Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Commodious Axiomatization of Quantifiers in Multiple-Valued Logic.. Stud Logica, 61 (1): 101-121 (1998)A New Look at Formal Methods for Software Construction.. The KeY Approach, volume 4334 of Lecture Notes in Computer Science, Springer, (2007)Using a Software Testing Technique to Improve Theorem Proving., and . FATES, volume 2931 of Lecture Notes in Computer Science, page 30-41. Springer, (2003)Towards Incremental Validation of Railway Systems., and . ISoLA (2), volume 9953 of Lecture Notes in Computer Science, page 433-446. (2016)Introduction to Track on Engineering Virtualized Services., and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 1-4. Springer, (2014)Semantic Tableaux with Ordering Restrictions., and . CADE, volume 814 of Lecture Notes in Computer Science, page 708-722. Springer, (1994)KeY-C: A Tool for Verification of C Programs., , and . CADE, volume 4603 of Lecture Notes in Computer Science, page 385-390. Springer, (2007)Abstract Execution., and . FM, volume 11800 of Lecture Notes in Computer Science, page 319-336. Springer, (2019)Task Forces in the EternalS Coordination Action.. ISoLA (2), volume 6416 of Lecture Notes in Computer Science, page 20-22. Springer, (2010)HATS: Highly Adaptable and Trustworthy Software Using Formal Methods.. ISoLA (2), volume 6416 of Lecture Notes in Computer Science, page 3-8. Springer, (2010)