Skip to main content

Showing 1–5 of 5 results for author: Prokić, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.21108  [pdf, other

    cs.LO

    Relaxed Choices in Bottom-Up Asynchronous Multiparty Session Types

    Authors: Ivan Prokić, Simona Prokić, Silvia Ghilezan, Alceste Scalas, Nobuko Yoshida

    Abstract: Asynchronous multiparty session types provide a formal model for expressing the behaviour of communicating processes and verifying that they correctly implement desired protocols. In the ``bottom-up'' approach to session typing, local session types are specified directly, and the properties of their composition (e.g. deadlock freedom and liveness) are checked and transferred to well-typed processe… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

    Comments: 27 pages

  2. arXiv:2306.14529  [pdf, other

    cs.DC

    Correct orchestration of Federated Learning generic algorithms: formalisation and verification in CSP

    Authors: Ivan Prokić, Silvia Ghilezan, Simona Kašterović, Miroslav Popovic, Marko Popovic, Ivan Kaštelan

    Abstract: Federated learning (FL) is a machine learning setting where clients keep the training data decentralised and collaboratively train a model either under the coordination of a central server (centralised FL) or in a peer-to-peer network (decentralised FL). Correct orchestration is one of the main challenges. In this paper, we formally verify the correctness of two generic FL algorithms, a centralise… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: text overlap with arXiv:2305.20027

  3. arXiv:2010.13925  [pdf, other

    cs.LO

    Precise Subtyping for Asynchronous Multiparty Sessions

    Authors: Silvia Ghilezan, Jovanka Pantović, Ivan Prokić, Alceste Scalas, Nobuko Yoshida

    Abstract: This paper presents the first formalisation of the precise subtyping relation for asynchronous multiparty sessions. We show that our subtyping relation is sound (i.e., guarantees safe process replacement) and also complete: any extension of the relation is unsound. To achieve our results, we develop a novel session decomposition technique, from full session types (including internal/external choic… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    ACM Class: F.3.2; F.3.3

  4. The Cpi-calculus: a Model for Confidential Name Passing

    Authors: Ivan Prokić

    Abstract: Sharing confidential information in distributed systems is a necessity in many applications, however, it opens the problem of controlling information sharing even among trusted parties. In this paper, we present a formal model in which dissemination of information is disabled at the level of the syntax in a direct way. We introduce a subcalculus of the pi-calculus in which channels are considered… ▽ More

    Submitted 12 September, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: In Proceedings ICE 2019, arXiv:1909.05242

    Journal ref: EPTCS 304, 2019, pp. 115-136

  5. arXiv:1802.05863  [pdf, ps, other

    cs.PL

    A Calculus for Modeling Floating Authorizations

    Authors: Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira

    Abstract: Controlling resource usage in distributed systems is a challenging task given the dynamics involved in access granting. Consider, for instance, the setting of floating licenses where access can be granted if the request originates in a licensed domain and the number of active users is within the license limits, and where licenses can be interchanged. Access granting in such scenarios is given in t… ▽ More

    Submitted 16 February, 2018; originally announced February 2018.