Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption., and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 338-352. Springer, (2005)The Semantics of Shared Submodules Specifications., and . TAPSOFT, Vol.1, volume 185 of Lecture Notes in Computer Science, page 359-373. Springer, (1985)Resource-aware policies., , , and . J. Vis. Lang. Comput., (2017)On the Complexity of Specification Morphisms., and . Theor. Comput. Sci., 189 (1-2): 239-248 (1997)Algebraic Specification of Modules and Their Basic Interconnections., , and . J. Comput. Syst. Sci., 34 (2/3): 293-339 (1987)On the Faithful Regular Extensions of Iterative Algebras. STOC, page 368-374. ACM, (1981)Closure Properties of Context-Tree Hyperedge Replacement Systems., and . WG, volume 1197 of Lecture Notes in Computer Science, page 101-113. Springer, (1996)Parallelism analysis in rule-based systems using graph grammars., and . Graph-Grammars and Their Application to Computer Science, volume 291 of Lecture Notes in Computer Science, page 427-439. Springer, (1986)A Model for Distribution and Revocation of Certificates., and . ICGT, volume 6372 of Lecture Notes in Computer Science, page 314-329. Springer, (2010)Refinements of Graph Transformation Systems via Rule Expressions., , and . TAGT, volume 1764 of Lecture Notes in Computer Science, page 368-382. Springer, (1998)