Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From High-Level Descriptions to VLSI Circuits., and . BIT, 28 (3): 620-638 (1988)Design Verification Using Synchronized Transitions.. Formal Hardware Verification, volume 1287 of Lecture Notes in Computer Science, page 114-155. Springer, (1997)A Comparison of Modular Verification Techniques., , and . TAPSOFT, volume 1214 of Lecture Notes in Computer Science, page 550-564. Springer, (1997)Viewpoint - Research evaluation for computer science., , , and . Commun. ACM, 52 (4): 31-34 (2009)Analysis of concurrent algorithms.. CONPAR, volume 111 of Lecture Notes in Computer Science, page 217-230. Springer, (1981)Synthesizing Delay Insensitive Circuits from Verified Programs., , and . Research Directions in High-Level Parallel Programming Languages, volume 574 of Lecture Notes in Computer Science, page 326-337. Springer, (1991)What is a Correct Behaviour of a File Under Concorrent Access?, and . DDB, page 93-103. North-Holland Publishing Company, (1982)The Behavior of Shared Objects: Concepts, Pitfalls, and a New Model., and . Inf. Process. Lett., 30 (3): 145-151 (1989)Specification and Implementation of Mutual Exclusion., and . IEEE Trans. Software Eng., 4 (5): 365-370 (1978)Geometrical Constructions., and . Program Specification, volume 134 of Lecture Notes in Computer Science, page 25-46. Springer, (1981)