From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verifying persistent security properties., , , и . Comput. Lang. Syst. Struct., 30 (3-4): 231-258 (2004)Sequence-based abstract interpretation of Prolog., , и . Theory Pract. Log. Program., 2 (1): 25-84 (2002)Properties of input-consuming derivations., , и . Theory Pract. Log. Program., 2 (2): 125-154 (2002)Analysis of ECN/RED and SAP-LAW with simultaneous TCP and UDP traffic., , , и . Comput. Networks, (2016)On Modular Termination Proofs of General Logic Programs, , , и . CoRR, (2000)A Matlab Toolkit for the Analysis of Two-Level Processor Sharing Queues., , и . QEST, том 12289 из Lecture Notes in Computer Science, стр. 144-147. Springer, (2020)Automated Verification of Prolog Programs., , , и . J. Log. Program., 39 (1-3): 3-42 (1999)On Discrete Time Reversibility modulo State Renaming and its Applications., и . VALUETOOLS, ICST, (2014)DOI:10.4108/icst.valuetools.2014.258200 reused by journals/sas/RossiM15.Declarative Semantics of Input Consuming Logic Programs., , , и . Program Development in Computational Logic, том 3049 из Lecture Notes in Computer Science, Springer, (2004)A Proof System for Information Flow Security., , , и . LOPSTR, том 2664 из Lecture Notes in Computer Science, стр. 199-218. Springer, (2002)