Author of the publication

Logic Meta-Programming Facilities in 'LOG.

, and . META, volume 649 of Lecture Notes in Computer Science, page 148-161. Springer, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Cervesato, Iliano
add a person with the name Cervesato, Iliano
 

Other publications of authors with the same name

Substructural Meta-Theory of a Type-Safe Language for Web Programming., and . Fundam. Informaticae, 130 (1): 67-97 (2014)On Representing Biological Systems through Multiset Rewriting., , , , and . EUROCAST, volume 2809 of Lecture Notes in Computer Science, page 415-426. Springer, (2003)Relating state-based and process-based concurrency through linear logic (full-version)., and . Inf. Comput., 207 (10): 1044-1077 (2009)On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters., , , , and . AsiaCCS, page 483-493. ACM, (2017)Specifying Kerberos 5 cross-realm authentication., , , and . WITS, page 12-26. ACM, (2005)Typed Multiset Rewriting Specifications of Security Protocols.. MFCSIT, volume 40 of Electronic Notes in Theoretical Computer Science, page 8-51. Elsevier, (2000)Expression and Enforcement of Dynamic Integrity Constraints., and . SEBD, page 283-298. Mediterranean Press (via S. Pellico, 13 - Tel. 0984-465645 - 87030 Rende (CS)), (1993)Reasoning About Set Comprehensions., and . SMT, volume 1163 of CEUR Workshop Proceedings, page 27-37. CEUR-WS.org, (2014)Event Calculus with Explicit Quantifiers., , and . TIME, page 81-88. IEEE Computer Society, (1998)Specifying Properties of Concurrent Computations in CLF., , , and . LFM@IJCAR, volume 199 of Electronic Notes in Theoretical Computer Science, page 67-87. Elsevier, (2004)