Author of the publication

Call-by-Value lambda-Graph Rewriting Without Rewriting.

, and . ICGT, volume 2505 of Lecture Notes in Computer Science, page 75-89. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Power of Linear Functions., , , and . CSL, volume 4207 of Lecture Notes in Computer Science, page 119-134. Springer, (2006)Static Analysis of Interaction Nets for Distributed Implementations.. SAS, volume 1302 of Lecture Notes in Computer Science, page 217-231. Springer, (1997)A Reversible Operational Semantics for Imperative Programming Languages., and . ICFEM, volume 12531 of Lecture Notes in Computer Science, page 91-106. Springer, (2020)Preface., and . TERMGRAPH, volume 72 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2002)The Geometry of Interaction Machine.. POPL, page 198-208. ACM Press, (1995)Coinductive Techniques for Operational Equivalence of Interaction Nets., and . LICS, page 321-332. IEEE Computer Society, (1998)Call-by-Value lambda-Graph Rewriting Without Rewriting., and . ICGT, volume 2505 of Lecture Notes in Computer Science, page 75-89. Springer, (2002)Combining interaction nets with externally defined programs., , and . APPIA-GULP-PRODE, page 297-312. Departamento de Informática, Universidade de Évora, (2001)Encouraging users to improve password security and memorability., and . Int. J. Inf. Sec., 18 (6): 741-759 (2019)Operational equivalence for interaction nets., and . Theor. Comput. Sci., 297 (1-3): 157-181 (2003)