Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Finitary Projection Model for Second Order Lambda Calculus and Solutions to Higher Order Domain Equations, , and . LICS, page 122-130. IEEE Computer Society, (1986)A decompilation of the pi-calculus and its application to termination. CoRR, (2011)Max-Plus Quasi-interpretations.. TLCA, volume 2701 of Lecture Notes in Computer Science, page 31-45. Springer, (2003)A Functional Scenario for Bytecode Verification of Resource Bounds., , , and . CSL, volume 3210 of Lecture Notes in Computer Science, page 265-279. Springer, (2004)Guest editor's introduction: Special issue on Modelling and Verification of Cryptographic Protocols.. J. Log. Algebraic Methods Program., 64 (2): 155 (2005)Type-free compiling of parametric types., and . Formal Description of Programming Concepts, page 377-398. North-Holland, (1987)On the Reduction of Chocs Bisimulation to pi-Calculus Bisimulation.. CONCUR, volume 715 of Lecture Notes in Computer Science, page 112-126. Springer, (1993)Modelling IP Mobility., and . CONCUR, volume 1466 of Lecture Notes in Computer Science, page 301-316. Springer, (1998)Resource Control for Synchronous Cooperative Threads., and . CONCUR, volume 3170 of Lecture Notes in Computer Science, page 68-82. Springer, (2004)Reasoning about Higher-Order Processes., and . TAPSOFT, volume 915 of Lecture Notes in Computer Science, page 202-216. Springer, (1995)