Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Is in a Step: New Perspectives on a Classical Question., , and . Essays in Memory of Amir Pnueli, volume 6200 of Lecture Notes in Computer Science, page 370-399. Springer, (2010)Accessing Databases within Esterel., and . SYNCHRON, volume 04491 of Dagstuhl Seminar Proceedings, IBFI, Schloss Dagstuhl, Germany, (2004)Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams., , and . TACAS, volume 4424 of Lecture Notes in Computer Science, page 648-663. Springer, (2007)Heap Patterns for Memory Graph Visualization., and . VISSOFT, page 162-166. IEEE, (2022)Dynamic Priorities for Modeling Real-Time., , and . FORTE, volume 107 of IFIP Conference Proceedings, page 321-336. Chapman & Hall, (1997)Verifying compiled file system code., and . Formal Aspects Comput., 24 (3): 375-391 (2012)Preface., , and . SFEDL@ETAPS, volume 115 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2004)DSIbin: identifying dynamic data structures in C/C++ binaries., , , , , and . ASE, page 331-341. IEEE Computer Society, (2017)Priorities for Modeling and Verifying Distributed Systems., , , and . TACAS, volume 1055 of Lecture Notes in Computer Science, page 278-297. Springer, (1996)Safe Reasoning with Logic LTS., and . SOFSEM, volume 5404 of Lecture Notes in Computer Science, page 376-387. Springer, (2009)