Author of the publication

Verification of Time-Aware Business Processes Using Constrained Horn Clauses.

, , , , and . LOPSTR, volume 10184 of Lecture Notes in Computer Science, page 38-55. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of complex security scenarios using defense trees and economic indexes., , , and . J. Exp. Theor. Artif. Intell., 24 (2): 161-192 (2012)Contextual Specialization of Constraint Logic Programs., and . APPIA-GULP-PRODE, page 455-470. (1999)Satisfiability of Constrained Horn Clauses on Algebraic Data Types: A Transformation-based Approach., , , and . CoRR, (2021)Solving Horn Clauses on Inductive Data Types Without Induction - ERRATUM., , , and . Theory Pract. Log. Program., 19 (4): 629 (2019)Verifying Catamorphism-Based Contracts using Constrained Horn Clauses., , , and . Theory Pract. Log. Program., 22 (4): 555-572 (2022)Verification of Programs by Combining Iterated Specialization with Interpolation., , , and . HCVS, volume 169 of EPTCS, page 3-18. (2014)Evaluating the Aspect-Category-Opinion-Sentiment Analysis Task on a Custom Dataset (short paper)., and . NL4AI@AI*IA, volume 3551 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)A Specification for Security Services on Computational Grids., , , and . GSEM, volume 3270 of Lecture Notes in Computer Science, page 119-135. Springer, (2004)Semantics and Controllability of Time-Aware Business Processes., , , , and . Fundam. Informaticae, 165 (3-4): 205-244 (2019)Multiple Query Satisfiability of Constrained Horn Clauses., , , and . CoRR, (2022)