed proceedings of the 6th Scandinavian Workshop on Algorithm Theory, SWAT'98, held in Stockholm, Sweden, in July 1998. The volume presents 28 revised full papers selected from 56 submissions; also included are three invited contributions. The papers present original research on algorithms and data structures in various areas including computational geometry, parallel and distributed systems, graph theory, approximation, computational biology, queueing, Voronoi diagrams, and combinatorics in general.
This book constitutes the refereed proceedings of the 6th Scandinavian Workshop on Algorithm Theory, SWAT'98, held in Stockholm, Sweden, in July 1998....
This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation.
This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, U...
This book constitutes the refereed proceedings of the 10th International Conference of Z Users, ZUM'97, held in Reading, UK, in April 1997. The volume presents 18 revised full papers together with three invited presentations by internationally leading experts. The papers are organized into topical sections on real-time systems, tools, logic, system development, reactive systems, refinement, and applications. Also a select Z bibliography by Jonathan Bowen is added. All in all, the book competently reports the state-of-the-art in research and advanced applications of the Z notation.
This book constitutes the refereed proceedings of the 10th International Conference of Z Users, ZUM'97, held in Reading, UK, in April 1997.
This book constitutes the refereed proceedings of the 22nd International Symposium on Mathematical Foundations of Computer Science, MFCS '97, held in Bratislava, Slovakia, in August 1997. The 40 revised full papers presented were carefully selected from a total of 94 submissions. Also included are nine invited papers and two abstracts of invited talks. The papers cover the whole range of theoretical computer science including programming theory, complexity theory, mathematical logic, rewriting, grammars, formal languages, theory of algorithms, computational graph theory, etc.
This book constitutes the refereed proceedings of the 22nd International Symposium on Mathematical Foundations of Computer Science, MFCS '97, held in ...