Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A note on the complexity of propositional Hoare logic., and . ACM Trans. Comput. Log., 1 (1): 171-174 (2000)Data Abstraction in VCC.. Engineering Dependable Software Systems, volume 34 of NATO Science for Peace and Security Series, D: Information and Communication Security, IOS Press, (2013)TAPS: A First-Order Verifier for Cryptographic Protocols.. CSFW, page 144-158. IEEE Computer Society, (2000)The Convergence Span of Greedy Load Balancing.. Inf. Process. Lett., 52 (4): 181-182 (1994)Verification Tools for Transactional Programs., , , , , , , , and . Transactional Memory, volume 8913 of Lecture Notes in Computer Science, Springer, (2015)Using Probabilistic Kleene Algebra for Protocol Verification., , and . RelMiCS, volume 4136 of Lecture Notes in Computer Science, page 296-310. Springer, (2006)Validating the Microsoft Hypervisor.. FM, volume 4085 of Lecture Notes in Computer Science, page 81-81. Springer, (2006)Optimistic synchronization-based state-space reduction., and . Formal Methods Syst. Des., 28 (3): 263-289 (2006)TAPS: The Last Few Slides.. FASec, volume 2629 of Lecture Notes in Computer Science, page 183-190. Springer, (2002)Separation and Reduction.. MPC, volume 1837 of Lecture Notes in Computer Science, page 45-59. Springer, (2000)