Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic Specification of Modules and Their Basic Interconnections., , and . J. Comput. Syst. Sci., 34 (2/3): 293-339 (1987)On the Complexity of Specification Morphisms., and . Theor. Comput. Sci., 189 (1-2): 239-248 (1997)On the Faithful Regular Extensions of Iterative Algebras. STOC, page 368-374. ACM, (1981)Refinements of Graph Transformation Systems via Rule Expressions., , and . TAGT, volume 1764 of Lecture Notes in Computer Science, page 368-382. Springer, (1998)Closure Properties of Context-Tree Hyperedge Replacement Systems., and . WG, volume 1197 of Lecture Notes in Computer Science, page 101-113. Springer, (1996)Parallelism analysis in rule-based systems using graph grammars., and . Graph-Grammars and Their Application to Computer Science, volume 291 of Lecture Notes in Computer Science, page 427-439. Springer, (1986)A Model for Distribution and Revocation of Certificates., and . ICGT, volume 6372 of Lecture Notes in Computer Science, page 314-329. Springer, (2010)Non-Equivalence of Categories for Equational Algebraic Specifications., and . COMPASS/ADT, volume 655 of Lecture Notes in Computer Science, page 222-235. Springer, (1991)The Semantics of Shared Submodules Specifications., and . TAPSOFT, Vol.1, volume 185 of Lecture Notes in Computer Science, page 359-373. Springer, (1985)Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption., and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 338-352. Springer, (2005)