From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Axiomatization of "If-Then-Else"., и . SIAM J. Comput., 16 (2): 332-357 (1987)Proving operational termination of membership equational programs., , , , и . High. Order Symb. Comput., 21 (1-2): 59-88 (2008)Ground confluence of order-sorted conditional specifications modulo axioms., , и . J. Log. Algebraic Methods Program., (2020)Taming distributed system complexity through formal patterns.. Sci. Comput. Program., (2014)User Interfaces and Metalanguage Applications., , , , , , и . All About Maude, том 4350 из Lecture Notes in Computer Science, Springer, (2007)Functional Modules., , , , , , и . All About Maude, том 4350 из Lecture Notes in Computer Science, Springer, (2007)LTL Model Checking., , , , , , и . All About Maude, том 4350 из Lecture Notes in Computer Science, Springer, (2007)A Hierarchy of Data Types: From Trees to Sets., , , , , , и . All About Maude, том 4350 из Lecture Notes in Computer Science, Springer, (2007)Unwinding and Inference Control., и . S&P, стр. 75-87. IEEE Computer Society, (1984)Security Policies and Security Models., и . S&P, стр. 11-20. IEEE Computer Society, (1982)