00945nam0 22002531i 450 UON0009350020231205102521.79801-981282-0-720020107d1987 |0itac50 baengGB|||| |||||Poets and EmperorsFrankish Politics and Carolingian PoetryP. GodmanOxfordClarendon Press1989 186 P. ; 22 cmGBOxfordUONL000029T3LETTERATURA MEDIEVALE E UMANISTICAAGODMANPeterUONV056532158650Clarendon PressUONV246509650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00093500SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI T 3 POET. CAROL. 01 SI MC 20555 5 Poets and emperors477927UNIOR03856nam 22007335 450 991048325960332120251226203721.03-662-45917-510.1007/978-3-662-45917-1(CKB)3710000000325120(SSID)ssj0001408437(PQKBManifestationID)11967328(PQKBTitleCode)TC0001408437(PQKBWorkID)11346670(PQKB)10492974(DE-He213)978-3-662-45917-1(MiAaPQ)EBC5577899(PPN)183152433(EXLCZ)99371000000032512020141222d2014 u| 0engurnn|008mamaatxtccrTrustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers /edited by Matteo Maffei, Emilio Tuosto1st ed. 2014.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2014.1 online resource (XV, 193 p. 50 illus.) Theoretical Computer Science and General Issues,2512-2029 ;8902Bibliographic Level Mode of Issuance: Monograph3-662-45916-7 Includes bibliographical references and index.Generalized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM – Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies.This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy Global Computing, TGC 2014, held in Rome, Italy, in September 2014. The 15 revised full papers presented were carefully reviewed and selected from 23 submissions. The Symposium on Trustworthy Global Computing  focuses on frameworks, tools, algorithms, and protocols for open-ended, large-scale systems and applications, and on rigorous reasoning about their behavior and properties.Theoretical Computer Science and General Issues,2512-2029 ;8902Data protectionMachine theoryApplication softwareComputer engineeringComputer networksData and Information SecurityFormal Languages and Automata TheoryComputer and Information Systems ApplicationsComputer Engineering and NetworksData protection.Machine theory.Application software.Computer engineering.Computer networks.Data and Information Security.Formal Languages and Automata Theory.Computer and Information Systems Applications.Computer Engineering and Networks.005.8Maffei Matteoedthttp://id.loc.gov/vocabulary/relators/edtTuosto Emilioedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483259603321Trustworthy Global Computing771960UNINA