Publication | Date of Publication | Type |
---|
Algebra and coalgebra of stream products | 2023-08-21 | Paper |
Bayesian parameter estimation with guarantees via interval analysis and simulation | 2023-08-17 | Paper |
Linearization, model reduction and reachability in nonlinear ODEs | 2023-07-21 | Paper |
On the expressiveness of internal mobility in name-passing calculi | 2023-06-28 | Paper |
On the Coalgebra of Partial Differential Equations | 2022-07-21 | Paper |
Automatic pre- and postconditions for partial differential equations | 2022-06-08 | Paper |
Weighted approximate Bayesian computation via Sanov's theorem | 2022-05-10 | Paper |
Automatic pre- and postconditions for partial differential equations | 2021-12-08 | Paper |
A linear-algebraic method to compute polynomial PDE conservation laws | 2021-08-05 | Paper |
Complete Algorithms for Algebraic Strongest Postconditions and Weakest Preconditions in Polynomial ODE’S | 2020-10-21 | Paper |
Algebra, Coalgebra, and Minimization in Polynomial Differential Equations | 2019-02-25 | Paper |
Algorithms for exact and approximate linear abstractions of polynomial continuous systems | 2018-12-06 | Paper |
Basic observables for processes | 2018-07-04 | Paper |
A fully abstract semantics for causality in the π-calculus | 2017-12-04 | Paper |
Algebra, Coalgebra, and Minimization in Polynomial Differential Equations | 2017-05-19 | Paper |
On the complexity of bisimilarity for value-passing processes | 2017-01-19 | Paper |
A semiring-based trace semantics for processes with applications to information leakage analysis | 2016-07-27 | Paper |
Asymptotic information leakage under one-try attacks | 2016-07-27 | Paper |
CaSPiS: a calculus of sessions, pipelines and services | 2016-07-27 | Paper |
Searching secrets rationally | 2015-12-28 | Paper |
Quantitative information flow under generic leakage functions and adaptive adversaries | 2015-11-25 | Paper |
Analysis of Probabilistic Systems via Generating Functions and Padé Approximation | 2015-11-04 | Paper |
Worst- and average-case privacy breaches in randomization mechanisms | 2015-08-17 | Paper |
Asymptotic Risk Analysis for Trust and Reputation Systems | 2014-11-04 | Paper |
Behavioural contracts with request-response operations | 2013-06-06 | Paper |
Worst- and Average-Case Privacy Breaches in Randomization Mechanisms | 2012-09-21 | Paper |
A coalgebraic perspective on linear weighted automata | 2012-05-24 | Paper |
Deciding safety properties in infinite-state pi-calculus via behavioural types | 2012-05-24 | Paper |
Quantitative Information Flow, with a View | 2011-11-22 | Paper |
Asymptotic Information Leakage under One-Try Attacks | 2011-05-19 | Paper |
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis | 2010-10-27 | Paper |
Spatial and behavioral types in the pi-calculus | 2010-10-07 | Paper |
On the Relationship between Spatial Logics and Behavioral Simulations | 2010-04-27 | Paper |
Weighted Bisimulation in Linear Algebraic Form | 2009-10-22 | Paper |
Deciding Safety Properties in Infinite-State Pi-Calculus via Behavioural Types | 2009-07-14 | Paper |
Quantifying information leakage in process calculi | 2009-06-11 | Paper |
A Typed Calculus for Querying Distributed XML Documents | 2009-03-05 | Paper |
Responsiveness in process calculi | 2008-12-12 | Paper |
Spatial and Behavioral Types in the Pi-Calculus | 2008-11-25 | Paper |
Type Abstractions of Name-Passing Processes | 2008-07-01 | Paper |
A Type System for Client Progress in a Service-Oriented Calculus | 2008-06-19 | Paper |
XPi: a typed process calculus for XML messaging | 2008-05-19 | Paper |
Mathematical Foundations of Computer Science 2003 | 2007-12-07 | Paper |
Mathematical Foundations of Computer Science 2003 | 2007-12-07 | Paper |
Quantifying Information Leakage in Process Calculi | 2007-09-11 | Paper |
A Concurrent Calculus with Atomic Transactions | 2007-09-04 | Paper |
Trustworthy Global Computing | 2006-11-01 | Paper |
Processes as formal power series: a coinductive approach to denotational semantics | 2006-09-14 | Paper |
Programming Languages and Systems | 2005-08-17 | Paper |
A method for symbolic analysis of security protocols | 2005-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738218 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484506 | 2003-06-12 | Paper |
Trace and testing equivalence on asynchronous processes | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4535055 | 2002-06-12 | Paper |
Proof Techniques for Cryptographic Processes | 2002-04-23 | Paper |
Divergence in testing and readiness semantics | 2002-03-03 | Paper |
A complexity analysis of bisimilarity for value-passing processes | 2000-08-21 | Paper |
Basic observables for processes | 2000-01-12 | Paper |
A fully abstract semantics for causality in the \(\pi\)-calculus | 1999-03-14 | Paper |
On the expressiveness of internal mobility in name-passing calculi | 1999-01-20 | Paper |
Some congruence properties for \(\pi\)-calculus bisimilarities | 1998-08-13 | Paper |
A symbolic semantics for the \(\pi\)-calculus | 1997-01-02 | Paper |
Testing equivalence for mobile processes | 1995-09-17 | Paper |
Complete sets of axioms for finite basic LOTOS behavioural equivalences | 1993-01-16 | Paper |