Author of the publication

Verifying Statemate Statecharts Using CSP and FDR.

, and . ICFEM, volume 4260 of Lecture Notes in Computer Science, page 324-341. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimally-Fair Multi-party Exchange Without Trusted Parties., and . ESORICS (1), volume 14344 of Lecture Notes in Computer Science, page 313-333. Springer, (2023)Software and Malware Capabilities: Opinions on (Inter)national Security., and . CW, page 96-102. IEEE Computer Society, (2017)Slow Abstraction via Priority., and . Theories of Programming and Formal Methods, volume 8051 of Lecture Notes in Computer Science, page 326-345. Springer, (2013)Mobile Electronic Identity: Securing Payment on Mobile Phones., and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 22-37. Springer, (2011)Extracting Formal Smart-Contract Specifications from Natural Language with LLMs., , , , and . FACS, volume 15189 of Lecture Notes in Computer Science, page 109-126. Springer, (2024)Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving., , and . ACM Trans. Softw. Eng. Methodol., 28 (3): 18:1-18:43 (2019)Laws of programming, , , , , , , , and . Commun. ACM, 30 (8): 672--686 (August 1987)The Theory and Practice of Concurrency. Prentice-Hall Series in Computing Science Prentice Hall, 1 edition, (Nov 10, 1998)Data Independent Induction over Structured Networks., and . PDPTA, CSREA Press, (2000)Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM., and . ICISSP, page 611-618. SCITEPRESS, (2020)