Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced operational semantics., and . ACM Comput. Surv., 33 (2): 135-176 (2001)A Formal Model for Lazy Implementations of a Prolog-Compatible Functional Language., , , , and . Implementations of Prolog, Ellis Horwood/Halsted Press/Wiley, (1984)Authentication primitives for secure protocol specifications., , , and . Future Gener. Comput. Syst., 21 (4): 645-653 (2005)Programming in a context-aware language., , , and . J. Supercomput., 75 (12): 7750-7764 (2019)Modelling and analysing IoT systems., , , and . J. Parallel Distributed Comput., (2021)Weakening the perfect encryption assumption in Dolev-Yao adversaries., and . Theor. Comput. Sci., 340 (1): 154-178 (2005)Stochastic models for the in silico simulation of synaptic processes., , , and . BMC Bioinform., (2008)Partial ordering models for concurrency can be defined operationally., and . Int. J. Parallel Program., 16 (6): 451-478 (1987)From Models to Languages., , and . Fundam. Informaticae, 134 (3-4): i (2014)Fairness and Priority., and . Fundam. Informaticae, 22 (3): 299-306 (1995)