Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compliance in Real Time Multiset Rewriting Models., , , , and . CoRR, (2018)Towards a Theory of Actor Computation., , , and . CONCUR, volume 630 of Lecture Notes in Computer Science, page 565-579. Springer, (1992)Analysis of Cellular Proliferation and Survival Signaling by Using Two Ligand/Receptor Systems Modeled by Pathway Logic., , and . HSB, volume 9271 of Lecture Notes in Computer Science, page 226-245. Springer, (2015)Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems., , , , and . FORMATS, volume 9884 of Lecture Notes in Computer Science, page 228-244. Springer, (2016)A Simplifier for Untyped Lambda Expressions., and . CTRS, volume 516 of Lecture Notes in Computer Science, page 342-353. Springer, (1990)Specification Diagrams for Actor Systems., and . High. Order Symb. Comput., 15 (4): 301-348 (2002)Inferring the Equivalence of Functional Programs That Mutate Data., and . Theor. Comput. Sci., 105 (2): 167-215 (1992)Role of Nerve Growth Factor Signaling in Cancer Cell Proliferation and Survival Using a Reachability Analysis Approach., , , , and . PACBB, volume 477 of Advances in Intelligent Systems and Computing, page 173-181. Springer, (2016)Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures., and . TASE, volume 13931 of Lecture Notes in Computer Science, page 1-19. Springer, (2023)Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders., , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 450-470. Springer, (2016)