Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying a self-stabilizing mutual exclusion algorithm., and . PROCOMET, volume 125 of IFIP Conference Proceedings, page 424-443. Chapman & Hall, (1998)Proof Search (Tutorial)., and . ICLP Workshop: Proof-Theoretical Extensions on Logic Programming, (1994)The verified software initiative: A manifesto, , , and . ACM Comput. Surv., 41 (4): 1--8 (2009)Unraveling a Card Trick., and . Essays in Memory of Amir Pnueli, volume 6200 of Lecture Notes in Computer Science, page 195-201. Springer, (2010)Verification by Abstraction.. 10th Anniversary Colloquium of UNU/IIST, volume 2757 of Lecture Notes in Computer Science, page 367-380. Springer, (2002)An Integration of Model Checking with Automated Proof Checking., , and . CAV, volume 939 of Lecture Notes in Computer Science, page 84-97. Springer, (1995)Code Generation Using a Formal Model of Reference Counting., and . NFM, volume 9690 of Lecture Notes in Computer Science, page 150-165. Springer, (2016)PVS: Combining Specification, Proof Checking, and Model Checking.. FMCAD, volume 1166 of Lecture Notes in Computer Science, page 257-264. Springer, (1996)Static Analysis for Safe Destructive Updates in a Functional Language.. LOPSTR, volume 2372 of Lecture Notes in Computer Science, page 1-24. Springer, (2001)Using Decision Procedures with a Higher-Order Logic.. TPHOLs, volume 2152 of Lecture Notes in Computer Science, page 5-26. Springer, (2001)