Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication primitives for secure protocol specifications., , , and . Future Gener. Comput. Syst., 21 (4): 645-653 (2005)Stochastic models for the in silico simulation of synaptic processes., , , and . BMC Bioinform., (2008)Partial ordering models for concurrency can be defined operationally., and . Int. J. Parallel Program., 16 (6): 451-478 (1987)From Models to Languages., , and . Fundam. Informaticae, 134 (3-4): i (2014)Fairness and Priority., and . Fundam. Informaticae, 22 (3): 299-306 (1995)Toward an Inductionless Technique for Proving Properties of Logic Programs., , and . ICLP, page 175-181. ADDP-GIA, (1982)Enhanced operational semantics., and . ACM Comput. Surv., 33 (2): 135-176 (2001)CCS is an (Augmented) Contact Free C/E System., , and . Mathematical Models for the Semantics of Parallelism, volume 280 of Lecture Notes in Computer Science, page 144-165. Springer, (1986)Causal Trees: Interleaving + Causality., and . Semantics of Systems of Concurrent Processes, volume 469 of Lecture Notes in Computer Science, page 239-255. Springer, (1990)Debits and Credits in Petri Nets and Linear Logic., , , and . Logic, Rewriting, and Concurrency, volume 9200 of Lecture Notes in Computer Science, page 135-159. Springer, (2015)