Marco Giunti

Learn More
We present a type checking algorithm for establishing a session-based discipline in the pi calculus of Milner, Parrow and Walker. Our session types are qualified as linear or unrestricted. Linearly typed communication channels are guaranteed to occur in exactly one thread, possibly multiple times; afterwards they evolve as unrestricted channels. Session(More)
We present a simple and intuitive type system for a variant of the pi calculus with sessions where typable processes are guaranteed to be exempt from runtime errors. The type system, meant to type programs, cannot be directly used to type the runtime language. Hence, type-safety cannot be proved directly, via Subject Reduction. Instead we define a different(More)
OBJECTIVES No study has evaluated circulating CXCL10 in patients with mixed cryoglobulinemia (MC) and hepatitis C virus (HCV) chronic infection. The aim of this study is to measure inteferon-inducible protein 10 (CXCL10/IP-10), interferon-gamma (IFN-gamma), and tumor necrosis factor alpha (TNF-alpha) (Th1 cytokines) in a series of cryoglobulinemic patients(More)
Mixed cryoglobulinemia (MC) is a systemic small-vessel vasculitis; B-cell expansion is the biological substrate of the disease. It can be regarded as benign lymphoproliferative condition that may evolve to frank lymphoma. HCV infection is the main causative factor of MC, as well as of other overlapping disorders, through multifactorial and multistep(More)
does not allow the transmission of an arbitrary channel. In most situations a receiving process k?(k′′).Q can be alpha-converted ahead of communication so that the bound channel k′′ syntactically matches the free channel k′ in the object of the sending process [11]. The exception happens exactly when k′ is free in Q: alpha-conversion becomes impossible (for(More)
We present a type checking algorithm for establishing a session-based discipline in a π-calculus with name matching. We account for analyzing processes exhibiting different behaviours in the branches of the if-then-else by imposing an affine discipline for session types. This permits to obtain type-safety or absence of communication errors while accepting(More)
The ability to prevent and to detect intrusions in computer systems is often heavily conditioned by having some knowledge of the security flaws of the system under analysis. Discover intrusions is particularly hard in concurrent systems, which contain several interactions among their components; suspicious interactions are usually studied manually by(More)