Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
40
views
24
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,109
similar
All similar
Record
: found
Abstract
: found
Book Chapter
: found
Is Open Access
Modular Product Programs
other
Author(s):
Marco Eilers
,
Peter Müller
,
Samuel Hitz
Publication date
(Online):
April 14 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Download
XML
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Algerian Journal of Natural Products
Most cited references
24
Record
: found
Abstract
: not found
Article
: not found
Hyperproperties
Michael Clarkson
,
Fred B. Schneider
,
Andrei Sabelfeld
(2010)
0
comments
Cited
40
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Fairness
Nissim Francez
(1986)
0
comments
Cited
37
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Secure Information Flow as a Safety Problem
Tachio Terauchi
,
Alex Aiken
(2005)
0
comments
Cited
31
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
April 14 2018
Pages
: 502-529
DOI:
10.1007/978-3-319-89884-1_18
SO-VID:
e0d1ae05-622d-4b5b-b19b-269e7168d279
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Consistent Subtyping for All
pp. 60
Dualizing Generalized Algebraic Data Types by Matrix Transposition
pp. 86
Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach
pp. 117
An Assertion-Based Program Logic for Probabilistic Programs
pp. 145
Fine-Grained Semantics for Probabilistic Programs
pp. 186
How long, O Bayesian network, will I sample thee?
pp. 214
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus
pp. 245
Failure is Not an Option
pp. 272
Let Arguments Go First
pp. 300
Behavioural Equivalence via Modalities for Algebraic Effects
pp. 327
Explicit Effect Subtyping
pp. 357
A Separation Logic for a Promising Semantics
pp. 385
Logical Reasoning for Disjoint Permissions
pp. 415
Deadlock-Free Monitors
pp. 442
Fragment Abstraction for Concurrent Shape Analysis
pp. 475
Reasoning About a Machine with Local Capabilities
pp. 502
Modular Product Programs
pp. 533
A Fistful of Dollars: Formalizing Asymptotic Complexity Claims via Deductive Program Verification
pp. 561
Verified Learning Without Regret
pp. 589
Program Verification by Coinduction
pp. 619
Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq
pp. 653
Evaluating Design Tradeoffs in Numeric Static Analysis for Java
pp. 683
An Abstract Interpretation Framework for Input Data Usage
pp. 711
Higher-Order Program Verification via HFL Model Checking
pp. 739
Quantitative Analysis of Smart Contracts
pp. 771
Session-Typed Concurrent Contracts
pp. 799
A Typing Discipline for Statically Verified Crash Failure Handling in Distributed Systems
pp. 827
On Polymorphic Sessions and Functions
pp. 856
Concurrent Kleene Algebra: Free Model and Completeness
pp. 885
Correctness of a Concurrent Object Collector for Actor Languages
pp. 912
Paxos Consensus, Deconstructed and Abstracted
pp. 940
On Parallel Snapshot Isolation and Release/Acquire Consistency
pp. 968
Eventual Consistency for CRDTs
pp. 1027
Compositional Verification of Compiler Optimisations on Relaxed Memory
Similar content
3,109
NF-κB–dependent IRF1 activation programs cDC1 dendritic cells to drive antitumor immunity
Authors:
Ghita Ghislat
,
Ammar Cheema
,
Elodie Baudoin
…
Adapting a Low-threshold Buprenorphine Program for Vulnerable Populations During the COVID-19 Pandemic
Authors:
Courtney D Nordeck
,
Megan Buresh
,
Noa Krawczyk
…
Fels-Rand: an Xlisp-Stat program for the comparative analysis of data under phylogenetic uncertainty.
Authors:
S Blomberg
See all similar
Cited by
2
Reductions for Automated Hypersafety Verification
Authors:
Azadeh Farzan
,
Anthony Vandikas
Property Directed Self Composition
Authors:
Ron Shemer
,
Arie Gurfinkel
,
Sharon Shoham
…
See all cited by