Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to the Specification and Verification of a Hardware Compilation Scheme., and . The Journal of Supercomputing, 19 (1): 23-39 (2001)Formalization of Data Flow Computing and a Coinductive Approach to Verifying Flowware Synthesis., and . Transactions on Computational Science, (2008)Continuity aspects of embedded reconfigurable computing., and . ISSE, 1 (1): 41-53 (2005)Decompilation: The Enumeration of Types and Grammars., and . ACM Trans. Program. Lang. Syst., 16 (5): 1613-1647 (1994)On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe?, and . CoRR, (2014)Select Z Bibliography.. ZUM, volume 1493 of Lecture Notes in Computer Science, page 367-406. Springer, (1998)Comp.specification.z and Z FORUM Frequently Asked Questions.. ZUM, volume 967 of Lecture Notes in Computer Science, page 561-569. Springer, (1995)Selected Z Bibliography.. Z User Workshop, page 353-373. Springer, (1990)PRG Archive Server.. Z User Workshop, page 379-379. Springer, (1990)Ten Commandments of Formal Methods... Ten Years On., and . Conquering Complexity, Springer, (2012)