Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Denotational and Operational Preciseness of Subtyping: A Roadmap - Dedicated to Frank de Boer on the Occasion of His 60th Birthday., , , , and . Theory and Practice of Formal Methods, volume 9660 of Lecture Notes in Computer Science, page 155-172. Springer, (2016)Characteristic Vectors of Reversible Boolean Functions with Threshold Components., , and . ISMVL, page 113-118. IEEE, (2022)Clones of Incompletely Specified Operations., , and . ISMVL, page 256-261. IEEE Computer Society, (2012)Nomura Parameters for S-Threshold Functions., and . ISMVL, page 248-253. IEEE Computer Society, (2017)A calculus for modeling floating authorizations., , and . J. Log. Algebraic Methods Program., (2019)Dynamic role authorization in multiparty conversations., , , , and . Formal Aspects Comput., 28 (4): 643-667 (2016)Regular Sets of Operations., , and . J. Multiple Valued Log. Soft Comput., 19 (1-3): 149-162 (2012)Precise subtyping for synchronous multiparty sessions., , , , and . J. Log. Algebraic Methods Program., (2019)Efficient compensation handling via subjective updates., , and . SAC, page 51-58. ACM, (2017)One Class of Maximal Binary Monomials., and . ISMVL, page 80-84. IEEE Computer Society, (2018)