Author of the publication

Abstraction Barriers in Equational Proof.

. AMAST, volume 1548 of Lecture Notes in Computer Science, page 196-213. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structured crisis training with mixed reality simulations., and . ISCRAM, ISCRAM Association, (2019)A Survey of Controlled Experiments in Software Engineering., , , , , , and . IEEE Trans. Software Eng., 31 (9): 733-753 (2005)Axiomatic Criteria for Quotients and Subobjects for Higher-Order Data Types.. ICALP, volume 2719 of Lecture Notes in Computer Science, page 903-917. Springer, (2003)Specification Refinement with System F - The Higher-Order Case.. WADT, volume 1827 of Lecture Notes in Computer Science, page 162-181. Springer, (1999)Specification Refinement with System F.. CSL, volume 1683 of Lecture Notes in Computer Science, page 530-545. Springer, (1999)Managing the changing understanding of benefits in software initiatives., and . J. Syst. Softw., (February 2024)A Higher-Order Simulation Relation for System F.. FoSSaCS, volume 1784 of Lecture Notes in Computer Science, page 130-145. Springer, (2000)Are Two Heads Better than One? On the Effectiveness of Pair Programming., , , , and . IEEE Software, 24 (6): 12-15 (2007)Perceived productivity threats in large agile development projects., and . ESEM, ACM, (2010)Toward AI-Based Scenario Management for Cyber Range Training., , and . HCI (41), volume 13095 of Lecture Notes in Computer Science, page 423-436. Springer, (2021)