Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Repository Interactions (working session).. Digital Libraries, page 171. ACM, (1996)Experience with fluid: analysis, design intent, and assurance for concurrency.. PADTAD, page 1-2. ACM, (2007)Deriving Efficient Graph Algorithms (Summary)., and . Logic of Programs, volume 164 of Lecture Notes in Computer Science, page 421-441. Springer, (1983)Design Dimensions for Software Certification: A Grounded Analysis., , , , and . CoRR, (2019)Respond to Dijkstra: >>On the cruelty of Really Teaching Computing Science<<. A debate on teaching computing science, page 1406--1407. ACM, (December 1989)CACM 32 (1989), Nr.~12.Extensions to Attribute Grammars, , , and . report, TR-TL-83-36. Tartan Labs., Pittsburgh, PA, (1983)ETAPS'98 Trip Report.. ACM SIGPLAN Notices, 33 (9): 18-19 (1998)Systematic Change of Data Representation: Program Manipulations and a Case Study.. ESOP, volume 1381 of Lecture Notes in Computer Science, page 252-266. Springer, (1998)Semantically Based Programming Tools (Summary)., and . TAPSOFT, Vol.1, volume 185 of Lecture Notes in Computer Science, page 52-59. Springer, (1985)Promises: Limited Specifications for Analysis and Manipulation., , and . ICSE, page 167-176. IEEE Computer Society, (1998)