Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A preliminary evaluation of verifiability in Ada., , and . ACM Annual Conference, page 218-224. ACM, (1980)Greatest Common Divisor of n Integers and Multipliers (Certification of Algorithm 386)., and . Commun. ACM, 16 (4): 257 (1973)Overview of verification systems., and . ACM SIGSOFT Softw. Eng. Notes, 10 (4): 1 (1985)A verified encrypted packet interface., , , and . ACM SIGSOFT Softw. Eng. Notes, 6 (3): 13-16 (1981)SICSOFT (Tutorial Session)., and . ACM Annual Conference, page 520. ACM, (1976)Beyond factorial (Abstract of presentation).. AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 667-668. AFIPS Press, (1978)Mathematical Methods for Digital Systems Development., and . VDM Europe (2), volume 552 of Lecture Notes in Computer Science, page 406-430. Springer, (1991)SIGSOFT tutorial on program verification (Tutorial Session)., and . ACM Annual Conference, page 521-522. ACM, (1976)Provable programming.. Reliable Software, page 411-419. ACM, (1975)Computing is a Physical Science (Abstract).. VDM Europe, volume 328 of Lecture Notes in Computer Science, page 1-1. Springer, (1988)