Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic model checking with rich assertional languages., , , , and . Theor. Comput. Sci., 256 (1-2): 93-112 (2001)Social networks and discovery in the enterprise (SaND)., , , , , , , , , and . SIGIR, page 836. ACM, (2009)Network Invariants in Action., , , and . CONCUR, volume 2421 of Lecture Notes in Computer Science, page 101-115. Springer, (2002)Public vs. private: comparing public social network information with email., , , , and . CSCW, page 393-402. ACM, (2008)The chasms of CSCW: a citation graph analysis of the CSCW conference., , , , , and . CSCW, page 289-298. ACM, (2006)Liveness and Acceleration in Parameterized Verification., and . CAV, volume 1855 of Lecture Notes in Computer Science, page 328-343. Springer, (2000)Symbolic Model Checking with Rich ssertional Languages., , , , and . CAV, volume 1254 of Lecture Notes in Computer Science, page 424-435. Springer, (1997)A Platform for Combining Deductive with Algorithmic Verification., and . CAV, volume 1102 of Lecture Notes in Computer Science, page 184-195. Springer, (1996)Blogs for Corporate Learning, , and . (2004)Harvesting with SONAR: the value of aggregating social network information., , , , , and . CHI, page 1017-1026. ACM, (2008)