Author of the publication

Verifying Statemate Statecharts Using CSP and FDR.

, and . ICFEM, volume 4260 of Lecture Notes in Computer Science, page 324-341. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Laws of programming, , , , , , , , and . Commun. ACM, 30 (8): 672--686 (August 1987)Data Independent Induction over Structured Networks., and . PDPTA, CSREA Press, (2000)Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM., and . ICISSP, page 611-618. SCITEPRESS, (2020)Unbounded Nondeterminism in CSP., and . Mathematical Foundations of Programming Semantics, volume 442 of Lecture Notes in Computer Science, page 160-193. Springer, (1989)Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion).. Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 198-205. Springer, (2016)Translating between models of concurrency., and . CoRR, (2019)A theory of binary digital pictures., and . Comput. Vis. Graph. Image Process., 32 (2): 221-243 (1985)Laws of Programming., , , , , , , , and . Commun. ACM, 30 (8): 672-686 (1987)Corrigendum: CACM 30(9): 770 (1987).Slow Abstraction via Priority., and . Theories of Programming and Formal Methods, volume 8051 of Lecture Notes in Computer Science, page 326-345. Springer, (2013)The Theory and Practice of Concurrency. Prentice-Hall Series in Computing Science Prentice Hall, 1 edition, (Nov 10, 1998)