iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.SCICO.2009.07.008
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T02:44:41Z","timestamp":1714099481140},"reference-count":24,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T00:00:00Z","timestamp":1275350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"vor","delay-in-days":1461,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1016\/j.scico.2009.07.008","type":"journal-article","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T12:01:31Z","timestamp":1251979291000},"page":"440-469","source":"Crossref","is-referenced-by-count":53,"title":["A process calculus for Mobile Ad Hoc Networks"],"prefix":"10.1016","volume":"75","author":[{"given":"Anu","family":"Singh","sequence":"first","affiliation":[]},{"given":"C.R.","family":"Ramakrishnan","sequence":"additional","affiliation":[]},{"given":"Scott A.","family":"Smolka","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.scico.2009.07.008_b1","series-title":"TACAS","first-page":"315","article-title":"Compositional analysis for verification of parameterized systems","volume":"vol. 2619","author":"Basu","year":"2003"},{"issue":"2\u20133","key":"10.1016\/j.scico.2009.07.008_b2","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.tcs.2008.04.029","article-title":"Parametric synchronizations in mobile nominal calculi","volume":"402","author":"Bruni","year":"2008","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.scico.2009.07.008_b3","series-title":"FOSSACS","article-title":"Mobile ambients","author":"Cardelli","year":"1998"},{"key":"10.1016\/j.scico.2009.07.008_b4","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/S0304-3975(96)00325-8","article-title":"On the decidability of process equivalences for the \u03c0-calculus","volume":"183","author":"Dam","year":"1997","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.scico.2009.07.008_b5","series-title":"IPDPS \u201901: Proceedings of the 15th International Parallel & Distributed Processing Symposium","first-page":"149","article-title":"A broadcast-based calculus for communicating systems","author":"Ene","year":"2001"},{"key":"10.1016\/j.scico.2009.07.008_b6","series-title":"COORDINATION","first-page":"132","article-title":"A calculus for mobile ad hoc networks","volume":"vol. 4467","author":"Godskesen","year":"2007"},{"key":"10.1016\/j.scico.2009.07.008_b7","unstructured":"J.C. Godskesen, O. Gryn, Modelling and verification of security protocols for ad hoc networks using UPPAAL, in: Proc. 18th Nordic Workshop on Programming Theory, October 2006"},{"key":"10.1016\/j.scico.2009.07.008_b8","series-title":"High-Level Concurrent Languages","first-page":"3","article-title":"Resource access control in systems of mobile agents","volume":"vol. 16.3","author":"Hennessy","year":"1998"},{"key":"10.1016\/j.scico.2009.07.008_b9","series-title":"Proc. MFPS \u201907","first-page":"275","article-title":"An observational theory for mobile ad hoc networks","volume":"vol. 173","author":"Merro","year":"2007"},{"key":"10.1016\/j.scico.2009.07.008_b10","series-title":"Proc. MFPS \u201906","first-page":"331","article-title":"Towards a calculus for wireless systems","volume":"vol. 158","author":"Mezzetti","year":"2006"},{"key":"10.1016\/j.scico.2009.07.008_b11","series-title":"Logic and Algebra of Specification","first-page":"203","article-title":"The polyadic pi-calculus: A tutorial","author":"Milner","year":"1993"},{"issue":"1","key":"10.1016\/j.scico.2009.07.008_b12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","article-title":"A calculus of mobile processes, Parts I and II","volume":"100","author":"Milner","year":"1992","journal-title":"Inform. Comput."},{"issue":"1\u20132","key":"10.1016\/j.scico.2009.07.008_b13","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.tcs.2006.08.036","article-title":"A framework for security analysis of mobile wireless networks","volume":"367","author":"Nanz","year":"2006","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.scico.2009.07.008_b14","series-title":"PPDP","first-page":"2","article-title":"Towards a primitive higher order calculus of broadcasting systems","author":"Ostrovsky","year":"2002"},{"key":"10.1016\/j.scico.2009.07.008_b15","series-title":"Handbook of Process Algebra","first-page":"479","article-title":"An introduction to the pi-calculus","author":"Parrow","year":"2001"},{"key":"10.1016\/j.scico.2009.07.008_b16","doi-asserted-by":"crossref","unstructured":"C.E. Perkins, E.M. Belding-Royer, S.R. Das, Ad hoc on-demand distance vector routing protocol, Internet-draft, IETF MANET Working Group, 2003. Available at http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-manet-aodv-13.txt","DOI":"10.17487\/rfc3561"},{"issue":"2\u20133","key":"10.1016\/j.scico.2009.07.008_b17","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0167-6423(95)00017-8","article-title":"A calculus of broadcasting systems","volume":"25","author":"Prasad","year":"1995","journal-title":"Sci. Comput. Program."},{"key":"10.1016\/j.scico.2009.07.008_b18","series-title":"CAV","first-page":"143","article-title":"Efficient model checking using tabled resolution","volume":"vol. 1254","author":"Ramakrishna","year":"1997"},{"issue":"5","key":"10.1016\/j.scico.2009.07.008_b19","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1017\/S0960129598002527","article-title":"On the bisimulation proof method","volume":"8","author":"Sangiorgi","year":"1998","journal-title":"Math. Struct. Comput. Sci."},{"key":"10.1016\/j.scico.2009.07.008_b20","series-title":"ICNP","first-page":"350","article-title":"Design and analysis of a leader election algorithm for mobile ad hoc networks","author":"Vasudevan","year":"2004"},{"key":"10.1016\/j.scico.2009.07.008_b21","unstructured":"XSB. The XSB logic programming system. http:\/\/xsb.sourceforge.net"},{"key":"10.1016\/j.scico.2009.07.008_b22","series-title":"TACAS","first-page":"42","article-title":"Parameterized verification of pi-calculus systems","volume":"vol. 3920","author":"Yang","year":"2006"},{"key":"10.1016\/j.scico.2009.07.008_b23","series-title":"PADL","first-page":"113","article-title":"A provably correct compiler for efficient model checking of mobile processes","volume":"vol. 3350","author":"Yang","year":"2005"},{"issue":"1","key":"10.1016\/j.scico.2009.07.008_b24","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/s10009-003-0136-3","article-title":"A logical encoding of the pi-calculus: Model checking mobile processes using tabled resolution","volume":"6","author":"Yang","year":"2004","journal-title":"Int. J. Softw. Tools Technol. Transfer (STTT)"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642309001142?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642309001142?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T10:38:42Z","timestamp":1558521522000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642309001142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,6]]}},"alternative-id":["S0167642309001142"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2009.07.008","relation":{},"ISSN":["0167-6423"],"issn-type":[{"value":"0167-6423","type":"print"}],"subject":[],"published":{"date-parts":[[2010,6]]}}}