Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward an Inductionless Technique for Proving Properties of Logic Programs., , and . ICLP, page 175-181. ADDP-GIA, (1982)CCS is an (Augmented) Contact Free C/E System., , and . Mathematical Models for the Semantics of Parallelism, volume 280 of Lecture Notes in Computer Science, page 144-165. Springer, (1986)Expressive Models for Synaptic Plasticity., , , and . CMSB, volume 4695 of Lecture Notes in Computer Science, page 152-167. Springer, (2007)Causal Trees: Interleaving + Causality., and . Semantics of Systems of Concurrent Processes, volume 469 of Lecture Notes in Computer Science, page 239-255. Springer, (1990)Cells in Silico: A Holistic Approach., , , and . SFM, volume 5016 of Lecture Notes in Computer Science, page 366-386. Springer, (2008)Observation Trees., , and . NAPAW, page 103-118. Springer, (1992)Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty., , and . Protocols, Strands, and Logic, volume 13066 of Lecture Notes in Computer Science, page 124-138. Springer, (2021)A Formal Analysis of Complex Type Flaw Attacks on Security Protocols., , and . AMAST, volume 5140 of Lecture Notes in Computer Science, page 167-183. Springer, (2008)Fairness and Priority., and . Fundam. Informaticae, 22 (3): 299-306 (1995)Control-flow Flattening Preserves the Constant-Time Policy (Extended Version)., , and . CoRR, (2020)