Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deciding H1 by resolution.. Inf. Process. Lett., 95 (3): 401-408 (2005)Extensions of valuations.. Math. Struct. Comput. Sci., 15 (2): 271-297 (2005)Isomorphism theorems between models of mixed choice.. Math. Struct. Comput. Sci., 27 (6): 1032-1067 (2017)Forward Analysis for WSTS, Part II: Complete WSTS, and . Logical Methods in Computer Science, (2012)The Ideal Approach to Computing Closed Subsets in Well-Quasi-Ordering., , , , and . CoRR, (2019)Continuous Previsions.. CSL, volume 4646 of Lecture Notes in Computer Science, page 542-557. Springer, (2007)The Orchids Intrusion Detection Tool., and . CAV, volume 3576 of Lecture Notes in Computer Science, page 286-290. Springer, (2005)Forward analysis for WSTS, part I: completions., and . Math. Struct. Comput. Sci., 30 (7): 752-832 (2020)Products and projective limits of continuous valuations on T0 spaces.. Math. Struct. Comput. Sci., 31 (2): 234-254 (2021)On Weakly Hausdorff Spaces and Locally Strongly Sober Spaces.. CoRR, (2022)