Skip to main content

Showing 1–14 of 14 results for author: Johansen, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.05231  [pdf, ps, other

    cs.LO cs.CR cs.DC cs.PL

    Bisimulations Respecting Duration and Causality for the Non-interleaving Applied $π$-Calculus

    Authors: Clément Aubert, Ross Horne, Christian Johansen

    Abstract: This paper shows how we can make use of an asynchronous transition system, whose transitions are labelled with events and which is equipped with a notion of independence of events, to define non-interleaving semantics for the applied $π$-calculus. The most important notions we define are: Start-Termination or ST-bisimilarity, preserving duration of events; and History-Preserving or HP- bisimilarit… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

    Comments: In Proceedings EXPRESS/SOS 2022, arXiv:2208.14777

    ACM Class: F.3.2; C.2.2

    Journal ref: EPTCS 368, 2022, pp. 3-22

  2. arXiv:2202.03791  [pdf, ps, other

    cs.FL math.AT

    Kleene Theorem for Higher-Dimensional Automata

    Authors: Uli Fahrenberg, Christian Johansen, Georg Struth, Krzysztof Ziemiański

    Abstract: We prove a Kleene theorem for higher-dimensional automata. It states that the languages they recognise are precisely the rational subsumption-closed sets of finite interval pomsets. The rational operations on these languages include a gluing, for which we equip pomsets with interfaces. For our proof, we introduce higher-dimensional automata with interfaces, which are modelled as presheaves over la… ▽ More

    Submitted 8 April, 2024; v1 submitted 8 February, 2022; originally announced February 2022.

  3. arXiv:2106.10895  [pdf, other

    cs.FL

    Posets with Interfaces as a Model for Concurrency

    Authors: Uli Fahrenberg, Christian Johansen, Georg Struth, Krzysztof Ziemiański

    Abstract: We introduce posets with interfaces (iposets) and generalise their standard serial composition to a new gluing composition. In the partial order semantics of concurrency, interfaces and gluing allow modelling events that extend in time and across components. Alternatively, taking a decompositional view, interfaces allow cutting through events, while serial composition may only cut through edges of… ▽ More

    Submitted 4 November, 2022; v1 submitted 21 June, 2021; originally announced June 2021.

  4. arXiv:2103.07557  [pdf, other

    cs.FL

    Languages of Higher-Dimensional Automata

    Authors: Uli Fahrenberg, Christian Johansen, Georg Struth, Krzysztof Ziemiański

    Abstract: We introduce languages of higher-dimensional automata (HDAs) and develop some of their properties. To this end, we define a new category of precubical sets, uniquely naturally isomorphic to the standard one, and introduce a notion of event consistency. HDAs are then finite, labeled, event-consistent precubical sets with distinguished subsets of initial and accepting cells. Their languages are sets… ▽ More

    Submitted 3 September, 2021; v1 submitted 12 March, 2021; originally announced March 2021.

    MSC Class: 68Q70

  5. A Multidisciplinary Definition of Privacy Labels: The Story of Princess Privacy and the Seven Helpers

    Authors: Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll

    Abstract: Privacy is currently in distress and in need of rescue, much like princesses in the all-familiar fairytales. We employ storytelling and metaphors from fairytales to make reader-friendly and streamline our arguments about how a complex concept of Privacy Labeling (the 'knight in shining armor') can be a solution to the current state of Privacy (the 'princess in distress'). We give a precise definit… ▽ More

    Submitted 9 May, 2021; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 29 pages, 6 figures

    Journal ref: Information and Computer Security, Vol. 30, No. 3, (2022) pp. 452-469

  6. arXiv:2011.04704  [pdf, ps, other

    cs.LO

    Domain Semirings United

    Authors: Uli Fahrenberg, Christian Johansen, Georg Struth, Krzysztof Ziemiánski

    Abstract: Domain operations on semirings have been axiomatised in two different ways: by a map from an additively idempotent semiring into a boolean subalgebra of the semiring bounded by the additive and multiplicative unit of the semiring, or by an endofunction on a semiring that induces a distributive lattice bounded by the two units as its image. This note presents classes of semirings where these approa… ▽ More

    Submitted 22 March, 2021; v1 submitted 9 November, 2020; originally announced November 2020.

    Comments: 7 pages

    MSC Class: 03B45; 06F0; 16Y60 ACM Class: F.3.2

  7. Studying the Transfer of Biases from Programmers to Programs

    Authors: Johanna Johansen, Tore Pedersen, Christian Johansen

    Abstract: It is generally agreed that one origin of machine bias is resulting from characteristics within the dataset on which the algorithms are trained, i.e., the data does not warrant a generalized inference. We, however, hypothesize that a different `mechanism', hitherto not articulated in the literature, may also be responsible for machine's bias, namely that biases may originate from (i) the programme… ▽ More

    Submitted 13 December, 2020; v1 submitted 17 May, 2020; originally announced May 2020.

