Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Reusability of Specifications and Implementations.. AMAST, page 43-56. Springer, (1991)Transformations of Graph Grammars.. TAGT, volume 1073 of Lecture Notes in Computer Science, page 428-442. Springer, (1994)Modeling E -service Orchestration through Petri Nets., , and . TES, volume 2444 of Lecture Notes in Computer Science, page 38-47. Springer, (2002)Product and Iteration of Module Specifications.. CAAP, volume 299 of Lecture Notes in Computer Science, page 149-164. Springer, (1988)An Algebraic View of Inheritance and Subtyping in Object Oriented Programming., and . ESEC, volume 550 of Lecture Notes in Computer Science, page 364-379. Springer, (1991)Which Graphs for Visual Modeling?. ICALP Satellite Workshops, page 383-386. Carleton Scientific, Waterloo, Ontario, Canada, (2000)On the Faithful Regular Extensions of Iterative Algebras. STOC, page 368-374. ACM, (1981)Closure Properties of Context-Tree Hyperedge Replacement Systems., and . WG, volume 1197 of Lecture Notes in Computer Science, page 101-113. Springer, (1996)Non-Equivalence of Categories for Equational Algebraic Specifications., and . COMPASS/ADT, volume 655 of Lecture Notes in Computer Science, page 222-235. Springer, (1991)Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption., and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 338-352. Springer, (2005)