Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding Extrema with Unary Predicates., , , , and . Algorithmica, 9 (6): 591-600 (1993)Checking Java Programs via Guarded Commands., , and . ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 110-111. Springer, (1999)Generating Sorted Lists of Random Numbers., and . ACM Trans. Math. Softw., 6 (3): 359-364 (1980)Using Transformations and Verification in Ciruit Design., , , and . Designing Correct Circuits, volume A-5 of IFIP Transactions, page 1-25. North-Holland, (1992)Generating error traces from verification-condition counterexamples., , and . Sci. Comput. Program., 55 (1-3): 209-226 (2005)Avoiding exponential explosion: generating compact verification conditions., and . POPL, page 193-205. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.Transforming Static Data Structures to Dynamic Structures (Abridged Version), and . FOCS, page 148-168. IEEE Computer Society, (1979)PLDI 2002: Extended static checking for Java., , , , , and . ACM SIGPLAN Notices, 48 (4S): 22-33 (2013)Spelling Correction in User Interfaces., , and . Commun. ACM, 26 (10): 764-773 (1983)A general method for solving divide-and-conquer recurrences., , and . SIGACT News, 12 (3): 36-44 (1980)