Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deductive verification of cryptographic software., , , and . ISSE, 6 (3): 203-218 (2010)Verification conditions for source-level imperative programs., and . Computer Science Review, 5 (3): 252-277 (2011)CAOVerif: An open-source deductive verification platform for cryptographic software implementations., , , , and . Sci. Comput. Program., (2014)Recursion patterns and time-analysis., , and . SIGPLAN Notices, 40 (5): 45-54 (2005)GammaPolarSlicer., , , and . Comput. Sci. Inf. Syst., 8 (2): 477-499 (2011)Visual Programming with Interaction Nets., , and . Diagrams, volume 5223 of Lecture Notes in Computer Science, page 165-171. Springer, (2008)Combining interaction nets with externally defined programs., , and . APPIA-GULP-PRODE, page 297-312. Departamento de Informática, Universidade de Évora, (2001)A Bounded Model Checker for SPARK Programs., , and . ATVA, volume 8837 of Lecture Notes in Computer Science, page 24-30. Springer, (2014)Sequential and Concurrent Abstract Machines for Interaction Nets.. FoSSaCS, volume 1784 of Lecture Notes in Computer Science, page 267-282. Springer, (2000)Monitoring for a Decidable Fragment of MTL-∫., , , and . RV, volume 9333 of Lecture Notes in Computer Science, page 169-184. Springer, (2015)