Author of the publication

Automated Verification of Behavioural Properties of Prolog Programs.

, , , and . ASIAN, volume 1345 of Lecture Notes in Computer Science, page 225-238. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proof System for Information Flow Security., , , and . LOPSTR, volume 2664 of Lecture Notes in Computer Science, page 199-218. Springer, (2002)Proportional Lumpability., , and . FORMATS, volume 11750 of Lecture Notes in Computer Science, page 265-281. Springer, (2019)Analysis of ECN/RED and SAP-LAW with simultaneous TCP and UDP traffic., , , and . Comput. Networks, (2016)Verifying persistent security properties., , , and . Comput. Lang. Syst. Struct., 30 (3-4): 231-258 (2004)Sequence-based abstract interpretation of Prolog., , and . Theory Pract. Log. Program., 2 (1): 25-84 (2002)Properties of input-consuming derivations., , and . Theory Pract. Log. Program., 2 (2): 125-154 (2002)On Modular Termination Proofs of General Logic Programs, , , and . CoRR, (2000)Declarative Semantics of Input Consuming Logic Programs., , , and . Program Development in Computational Logic, volume 3049 of Lecture Notes in Computer Science, Springer, (2004)On Discrete Time Reversibility modulo State Renaming and its Applications., and . VALUETOOLS, ICST, (2014)DOI:10.4108/icst.valuetools.2014.258200 reused by journals/sas/RossiM15.Bisimulation and Unwinding for Verifying Possibilistic Security Properties., , , and . VMCAI, volume 2575 of Lecture Notes in Computer Science, page 223-237. Springer, (2003)