Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decidability and Complexity Results for Security Protocols., , and . VISSAS, volume 1 of NATO Security through Science Series D: Information and Communication Security, page 185-211. IOS Press, (2005)Abstractions of Multi-agent Systems., and . CEEMAS, volume 4696 of Lecture Notes in Computer Science, page 11-21. Springer, (2007)On Reducing Linearizability to State Reachability., , , and . ICALP (2), volume 9135 of Lecture Notes in Computer Science, page 95-107. Springer, (2015)Verifying Concurrent Programs against Sequential Specifications., , , and . ESOP, volume 7792 of Lecture Notes in Computer Science, page 290-309. Springer, (2013)Checking Causal Consistency of Distributed Databases., , , , and . NETYS, volume 11704 of Lecture Notes in Computer Science, page 35-51. Springer, (2019)Model-checking an Epistemic μ-calculus with Synchronous and Perfect Recall Semantics, , and . CoRR, (2012)Model Checking an Epistemic mu-calculus with Synchronous and Perfect Recall Semantics., , and . CoRR, (2013)Abstractions of data types., and . Acta Inf., 42 (8-9): 639-671 (2006)Proving highly-concurrent traversals correct., , , , , , and . Proc. ACM Program. Lang., 4 (OOPSLA): 128:1-128:29 (2020)Counterexample Guided Abstraction Refinement is Better under Equational Abstraction.. ECBS, page 126-135. IEEE Computer Society, (2008)