Author of the publication

Liveness by Invisible Invariants.

, , , and . FORTE, volume 4229 of Lecture Notes in Computer Science, page 356-371. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On What Linda Is: Formal Description of Linda as a Reactive System., and . COORDINATION, volume 1282 of Lecture Notes in Computer Science, page 187-204. Springer, (1997)Invisible Safety of Distributed Protocols., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 528-539. Springer, (2006)From model checking to a temporal proof for partial models: preliminary example., , , , and . CoRR, (2017)TamperProof: a server-agnostic defense for parameter tampering attacks on web applications., , , , and . CODASPY, page 129-140. ACM, (2013)Ranking Abstraction as Companion to Predicate Abstraction., , and . FORTE, volume 3731 of Lecture Notes in Computer Science, page 1-12. Springer, (2005)Automatic Verification of Probabilistic Free Choice., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 208-224. Springer, (2002)Formal Verification of Backward Compatibility of Microcode., , , , , , , , , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 185-198. Springer, (2005)IIV: An Invisible Invariant Verifier., , , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 408-412. Springer, (2005)From Model Checking to a Temporal Proof., and . SPIN, volume 2057 of Lecture Notes in Computer Science, page 1-14. Springer, (2001)Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness., , , , , and . CSF, page 145-160. IEEE Computer Society, (2013)