Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reasoning About Networks With Many Identical Finite-State Processes., , and . PODC, page 240-248. ACM, (1986)Can Message Buffers be Characterized in Linear Temporal Logic?, , , and . PODC, page 148-156. ACM, (1982)Distributed Computing Issues in Hardware Design.. Distributed Comput., 1 (4): 185-186 (1986)Another Look at LTL Model Checking., , and . Formal Methods Syst. Des., 10 (1): 47-71 (1997)Efficient Craig interpolation for linear Diophantine (dis)equations and linear modular equations., , and . Formal Methods Syst. Des., 35 (1): 6-39 (2009)Verification of SpecC using predicate abstraction., , and . Formal Methods Syst. Des., 30 (1): 5-28 (2007)Functional Equivalence Verification Tools in High-Level Synthesis Flows., , , and . IEEE Des. Test Comput., 26 (4): 88-95 (2009)Statistical Verification of Probabilistic Properties with Unbounded Until., , and . SBMF, volume 6527 of Lecture Notes in Computer Science, page 144-160. Springer, (2010)Grand Challenge: Model Check Software., , and . VISSAS, volume 1 of NATO Security through Science Series D: Information and Communication Security, page 55-68. IOS Press, (2005)Verification of the Futurebus+ Cache Coherence Protocol., , , , , , and . CHDL, volume A-32 of IFIP Transactions, page 15-30. North-Holland, (1993)