|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3241852 |
003 |
MWH |
005 |
20191028191518.0 |
007 |
cr nn 008mamaa |
008 |
121227s2003 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540365754
|
024 |
7 |
|
|a 10.1007/3-540-36575-3
|2 doi
|
035 |
|
|
|a (DE-He213)978-3-540-36575-4
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a UMZ
|2 bicssc
|
072 |
|
7 |
|a COM051230
|2 bisacsh
|
072 |
|
7 |
|a UMZ
|2 thema
|
072 |
|
7 |
|a UL
|2 thema
|
245 |
1 |
0 |
|a Programming Languages and Systems
|h [electronic resource] :
|b 12th European Symposium on Programming, ESOP 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings /
|c edited by Pierpaolo Degano.
|
250 |
|
|
|a 1st ed. 2003.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2003.
|
300 |
|
|
|a CDXXXVI, 420 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2618
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a Invited Talks -- Computer Security from a Programming Language and Static Analysis Perspective -- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis -- Contributed Papers -- A Tail-Recursive Semantics for Stack Inspections -- Flexible Models for Dynamic Linking -- Correction of Functional Logic Programs -- Approximate Pruning in Tabled Logic Programming -- Goal-Independent Suspension Analysis for Logic Programs with Dynamic Scheduling -- Security Properties: Two Agents Are Sufficient -- A Simple Language for Real-Time Cryptographic Protocol Analysis -- Rule Formats for Non Interference -- On the Secure Implementation of Security Protocols -- Handling Encryption in an Analysis for Secure Information Flow -- Using Controller-Synthesis Techniques to Build Property-Enforcing Layers -- Automatic Software Model Checking Using CLP -- Verifying Temporal Heap Properties Specified via Evolution Logic -- Correctness of Data Representations Involving Heap Data Structures -- Modeling Web Interactions -- Type Inference for a Distributed ?-Calculus -- Type-Safe Update Programming -- Type Error Slicing in Implicitly Typed Higher-Order Languages -- Core Formal Molecular Biology -- Requirements on the Execution of Kahn Process Networks -- Tagging, Encoding, and Jones Optimality -- The Rely-Guarantee Method in Isabelle/HOL -- Building Certified Libraries for PCC: Dynamic Storage Allocation -- Finite Differencing of Logical Formulas for Static Analysis -- Register Allocation by Proof Transformation.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 12th European Symposium on Programming, ESOP 2003, held in Warsaw, Poland, in April 2003. The 25 revised full papers presented together with two invited papers were carefully reviewed and selected from 99 submissions. Among the topics addressed are programming paradigms and their integration, program semantics, calculi of computation, security, advanced type systems, program analysis, program transformation, and practical algorithms based on theoretical developments.
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Programming languages (Electronic computers).
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computer logic.
|
690 |
|
|
|a Electronic resources (E-books)
|
700 |
1 |
|
|a Degano, Pierpaolo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2618
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/3-540-36575-3
|3 Click to view e-book
|t 0
|
907 |
|
|
|a .b32418528
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g gw
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i21550177
|z 02-26-20
|
999 |
f |
f |
|i 9966498e-6389-52f1-868f-dfe76eedb9e1
|s e537c77b-f5c7-5230-83b5-a95d89321943
|t 0
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|t 0
|e E-Book
|h Library of Congress classification
|i Elec File
|