• 1125 Citations
  • 18 h-Index
1987 …2022
If you made any changes in Pure these will be visible here soon.

Research Outputs 1987 2019

2019

Abstract Hidden Markov Models: a monadic account of quantitative information flow

McIver, A., Morgan, C. & Rabehaja, T., 29 Mar 2019, In : Logical Methods in Computer Science. 15, 1, p. 1-50 50 p., 36.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Information Flow
Hidden Markov models
Markov Model
Semantics
Transformer

An axiomatization of information flow measures

Alvim, M. S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C. & Smith, G., 19 Jul 2019, In : Theoretical Computer Science. 777, p. 32-54 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Axiomatization
Information Flow
Leakage
Computer systems
Axioms

Categorical information flow

Rabehaja, T., McIver, A., Morgan, C. & Struth, G., 2019, The art of modelling computational systems: a journey from logic and concurrency to security and privacy. Alvim, M. S., Chatzikokolakis, K., Olarte, C. & Valencia, F. (eds.). Cham, Switzerland: Springer, Springer Nature, p. 329-343 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11760 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Information Flow
Categorical
Transformer
Model

Experiments in information flow analysis

McIver, A., Oct 2019, Mathematics of program construction: 13th International Conference, MPC 2019, Proceedings. Hutton, G. (ed.). Cham: Springer, Springer Nature, p. 1-17 17 p. (Lecture Notes in Computer Science; vol. 11825).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer programming languages
Experiments
Semantics

Generalised differential privacy for text document processing

Fernandes, N., Dras, M. & McIver, A., 1 Jan 2019, Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings. Nielson, F. & Sands, D. (eds.). Cham: Springer-VDI-Verlag GmbH & Co. KG, p. 123-148 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11426 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Privacy
Learning systems
Semantics
Text processing
Processing

Preface

ter Beek, M. H., McIver, A. & Oliveira, J. N., 2019, Formal methods - the next 30 years: third World Congress, FM 2019 Porto, Portugal, October 7–11, 2019 Proceedings. Cham, Switzerland: Springer, Springer Nature, p. v-vi 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11800).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introductionResearchpeer-review

Program algebra for quantitative information flow

McIver, A. K., Morgan, C. C. & Rabehaja, T., Aug 2019, In : Journal of Logical and Algebraic Methods in Programming. 106, p. 55-77 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Proving that programs are differentially private

McIver, A. & Morgan, C., 1 Jan 2019, Programming Languages and Systems: 17th Asian Symposium, APLAS 2019, Proceedings. Lin, A. W. (ed.). Switzerland: Springer, Springer Nature, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11893 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Information Flow
Semantics
Loss Function
Privacy
Verify

The thousand-and-one cryptographers

McIver, A. & Morgan, C., 2019, Engineering Secure and Dependable Software Systems. Pretschner, A., Müller, P. & Stöckle, P. (eds.). Amsterdam: IOS Press, p. 137-162 26 p. (NATO Science for Peace and Security Series. Sub-Series D: Information and Communication Security; vol. 53).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

abstraction
experience
Group
2018

An algebraic approach for reasoning about information flow

Américo, A., Alvim, M. S. & McIver, A., 1 Jan 2018, Formal Methods: 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Cham: Springer, Springer Nature, p. 55-72 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Algebraic Approach
Information Flow
Algebra
Reasoning
Specifications

A new proof rule for almost-sure termination

McIver, A., Morgan, C., Kaminski, B. L. & Katoen, J-P., 5 Jan 2018, In : Proceedings of the ACM on Programming Languages. 2, POPL, p. 1-28 28 p., 33.

Research output: Contribution to journalArticleResearchpeer-review

Markov processes
Innovation

Conditioning in probabilistic programming

Olmedo, F., Gretz, F., Jansen, N., Kaminski, B. L., Katoen, J. P. & McIver, A., 1 Jan 2018, In : ACM Transactions on Programming Languages and Systems. 40, 1, p. 1-50 50 p., 4.

Research output: Contribution to journalArticleResearchpeer-review

Computer programming
Semantics
Hoists
Markov processes
Sampling

Preface

McIver, A. & Horvath, A., 1 Jan 2018, Quantitative Evaluation of Systems: 15th International Conference, QEST 2018. McIver, A. & Horvath, A. (eds.). Vol. 11024 LNCS. p. v-vi 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Formal methods
Quantitative Evaluation
Stochastic models
Computer networks
Computer systems

Processing text for privacy: an information flow perspective

Fernandes, N., Dras, M. & McIver, A., 1 Jan 2018, Formal Methods: 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Cham: Springer, Springer Nature, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Text processing
Text Processing
Obfuscation
Information Flow
Privacy

