Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Solving Equations in Kleene Algebras., and . SoMeT, volume 161 of Frontiers in Artificial Intelligence and Applications, page 285-304. IOS Press, (2007)Converting an imperative program to a declarative one., , and . Knowl. Based Syst., 19 (2): 130-140 (2006)Static Analysis of Binary Code to Isolate Malicious Behaviors., , , and . WETICE, page 184-189. IEEE Computer Society, (1999)Visibly Pushdown Kleene Algebra and Its Use in Interprocedural Analysis of (Mutually) Recursive Programs., and . RelMiCS, volume 5827 of Lecture Notes in Computer Science, page 44-58. Springer, (2009)Solving Linear Equations in *-continuous Action Lattices., , and . RelMiCS, volume 4988 of Lecture Notes in Computer Science, page 289-303. Springer, (2008)A Declarative Approach to Stateful Intrusion Detection and Network Monitoring., , , and . PST, page 175-179. (2004)A Formal Translation From an Imperative Language With Array to a Declarative Language., , and . SoMeT, volume 147 of Frontiers in Artificial Intelligence and Applications, page 319-339. IOS Press, (2006)A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes., , and . AMAST, volume 1548 of Lecture Notes in Computer Science, page 214-230. Springer, (1998)Secure Self-Certified COTS., , , , and . WETICE, page 183-188. IEEE Computer Society, (2000)Formal Implementation of Network Security Policies., , and . PST, page 161-166. (2004)