Author of the publication

Abstract Contract Synthesis and Verification in the Symbolic K Framework.

, , and . Fundam. Informaticae, 177 (3-4): 235-273 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monte Carlo simulation of electronic characteristics in short channel δ-doped AlInAs/GaInAs HEMTs., , , , and . Microelectron. Reliab., 41 (1): 73-77 (2001)Abstract Contract Synthesis and Verification in the Symbolic K Framework., , and . Fundam. Informaticae, 177 (3-4): 235-273 (2020)Langevin Forces and Generalized Transfer Fields for Noise Modelling in Deep Submicron Devices., , , , , , , , and . VLSI Design, 13 (1-4): 85-90 (2001)Full Passive UHF Tag With a Temperature Sensor Suitable for Human Body Temperature Monitoring., , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 57-II (2): 95-99 (2010)Symbolic Abstract Contract Synthesis in a Rewriting Framework., , and . LOPSTR, volume 10184 of Lecture Notes in Computer Science, page 187-202. Springer, (2016)Automatic Inference of Specifications in the K Framework., , and . PROLE, volume 200 of EPTCS, page 1-17. (2015)High injection effects on noise characteristics of Si BJTs and SiGe HBTs., , , and . Microelectron. Reliab., 41 (6): 847-854 (2001)Ultra-Low Power Passive UHF RFID for Wireless Sensor Networks., , , and . DSD, page 671-675. IEEE Computer Society, (2008)Analysing knowledge capture mechanisms: Methods and a stylised bioventure case., , , , , , and . J. Informetrics, 8 (1): 259-272 (2014)Detection of Malicious Bots Using a Proactive Supervised Classification Approach., , , , and . IWAIPR, volume 14335 of Lecture Notes in Computer Science, page 297-309. Springer, (2023)