Author of the publication

Proportional Lumpability.

, , and . FORMATS, volume 11750 of Lecture Notes in Computer Science, page 265-281. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complexity of Nesting Analysis in Mobile Ambients., , , , and . VMCAI, volume 2575 of Lecture Notes in Computer Science, page 86-101. Springer, (2003)Morphos Configuration Engine: the Core of a Commercial Configuration System in CLP(FD)., , , , and . Fundam. Informaticae, 105 (1-2): 105-133 (2010)Rank and simulation: the well-founded case., , and . J. Log. Comput., 25 (6): 1331-1349 (2015)A uniform approach to constraint-solving for lists, multisets, compact lists, and sets, , and . CoRR, (2003)Algorithmic Algebraic Model Checking II: Decidability of Semi-algebraic Model Checking and Its Applications to Systems Biology., , and . ATVA, volume 3707 of Lecture Notes in Computer Science, page 217-233. Springer, (2005)Algorithmic Algebraic Model Checking I: Challenges from Systems Biology., , , , , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 5-19. Springer, (2005)CoPS - Checker of Persistent Security., , and . TACAS, volume 2988 of Lecture Notes in Computer Science, page 144-152. Springer, (2004)External Interactions on Hybrid Models of Biological Systems., and . FMMB, volume 8738 of Lecture Notes in Computer Science, page 63-81. Springer, (2014)Transforming Processes to Check and Ensure Information Flow Security., , , and . AMAST, volume 2422 of Lecture Notes in Computer Science, page 271-286. Springer, (2002)Unwinding Conditions for Security in Imperative Languages., , and . LOPSTR, volume 3573 of Lecture Notes in Computer Science, page 85-100. Springer, (2004)