Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Limits and Possibilities of Automated Protocol Analysis.. PSTV, page 339-344. North-Holland, (1987)An analysis of bistate hashing.. PSTV, volume 38 of IFIP Conference Proceedings, page 301-314. Chapman & Hall, (1995)Code Clarity.. IEEE Software, 33 (2): 22-25 (2016)The Theory and Practice of A Formal Method: NewCoRe.. IFIP Congress (1), volume A-51 of IFIP Transactions, page 35-44. North-Holland, (1994)An Analysis of Bitstate Hashing.. Formal Methods Syst. Des., 13 (3): 289-307 (1998)Curve Balls.. IEEE Software, 35 (2): 18-21 (2018)An Improved Protocol Reachability Analysis Technique.. Softw. Pract. Exp., 18 (2): 137-161 (1988)Code Vault.. IEEE Software, 35 (5): 85-87 (2018)Early Fault Detection Tools.. TACAS, volume 1055 of Lecture Notes in Computer Science, page 1-13. Springer, (1996)The SPIN Model Checker. Addison Wesley, (2004)