Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Safe locking for multi-threaded Java with exceptions., , , and . J. Log. Algebraic Methods Program., 81 (3): 257-283 (2012)A modular reasoning system using uninterpreted predicates for code reuse., , , and . J. Log. Algebraic Methods Program., (2018)Tracking Behavioral Constraints during Object-Oriented Software Evolution., , and . ISoLA (1), volume 7609 of Lecture Notes in Computer Science, page 253-268. Springer, (2012)Introduction to Track on Engineering Virtualized Services., and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 1-4. Springer, (2014)Lazy Behavioral Subtyping., , , and . FM, volume 5014 of Lecture Notes in Computer Science, page 52-67. Springer, (2008)Run-Time Assertion Checking of Data- and Protocol-Oriented Properties of Java Programs: An Industrial Case Study., , , , and . LNCS Trans. Aspect Oriented Softw. Dev., (2014)Godot: All the Benefits of Implicit and Explicit Futures (Artifact)., , , , and . Dagstuhl Artifacts Ser., 5 (2): 01:1-01:2 (2019)Validating Behavioral Component Interfaces in Rewriting Logic., , and . Fundam. Informaticae, 82 (4): 341-359 (2008)Theme issue on Integrated Formal Methods., and . Softw. Syst. Model., 15 (4): 933-935 (2016)Proving Correctness of Parallel Implementations of Transition System Specifications., , , and . CoRR, (2023)