Schedulers and finishers: on generating and filtering the behaviours of an event structure

McIver, A., Rabehaja, T. & Struth, G., 5 Oct 2018, In : Theoretical Computer Science. 744, p. 97-112 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Event Structures
Regain
Model structures
Scheduler
Filtering
2017

Algebra for quantitative information flow

McIver, A. K., Morgan, C. C. & Rabehaja, T., 2017, Relational and algebraic methods in computer science: 16th International Conference, RAMiCS 2017, Lyon, France, May 15-18, 2017. Proceedings. Höfner, P., Pous, D. & Struth, G. (eds.). Springer, Springer Nature, p. 3-23 21 p. (Lecture Notes in Computer Science; vol. 10226).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Information Flow
Algebra
Semantics
Confidentiality
Fragment

Formal analysis of the information leakage of the DC-nets and crowds anonymity protocols

Américo, A., Vaz, A., Alvim, M. S., Campos, S. V. A. & McIver, A., 2017, Formal methods: foundations and applications: 20th Brazilian Symposium, SBMF 2017, Recife, Brazil, November 29 – December 1, 2017. Proceedings. Cavalheiro, S. & Fiadeiro, J. (eds.). Cham: Springer, Springer Nature, p. 142-158 17 p. (Lecture Notes in Computer Science; vol. 10623).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Formal Analysis
Anonymity
Leakage
Network protocols
Information Flow

Privacy in elections: How small is “small”?

McIver, A., Rabehaja, T., Wen, R. & Morgan, C., 1 Oct 2017, In : Journal of Information Security and Applications. 36, p. 112-126 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Transparency

Reasoning about distributed secrets

Bordenabe, N., McIver, A., Morgan, C. & Rabehaja, T., 2017, Formal techniques for distributed objects, components, and systems: 37th IFIP WG 6.1 International Conference, FORTE 2017, held as part of the 12th International Federated Conference on Distributed Computing Techniques, DisCoTec 2017, Neuchâtel, Switzerland, June 19-22, 2017, Proceedings. Bouajjani, A. & Silva, A. (eds.). Cham: Springer, Springer Nature, p. 156-170 15 p. (Lecture Notes in Computer Science; vol. 10321).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Confidentiality
Reasoning
Disclosure
Leakage
Privacy
2016

Axioms for information leakage

Alvim, M. S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C. & Smith, G., 8 Aug 2016, Proceedings - IEEE 29th Computer Security Foundations Symposium, CSF 2016. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), Vol. 2016-August. p. 77-92 16 p. 7536368. (IEEE Computer Security Foundations Symposium Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer systems

Probabilistic rely-guarantee calculus

McIver, A., Rabehaja, T. & Struth, G., 6 Dec 2016, In : Theoretical Computer Science. 655, p. 120-134 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Algebra
Calculus
Kleene Algebra
Semantics
Eratosthenes

Program refinement, perfect secrecy and information flow

McIver, A. K., 2016, Engineering Trustworthy Software Systems - 1st International School, SETSS 2014, Tutorial Lectures. Liu, Z. & Zhang, Z. (eds.). 1st ed. Cham, Switzerland: Springer, Springer Nature, Vol. 9506. p. 80-102 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9506).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Information Flow
Data structures
Refinement
Hardness
Acoustic waves

Schedulers and finishers: On generating the behaviours of an event structure

McIver, A., Rabehaja, T. & Struth, G., 2016, Theoretical Aspects of Computing - ICTAC 2016, 13th International Colloquium, Proceedings. Sampaio, A. & Wang, F. (eds.). Cham, Switzerland: Springer, Springer Nature, Vol. 9965 LNCS. p. 121-138 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9965 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Event Structures
Regain
Model structures
Scheduler
Scheduling
2015

Abstract hidden Markov models: a monadic account of quantitative information flow

McIver, A., Morgan, C. & Rabehaja, T., 31 Jul 2015, Proceedings - 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2015. Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 597-608 12 p. 7174915. (Annual Symposium on Logic in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Information Flow
Hidden Markov models
Markov Model
Semantics
Uncertainty Measure

Conditioning in Probabilistic Programming

Jansen, N., Kaminski, B. L., Katoen, J. P., Olmedo, F., Gretz, F. & McIver, A., 21 Dec 2015, In : Electronic Notes in Theoretical Computer Science. 319, p. 199-216 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Probabilistic Programming
Computer programming
Conditioning
Semantics
Precondition

Hidden-Markov program algebra with iteration

McIver, A., Meinicke, L. & Morgan, C., 19 Feb 2015, In : Mathematical Structures in Computer Science. 25, 2, p. 320-360 41 p.

