Search Results - "Roscoe, W A"
-
1
A refinement-based approach to safe smart contract deployment and evolution
Published in Software and systems modeling (01-06-2024)“…In our previous work, we proposed a verification framework that shifts from the “code is law” to a new “specification is law” paradigm related to the safe…”
Get full text
Journal Article -
2
Approximate verification of concurrent systems using token structures and invariants
Published in International journal on software tools for technology transfer (01-08-2022)“…Distributed systems often rely on token structures to avoid undesired states and behave correctly. While conservative token structures ensure that a fixed…”
Get full text
Journal Article -
3
Translating between models of concurrency
Published in Acta informatica (01-10-2020)“…Hoare’s Communicating Sequential Processes (CSP) (Hoare in Communicating Sequential Processes, Prentice-Hall Inc, Upper Saddle River, 1985) admits a rich…”
Get full text
Journal Article -
4
FDR3: a parallel refinement checker for CSP
Published in International journal on software tools for technology transfer (01-04-2016)“…Failures divergence refinement 3 (FDR3) is a complete rewrite of the CSP refinement checker FDR2 that incorporates a significant number of enhancements. In…”
Get full text
Journal Article -
5
Failure of Spermatogenesis in Mice Lacking Connexin43
Published in Biology of reproduction (01-09-2001)“…Connexin43 (Cx43), a gap junction protein encoded by the Gja1 gene, is expressed in several cell types of the testis. Cx43 gap junctions couple Sertoli cells…”
Get full text
Journal Article -
6
On the expressive power of CSP refinement
Published in Formal aspects of computing (01-08-2005)“…Abstract We show that wide-ranging classes of predicates on the failures-divergences model for CSP can be represented by refinement checks in a general form…”
Get full text
Conference Proceeding Journal Article -
7
Efficient verification of concurrent systems using local-analysis-based approximations and SAT solving
Published in Formal aspects of computing (01-06-2019)“…This work develops a type of local analysis that can prove concurrent systems deadlock free. As opposed to examining the overall behaviour of a system, local…”
Get full text
Journal Article -
8
VEGF and angiogenesis in acute and chronic MOG(35–55) peptide induced EAE
Published in Journal of neuroimmunology (30-04-2009)“…Abstract An increased expression of vascular endothelial growth factor (VEGF) is associated with demyelinated lesions in both multiple sclerosis (MS) and its…”
Get full text
Journal Article -
9
Responsiveness and stable revivals
Published in Formal aspects of computing (01-08-2007)“…Abstract Individual components in an inter-operating system require assurance from other components both of appropriate functionality and of suitable…”
Get full text
Conference Proceeding Journal Article -
10
Computing maximal weak and other bisimulations
Published in Formal aspects of computing (01-05-2016)“…We present and compare several algorithms for computing the maximal strong bisimulation, the maximal divergence-respecting delay bisimulation, and the maximal…”
Get full text
Journal Article -
11
Checking noninterference in Timed CSP
Published in Formal aspects of computing (2013)“…A well-established specification of noninterference in CSP is that, when high-level events are appropriately abstracted, the remaining low-level view is…”
Get full text
Journal Article -
12
Reverse Authentication in Financial Transactions and Identity Management
Published in Mobile networks and applications (01-10-2013)“…New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to…”
Get full text
Journal Article -
13
Rigorous development of component-based systems using component metadata and patterns
Published in Formal aspects of computing (01-11-2016)“…In previous work we presented a CSP-based systematic approach that fosters the rigorous design of component-based development. Our approach is strictly defined…”
Get full text
Journal Article -
14
Responsiveness of interoperating components
Published in Formal aspects of computing (01-11-2004)“…This paper investigates the issue of responsiveness of interoperating components: one not causing the other to deadlock. This is obviously related to the…”
Get full text
Journal Article -
15
Authenticating ad hoc networks by comparison of short digests
Published in Information and computation (01-02-2008)“…We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared…”
Get full text
Journal Article Conference Proceeding -
16
A Static Analysis Framework for Livelock Freedom in CSP
Published in Logical methods in computer science (24-09-2013)“…In a process algebra with hiding and recursion it is possible to create processes which compute internally without ever communicating with their environment…”
Get full text
Journal Article -
17
Connexin 43 gap junction proteins are up-regulated in remyelinating spinal cord
Published in Journal of neuroscience research (01-04-2007)“…Alterations in the expression of gap junction proteins have previously been observed in several diseases affecting the central nervous system; however, the…”
Get full text
Journal Article -
18
Committable: A Decentralised and Trustless Open-Source Protocol
Published in 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (02-05-2022)“…Collaborative development in open-source software (OSS) has long been limited by the lack of participation, i.e., A project is often maintained by an…”
Get full text
Conference Proceeding -
19
Experimental allergic encephalomyelitis in connexin 43-heterozygous mice
Published in Cell communication & adhesion (01-03-2007)“…Alterations in the expression of gap junction proteins (connexins) have previously been observed in experimental allergic encephalomyelitis (EAE)…”
Get more information
Journal Article -
20
What is intransitive noninterference?
Published in Proceedings of the 12th IEEE Computer Security Foundations Workshop (1999)“…The term "intransitive noninterference" refers to the information flow properties required of systems like downgraders, in which it may be legitimate for…”
Get full text
Conference Proceeding