The paper describes a constraint-based solution to the protein folding problem on face-centered cubic lattices - a biologically meaningful approximation of the general protein folding problem. The paper improves the results presented in [15] and …
Independent Dynamics Hybrid Automata (IDA) describe a new class of hybrid automata that extends decidable O-minimal automata by further allowing identity resets. We define the conditions under which reachability is decidable over IDA. These …
In this paper we introduce and study a special class of hybrid automata, Semi-Algebraic Constant Reset hybrid automata (SACoRe). SACoRe automata are an extension of O-minimal semi-algebraic automata over the reals in the case of flows obtained from …
We study the relation between Nominal Logic and the Theory of Contexts, two approaches for specifying and reasoning about datatypes with binders. We consider a natural-deduction style proof system for intuitionistic nominal logic, called NINL, …
We study unwinding conditions for the definition of non-interference properties of a simple imperative language, admitting parallel executions on a shared memory. We present different classes of programs obtained by instantiating a general unwinding …
CoPS is an automatic checker of multilevel system security properties. CoPS can be used to check three different bisimulation-based non-interference properties for systems expressed as terms of the Security Process Algebra (SPA) language. The …
A new approach is presented for computing approximations of the reached sets of linear hybrid automata. First, we present some new theoretical results on termination of a class of reachability algorithms, which includes Botchkarev's, based on …
In this paper, we model fresh names in the π-calculus using abstractions with respect to a new binding operator 6. Both the theory and the metatheory of the π-calculus benefit from this simple extension. The operational semantics of this new calculus …
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal with real applications, it is often necessary to admit mechanisms for …