Research output: Contribution to journalArticleResearchpeer-review

Algebra
Iteration
Hidden Markov models
Noninterference
Semantics

Logic for programming, artificial intelligence, and reasoning: 20th international conference, LPAR-20 2015 Suva, Fiji, november 24–28, 2015 proceedings

Davis, M. (ed.), Fehnker, A. (ed.), McIver, A. (ed.) & Voronkov, A. (ed.), 2015, Heidelberg: Springer, Springer Nature. 640 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9450)

Research output: Book/ReportEdited Book/AnthologyResearchpeer-review

2014

Abstract channels and their robust information-leakage ordering

McIver, A., Morgan, C., Smith, G., Espinoza, B. & Meinicke, L., 2014, Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Proceedings. Abadi, M. & Kremer, S. (eds.). Heidelberg: Springer, Springer Nature, p. 83-102 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8414 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Leakage
Chemical analysis
Labeling
Redundancy
Entropy

Abstractions of non-interference security: Probabilistic versus possibilistic

Hoang, T. S., McIver, A. K., Meinicke, L., Morgan, C. C., Sloane, A. & Susatyo, E., Jan 2014, In : Formal Aspects of Computing. 26, 1, p. 169-194 26 p.

Research output: Contribution to journalArticleResearchpeer-review

Noninterference
Semantics
Semantic Analysis
Refinement
Network protocols

Additive and multiplicative notions of leakage, and their capacities

Alvim, M. S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C. & Smith, G., 13 Nov 2014, Proceedings - 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014. Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), Vol. 2014-January. p. 308-322 15 p. 6957119

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Channel capacity
Information theory

Hopscotch - reaching the target hop by hop

Höfner, P. & McIver, A., 7 Aug 2014, In : Journal of Logical and Algebraic Methods in Programming. 83, 2, p. 212-224 13 p., 397.

Research output: Contribution to journalArticleResearchpeer-review

graph theory
computer science
Algebra
Path
Target

Operational versus weakest pre-expectation semantics for the probabilistic guarded command language

Gretz, F., Katoen, J. P. & McIver, A., Mar 2014, In : Performance Evaluation. 73, p. 110-132 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Semantics
Reward
Operational Semantics
Markov Decision Process
Correspondence

Towards a formal analysis of information leakage for signature attacks in preferential elections

Wen, R., McIver, A. & Morgan, C., 2014, FM 2014: Formal Methods - 19th International Symposium, Proceedings. Jones, C., Pihlajasaari, P. & Sun, J. (eds.). Cham, Switzerland: Springer, Springer Nature, Vol. 8442 LNCS. p. 595-610 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8442 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Formal methods
Formal Analysis
Vote
Elections
Leakage
2013

An event structure model for probabilistic concurrent Kleene algebra

McIver, A., Rabehaja, T. & Struth, G., 2013, Logic for Programming, Artificial Intelligence, and Reasoning - 19th International Conference, LPAR 2013, Proceedings. McMillan, K., Middeldorp, A. & Voronkov, A. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8312. p. 653-667 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8312 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Kleene Algebra
Event Structures
Model structures
Algebra
Concurrent

Prinsys - On a quest for probabilistic loop invariants

Gretz, F., Katoen, J. P. & McIver, A., 2013, Quantitative Evaluation of Systems: 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings. Joshi, K., Siegle, M., Stoelinga, M. & D’Argenio, P. R. (eds.). Heidelberg: Springer, Springer Nature, p. 193-208 16 p. (Lecture Notes in Computer Science; vol. 8054).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Invariant
Infinite Domain
Acoustic waves
Software Tools
Annotation

Probabilistic concurrent Kleene algebra

McIver, A., Rabehaja, T. & Struth, G., 2013, In : Proceedings 11th International Workshop on Quantitative Aspects of Programming Languages and Systems : Rome, 23rd-24th March 2013. p. 97-115 19 p.

Research output: Contribution to journalConference paperResearchpeer-review

Kleene Algebra
Concurrent
Probabilistic Automata
Algebra
Nondeterminism

Statistical model checking of wireless mesh routing protocols

Höfner, P. & McIver, A., 2013, NASA Formal Methods - 5th International Symposium, NFM 2013, Proceedings. Brat, G., Rungta, N. & Venet, A. (eds.). Heidelberg: Springer, Springer Nature, Vol. 7871. p. 322-336 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7871 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Wireless mesh networks (WMN)
Model checking
Routing Protocol
Routing protocols
Model Checking
2012

A Kantorovich-monadic powerdomain for information hiding, with probability and nondeterminism

McIver, A., Meinicke, L. & Morgan, C., 2012, Proceedings of the 2012 27th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2012. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 461-470 10 p. 6280465

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Information Hiding
Nondeterminism
Partially Observable Markov Decision Process
Monads
Entropy

