The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, top ....The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, topology, geometry, and computer graphics will be developed to characterise system/graph growth and stability. The aim is two-fold: first to reduce real complex systems (mainly financial systems) to computationally manageable structures (including direct visualisation) and second to construct realistic models of the evolution of such systems.Read moreRead less
Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in bu ....Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in building trusted computer applications. Process calculi and logic represent two promising disciplines in which the principles of analysis and design of secure systems can be studied systematically, out of which formal verification tools can be constructed.Read moreRead less
Expressive power and complexity of temporal logics for model-checking. Hardware verification based upon mathematical logic is now routinely
used in industry to verify the correctness of large digital circuits
using a technique called model-checking. Such discrete systems move
from one state to another according to the regular ticks of a clock.
The challenge now is to find tractable methods for reasoning about
real-time systems and hybrid systems that move in a continuous manner
with respec ....Expressive power and complexity of temporal logics for model-checking. Hardware verification based upon mathematical logic is now routinely
used in industry to verify the correctness of large digital circuits
using a technique called model-checking. Such discrete systems move
from one state to another according to the regular ticks of a clock.
The challenge now is to find tractable methods for reasoning about
real-time systems and hybrid systems that move in a continuous manner
with respect to time: examples include aeroplanes flying according to
the laws of physics and a moving robot arm. We shall invent new logics
which are specifically tailored for tractable reasoning about
real-time and hybrid systems.Read moreRead less