Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Orchids Intrusion Detection Tool., and . CAV, volume 3576 of Lecture Notes in Computer Science, page 286-290. Springer, (2005)The Ideal Approach to Computing Closed Subsets in Well-Quasi-Ordering., , , , and . CoRR, (2019)Continuous Previsions.. CSL, volume 4646 of Lecture Notes in Computer Science, page 542-557. Springer, (2007)Continuous R-valuations., and . ISDT, volume 2 of Electronic Notes in Theoretical Informatics and Computer Science, EpiSciences, (2022)Well Quasi-Orders in Computer Science (Dagstuhl Seminar 16031)., , , and . Dagstuhl Reports, 6 (1): 69-98 (2016)A Smell of Orchids., and . RV, volume 5289 of Lecture Notes in Computer Science, page 1-20. Springer, (2008)A Probabilistic and Non-Deterministic Call-by-Push-Value Language.. LICS, page 1-13. IEEE, (2019)Separating minimal valuations, point-continuous valuations and continuous valuations., and . CoRR, (2021)Reflecting BDDs in Coq., , , and . ASIAN, volume 1961 of Lecture Notes in Computer Science, page 162-181. Springer, (2000)Towards Producing Formally Checkable Security Proofs, Automatically.. CSF, page 224-238. IEEE Computer Society, (2008)