<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Bisimilarity via unique-solution techniques</article-title>
      </title-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Bisimilarity is employed to dene behavioural equivalences and reason about them.
Finding its origins in concurrency theory, bisimilarity is now widely used also in
other areas, as well as outside Computer Science.</p>
      <p>
        In proofs of bisimilarity results, the bisimulation proof method has become
predominant, particularly with the enhancements of the method provided by the
so called ‘up-to techniques’ [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Among these, one of the most powerful ones is
‘up-to context’, whereby, during the bisimulation game, a common context in the
derivatives of two terms can be erased. Forms of ‘bisimulations up-to context’
have been shown to be eective in various elds, including process calculi [
        <xref ref-type="bibr" rid="ref11 ref13 ref18">13, 18,
11</xref>
        ], -calculi [
        <xref ref-type="bibr" rid="ref22 ref5 ref6 ref7">7, 6, 5, 22</xref>
        ], and automata [
        <xref ref-type="bibr" rid="ref1 ref16">1, 16</xref>
        ]. A lot of work has been carried out
recently on ’up-to context’ and other up-to techniques, as well as on trying to give
a systematic treatment of the set of all such techniques (e.g., the tutorial [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]).
      </p>
      <p>
        In this paper we summarise a dierent, ongoing, strand of work about
techniques for proving bisimilarity results. This strand is inspired by Milner’s theorem
about unique solution of equations in his landmark book on CCS [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This theorem
roughly says that two tuples of processes are componentwise bisimilar if they are
solutions of the same system of equations. Milner’s theorem has however syntactic
constraints, on the shape of the equations. For instance, the theorem heavily relies
on the sum operator { any other operator but prex and sum is essentially
forbidden. This limits the expressiveness of the technique (since occurrences of other
operators above the variables, such as parallel composition and restriction, in
general cannot be removed), and its transport onto other languages (e.g., languages
for distributed systems or higher-order languages, which usually do not include
the sum operator).
      </p>
      <p>An important remark has to be made before providing more technical details.
In this paper, behavioural equivalences, hence also bisimilarity, are meant to be
weak because they abstract from internal moves of terms, as opposed to the strong
ones, which make no distinctions between the internal moves and the external ones
(i.e., the interactions with the environment). Weak equivalences are, practically,
the most relevant ones: e.g., two equal programs may produce the same result with
dierent numbers of evaluation steps. The problems mentioned above concerning
Milner’s theorem do not exist in the case of strong bisimilarity.</p>
      <p>
        We outline two directions for improving Milner’s unique-solution technique.
The rst consists in replacing equations with special inequations called
contractions [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The second consists in replacing the most severe syntactic constraint in
Milner’s theorem with a semantic condition that has to do with divergence [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ].
      </p>
      <p>
        Other motivations for the work on unique solutions are the following. First,
the unique-solution techniques convey the avour of ’bisimilarity up-to context’
techinques, as the equations (or contractions) intuitively bring out those contexts
that would be erased in an ’up-to context’ proof (indeed there are completeness
results with respect to certain forms of up-to context, in CCS-like languages [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]).
Thus here the goal is to bring light into the up-to-context techniques. For instance,
in higher-order languages, while there are well-developed techniques for proving
congruence [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], up-to context is still poorly understood [
        <xref ref-type="bibr" rid="ref11 ref22 ref5 ref6 ref7">7, 6, 5, 22, 11</xref>
        ].
      </p>
      <p>Another possible interest for the unique-solution techniques is that they can be
transported onto other equivalences, including contextually-dened equivalences
such as barbed congruence, and non-coinductive equivalences such as contextual
equivalence (i.e., may testing) and trace equivalence.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Equations and Milner’s theorem</title>
      <p>
        We recall equations and Milner’s theorem, in the setting of CCS. We omit the
standard denitions of syntax and operational semantics of the calculus, as well
of weak bisimulation, written , [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Uniqueness of solutions of equations [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] intuitively says that if a context C obeys
certain conditions, then all processes P that satisfy the equation P C[P ] are
bisimilar with each other. We use capital letters X; Y; Z for variable of equations.
The body of an equation is a CCS expression possibly containing variables.
Denition 1. Given, for each i of a countable indexing set I, variables Xi, and
expressions Ei possibly containing such variables, fXi = Eigi2I is a system of
equations. (There is one equation for each variable Xi.)
