Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exact quantitative probabilistic model checking through rational search., , , , and . FMCAD, page 92-99. IEEE, (2017)Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability., , , and . ACM Trans. Comput. Log., 21 (1): 2:1-2:44 (2020)Contract signing, optimism, and advantage., , , and . J. Log. Algebraic Methods Program., 64 (2): 189-218 (2005)Deciding accuracy of differential privacy schemes., , , , and . Proc. ACM Program. Lang., 5 (POPL): 1-30 (2021)Stack-Aware Hyperproperties., , , and . TACAS (1), volume 13993 of Lecture Notes in Computer Science, page 308-325. Springer, (2023)Enhancing Computing Curricular Outcomes and Student Accomplishments Through Collegiate Competitions., , , , , and . CompEd (1), page 22-28. ACM, (2023)Reasoning About States of Probabilistic Sequential Programs., , and . CSL, volume 4207 of Lecture Notes in Computer Science, page 240-255. Springer, (2006)Exact quantitative probabilistic model checking through rational search., , , , and . Formal Methods Syst. Des., 56 (1): 90-126 (2020)Deciding Accuracy of Differential Privacy Schemes., , , , and . CoRR, (2020)Formal Analysis of Multiparty Contract Signing., , and . J. Autom. Reason., 36 (1-2): 39-83 (2006)