Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selected Z Bibliography.. Z User Workshop, page 353-373. Springer, (1990)PRG Archive Server.. Z User Workshop, page 379-379. Springer, (1990)Ten Commandments of Formal Methods... Ten Years On., and . Conquering Complexity, Springer, (2012)On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe?, and . CoRR, (2014)Decompilation: The Enumeration of Types and Grammars., and . ACM Trans. Program. Lang. Syst., 16 (5): 1613-1647 (1994)Select Z Bibliography.. ZUM, volume 1493 of Lecture Notes in Computer Science, page 367-406. Springer, (1998)Comp.specification.z and Z FORUM Frequently Asked Questions.. ZUM, volume 967 of Lecture Notes in Computer Science, page 561-569. Springer, (1995)Safe Compilation for Hidden Deterministic Hardware Aliasing., and . ISSRE Workshops, page 422-427. IEEE, (2019)An Approach to the Specification and Verification of a Hardware Compilation Scheme., and . The Journal of Supercomputing, 19 (1): 23-39 (2001)Continuity aspects of embedded reconfigurable computing., and . ISSE, 1 (1): 41-53 (2005)