Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic role authorization in multiparty conversations., , , , and . Formal Aspects Comput., 28 (4): 643-667 (2016)Precise subtyping for synchronous multiparty sessions., , , , and . J. Log. Algebraic Methods Program., (2019)Efficient Bisimilarities from Second-Order Reaction Semantics for pi-Calculus., , and . CONCUR, volume 6269 of Lecture Notes in Computer Science, page 358-372. Springer, (2010)Types for Role-Based Access Control of Dynamic Web Data., , , and . WFLP, volume 6559 of Lecture Notes in Computer Science, page 1-29. Springer, (2010)Stream-based dynamic data race detection., , , and . NIK, Bibsys Open Journal Systems, Norway, (2018)Non-Intrusive MC/DC Measurement Based on Traces., , , , , and . TASE, page 86-92. IEEE, (2019)Exception handling for copyless messaging., and . PPDP, page 151-162. ACM, (2012)Denotational and Operational Preciseness of Subtyping: A Roadmap - Dedicated to Frank de Boer on the Occasion of His 60th Birthday., , , , and . Theory and Practice of Formal Methods, volume 9660 of Lecture Notes in Computer Science, page 155-172. Springer, (2016)