The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, top ....The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, topology, geometry, and computer graphics will be developed to characterise system/graph growth and stability. The aim is two-fold: first to reduce real complex systems (mainly financial systems) to computationally manageable structures (including direct visualisation) and second to construct realistic models of the evolution of such systems.Read moreRead less
Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in bu ....Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in building trusted computer applications. Process calculi and logic represent two promising disciplines in which the principles of analysis and design of secure systems can be studied systematically, out of which formal verification tools can be constructed.Read moreRead less