Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Inherent Difficulty of Timely Primary-Backup Replication., , , and . Bell Labs Tech. J., 17 (2): 15-24 (2012)Local proofs for global safety properties., and . Formal Methods Syst. Des., 34 (2): 104-125 (2009)Synthesis of coordination programs from linear temporal specifications., , and . Proc. ACM Program. Lang., 4 (POPL): 54:1-54:27 (2020)Synthesis of coordination programs from linear temporal logic., , and . CoRR, (2019)Securing a Compiler Transformation., and . SAS, volume 9837 of Lecture Notes in Computer Science, page 170-188. Springer, (2016)Syntactic Program Transformations for Automatic Abstraction., and . CAV, volume 1855 of Lecture Notes in Computer Science, page 435-449. Springer, (2000)Efficient Analysis of Cyclic Definitions., and . CAV, volume 1633 of Lecture Notes in Computer Science, page 394-405. Springer, (1999)The Resh Programming Language for Multirobot Orchestration., , and . ICRA, page 4026-4032. IEEE, (2021)Local Proofs for Global Safety Properties., and . CAV, volume 4590 of Lecture Notes in Computer Science, page 55-67. Springer, (2007)The Impact of Program Transformations on Static Program Analysis., and . SAS, volume 11002 of Lecture Notes in Computer Science, page 306-325. Springer, (2018)