Author of the publication

Extracting Purely Functional Contents from Logical Inductive Types.

, , and . TPHOLs, volume 4732 of Lecture Notes in Computer Science, page 70-85. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin., , , and . IACR Cryptol. ePrint Arch., (2021)Improving Predictability, Efficiency and Trust of Model-Based Proof Activity., , , and . ICSE (2), page 139-148. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Formal Modeling of Airport Security Regulations using the Focal Environment., , and . RELAW, page 16-20. IEEE Computer Society, (2008)Djed: A Formally Verified Crypto-Backed Autonomous Stablecoin Protocol., , , and . ICBC, page 1-9. IEEE, (2023)Extracting Purely Functional Contents from Logical Inductive Types., , and . TPHOLs, volume 4732 of Lecture Notes in Computer Science, page 70-85. Springer, (2007)Certifying Airport Security Regulations Using the Focal Environment., , and . FM, volume 4085 of Lecture Notes in Computer Science, page 48-63. Springer, (2006)Producing UML Models from Focal Specifications: An Application to Airport Security Regulations., , and . TASE, page 121-124. IEEE Computer Society, (2008)Using Simulink Design Verifier for Proving Behavioral Properties on a Complex Safety Critical System in the Ground Transportation Domain., , and . CSDM, page 61-72. Springer, (2010)A formal and sound transformation from Focal to UML : an application to airport security regulations., , and . Innov. Syst. Softw. Eng., 4 (3): 267-274 (2008)Modeling Airport Security Regulations in Focal., , and . ReMo2V, volume 241 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)