Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Curb Your Theory! A Circumspective Approach for Inclusive Interpretation of Disjunctive Information., , and . IJCAI, page 634-639. Morgan Kaufmann, (1993)Normal Forms for Second-Order Logic over Finite Structures, and Classification of NP Optimization Problems., , and . Ann. Pure Appl. Log., 78 (1-3): 111-125 (1996)Algenraic Operational Semantics.. FSTTCS, volume 287 of Lecture Notes in Computer Science, page 1-2. Springer, (1987)Inverse privacy., and . Commun. ACM, 59 (7): 38-42 (2016)Ordinary interactive small-step algorithms, III., and . ACM Trans. Comput. Log., 8 (3): 16 (2007)Invited Talk: ASM Formalware in the Software Engineering Cycle.. AMAST, volume 1816 of Lecture Notes in Computer Science, page 197. Springer, (2000)Exact Exploration and Hanging Algorithms., , and . CSL, volume 6247 of Lecture Notes in Computer Science, page 140-154. Springer, (2010)AMAST'91 Banquet Talk.. Current Trends in Theoretical Computer Science, World Scientific, (2001)Evidential Authorization., , , and . The Future of Software Engineering, page 73-99. Springer, (2010)Festschrift for Bertrand Meyer on the Occasion of His 60th Birthday, November 2010.Background of Computation., and . Bulletin of the EATCS, (2007)