Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rewrite based Verification of XML Updates, and . CoRR, (2009)Preferring diagnoses by abduction., , and . IEEE Trans. Syst. Man Cybern., 23 (3): 792-808 (1993)Any Gound Associative-Commutative Theory Has a Finite Canonical System., and . RTA, volume 488 of Lecture Notes in Computer Science, page 423-434. Springer, (1991)A Proof System for Conditional Algebraic Specifications., and . CTRS, volume 516 of Lecture Notes in Computer Science, page 51-63. Springer, (1990)On Word Problems in Horn Theories., and . CADE, volume 310 of Lecture Notes in Computer Science, page 527-537. Springer, (1988)One-variable context-free hedge automata., and . J. Comput. Syst. Sci., (2019)Matching a Set of Strings with Variable Length Don't Cares., and . CPM, volume 937 of Lecture Notes in Computer Science, page 230-247. Springer, (1995)Studies on the Ground Convergence Property of Conditional Theories., and . AMAST, page 363-376. Springer, (1991)Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption., , , and . ACM Trans. Comput. Log., 9 (4): 24:1-24:52 (2008)Reasoning with Conditional Axioms., and . Ann. Math. Artif. Intell., 15 (2): 125-149 (1995)