Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Algorithm for Generating Database Transactions from Relational Algebra Specifications. RULE, volume 21 of EPTCS, page 77-89. (2009)Some Independent Results for Equational Unification., , and . RTA, volume 914 of Lecture Notes in Computer Science, page 367-381. Springer, (1995)Modular Access Control Via Strategic Rewriting., , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 578-593. Springer, (2007)An Improved System of Intersection Types for Explicit Substitutions., , and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 511-523. Kluwer, (2002)Equational Unification, Word Unification, and 2nd-Order Equational Unification., , and . Theor. Comput. Sci., 198 (1-2): 1-47 (1998)An Improved General E-Unification Method., and . J. Symb. Comput., 14 (4): 303-320 (1992)Razor: Provenance and Exploration in Model-Finding., and . PAAR@IJCAR, volume 31 of EPiC Series in Computing, page 76-93. EasyChair, (2014)Specifying and Reasoning About Dynamic Access-Control Policies., , and . IJCAR, volume 4130 of Lecture Notes in Computer Science, page 632-646. Springer, (2006)Context-Aware Event Stream Analytics., , , and . EDBT, page 413-424. OpenProceedings.org, (2016)Realtime healthcare services via nested complex event processing technology., , , , , , , and . EDBT, page 622-625. ACM, (2012)