      </p>
      <p>We write E[Pe] for the expression resulting from E by replacing each variable
Xi with the process Pi</p>
      <sec id="sec-2-1">
        <title>Denition 2.</title>
        <p>Suppose fXi = Eigi2I is a system of equations:
{ Pe is a solution of the system of equations for</p>
        <p>Pi Ei[Pe].
{ the system has a unique solution for</p>
        <p>for , then Pe Qe.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Denition 3.</title>
        <p>A system of equations fXi = Eigi2I is</p>
        <p>if for each i it holds that
if whenever Pe and Qe are both solutions
{ guarded if, in each Ei, each occurrence of an equation variable is underneath
a visible prex (i.e., a prex that is not );
{ sequential if, in each Ei, each occurrence of an equation variable only appears
underneath prexes and sums.</p>
        <p>In other words, if the system is sequential, then for every expression Ei, any
subexpression of Ei in which Xj appears, apart from Xj itself, is a sum (of prexed
terms). For instance, X = . X + . 0 is sequential but not guarded; using ‘
for a visible prex, X = ‘. X j P is guarded but not sequential, whereas X =
‘. X + . a (a. b j a. 0), as well as X = . (a. X + . b. X + ) are both guarded
and sequential.</p>
        <p>
          Theorem 1 (unique solution of equations, [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]). A system of guarded and
sequential equations has a unique solution for .
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Contractions</title>
      <p>
        Intuitively, for a behavioural equivalence , its contraction is a preorder in
which P Q holds if P Q and, in addition, Q has the possibility of being at
least as ecient as P . That is, if P can do some work (i.e., some interactions with
its environment), then Q should be able to do the same work at least as quickly
as P (i.e., performing no more -steps then those performed by P ). Process Q,
however, may be nondeterministic and may have other ways of doing the same
work, and these could be slow (i.e., involving more -steps than those performed
by P ). The bisimilarity contraction is written bis and is a precongruence in CCS;
see [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ] for the formal denition. A system of contractions is dened as a system
of equations, except that the contraction symbol is used in the place of the
equality symbol =. Thus a system of contractions is a set fXi Eigi2I where I is
an indexing set and expressions Ei may contain the contraction variables fXigi2I .
Denition 4. Given a behavioural equivalence
system of contractions fXi Eigi2I , we say that:
and its contraction
, and a
{ Pe is a solution for of the system of contractions if Pe Ee[Pe];
{ the system has a unique solution for if whenever Pe and Qe are both solutions
for then Pe Qe.
      </p>
      <p>When we reason about bisimilarity, the contraction symbol is interpreted as
the bisimilarity contraction bis, and the equivalence as the bisimilarity . Thus
Pe being a solution for bis of the system of contractions fXi Eigi2I means that
Pe bis Ee[Pe]; and the system having a unique solution for means that whenever
Pe and Qe are both solutions for bis then Pe Qe.</p>
      <p>Lemma 1. If a system of equations fXi = Eigi2I has a unique solution for ,
then also the corresponding system of contractions fXi Eigi2I has a unique
solution for .</p>
      <p>The converse of the lemma, in contrast, is false: systems of contractions more
easily have a unique solution.</p>
      <p>Denition 5. A system of contractions fXi Eigi2I is weakly guarded if, in
each Ei, each occurrence of a contraction variable is underneath a prex.</p>
      <sec id="sec-3-1">
        <title>Theorem 2 (unique solution of contractions for</title>
        <p>guarded contractions has a unique solution for .
). A system of
weakly</p>
        <p>
          We refer to [
          <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
          ] for discussions on completeness (the method is complete, in
the sense that any process bisimilarity can be proved with the method), examples
of application, abstract formulation of the method, and generalisation to other
languages and to other equivalences, including non-coinductive equivalences.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Divergence in equations</title>
      <p>
        In this section we highlight a dierent approach, whereby one goes back to
equations, but adds a condition based in divergence. In its basic form, the method
(inspired by results by Roscoe in CSP [
        <xref ref-type="bibr" rid="ref14 ref15">15, 14</xref>
        ] essentially says that a guarded equation
(or system of equations) whose innite unfolding never produces a divergence has
the unique-solution property.
