Author of the publication

From UML to Process Algebra and Back: An Automated Approach to Model-Checking Software Design Artifacts of Concurrent Systems.

, , , , , , and . NASA Formal Methods, volume 7871 of Lecture Notes in Computer Science, page 244-260. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Detailed Account of The Inconsistent Labelling Problem of Stutter-Preserving Partial-Order Reduction., , and . CoRR, (2020)Property Specification Made Easy: Harnessing the Power of Model Checking in UML Designs., , , , and . FORTE, volume 8461 of Lecture Notes in Computer Science, page 17-32. Springer, (2014)Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies Using mCRL2., , , , and . FORTE, volume 13273 of Lecture Notes in Computer Science, page 11-30. Springer, (2022)Bisimulation Minimisations for Boolean Equation Systems., and . Haifa Verification Conference, volume 6405 of Lecture Notes in Computer Science, page 102-116. Springer, (2009)Strategy Derivation for Small Progress Measures., and . CoRR, (2014)On Parity Game Preorders and the Logic of Matching Plays., and . SOFSEM, volume 9587 of Lecture Notes in Computer Science, page 277-289. Springer, (2016)Integrating Verification, Testing, and Learning for Cryptographic Protocols., , , , and . IFM, volume 4591 of Lecture Notes in Computer Science, page 538-557. Springer, (2007)Proof Graphs for Parameterised Boolean Equation Systems., , and . CONCUR, volume 8052 of Lecture Notes in Computer Science, page 470-484. Springer, (2013)Static Analysis Techniques for Parameterised Boolean Equation Systems., , and . TACAS, volume 5505 of Lecture Notes in Computer Science, page 230-245. Springer, (2009)A framework for the extended evaluation of ABAC policies., , and . Cybersecurity, 2 (1): 6 (2019)