Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Algorithms to Reason about XML Keys, , , , and . 23rd International Conference on Database and Expert Systems Applications (DEXA 2012), Vienna, Austria, 3-6 September, volume 7446 of Lecture Notes in Computer Science, page 101-115. Springer, (3--6 September 2012)A Complete Logic for Non-Deterministic Database Transformations., , , and . CoRR, (2016)On Fragments of Higher Order Logics that on Finite Structures Collapse to Second Order., , and . WoLLIC, volume 10388 of Lecture Notes in Computer Science, page 125-139. Springer, (2017)An automated evaluation of broker compatibility for the Message Queuing Telemetry Transport protocol., , and . J. Softw. Evol. Process., (July 2023)SQL-Sampler: A Tool to Visualize and Consolidate Domain Semantics by Perfect SQL Sample Data., , and . APCCM, volume 154 of CRPIT, page 71-80. Australian Computer Society, (2014)Expressivity Within Second-Order Transitive-Closure Logic., , and . CSL, volume 119 of LIPIcs, page 22:1-22:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Expressing Properties in Second and Third Order Logic: Hypercube Graphs and SATQBF, , and . CoRR, (2013)Uniform Polylogarithmic Space Completeness, , , and . Frontiers in Computer Science, (April 2022)Extracting High-Level System Specifications from Source Code via Abstract State Machines., , , and . MEDI, volume 11815 of Lecture Notes in Computer Science, page 267-283. Springer, (2019)Automated security test generation for MQTT using attack patterns., , and . ARES, page 97:1-97:9. ACM, (2020)