From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Checking Java Programs via Guarded Commands., , и . ECOOP Workshops, том 1743 из Lecture Notes in Computer Science, стр. 110-111. Springer, (1999)Generating Sorted Lists of Random Numbers., и . ACM Trans. Math. Softw., 6 (3): 359-364 (1980)Using Transformations and Verification in Ciruit Design., , , и . Designing Correct Circuits, том A-5 из IFIP Transactions, стр. 1-25. North-Holland, (1992)Finding Extrema with Unary Predicates., , , , и . Algorithmica, 9 (6): 591-600 (1993)Generating error traces from verification-condition counterexamples., , и . Sci. Comput. Program., 55 (1-3): 209-226 (2005)Avoiding exponential explosion: generating compact verification conditions., и . POPL, стр. 193-205. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.Transforming Static Data Structures to Dynamic Structures (Abridged Version), и . FOCS, стр. 148-168. IEEE Computer Society, (1979)A general method for solving divide-and-conquer recurrences., , и . SIGACT News, 12 (3): 36-44 (1980)Algorithms on vector sets., и . SIGACT News, 11 (2): 36-39 (1979)PLDI 2002: Extended static checking for Java., , , , , и . ACM SIGPLAN Notices, 48 (4S): 22-33 (2013)