      </p>
      <p>We discuss the approach in CCS, as before, and assuming for simplicity a single
equation X = E (the results can be generalised to systems of equations). We need
to reason with the unfoldings of the given equation X = E: we dene the n-th
unfolding of E to be En; thus E1 is dened as E, E2 as E[E], and En+1 as
En[E]. The innite unfolding represents the simplest and most intuitive solution
to the equation. In the CCS grammar, such a solution is obtained by turning the
4
KE with KE = E[KE ].
equation into a recursive denition, namely the process
Process KE is the syntactic solution of the equation .</p>
      <p>Theorem 3 (Unique solution). A guarded system of equations whose syntactic
solutions do not diverge has a unique solution for .</p>
      <p>The theorem can be strengthened by distinguishing between dierent forms
of divergence; in particular, ignoring divergences that already show up in partial
unfoldings of the equations, i.e., En for some n 0, called innocuous divergences.</p>
      <p>
        We refer to [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] for abstract formulations of the method, application to other
languages, equivalences, as well as preorders. In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] the method is applied to
showing what is the equivalence induced on -terms by Milner’s encoding into the
-calculus (for call-by-value), a problem that had remained open since Milner’s
work on functions as processes [
        <xref ref-type="bibr" rid="ref10 ref9">10, 9</xref>
        ]. Such proofs seem hard to carry out with
the ordinary bisimulation proof method, even when enhanced by means of ‘up-to
techniques’.
4.1
      </p>
      <sec id="sec-4-1">
        <title>Comparison</title>
        <p>
          In comparison with the method based on contractions, the main drawback for
the method based on equations is the presence of a semantic condition, involving
divergence: the unfoldings of the equations should not produce divergences, or only
produce innocuous divergences. Various techniques for checking divergence exist in
the literature, including type-based techniques [
          <xref ref-type="bibr" rid="ref19 ref2 ref23">23, 19, 2</xref>
          ]; a syntactic condition is
proposed in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. However, in general divergence is undecidable, and therefore, the
check may sometimes be unfeasible. Nevertheless, the equations that one writes
for proofs usually involve forms of ‘normalised’ processes, and as such they are
divergence free (or at most, contain only innocuous divergences). More experiments
are needed to validate this claim or to understand how limiting this problem is.
        </p>
        <p>On the other hand, using contractions for proving an equivalence, one needs
also the theory of the associated contraction preorder; moreover there may be
processes for which the contraction technique is not applicable simply because the
contraction preorder is strictly ner than the equivalence, and therefore one of the
processes fails to be a solution.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bonchi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pous</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Checking nfa equivalence with bisimulations up to congruence</article-title>
          . In: Giacobazzi,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Cousot</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (eds.)
          <source>Proc. POPL'13</source>
          . pp.
          <volume>457</volume>
          {
          <fpage>468</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Demangeon</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hirschko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Termination in impure concurrent languages</article-title>
          .
          <source>In: Proc. 21th CONCUR. LNCS 6269</source>
          , pp.
          <volume>328</volume>
          {
          <fpage>342</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Durier</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hirschko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Divergence and unique solution of equations</article-title>
          .
          <source>In: 28th CONCUR. LIPIcs</source>
          , vol.
          <volume>85</volume>
          , pp.
          <volume>11</volume>
          :
          <issue>1</issue>
          {
          <fpage>11</fpage>
          :
          <fpage>16</fpage>
          .
          <string-name>
            <surname>Schloss Dagstuhl - LeibnizZentrum fuer Informatik</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Durier</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hirschko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Eager functions as processes</article-title>
          .
          <source>In: 33nd Annual ACM/IEEE Symposium on Logic in Computer Science</source>
          ,
          <string-name>
            <surname>LICS</surname>
          </string-name>
          <year>2018</year>
          .
          <article-title>IEEE Computer Society (</article-title>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Koutavas</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wand</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Small bisimulations for reasoning about higher-order imperative programs</article-title>
          .
          <source>In: Proc. 33rd POPL</source>
          . pp.
          <volume>141</volume>
          {
          <issue>152</issue>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lassen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Relational reasoning about contexts</article-title>
          . In:
          <article-title>Higher-order operational techniques in semantics</article-title>
          . pp.
