Author of the publication

On linear rewriting systems for Boolean logic and some applications to proof theory.

, and . Logical Methods in Computer Science, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond formulas-as-cographs: an extension of Boolean logic to arbitrary graphs., , and . CoRR, (2020)MetaMorphosis: Task-oriented Privacy Cognizant Feature Generation for Multi-task Learning., , , and . IoTDI, page 288-300. ACM, (2023)Understanding People's Attitude and Concerns towards Adopting IoT Devices., , and . CHI Extended Abstracts, page 307:1-307:10. ACM, (2021)Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises., , , , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 287-310. Springer, (2017)How Risky Are Real Users' IFTTT Applets?, , , , , , and . SOUPS @ USENIX Security Symposium, page 505-529. USENIX Association, (2020)Proof Complexity of Monotone Branching Programs., and . CiE, volume 13359 of Lecture Notes in Computer Science, page 74-87. Springer, (2022)Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps., , , , and . COMPASS, page 215-229. ACM, (2021)Understanding and mitigating the privacy risks of smartphone sensor fingerprinting. University of Illinois Urbana-Champaign, USA, (2016)From positive and intuitionistic bounded arithmetic to monotone proof complexity.. LICS, page 126-135. ACM, (2016)Analyzing an adaptive reputation metric for anonymity systems., , and . HotSoS, page 11. ACM, (2014)