From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building certified components within FOCAL., , и . Trends in Functional Programming, том 5 из Trends in Functional Programming, стр. 33-48. Intellect, (2004)Formal Modeling of Airport Security Regulations using the Focal Environment., , и . RELAW, стр. 16-20. IEEE Computer Society, (2008)Development of a Programming Environment for Setl., , , и . ESEC, том 289 из Lecture Notes in Computer Science, стр. 21-32. Springer, (1987)Deriving Software Specifications from Event Based Models., , и . ZB, том 1878 из Lecture Notes in Computer Science, стр. 209-229. Springer, (2000)A tool for Ada program manipulations: mentor-Ada., , и . SIGAda, стр. 297-308. Cambridge University Press, (1985)Certifying Airport Security Regulations Using the Focal Environment., , и . FM, том 4085 из Lecture Notes in Computer Science, стр. 48-63. Springer, (2006)Documents Structure and Modularity in Mentor., , , и . Software Development Environments (SDE), стр. 141-148. ACM, (1984)SIGPLAN Notices 19 (5), May 1984.Producing UML Models from Focal Specifications: An Application to Airport Security Regulations., , и . TASE, стр. 121-124. IEEE Computer Society, (2008)Outline of a Tool for Document Manipulation., , , , и . IFIP Congress, стр. 615-620. North-Holland/IFIP, (1983)Modeling Airport Security Regulations in Focal., , и . ReMo2V, том 241 из CEUR Workshop Proceedings, CEUR-WS.org, (2006)