Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing Multiplicities in Class Diagrams., , and . MoDELS, volume 6981 of Lecture Notes in Computer Science, page 379-393. Springer, (2011)Configuration Repair via Flow Networks., , , and . ISMIS, volume 7661 of Lecture Notes in Computer Science, page 321-330. Springer, (2012)Consistency and Minimality of UML Class Specifications with Multiplicities and Uniqueness Constraints., and . TASE, page 411-420. IEEE Computer Society, (2007)Evolution of automated weakness detection in Ethereum bytecode: a comprehensive study., , , and . Empir. Softw. Eng., 29 (2): 41 (April 2024)On the Word, Subsumption, and Complement Problem for Recurrent Term Schematizations., and . MFCS, volume 1450 of Lecture Notes in Computer Science, page 257-266. Springer, (1998)Basic Rewriting via Logic Programming, with an Application to the Reachability Problem., and . J. Autom. Lang. Comb., 11 (1): 107-142 (2006)Identification of token contracts on Ethereum: standard compliance and beyond., and . Int. J. Data Sci. Anal., 16 (3): 333-352 (September 2023)Manipulating Tree Tuple Languages by Transforming Logic Programs., and . FTP, volume 86 of Electronic Notes in Theoretical Computer Science, page 76-90. Elsevier, (2003)Optimal Axiomatizations of Finitely Valued Logics.. Inf. Comput., 162 (1-2): 185-205 (2000)Minimal Distance of Propositional Models., , , and . Theory Comput. Syst., 63 (6): 1131-1184 (2019)