Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic User Interface Composition., , , and . SN Comput. Sci., 4 (3): 259 (May 2023)ModelRob: A Simulink Library for Model-Based Development of robot manipulators., and . ICRA, page 2654-2659. IEEE, (2012)Verifying a self-stabilizing mutual exclusion algorithm., and . PROCOMET, volume 125 of IFIP Conference Proceedings, page 424-443. Chapman & Hall, (1998)The verified software initiative: A manifesto., , , and . ACM Comput. Surv., 41 (4): 22:1-22:8 (2009)Proof Search (Tutorial)., and . ICLP Workshop: Proof-Theoretical Extensions on Logic Programming, (1994)TeLEx: learning signal temporal logic from positive examples using tightness metric., , , , and . Formal Methods Syst. Des., 54 (3): 364-387 (2019)A Tutorial on Using PVS for Hardware Verification., , , and . TPCD, volume 901 of Lecture Notes in Computer Science, page 258-279. Springer, (1994)Static Analysis for Safe Destructive Updates in a Functional Language.. LOPSTR, volume 2372 of Lecture Notes in Computer Science, page 1-24. Springer, (2001)PVS: A Prototype Verification System., , and . CADE, volume 607 of Lecture Notes in Computer Science, page 748-752. Springer, (1992)Proof Search in the Intuitionistic Sequent Calculus.. CADE, volume 607 of Lecture Notes in Computer Science, page 522-536. Springer, (1992)