Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stronger compositions for retrenchments., and . J. Log. Algebraic Methods Program., 79 (3-5): 215-232 (2010)Simple feature engineering via neat default retrenchments., and . J. Log. Algebraic Methods Program., 80 (8): 453-480 (2011)Engineering and theoretical underpinnings of retrenchment., , , and . Sci. Comput. Program., 67 (2-3): 301-329 (2007)Retrenchment and the Mondex Electronic Purse., , , and . Abstract State Machines, page 41-48. (2005)Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties., , , and . ISoLA, page 82-90. IEEE Computer Society, (2006)Retrenchment and the Atomicity Pattern., , , and . SEFM, page 37-46. IEEE Computer Society, (2007)Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern., , , and . FM, volume 3582 of Lecture Notes in Computer Science, page 382-398. Springer, (2005)Composition mechanisms for retrenchment., , and . J. Log. Algebraic Methods Program., 75 (2): 209-229 (2008)Retrenchment and refinement interworking: the tower theorems., and . Math. Struct. Comput. Sci., 25 (1): 135-202 (2015)Retrenching the Purse: The Balance Enquiry Quandary, and Generalised and (1, 1) Forward Refinements., , , and . Fundam. Informaticae, 77 (1-2): 29-69 (2007)