Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encouraging users to improve password security and memorability., and . Int. J. Inf. Sec., 18 (6): 741-759 (2019)Operational equivalence for interaction nets., and . Theor. Comput. Sci., 297 (1-3): 157-181 (2003)YALE: Yet Another Lambda Evaluator Based on Interaction Nets.. ICFP, page 117-128. ACM, (1998)SIGPLAN Notices 34(1), January 1999.Combining interaction nets with externally defined programs., , and . APPIA-GULP-PRODE, page 297-312. Departamento de Informática, Universidade de Évora, (2001)Call-by-Value lambda-Graph Rewriting Without Rewriting., and . ICGT, volume 2505 of Lecture Notes in Computer Science, page 75-89. Springer, (2002)A Lambda-Evaluator Based on Interaction Nets.. Theory and Formal Methods, page 41-60. Imperial College Press, (1994)From Term Rewriting to Generalised Interaction Nets., and . PLILP, volume 1140 of Lecture Notes in Computer Science, page 319-333. Springer, (1996)Iterator Types., , , and . FoSSaCS, volume 4423 of Lecture Notes in Computer Science, page 17-31. Springer, (2007)Static Analysis of Interaction Nets for Distributed Implementations.. SAS, volume 1302 of Lecture Notes in Computer Science, page 217-231. Springer, (1997)The Power of Linear Functions., , , and . CSL, volume 4207 of Lecture Notes in Computer Science, page 119-134. Springer, (2006)