Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A monadic analysis of information flow security with mutable state., , and . J. Funct. Program., 15 (2): 249-291 (2005)Relating Natural Deduction and Sequent Calculus for Intuitionistic Non-Commutative Linear Logic., and . Electr. Notes Theor. Comput. Sci., (1999)On the Unification Problem for Cartesian Closed Categories., , and . J. Symb. Log., 62 (2): 636-647 (1997)Using Constrained Intuitionistic Linear Logic for Hybrid Robotic Planning Problems., and . ICRA, page 3705-3710. IEEE, (2007)Automated techniques for provably safe mobile code., , , , and . Theor. Comput. Sci., 290 (2): 1175-1199 (2003)Logical Frameworks.. Handbook of Automated Reasoning, Elsevier and MIT Press, (2001)Editorial., , and . ACM Trans. Comput. Log., 3 (3): 335-335 (2002)Contextual modal type theory., , and . ACM Trans. Comput. Log., 9 (3): 23:1-23:49 (2008)Tutorial on Lambda-Prolog., , , and . CADE, volume 449 of Lecture Notes in Computer Science, page 682. Springer, (1990)A Logical Characterization of Forward and Backward Chaining in the Inverse Method., , and . IJCAR, volume 4130 of Lecture Notes in Computer Science, page 97-111. Springer, (2006)