          <volume>91</volume>
          {
          <fpage>135</fpage>
          . Cambridge University Press (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lassen</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Bisimulation in untyped lambda calculus: Bohm trees and bisimulation up to context</article-title>
          .
          <source>Electr. Notes Theor. Comput. Sci</source>
          .
          <volume>20</volume>
          ,
          <issue>346</issue>
          {
          <fpage>374</fpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Milner</surname>
          </string-name>
          , R.:
          <article-title>Communication and Concurrency</article-title>
          . Prentice
          <string-name>
            <surname>Hall</surname>
          </string-name>
          (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Milner</surname>
          </string-name>
          , R.:
          <article-title>Functions as processes</article-title>
          .
          <source>Journal of Mathematical Structures in Computer Science</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ),
          <volume>119</volume>
          {
          <fpage>141</fpage>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Milner</surname>
          </string-name>
          , R.:
          <article-title>Functions as processes</article-title>
          .
          <source>In: ICALP. LNCS 443</source>
          , pp.
          <volume>167</volume>
          {
          <fpage>180</fpage>
          . Springer (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Peirard</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sumii</surname>
          </string-name>
          , E.:
          <article-title>Sound bisimulations for higher-order distributed process calculus</article-title>
          .
          <source>In: Proc. FOSSACS. LNCS 6604</source>
          , pp.
          <volume>123</volume>
          {
          <fpage>137</fpage>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Pitts</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Howe's method</article-title>
          . In: Sangiorgi,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Rutten</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <article-title>Advanced Topics in Bisimulation and Coinduction</article-title>
          . Cambridge University Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Pous</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Enhancements of the bisimulation proof method</article-title>
          . In: Sangiorgi,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Rutten</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <article-title>Advanced Topics in Bisimulation and Coinduction</article-title>
          . Cambridge University Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Roscoe</surname>
            ,
            <given-names>A.W.:</given-names>
          </string-name>
          <article-title>An alternative order for the failures model</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>2</volume>
          (
          <issue>5</issue>
          ),
          <volume>557</volume>
          {
          <fpage>577</fpage>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Roscoe</surname>
            ,
            <given-names>A.W.:</given-names>
          </string-name>
          <article-title>The theory and practice of concurrency</article-title>
          . Prentice Hall (
          <year>1998</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Rot</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bonsangue</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rutten</surname>
            ,
            <given-names>J.J.M.M.:</given-names>
          </string-name>
          <article-title>Coinductive proof techniques for language equivalence</article-title>
          .
          <source>In: Proc. LATA. LNCS 7810</source>
          , pp.
          <volume>480</volume>
          {
          <fpage>492</fpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milner</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The problem of \Weak Bisimulation up to"</article-title>
          .
          <source>In: Proc. CONCUR '92. LNCS 630</source>
          , pp.
          <volume>32</volume>
          {
          <fpage>46</fpage>
          . Springer Verlag (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walker</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The -calculus: a Theory of Mobile Processes</article-title>
          . Cambridge University Press (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Termination of processes</article-title>
          .
          <source>Mathematical Structures in Computer Science</source>
          <volume>16</volume>
          (
          <issue>1</issue>
          ),
          <volume>1</volume>
          {
          <fpage>39</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Equations, contractions, and
          <article-title>unique solutions</article-title>
          .
          <source>In: POPL 2015</source>
          . pp.
          <volume>421</volume>
          {
          <fpage>432</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2015</year>
          ),
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Equations, contractions, and
          <article-title>unique solutions</article-title>
          .
          <source>ACM Trans. Comput. Log</source>
          .
          <volume>18</volume>
          (
          <issue>1</issue>
          ), 4:
          <issue>1</issue>
          {4:
          <issue>30</issue>
          (
          <year>2017</year>
          ),
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Sangiorgi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kobayashi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sumii</surname>
          </string-name>
          , E.:
          <article-title>Environmental bisimulations for higher-order languages</article-title>
          .
          <source>ACM Trans. Program. Lang. Syst</source>
          .
          <volume>33</volume>
          (
          <issue>1</issue>
          ),
          <volume>5</volume>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Yoshida</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Honda</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Strong Normalisation in the Pi-Calculus</article-title>
          .
          <source>Information and Computation</source>
          <volume>191</volume>
          (
          <issue>2</issue>
          ),
          <volume>145</volume>
          {
          <fpage>202</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>