Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specialising Logic Programs with Respect to Call?Post Specifications., and . LOPSTR, volume 1559 of Lecture Notes in Computer Science, page 159-178. Springer, (1998)On Modular Termination Proofs of General Logic Programs, , , and . CoRR, (2000)Verifying persistent security properties., , , and . Comput. Lang. Syst. Struct., 30 (3-4): 231-258 (2004)Sequence-based abstract interpretation of Prolog., , and . Theory Pract. Log. Program., 2 (1): 25-84 (2002)Properties of input-consuming derivations., , and . Theory Pract. Log. Program., 2 (2): 125-154 (2002)Analysis of ECN/RED and SAP-LAW with simultaneous TCP and UDP traffic., , , and . Comput. Networks, (2016)On Discrete Time Reversibility modulo State Renaming and its Applications., and . VALUETOOLS, ICST, (2014)DOI:10.4108/icst.valuetools.2014.258200 reused by journals/sas/RossiM15.Declarative Semantics of Input Consuming Logic Programs., , , and . Program Development in Computational Logic, volume 3049 of Lecture Notes in Computer Science, Springer, (2004)A Matlab Toolkit for the Analysis of Two-Level Processor Sharing Queues., , and . QEST, volume 12289 of Lecture Notes in Computer Science, page 144-147. Springer, (2020)A Proof System for Information Flow Security., , , and . LOPSTR, volume 2664 of Lecture Notes in Computer Science, page 199-218. Springer, (2002)