Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A universal upper bound on the performance of the Lempel-Ziv algorithm on maliciously-constructed data., and . SEQUENCES, page 123-135. IEEE, (1997)Strict Self-assembly of Discrete Sierpinski Triangles., , and . CiE, volume 4497 of Lecture Notes in Computer Science, page 455-464. Springer, (2007)Verifying Chemical Reaction Networks with the Isabelle Theorem Prover., , , and . Allerton, page 1-8. IEEE, (2023)Automated requirements analysis for a molecular watchdog timer., , , , , , , and . ASE, page 767-778. ACM, (2014)Reactamole: Functional Reactive Molecular Programming., , , and . DNA, volume 205 of LIPIcs, page 10:1-10:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Recursive Computational Depth., and . Inf. Comput., 153 (1): 139-172 (1999)Computability and Complexity in Self-Assembly., , , and . Electron. Colloquium Comput. Complex., (2008)Real-Time Computability of Real Numbers by Chemical Reaction Networks., , , , and . UCNC, volume 10240 of Lecture Notes in Computer Science, page 29-40. Springer, (2017)A Fully Characterized Test Suite for Genetic Programming., and . Evolutionary Programming, volume 1447 of Lecture Notes in Computer Science, page 537-546. Springer, (1998)State logging in chemical reaction networks., , and . NANOCOM, page 23:1-23:6. ACM, (2017)