Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theorem Proving Using Lazy Proof Explication., , , and . CAV, volume 2725 of Lecture Notes in Computer Science, page 355-367. Springer, (2003)Model-Driven Software Verification., and . SPIN, volume 2989 of Lecture Notes in Computer Science, page 76-91. Springer, (2004)A Semantic Approach to Secure Information Flow., and . MPC, volume 1422 of Lecture Notes in Computer Science, page 254-271. Springer, (1998)Automated policy-based resource construction in utility computing environments., , , and . NOMS (1), page 381-393. IEEE, (2004)Simulated Annealing Based Integerization of Hidden Weights for Area-Efficient IoT Edge Intelligence., , and . iSES, page 427-432. IEEE, (2022)Analysis of Radiation Impact on Memristive Crossbar Arrays., , and . LASCAS, page 1-4. IEEE, (2020)Model driven code checking., , and . Autom. Softw. Eng., 15 (3-4): 283-297 (2008)Annotation inference for modular checkers., , and . Inf. Process. Lett., 77 (2-4): 97-108 (2001)Experience with Rule-Based Analysis of Spacecraft Logs., and . FTSCS, volume 476 of Communications in Computer and Information Science, page 1-16. Springer, (2014)Towards a Logic for Inferring Properties of Event Streams., , and . ISoLA (2), volume 9953 of Lecture Notes in Computer Science, page 394-399. (2016)