Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Analysis of Fault-Tolerance in Distributed Systems., and . Formal Methods in System Design, 26 (2): 183-196 (2005)Verifying Programs That Use Causally-Ordered Message-Passing., and . Sci. Comput. Program., 24 (2): 105-128 (1995)A Bound on Attacks on Payment Protocols.. LICS, page 61-70. IEEE Computer Society, (2001)Towards a framework and a benchmark for testing tools for multi-threaded programs., , , and . Concurrency and Computation: Practice and Experience, 19 (3): 267-279 (2007)ETAPS '99 - Conference Report., and . SIGPLAN Notices, 34 (6): 16-17 (1999)Detection of deadlock potentials in multithreaded programs., , , , , , , and . IBM Journal of Research and Development, 54 (5): 3 (2010)Mining Attribute-based Access Control Policies., and . CoRR, (2013)Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods., , and . CAV, volume 1855 of Lecture Notes in Computer Science, page 264-279. Springer, (2000)Efficient Symbolic Detection of Global Properties in Distributed Systems., and . CAV, volume 1427 of Lecture Notes in Computer Science, page 357-368. Springer, (1998)Querying Complex Graphs., and . PADL, volume 3819 of Lecture Notes in Computer Science, page 199-214. Springer, (2006)