Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NSA's MISSI Reference Architecture - Moving from Prose to Precise Specification., and . Requirements Targeting Software and Systems Engineering, volume 1526 of Lecture Notes in Computer Science, page 293-329. Springer, (1997)Concurrent Runtime Checking of Annotated Ada Programs., , and . FSTTCS, volume 241 of Lecture Notes in Computer Science, page 10-35. Springer, (1986)Extracting Information from Resolution Proof Trees., and . Artif. Intell., 2 (1): 27-54 (1971)An Event-Based Architecture Definition Language., and . IEEE Trans. Software Eng., 21 (9): 717-734 (1995)The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, (2001)Debugging Ada Tasking Programs., and . IEEE Softw., 2 (2): 47-57 (1985)Software validation and verification - a state of the art report(Panel Discussion)., , , , , and . ACM Annual Conference (2), page 781. ACM, (1978)Rapide: A language and toolset for simulation of distributed systems by partial orderings of events.. Partial Order Methods in Verification, volume 29 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 329-357. DIMACS/AMS, (1996)Translating recursion schemes into program schemes., and . Proving Assertions About Programs, page 83-96. ACM, (1972)Proof of Termination within a Weak Logic of Programs., and . Acta Inf., (1977)