Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Limits and Possibilities of Automated Protocol Analysis.. PSTV, page 339-344. North-Holland, (1987)An analysis of bistate hashing.. PSTV, volume 38 of IFIP Conference Proceedings, page 301-314. Chapman & Hall, (1995)Preface., , and . The Spin Verification System, volume 32 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page ix-. DIMACS/AMS, (1996)Outline for an operational semantics of Promela., and . The Spin Verification System, volume 32 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 133-152. DIMACS/AMS, (1996)Metis: File System Model Checking via Versatile Input and State Exploration., , , , , , , and . FAST, page 123-140. USENIX Association, (2024)The SPIN Model Checker. Addison Wesley, (2004)The Theory and Practice of A Formal Method: NewCoRe.. IFIP Congress (1), volume A-51 of IFIP Transactions, page 35-44. North-Holland, (1994)Code Clarity.. IEEE Software, 33 (2): 22-25 (2016)Code Vault.. IEEE Software, 35 (5): 85-87 (2018)Early Fault Detection Tools.. TACAS, volume 1055 of Lecture Notes in Computer Science, page 1-13. Springer, (1996)