Author of the publication

Towards a Behavioural Theory for Random Parallel Computing.

, , , and . Computational Models of Rationality, page 365-376. College Publications, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expressivity Within Second-Order Transitive-Closure Logic., , and . CSL, volume 119 of LIPIcs, page 22:1-22:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)An automated evaluation of broker compatibility for the Message Queuing Telemetry Transport protocol., , and . J. Softw. Evol. Process., (July 2023)A Complete Logic for Non-Deterministic Database Transformations., , , and . CoRR, (2016)On Fragments of Higher Order Logics that on Finite Structures Collapse to Second Order., , and . WoLLIC, volume 10388 of Lecture Notes in Computer Science, page 125-139. Springer, (2017)SQL-Sampler: A Tool to Visualize and Consolidate Domain Semantics by Perfect SQL Sample Data., , and . APCCM, volume 154 of CRPIT, page 71-80. Australian Computer Society, (2014)Performance Analysis of Algorithms to Reason about XML Keys, , , , and . 23rd International Conference on Database and Expert Systems Applications (DEXA 2012), Vienna, Austria, 3-6 September, volume 7446 of Lecture Notes in Computer Science, page 101-115. Springer, (3--6 September 2012)Expressing Properties in Second and Third Order Logic: Hypercube Graphs and SATQBF, , and . CoRR, (2013)A logic for reflective ASMs., , and . Sci. Comput. Program., (2021)Efficient SPARQL Evaluation on Stratified RDF Data with Meta-data., , and . ADBIS, volume 11019 of Lecture Notes in Computer Science, page 99-112. Springer, (2018)Automated security test generation for MQTT using attack patterns., , and . ARES, page 97:1-97:9. ACM, (2020)