Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attributed Data for CHR Indexing., and . ICLP, volume 5649 of Lecture Notes in Computer Science, page 357-371. Springer, (2009)Vacuity Checking in the Modal Mu-Calculus., , , and . AMAST, volume 2422 of Lecture Notes in Computer Science, page 147-162. Springer, (2002)Optimizing Inequality Joins in Datalog with Approximated Constraint Propagation., , and . PADL, volume 7149 of Lecture Notes in Computer Science, page 108-122. Springer, (2012)A Model-Based Design-for-Verification Approach to Checking for Deadlock in Multi-Threaded Applications., , and . International Journal of Software Engineering and Knowledge Engineering, 17 (2): 207-230 (2007)Compiling Constraint Handling Rules for Efficient Tabled Evaluation., and . PADL, volume 4354 of Lecture Notes in Computer Science, page 170-184. Springer, (2007)Typed Datalog., , and . PADL, volume 5418 of Lecture Notes in Computer Science, page 168-182. Springer, (2009)A Model-based Design-for-Verification Approach to Checking for Deadlock in Multi-threaded Applications., , and . SEKE, page 120-125. (2006)Constraint-Based Model Checking of Data-Independent Systems., and . ICFEM, volume 2885 of Lecture Notes in Computer Science, page 579-598. Springer, (2003)Approximating Constraint Propagation in Datalog, , and . CoRR, (2011)Contracts and Middleware for Safe SOA Applications., , and . SDSOA@ICSE, page 5. IEEE Computer Society, (2007)