Author of the publication

Proof Rules for the Programming Language Euclid.

, , , , , and . Program Construction, volume 69 of Lecture Notes in Computer Science, page 133-163. Springer, (1978)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frigate: a user-extensible OO file system., and . IEEE Concurrency, 6 (4): 26-35 (1998)Enabling Secure Ubiquitous Interactions., , , , , and . Middleware Workshops, page 76-80. PUC-Rio, (2003)Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract)., , and . SOSP, page 64-65. ACM, (1979)long version: CACM 23(2).Measuring the Quality of Service of Optimistic Replication., , , , , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 319-320. Springer, (1998)Vision, issues, and architecture for nomadic computing and communications., , , and . IEEE Wirel. Commun., 2 (6): 14-27 (1995)Saving portable computer battery power through remote process execution., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 2 (1): 19-26 (1998)Report on the programming language Euclid., , , , and . ACM SIGPLAN Notices, 12 (2): 1-79 (1977)The Ficus Replicated File System (Abstract)., , , and . ACM SIGOPS Oper. Syst. Rev., 26 (2): 26 (1992)Primarily Disconnected Operation: Experiences with Ficus., , , and . Workshop on the Management of Replicated Data, page 2-5. IEEE Computer Society Press, (1992)A Model for Verification of Data Security in Operating Systems., and . Commun. ACM, 21 (9): 737-749 (1978)