Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanically Checking a Lemma Used in an Automatic Verification Tool., and . FMCAD, volume 1166 of Lecture Notes in Computer Science, page 362-376. Springer, (1996)Autotically Synthesized Term Denotation Predicates: A Proof Aid., and . TPHOLs, volume 971 of Lecture Notes in Computer Science, page 46-57. Springer, (1995)Formal Verification of Secure Programs in the Presence of Side Effects., and . HICSS (3), page 327-. IEEE Computer Society, (1998)API Access Control with OAuth: Coordinating interactions with the Internet of Things.. IEEE Consumer Electronics Magazine, 4 (3): 52-58 (2015)The practical verification of microprocessor designs.. Compcon, page 462-467. IEEE Computer Society, (1991)Alexandria: A Tool for Hierarchical Verification., , , and . FMCAD, volume 1522 of Lecture Notes in Computer Science, page 515-522. Springer, (1998)A Hierarchical Methodology for Verifying Microprogrammed Microprocessors.. S&P, page 345-359. IEEE Computer Society, (1990)Abstraction Techniques for Modeling Real-World Interface Chips., , and . HUG, volume 780 of Lecture Notes in Computer Science, page 267-280. Springer, (1993)Inference Rules for Programming Languages with Side Effects in Expressions., and . TPHOLs, volume 1125 of Lecture Notes in Computer Science, page 51-60. Springer, (1996)An HOL Theory for Logic States with Indeterminate Strengths., and . TPHOLs, page 96-103. IEEE Computer Society, (1991)