    Comments: 40 pages of which 7 pages of Appendix, 26 Figures, 2 Tables

    Journal ref: AI & SOCIETY: Knowledge, Culture and Communication, 2023, Vol.38, No.4, pp.1659-1683

  8. arXiv:1910.06162  [pdf, ps, other

    cs.FL math.CO

    Generating Posets Beyond N

    Authors: Uli Fahrenberg, Christian Johansen, Georg Struth, Ratan Bahadur Thapa

    Abstract: We introduce iposets---posets with interfaces---equipped with a novel gluing composition along interfaces and the standard parallel composition. We study their basic algebraic properties as well as the hierarchy of gluing-parallel posets generated from singletons by finitary applications of the two compositions. We show that not only series-parallel posets, but also interval orders, which seem mor… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

  9. Sculptures in Concurrency

    Authors: Uli Fahrenberg, Christian Johansen, Christopher A. Trotter, Krzysztof Ziemiański

    Abstract: We give a formalization of Pratt's intuitive sculpting process for higher-dimensional automata (HDA). Intuitively, an HDA is a sculpture if it can be embedded in (i.e., sculpted from) a single higher dimensional cell (hypercube). A first important result of this paper is that not all HDA can be sculpted, exemplified through several natural acyclic HDA, one being the famous "broken box" example of… ▽ More

    Submitted 13 April, 2021; v1 submitted 5 December, 2018; originally announced December 2018.

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 2 (April 14, 2021) lmcs:6524

  10. InfoInternet for Education in the Global South: A Study of Applications Enabled by Free Information-only Internet Access in Technologically Disadvantaged Areas (authors' version)

    Authors: Johanna Johansen, Christian Johansen, Josef Noll

    Abstract: This paper summarises our work on studying educational applications enabled by the introduction of a new information layer called InfoInternet. This is an initiative to facilitate affordable access to internet based information in communities with network scarcity or economic problems from the Global South. InfoInternet develops both networking solutions as well as business and social models, toge… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

    Comments: 16 pages, 1 figure, under review for a journal since March 2018

    Journal ref: African Journal of Science, Technology, Innovation and Development, 2022, Vol. 14, No. 3, pp. 642-654

  11. arXiv:1807.07952  [pdf, other

    cs.CR

    The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications

    Authors: Christian Johansen, Aulon Mujaj, Hamed Arshad, Josef Noll

    Abstract: In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. Several new implementations of such end-to-end encrypted… ▽ More

    Submitted 30 July, 2019; v1 submitted 20 July, 2018; originally announced July 2018.

    Comments: 38 pages, 24 figures, 2 tables. Under review for a Journal since Feb.2018

  12. Automated verification of dynamic root of trust protocols (long version)

    Authors: Sergiu Bursuc, Christian Johansen, Shiwei Xu

    Abstract: Automated verification of security protocols based on dynamic root of trust, typically relying on protected hardware such as TPM, involves several challenges that we address in this paper. We model the semantics of trusted computing platforms (including CPU, TPM, OS, and other essential components) and of associated protocols in a classical process calculus accepted by ProVerif. As part of the for… ▽ More

    Submitted 7 March, 2017; v1 submitted 30 January, 2017; originally announced January 2017.

    Comments: 27 pages with Appendix

    Journal ref: International Conference on Principles of Security and Trust. POST 2017. Lecture Notes in Computer Science, vol 10204, pp. 95-116. Springer

  13. arXiv:1612.00666  [pdf, ps, other

    cs.PL

    Dynamic Structural Operational Semantics

    Authors: Christian Johansen, Olaf Owe

    Abstract: We introduce Dynamic SOS as a framework for describing semantics of programming languages that include dynamic software upgrades, for upgrading software code during run-time. Dynamic SOS (DSOS) is built on top of the Modular SOS of P. Mosses, with an underlying category theory formalization. The idea of Dynamic SOS is to bring out the essential differences between dynamic upgrade constructs and pr… ▽ More

    Submitted 20 July, 2018; v1 submitted 2 December, 2016; originally announced December 2016.

    Comments: 36 pages

  14. arXiv:1404.5899  [pdf, ps, other

    math.NA cs.LG

    A Comparison of Clustering and Missing Data Methods for Health Sciences

    Authors: Ran Zhao, Deanna Needell, Christopher Johansen, Jerry L. Grenard

    Abstract: In this paper, we compare and analyze clustering methods with missing data in health behavior research. In particular, we propose and analyze the use of compressive sensing's matrix completion along with spectral clustering to cluster health related data. The empirical tests and real data results show that these methods can outperform standard methods like LPA and FIML, in terms of lower misclassi… ▽ More

    Submitted 22 April, 2014; originally announced April 2014.

    MSC Class: 62H30; 91C20; 94A08