Author of the publication

Towards Interpretation of Abstract Instructions Using Declarative Constraints in Temporal Logic.

, , , and . ICSCA, page 17-20. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More Expressive Temporal Logic for Specifications., and . SEKE, page 363-366. Knowledge Systems Institute, (1993)Logical environments for natural language approach., , and . ISPW, page 84-86. ACM, (1985)ACM SIGSOFT Software Engineering Notes 11(4), August 1986.Reliable Simulation and Monitoring of Hybrid Systems Based on Interval Analysis - (Extended Abstract)., , and . CyPhy, volume 11267 of Lecture Notes in Computer Science, page 79-82. Springer, (2017)Fast Translation from LTL to Büchi Automata via Non-transition-based Automata., , , and . ICFEM, volume 8829 of Lecture Notes in Computer Science, page 364-379. Springer, (2014)Modularization of formal specifications or efficient synthesis of reactive systems., , , and . ICSCA, page 208-213. ACM, (2017)Approximate Analysis of Homeostasis of Gene Networks by Linear Temporal Logic using Network Motifs., , and . BIOINFORMATICS, page 93-101. SciTePress, (2015)Temporal logic extended with object creation and destruction., and . SEKE, page 156-163. Knowledge Systems Institute, (1994)A Formal Ontology for Business Process Model TAP: Tasks-Agents-Products., , and . EJC, volume 166 of Frontiers in Artificial Intelligence and Applications, page 290-297. IOS Press, (2007)An Operational Semantics of Program Dependence Graphs for Unstructured Programs., , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 264-271. Springer, (2006)A Formal System for Analysis of Cryptographic Encryption and Their Security Properties., , and . ISSS, volume 3233 of Lecture Notes in Computer Science, page 87-112. Springer, (2003)