Author of the publication

Liveness with Invisible Ranking.

, , , and . VMCAI, volume 2937 of Lecture Notes in Computer Science, page 223-238. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Little Knowledge Goes a Long Way: Knowledge-Based Derivations and Correctness Proofs for a Family of Protocols., and . J. ACM, 39 (3): 449-478 (1992)Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications., , , , , and . WebApps, page 107-108. USENIX Association, (2012)Verification of Multiprocess Probabilistic Protocols., and . PODC, page 12-27. ACM, (1984)Witnessing Program Transformations., and . SAS, volume 7935 of Lecture Notes in Computer Science, page 304-323. Springer, (2013)Shape Analysis of Single-Parent Heaps., , and . VMCAI, volume 4349 of Lecture Notes in Computer Science, page 91-105. Springer, (2007)A Witnessing Compiler: A Proof of Concept., , and . RV, volume 8174 of Lecture Notes in Computer Science, page 340-345. Springer, (2013)Liveness with Incomprehensible Ranking., , , and . TACAS, volume 2988 of Lecture Notes in Computer Science, page 482-496. Springer, (2004)Ethical and Secure Data Sharing across Borders., , and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 136-140. Springer, (2012)A Switch, in Time., and . TGC, volume 9533 of Lecture Notes in Computer Science, page 131-146. Springer, (2015)Reasoning in a Restricted Temporal Logic, and . Inf. Comput., 102 (2): 167-195 (February 1993)