Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tempus fugit: How to plug it., , , and . J. Log. Algebraic Methods Program., 72 (2): 173-190 (2007)A Parallel Programming Style and Its Algebra of Programs., , and . PARLE, volume 694 of Lecture Notes in Computer Science, page 367-378. Springer, (1993)COBWEB-2: Structured Specification of a Wafer-Scale Supercomputer., , , , and . PARLE (1), volume 258 of Lecture Notes in Computer Science, page 51-67. Springer, (1987)Abstract Interpretation of Term Graph Rewriting Systems.. Functional Programming, page 54-65. Springer, (1990)Deep Latent Defence., , , and . CoRR, (2019)Foreword: Theoretical Aspects of Coordination Languages., and . Theor. Comput. Sci., 192 (2): 163-165 (1998)Measuring the confinement of probabilistic systems., , and . Theor. Comput. Sci., 340 (1): 3-56 (2005)Refining Multiset Tranformers., , and . Theor. Comput. Sci., 192 (2): 233-258 (1998)Real-time processing of social media with SENTINEL: A syndromic surveillance system incorporating deep learning for health classification., , , , and . Inf. Process. Manag., 56 (3): 1166-1184 (2019)Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool., , , and . SAT-CPS@CODASPY, page 21-30. ACM, (2022)