Author of the publication

Social Processes and Proofs of Theorems and Programs

, , and . Communications of the ACM, 22 (5): 271--280 (May 1979)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Complexity of Hilbert's 17th Problem., , and . FSTTCS, volume 3328 of Lecture Notes in Computer Science, page 237-249. Springer, (2004)Online Interval Scheduling., and . SODA, page 302-311. ACM/SIAM, (1994)Simulating Special but Natural Quantum Circuits, , and . CoRR, (2012)Preserving Average Proximity in Arrays., , and . Commun. ACM, 21 (3): 218-231 (1978)The Enforcement of Security Policies for Computation., and . SOSP, page 197-206. ACM, (1975)Operating System Review 9(5), Special Issue.Secure Databases: Protection Against User Influence., , and . ACM Trans. Database Syst., 4 (1): 97-106 (1979)Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs., , , and . POPL, page 220-233. ACM Press, (1980)Social Processes and Proofs of Theorems and Programs., , and . Commun. ACM, 22 (5): 271-280 (1979)Unbounded Fan-in Circuits and Associative Functions, , and . STOC, page 52-60. ACM, (1983)Programming Aspects of VLSI., , and . POPL, page 57-65. ACM Press, (1982)