A process algebra for wireless mesh networks

Fehnker, A., Van Glabbeek, R., Höfner, P., McIver, A., Portmann, M. & Tan, W. L., 2012, Programming Languages and Systems: 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Proceedings. Seidl, H. (ed.). Heidelberg, Germany: Springer, Springer Nature, Vol. 7211 LNCS. p. 295-315 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7211 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Wireless Mesh Networks
Wireless mesh networks (WMN)
Process Algebra
Routing Protocol
Routing protocols

A rigorous analysis of AODV and its variants

Höfner, P., Tan, W. L., McIver, A., Van Glabbeek, R., Portmann, M. & Fehnker, A., 2012, MSWiM'12 - Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Zomaya, A. (ed.). New York: ACM, p. 203-212 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Algebra
Network protocols
Wireless Mesh Networks
Wireless mesh networks (WMN)
Formal methods

Automated analysis of AODV using UPPAAL

Fehnker, A., Van Glabbeek, R., Höfner, P., McIver, A., Portmann, M. & Tan, W. L., 2012, Tools and Algorithms for the Construction and Analysis of Systems - 18th Int. Conf., TACAS 2012, Held as Part of the European Joint Conf. on Theory and Practice of Software, ETAPS 2012, Proceedings. Flanagan, C. & König, B. (eds.). Heidelberg, Germany: Springer, Springer Nature, Vol. 7214 LNCS. p. 173-187 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7214 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Network protocols
Wireless Mesh Networks
Wireless mesh networks (WMN)
Formal methods
Process Algebra

Operational versus weakest precondition semantics for the probabilistic guarded command language

Gretz, F., Katoen, J. P. & McIver, A., 2012, Proceedings - 2012 9th International Conference on Quantitative Evaluation of Systems, QEST 2012. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 168-177 10 p. 6354645

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Semantics

Preface: Special issue QFM 2009

Andover, S., McIver, A. & Nunez, M., Jan 2012, In : Journal of Logic and Algebraic Programming. 81, 1, p. 1 1 p.

Research output: Contribution to journalEditorialResearchpeer-review

2011

Compositional refinement in agent-based security protocols

McIver, A. K. & Morgan, C. C., Nov 2011, In : Formal Aspects of Computing. 23, 6, p. 711-737 27 p.

Research output: Contribution to journalArticleResearchpeer-review

Security Protocols
Refinement
Semantics
Network protocols
Model checking

Continual and explicit comparison to promote proactive facilitation during second computer language learning

Bower, M. & McIver, A., 2011, ITiCSE'11 - Proceedings of the 16th Annual Conference on Innovation and Technology in Computer Science. New York: ACM, p. 218-222 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer programming languages
Students
Language
Facilitation
Programming

Model exploration and analysis for quantitative safety refinement in probabilistic B

Ndukwu, U. & McIver, A., 17 Jun 2011, In : Proceedings of the 15th International Refinement Workshop (Refine 2011) : Limerick, Ireland, 20th June 2011. 55, p. 101-120 20 p.

Research output: Contribution to journalConference paperResearchpeer-review

Model checking
Systems analysis
Specifications
Controllers

On probabilistic Kleene algebras, automata and simulations

McIver, A., Rabehaja, T. M. & Struth, G., 2011, Relational and Algebraic Methods in Computer Science: 12th International Conference, RAMICS 2011, Rotterdam, The Netherlands, May 30 – June 3, 2011. Proceedings. de Swart, H. (ed.). Heidelberg: Springer, Springer Nature, p. 264-279 16 p. (Lecture Notes in Computer Science; vol. 6663).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Kleene Algebra
Algebra
Automata
Simulation
Modulo

Preface

Höfner, P., McIver, A. & Struth, G., 2011, In : CEUR Workshop Proceedings. 760, p. 4p 1 p.

Research output: Contribution to journalEditorialResearchpeer-review

Towards an algebra of routing tables

Höfner, P. & McIver, A., 2011, Relational and Algebraic Methods in Computer Science - 12th International Conference, RAMICS 2011, Proceedings. de Swart, H. (ed.). Heidelberg, Germany: Springer, Springer Nature, Vol. 6663 LNCS. p. 212-229 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6663 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Algebra
Tables
Routing
Safety
Wireless Mesh Networks
2010

An expectation transformer approach to predicate abstraction and data independence for probabilistic programs

Ndukwu, U. & McIver, A. K., 2010, Proceedings of the 8th Workshop on Quantitative Aspects of Programming Languages. Di Pierro, A. & Norman, G. (eds.). Electronic Proceedings in Theoretical Computer Science (EPTCS), p. 129-143 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Model checking
Network protocols