Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Converting an imperative program to a declarative one., , and . Knowl. Based Syst., 19 (2): 130-140 (2006)Toward Solving Equations in Kleene Algebras., and . SoMeT, volume 161 of Frontiers in Artificial Intelligence and Applications, page 285-304. IOS Press, (2007)Static Analysis of Binary Code to Isolate Malicious Behaviors., , , and . WETICE, page 184-189. IEEE Computer Society, (1999)A Declarative Approach to Stateful Intrusion Detection and Network Monitoring., , , and . PST, page 175-179. (2004)Visibly Pushdown Kleene Algebra and Its Use in Interprocedural Analysis of (Mutually) Recursive Programs., and . RelMiCS, volume 5827 of Lecture Notes in Computer Science, page 44-58. Springer, (2009)Solving Linear Equations in *-continuous Action Lattices., , and . RelMiCS, volume 4988 of Lecture Notes in Computer Science, page 289-303. Springer, (2008)A Formal Translation From an Imperative Language With Array to a Declarative Language., , and . SoMeT, volume 147 of Frontiers in Artificial Intelligence and Applications, page 319-339. IOS Press, (2006)Secure Self-Certified COTS., , , , and . WETICE, page 183-188. IEEE Computer Society, (2000)A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes., , and . AMAST, volume 1548 of Lecture Notes in Computer Science, page 214-230. Springer, (1998)Formal Implementation of Network Security Policies., , and . PST, page 161-166. (2004)