Author of the publication

A Specification Logic for Programs in the Probabilistic Guarded Command Language.

, , , and . ICTAC, volume 13572 of Lecture Notes in Computer Science, page 369-387. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Run-Time Assertion Checking of Data- and Protocol-Oriented Properties of Java Programs: An Industrial Case Study., , , , and . LNCS Trans. Aspect Oriented Softw. Dev., (2014)Object-Oriented Specification and Open Distributed Systems., and . Essays in Memory of Ole-Johan Dahl, volume 2635 of Lecture Notes in Computer Science, page 137-164. Springer, (2004)Lazy Behavioral Subtyping., , , and . FM, volume 5014 of Lecture Notes in Computer Science, page 52-67. Springer, (2008)Tracking Behavioral Constraints during Object-Oriented Software Evolution., , and . ISoLA (1), volume 7609 of Lecture Notes in Computer Science, page 253-268. Springer, (2012)Introduction to Track on Engineering Virtualized Services., and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 1-4. Springer, (2014)Safe locking for multi-threaded Java with exceptions., , , and . J. Log. Algebraic Methods Program., 81 (3): 257-283 (2012)A modular reasoning system using uninterpreted predicates for code reuse., , , and . J. Log. Algebraic Methods Program., (2018)Godot: All the Benefits of Implicit and Explicit Futures (Artifact)., , , , and . Dagstuhl Artifacts Ser., 5 (2): 01:1-01:2 (2019)Theme issue on Integrated Formal Methods., and . Softw. Syst. Model., 15 (4): 933-935 (2016)Validating Behavioral Component Interfaces in Rewriting Logic., , and . Fundam. Informaticae, 82 (4): 341-359 (2008)