Amanote Research

Amanote Research

    RegisterSign In

Hacking Nondeterminism With Induction and Coinduction

Communications of the ACM - United States
doi 10.1145/2713167
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer Science
Date

January 28, 2015

Authors
Filippo BonchiDamien Pous
Publisher

Association for Computing Machinery (ACM)


Related search

Indexed Induction and Coinduction, Fibrationally

Logical Methods in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Structural Induction and Coinduction in a Fibrational Setting

Information and Computation
Theoretical Computer ScienceComputational TheoryComputer Science ApplicationsInformation SystemsMathematics
1998English

Ethical and Unethical Hacking

The Ethics of Cybersecurity
2020English

On the Succinctness of Nondeterminism

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Reproductive Hacking

Fly
Insect Science
2014English

Cyber Security and Ethical Hacking

International Journal for Research in Applied Science and Engineering Technology
2018English

Overview of Hacking

IOSR Journal of Computer Engineering
2016English

Transport Tunneling System With a Communication Hacking Framework

ICTACT Journal on Communication Technology
2018English

Generic Trace Semantics via Coinduction

Logical Methods in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy