Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Complexity of Propositional Linear Temporal Logics, and . J. ACM, 32 (3): 733-749 (July 1985)SWIPE: eager erasure of sensitive data in large scale systems software., , , , and . CODASPY, page 295-306. ACM, (2012)Model Checking Concurrent Programs with Nondeterminism and Randomization., , and . FSTTCS, volume 8 of LIPIcs, page 364-375. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2010)Triggers on Database Histories., and . IEEE Data Eng. Bull., 15 (1-4): 48-51 (1992)Symmetry and Model Checking., and . Formal Methods Syst. Des., 9 (1/2): 105-131 (1996)SMC: a symmetry-based model checker for verification of safety and liveness properties., , and . ACM Trans. Softw. Eng. Methodol., 9 (2): 133-166 (2000)Performance Evaluation of G-tree and Its Application in Fuzzy Databases., , , , , and . CIKM, page 235-242. ACM, (1996)Model Checking Failure-Prone Open Systems Using Probabilistic Automata., and . ATVA, volume 9364 of Lecture Notes in Computer Science, page 148-165. Springer, (2015)Emptiness Under Isolation and the Value Problem for Hierarchical Probabilistic Automata., , and . FoSSaCS, volume 10203 of Lecture Notes in Computer Science, page 231-247. (2017)Power of Randomization in Automata on Infinite Strings., , and . CONCUR, volume 5710 of Lecture Notes in Computer Science, page 229-243. Springer, (2009)