Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inferring the Equivalence of Functional Programs That Mutate Data., and . Theor. Comput. Sci., 105 (2): 167-215 (1992)Predefined Data Modules., , , , , , and . All About Maude, volume 4350 of Lecture Notes in Computer Science, Springer, (2007)A Sampler of Application Areas., , , , , , and . All About Maude, volume 4350 of Lecture Notes in Computer Science, Springer, (2007)Introduction., , , , , , and . All About Maude, volume 4350 of Lecture Notes in Computer Science, Springer, (2007)Metaprogramming Applications., , , , , , and . All About Maude, volume 4350 of Lecture Notes in Computer Science, Springer, (2007)José Meseguer: Scientist and Friend Extraordinaire., , and . Logic, Rewriting, and Concurrency, volume 9200 of Lecture Notes in Computer Science, page 1-47. Springer, (2015)A Rewriting Framework for Activities Subject to Regulations., , , , , and . RTA, volume 15 of LIPIcs, page 305-322. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols., , , , and . POST, volume 9036 of Lecture Notes in Computer Science, page 259-279. Springer, (2015)Compliance in Real Time Multiset Rewriting Models., , , , and . CoRR, (2018)A Simplifier for Untyped Lambda Expressions., and . CTRS, volume 516 of Lecture Notes in Computer Science, page 342-353. Springer, (1990)