People

Papers & Software

Seminar

Stages



INRIA

LIX

CNRS
Papers

Papers (co-)authored by Romain Beauxis

[1] David Baelde, Romain Beauxis, and Samuel Mimram. Liquidsoap: a High-Level Programming Language for Multimedia Streaming. In Ivana Cerná, Tibor Gyimóthy, Juraj Hromkovic, Keith Jefferey, Rastislav Královic, Marko Vukolic, and Stefan Wolf, editors, SOFSEM 2011: Theory and Practice of Computer Science, volume 6543 of Lecture Notes in Computer Science, pages 99-110, Novy Smokovec, Slovakia, 2011. Springer Berlin / Heidelberg.
[ bib | http ]
[2] Romain Beauxis and Samuel Mimram. A Non-Standard Semantics for Kahn Networks in Continuous Time. In Marc Bezem, editor, Computer Science Logic (CSL'11) - 25th International Workshop/20th Annual Conference of the EACSL, volume 12 of Leibniz International Proceedings in Informatics (LIPIcs), pages 35-50, Bergen, Norway, 2011. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
[ bib | http ]
[3] Romain Beauxis and Catuscia Palamidessi. Probabilistic and nondeterministic aspects of anonymity. Theoretical Computer Science, 410(41):4006-4025, 2009.
[ bib | http ]
[4] Romain Beauxis. Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols. PhD thesis, LIX, Ecole Polytechnique, France, 2009.
[ bib ]
[5] Romain Beauxis, Catuscia Palamidessi, and Frank D. Valencia. On the asynchronous nature of the asynchronous pi-calculus. In Pierpaolo Degano, Rocco De Nicola, and José Meseguer, editors, Concurrency, Graphs and Models, volume 5065 of Lecture Notes in Computer Science, pages 473-492. Springer, 2008.
[ bib | http | .pdf ]
[6] Romain Beauxis, Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Formal approaches to information-hiding (tutorial). In Gilles Barthe and Cédric Fournet, editors, Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007), volume 4912 of Lecture Notes in Computer Science, pages 347-362. Springer, 2008.
[ bib | http | .pdf ]
[7] Romain Beauxis. Probabilistic and concurrent models for security. In Maria Garcia de la Banda and Enrico Pontelli, editors, 24th International Conference on Logic Programming, volume 5366 of Lecture Notes in Computer Science, pages 801-802. Springer, 2008.
[ bib ]

This file has been generated by bibtex2html 1.74


Back


Page maintainer: Catuscia Palamidessi