Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thoughts on a Larch/ML and a New Application for LP., , and . Larch, page 297-312. Springer, (1992)Scenario Graphs Applied to Security (Extended Abstract).. VISSAS, volume 1 of NATO Security through Science Series D: Information and Communication Security, page 229-234. IOS Press, (2005)DURRA : A Task-Level Description Language., and . ICPP, page 370-376. Pennsylvania State University Press, (1987)Opening keynote: Crashing drones and hijacked cameras: Cybertrust meets cyberphysical., and . SoCC, page 1-3. IEEE, (2016)Guest Editors' Introduction-Special Issues for FM '99: The First World Congress On Formal Methods in the Development of Computing Systems., and . IEEE Trans. Software Eng., 26 (8): 673-674 (2000)CS woes: deadline-driven research, academic inequality., and . Commun. ACM, 52 (12): 8-9 (2009)Specification Matching of Software Components., and . ACM Trans. Softw. Eng. Methodol., 6 (4): 333-369 (1997)Inverse privacy., and . Commun. ACM, 59 (7): 38-42 (2016)On the Semantics of Purpose Requirements in Privacy Policies, , and . CoRR, (2011)A Behavioral Notion of Subtyping., and . ACM Trans. Program. Lang. Syst., 16 (6): 1811-1841 (1994)