Skip to main content

Showing 1–13 of 13 results for author: Ghilezan, S

.
  1. arXiv:2306.14529  [pdf, other

    cs.DC

    Correct orchestration of Federated Learning generic algorithms: formalisation and verification in CSP

    Authors: Ivan Prokić, Silvia Ghilezan, Simona Kašterović, Miroslav Popovic, Marko Popovic, Ivan Kaštelan

    Abstract: Federated learning (FL) is a machine learning setting where clients keep the training data decentralised and collaboratively train a model either under the coordination of a central server (centralised FL) or in a peer-to-peer network (decentralised FL). Correct orchestration is one of the main challenges. In this paper, we formally verify the correctness of two generic FL algorithms, a centralise… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: text overlap with arXiv:2305.20027

  2. A Simple Python Testbed for Federated Learning Algorithms

    Authors: Miroslav Popovic, Marko Popovic, Ivan Kastelan, Miodrag Djukic, Silvia Ghilezan

    Abstract: Nowadays many researchers are develo** various distributed and decentralized frameworks for federated learning algorithms. However, development of such a framework targeting smart Internet of Things in edge systems is still an open challenge. In this paper, we present our solution to that challenge called Python Testbed for Federated Learning Algorithms. The solution is written in pure Python, a… ▽ More

    Submitted 18 July, 2023; v1 submitted 31 May, 2023; originally announced May 2023.

    Comments: 6 pages, 7 figures, 3 algorithms, as accepted at ZINC 2023, Published by IEEE Xplore

    ACM Class: D.2.11

  3. arXiv:2212.06675  [pdf, ps, other

    math.LO cs.LO

    Logic of Combinatory Logic

    Authors: Simona Kašterović, Silvia Ghilezan

    Abstract: We develop a classical propositional logic for reasoning about combinatory logic. We define its syntax, axiomatic system and semantics. The syntax and axiomatic system are presented based on classical propositional logic, with typed combinatory terms as basic propositions, along with the semantics based on applicative structures extended with special elements corresponding to primitive combinators… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

    MSC Class: 03B40; 03B05 ACM Class: F.4.1

  4. arXiv:2112.11062  [pdf, other

    cs.LO math.LO

    L-types for resource awareness: an implicit name approach

    Authors: Silvia Ghilezan, Jelena Ivetić, Simona Kašterović, Pierre Lescanne

    Abstract: Since the early work of Church on $λ$I-calculus and Gentzen on structural rules, the control of variable use has gained an important role in computation and logic emerging different resource aware calculi and substructural logics with applications to programming language and compiler design. This paper presents the first formalization of variable control in calculi with implicit names based on de… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

  5. arXiv:2010.13925  [pdf, other

    cs.LO

    Precise Subty** for Asynchronous Multiparty Sessions

    Authors: Silvia Ghilezan, Jovanka Pantović, Ivan Prokić, Alceste Scalas, Nobuko Yoshida

    Abstract: This paper presents the first formalisation of the precise subty** relation for asynchronous multiparty sessions. We show that our subty** relation is sound (i.e., guarantees safe process replacement) and also complete: any extension of the relation is unsound. To achieve our results, we develop a novel session decomposition technique, from full session types (including internal/external choic… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    ACM Class: F.3.2; F.3.3

  6. A Typed Model for Dynamic Authorizations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling. We build upon the pi-calculus so as to e… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    Journal ref: EPTCS 203, 2016, pp. 73-84

  7. Precise subty** for synchronous multiparty sessions

    Authors: Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Nobuko Yoshida

    Abstract: The notion of subty** has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subty**, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with r… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    ACM Class: D.3.3; F.3.2

    Journal ref: EPTCS 203, 2016, pp. 29-43

  8. Combining behavioural types with security analysis

    Authors: Massimo Bartoletti, Ilaria Castellani, Pierre-Malo Deniélou, Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, Jorge A. Pérez, Peter Thiemann, Bernardo Toninho, Hugo Torres Vieira

    Abstract: Today's software systems are highly distributed and interconnected, and they increasingly rely on communication to achieve their goals; due to their societal importance, security and trustworthiness are crucial aspects for the correctness of these systems. Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforc… ▽ More

    Submitted 8 October, 2015; originally announced October 2015.

    Journal ref: Journal of Logical and Algebraic Methods in Programming, Elsevier, 2015, pp.18

  9. arXiv:1412.2219  [pdf, ps, other

    cs.LO math.LO

    Resource control and intersection types: an intrinsic connection

    Authors: S. Ghilezan, J. Ivetic, P. Lescanne, S. Likavec

    Abstract: In this paper we investigate the $λ$ -calculus, a $λ$-calculus enriched with resource control. Explicit control of resources is enabled by the presence of erasure and duplication operators, which correspond to thinning and con-traction rules in the type assignment system. We introduce directly the class of $λ$ -terms and we provide a new treatment of substitution by its decompo-sition into atomic… ▽ More

    Submitted 6 December, 2014; originally announced December 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1306.2283

  10. Dynamic Role Authorization in Multiparty Conversations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at ru… ▽ More

    Submitted 25 August, 2014; originally announced August 2014.

    Comments: In Proceedings BEAT 2014, arXiv:1408.5564

    ACM Class: D.3.1; F.3.2

    Journal ref: EPTCS 162, 2014, pp. 1-8

  11. arXiv:1306.2283  [pdf, ps, other

    math.LO cs.LO

    A journey through resource control lambda calculi and explicit substitution using intersection types (an account)

    Authors: Silvia Ghilezan, Jelena Ivetic, Pierre Lescanne, Silvia Likavec

    Abstract: In this paper we invite the reader to a journey through three lambda calculi with resource control: the lambda calculus, the sequent lambda calculus, and the lambda calculus with explicit substitution. All three calculi enable explicit control of resources due to the presence of weakening and contraction operators. Along this journey, we propose intersection type assignment systems for all three r… ▽ More

    Submitted 10 June, 2013; originally announced June 2013.

    Comments: arXiv admin note: text overlap with arXiv:1112.3455

  12. arXiv:1203.4754  [pdf, other

    cs.LO cs.DC math.LO

    Computational interpretation of classical logic with explicit structural rules

    Authors: Silvia Ghilezan, Pierre Lescanne, Dragisa Zunic

    Abstract: We present a calculus providing a Curry-Howard correspondence to classical logic represented in the sequent calculus with explicit structural rules, namely weakening and contraction. These structural rules introduce explicit erasure and duplication of terms, respectively. We present a type system for which we prove the type-preservation under reduction. A mutual relation with classical calculus fe… ▽ More

    Submitted 21 March, 2012; originally announced March 2012.

  13. arXiv:1112.3455  [pdf, other

    math.LO cs.LO

    Resource control and strong normalisation

    Authors: Silvia Ghilezan, Jelena Ivetic, Pierre Lescanne, Silvia Likavec

    Abstract: We introduce the \emph{resource control cube}, a system consisting of eight intuitionistic lambda calculi with either implicit or explicit control of resources and with either natural deduction or sequent calculus. The four calculi of the cube that correspond to natural deduction have been proposed by Kesner and Renaud and the four calculi that correspond to sequent lambda calculi are introduced i… ▽ More

    Submitted 17 May, 2013; v1 submitted 15 December, 2011; originally announced December 2011.