Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface to special issue on software verification., and . ACM Comput. Surv., 41 (4): 18:1-18:3 (2009)Virtual Time and Timeout in Client-Server Networks - (Extended Abstract).. ICTAC, volume 6916 of Lecture Notes in Computer Science, page 1-3. Springer, (2011)Topic Introduction., , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 623. Springer, (2003)A Perspective on Parallel Program Design.. Research Directions in High-Level Parallel Programming Languages, volume 574 of Lecture Notes in Computer Science, page 2-5. Springer, (1991)A secure voting scheme based on rational self-interest.. Formal Aspects Comput., 24 (4-6): 793-805 (2012)How Processes Learn., and . Distributed Computing, 1 (1): 40-52 (1986)The Case against a Grand Unification Theory.. ICSR, volume 2319 of Lecture Notes in Computer Science, page 328. Springer, (2002)Remark on Älgorithm 246: Graycode Z".. ACM Trans. Math. Softw., 1 (3): 285 (1975)Verified Software: Theories, Tools, Experiments Vision of a Grand Challenge Project., and . VSTTE, volume 4171 of Lecture Notes in Computer Science, page 1-18. Springer, (2005)A nontrivial example of concurrent processing: Distributed simulation., and . COMPSAC, page 822-826. IEEE, (1978)