LEADER 03971nam 2200673 a 450 001 9910143575703321 005 20170816123935.0 010 $a1-280-27733-5 010 $a9786610277339 010 $a0-470-35383-X 010 $a0-471-73656-2 010 $a0-471-73655-4 035 $a(CKB)1000000000355193 035 $a(EBL)233616 035 $a(OCoLC)475940364 035 $a(SSID)ssj0000164975 035 $a(PQKBManifestationID)11153342 035 $a(PQKBTitleCode)TC0000164975 035 $a(PQKBWorkID)10125160 035 $a(PQKB)10123447 035 $a(MiAaPQ)EBC233616 035 $a(EXLCZ)991000000000355193 100 $a20041208d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGrammars with context conditions and their applications$b[electronic resource] /$fby Alexander Meduna, Martin Svec 210 $aHoboken, N.J. $cJohn Wiley & Sons$dc2005 215 $a1 online resource (230 p.) 300 $aDescription based upon print version of record. 311 $a0-471-71831-9 320 $aIncludes bibliographical references (p. 201-212) and index. 327 $aGrammars with Context Conditions and Their Applications; Contents; Preface; Acknowledgments; 1 Introduction; 2 Preliminaries and Definitions; 2.1 Basic Definitions; 2.2 Grammars; 3 Conditions Placed on Derivation Domains; 3.1 Sequential Grammars over Word Monoids; 3.2 Parallel Grammars over Word Monoids; 4 Conditions Placed on the Use of Productions; 4.1 Sequential Conditional Grammars; 4.1.1 Context-Conditional Grammars; 4.1.2 Random-Context Grammars; 4.1.3 Generalized Forbidding Grammars; 4.1.4 Semi-conditional Grammars; 4.1.5 Simple Semi-conditional Grammars 327 $a4.2 Parallel Conditional Grammars4.2.1 Context-Conditional ETOL Grammars; 4.2.2 Forbidding ETOL Grammars; 4.2.3 Simple Semi-conditional ETOL Grammars; 4.3 Global Context Conditional Grammars; 5 Conditions Placed on the Neighborhood of Rewritten Symbols; 5.1 Continuous Context; 5.1.1 Sequential Uniform Rewriting; 5.1.2 Parallel Uniform Rewriting; 5.2 Scattered Context; 5.2.1 Scattered Context Grammars and Their Reduction; 5.2.2 Semi-parallel Uniform Rewriting; 6 Grammatical Transformations and Derivation Simulations; 6.1 Derivation Simulation; 6.2 Grammatical Simulation 327 $a6.3 Simulation of E(0, l )L Grammars7 Applications and Implementation; 7.1 Applications; 7.2 Implementation; 8 Concluding and Bibliographical Notes; Bibliography; Denotations of Language Families; Subject Index 330 $aThe essential guide to grammars with context conditionsThis advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to the types of context conditions, this self-contained reference classifies them into grammars with context conditions placed on the domains of grammatical derivations, the use of grammatical productions, and the neighborhood of the rewritten symbols. The focus is on grammatical generative power, important properties, simplification, reductio 606 $aGenerative grammar 606 $aContext (Linguistics) 606 $aGrammar, Comparative and general$xConditionals 606 $aComputational linguistics 606 $aFormal languages 608 $aElectronic books. 615 0$aGenerative grammar. 615 0$aContext (Linguistics) 615 0$aGrammar, Comparative and general$xConditionals. 615 0$aComputational linguistics. 615 0$aFormal languages. 676 $a415 700 $aMeduna$b Alexander$f1957-$0981325 701 $aSvec$b Martin$0981326 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143575703321 996 $aGrammars with context conditions and their applications$92239860 997 $aUNINA LEADER 04977nam 22008295 450 001 9910484507603321 005 20251225210906.0 010 $a3-319-54876-X 024 7 $a10.1007/978-3-319-54876-0 035 $a(CKB)3710000001127387 035 $a(DE-He213)978-3-319-54876-0 035 $a(MiAaPQ)EBC6296759 035 $a(MiAaPQ)EBC5592039 035 $a(Au-PeEL)EBL5592039 035 $a(OCoLC)974890686 035 $a(PPN)199766754 035 $a(EXLCZ)993710000001127387 100 $a20170301d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRisks and Security of Internet and Systems $e11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers /$fedited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (VIII, 239 p. 67 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v10158 311 08$a3-319-54875-1 327 $aProtection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating -- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams -- Towards the weaving of the characteristics of good security requirements -- Methodology for Security -- Towards Empirical Evaluation of Automated Risk Assessment Methods -- An n-sided polygonal model to calculate the impact of cyber security events -- Security and Formal Methods -- SPTool ? equivalence checker for SAND attack trees -- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study -- Network Security -- A Proactive Stateful Firewall for Software Defined Networking -- Protocol Reverse Engineering: Challenges and Obfuscation -- Detection and Monitoring.-Detecting anomalous behavior in DBMS logs -- Online link disclosure strategies for social networks -- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory -- Cryptography -- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication -- Improving Side-Channel Attacks against Pairing-Based Cryptography -- A First DFA on PRIDE: from Theory to Practice. 330 $aThis book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016. The 17 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They cover diverse research themes, ranging from classic topics, such as intrusion detection, applied cryptography, formal methods and methodology for risk and security analysis, to emerging issues, such as ransomware and security of software defined networking or virtualization techniques. . 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v10158 606 $aData protection 606 $aSoftware engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aComputer networks 606 $aComputer science 606 $aApplication software 606 $aData and Information Security 606 $aSoftware Engineering 606 $aCryptology 606 $aComputer Engineering and Networks 606 $aTheory of Computation 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputer science. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aSoftware Engineering. 615 24$aCryptology. 615 24$aComputer Engineering and Networks. 615 24$aTheory of Computation. 615 24$aComputer and Information Systems Applications. 676 $a004.67 702 $aCuppens$b Frédéric$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLanet$b Jean-Louis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLegay$b Axel$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484507603321 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNINA