Filter your results
- 22
- 2
- 21
- 3
- 24
- 1
- 2
- 1
- 2
- 1
- 1
- 2
- 5
- 4
- 1
- 2
- 2
- 1
- 24
- 2
- 1
- 1
- 1
- 1
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
24 results
|
|
sorted by
|
|
Replica-Based High-Performance Tuple Space Computing17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.3-18, ⟨10.1007/978-3-319-19282-6_1⟩
Conference papers
hal-01774936v1
|
||
|
Klaim-DB: A Modeling Language for Distributed Database Applications17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.197-212, ⟨10.1007/978-3-319-19282-6_13⟩
Conference papers
hal-01774934v1
|
||
|
Exploring the Relationship Between Data Science and Circular Economy: An Enhanced CRISP-DM Process Model18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.177-189, ⟨10.1007/978-3-030-29374-1_15⟩
Conference papers
hal-02510135v1
|
||
|
A Fixpoint-Based Calculus for Graph-Shaped Computational Fields17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.101-116, ⟨10.1007/978-3-319-19282-6_7⟩
Conference papers
hal-01774933v1
|
||
|
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers
hal-01059143v1
|
||
|
Aggregation Policies for Tuple Spaces20th International Conference on Coordination Languages and Models (COORDINATION), Jun 2018, Madrid, Spain. pp.181-199, ⟨10.1007/978-3-319-92408-3_8⟩
Conference papers
hal-01821494v1
|
||
|
Probabilistic Analysis of the Quality Calculus15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.258-272, ⟨10.1007/978-3-642-38592-6_18⟩
Conference papers
hal-01515243v1
|
||
|
Attack Tree Generation by Policy Invalidation9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.249-259, ⟨10.1007/978-3-319-24018-3_16⟩
Conference papers
hal-01442547v1
|
||
|
A Collaborative Approach to Botnet ProtectionInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.624-638, ⟨10.1007/978-3-642-32498-7_47⟩
Conference papers
hal-01542425v1
|
||
|
Towards Probabilistic Session-Type Monitoring23th International Conference on Coordination Languages and Models (COORDINATION), Jun 2021, Valletta, Malta. pp.106-120, ⟨10.1007/978-3-030-78142-2_7⟩
Conference papers
hal-03387845v1
|
||
|
Enforcing Availability in Failure-Aware Communicating Systems36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.195-211, ⟨10.1007/978-3-319-39570-8_13⟩
Conference papers
hal-01432918v1
|
||
|
Galois Connections for Flow Algebras13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.138-152, ⟨10.1007/978-3-642-21461-5_9⟩
Conference papers
hal-01583315v1
|
||
|
Many-to-Many Information Flow Policies19th International Conference on Coordination Languages and Models (COORDINATION), Jun 2017, Neuchâtel, Switzerland. pp.159-177, ⟨10.1007/978-3-319-59746-1_9⟩
Conference papers
hal-01657347v1
|
||
|
Coordination Models and LanguagesSpringer International Publishing, LNCS-9686, 2016, Lecture Notes in Computer Science, 978-3-319-39518-0. ⟨10.1007/978-3-319-39519-7⟩
Books
hal-01631711v1
|
||
|
Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.104-118, ⟨10.1007/978-3-662-43352-2_9⟩
Conference papers
hal-01287735v1
|
||
|
Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.202-218, ⟨10.1007/978-3-642-21464-6_14⟩
Conference papers
hal-01582991v1
|
||
|
Integrating Attributes into Role-Based Access Control29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers
hal-01745833v1
|
||
|
Information Security Theory and PracticeSpringer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books
hal-03173895v1
|
||
|
A Theory of Automated Market Makers in DeFi23th International Conference on Coordination Languages and Models (COORDINATION), Jun 2021, Valletta, Malta. pp.168-187, ⟨10.1007/978-3-030-78142-2_11⟩
Conference papers
hal-03387829v1
|
||
|
Recursive Advice for Coordination14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.137-151, ⟨10.1007/978-3-642-30829-1_10⟩
Conference papers
hal-01529587v1
|
||
|
The Stochastic Quality Calculus16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.179-193, ⟨10.1007/978-3-662-43376-8_12⟩
Conference papers
hal-01290076v1
|
||
|
Coordination Models and LanguagesSpringer International Publishing, LNCS-11533, 2019, Lecture Notes in Computer Science, 978-3-030-22396-0. ⟨10.1007/978-3-030-22397-7⟩
Books
hal-02365511v1
|
||
|
Uniform Protection for Multi-exposed Targets34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.182-198, ⟨10.1007/978-3-662-43613-4_12⟩
Conference papers
hal-01398016v1
|
||
|
Denial-of-Service Security Attack in the Continuous-Time World34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.149-165, ⟨10.1007/978-3-662-43613-4_10⟩
Conference papers
hal-01398014v1
|