Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint-Based Verification of Client-Server Protocols., and . CP, volume 2239 of Lecture Notes in Computer Science, page 286-301. Springer, (2001)On the Qualitative Analysis of Conformon P Systems., , and . Workshop on Membrane Computing, volume 5391 of Lecture Notes in Computer Science, page 78-94. Springer, (2008)Attacking Symbolic State Explosion., , and . CAV, volume 2102 of Lecture Notes in Computer Science, page 298-310. Springer, (2001)Algorithmic Verification of Invalidation-Based Protocols., and . CAV, volume 2404 of Lecture Notes in Computer Science, page 295-308. Springer, (2002)Comparing the Expressive Power of Well-Structured Transition Systems., , and . CSL, volume 4646 of Lecture Notes in Computer Science, page 99-114. Springer, (2007)On the Dynamics of PB Systems with Volatile Membranes., and . Workshop on Membrane Computing, volume 4860 of Lecture Notes in Computer Science, page 240-256. Springer, (2007)An Abstract Machine for Asynchronous Programs with Closures and Priority Queues., , , , , , and . RP, volume 10506 of Lecture Notes in Computer Science, page 59-74. Springer, (2017)Towards Runtime Monitoring of Node.js and Its Application to the Internet of Things., , , , , and . ALP4IoT@iFM, volume 264 of EPTCS, page 27-42. (2017)Forum Objects., and . GULP-PRODE, page 283-294. (1995)A Bottom-Up Characterization of Finite Success., and . ILPS, page 676. MIT Press, (1993)