Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Pi-Calculus: A Theory of Mobile Processes

Buy

Mobile systems, whose components communicate and change their structure, now pervade the informational world and the wider world of which it is a part. The science of mobile systems is as yet immature, however. This book presents the pi-calculus, a theory of mobile systems. The pi-calculus provides a conceptual framework for understanding mobility, and mathematical tools for expressing systems and reasoning about their behaviours. The book serves both as a reference for the theory and as an extended demonstration of how to use pi-calculus to describe systems and analyse their properties. It covers the basic theory of pi-calculus, typed pi-calculi, higher-order processes, the relationship between pi-calculus and lambda-calculus, and applications of pi-calculus to object-oriented design and programming. The book is written at the graduate level, assuming no prior acquaintance with the subject, and is intended for computer scientists interested in mobile systems.

(HTML tags aren't allowed.)

Imperfect C++ Practical Solutions for Real-Life Programming
Imperfect C++ Practical Solutions for Real-Life Programming

C++, although a marvelous language, isn't perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn't just tell you what's wrong with C++, but offers practical techniques and tools for writing code that's...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Ethical Hacking
Ethical Hacking
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50...

Coplanar Waveguide Circuits Components & Systems
Coplanar Waveguide Circuits Components & Systems

Up-to-date coverage of the analysis and applications of coplanar waveguides to microwave circuits and antennas

The unique feature of coplanar waveguides, as opposed to more conventional waveguides, is their uniplanar construction, in which all of the conductors are aligned on the same side of the substrate. This feature simplifies...

A+ Certification Training Kit, Second Edition (IT-Training Kits)
A+ Certification Training Kit, Second Edition (IT-Training Kits)

Welcome to the A+ Certification Training Kit. This technology-based training kit is intended to provide the user with the skills necessary for A+ Certification. It is a study of the computer—its hardware and software—from its earliest beginnings, through the advent of the mainframe and personal computers, up to present-day...

Pro SQL Server 2005 Replication (Definitive Guide)
Pro SQL Server 2005 Replication (Definitive Guide)
Replication is a way of copying and updating information in a database. This allows all users to see the same information and any changes made to it. Replication also duplicates the database across a number of computers so that, if one computer goes down, the information is not lost and can still be accessed. Pro SQL Server 2005...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy