Publication | Date of Publication | Type |
---|
A Process Algebra for (Delimited) Persistent Stochastic Non-Interference | 2024-03-14 | Paper |
Reverse bisimilarity vs. forward bisimilarity | 2023-11-24 | Paper |
Biased Processor Sharing in Fork-Join Queues | 2023-06-28 | Paper |
Proportional lumpability and proportional bisimilarity | 2022-05-17 | Paper |
Reasoning about proportional lumpability | 2022-03-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q3384915 | 2021-12-17 | Paper |
A Matlab toolkit for the analysis of two-level processor sharing queues | 2021-12-08 | Paper |
Persistent Stochastic Non-Interference | 2021-10-25 | Paper |
\textit{D\_PSNI}: delimited persistent stochastic non-interference | 2021-08-27 | Paper |
Proportional lumpability | 2020-05-05 | Paper |
Aggregation and truncation of reversible Markov chains modulo state renaming | 2018-10-23 | Paper |
Applying Reversibility Theory for the Performance Evaluation of Reversible Computations | 2018-07-06 | Paper |
Lumping-based equivalences in Markovian automata: algorithms and applications to product-form analyses | 2018-05-30 | Paper |
Dynamic control of the join-queue lengths in saturated fork-join stations | 2018-01-11 | Paper |
Termination of simply moded logic programs with dynamic scheduling | 2017-07-12 | Paper |
Quantitative Analysis of Concurrent Reversible Computations | 2015-09-14 | Paper |
Operational Semantics for Reexecution-based Analysis of Logic Programs with Delay Declarations | 2013-05-24 | Paper |
Transforming Processes to Check and Ensure Information Flow Security* | 2011-05-06 | Paper |
A Proof System for Information Flow Security | 2011-03-04 | Paper |
A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks | 2010-10-27 | Paper |
Fundamentals of Computation Theory | 2010-04-20 | Paper |
Theoretical Computer Science | 2010-02-23 | Paper |
Action Refinement in Process Algebra and Security Issues | 2009-01-22 | Paper |
Unwinding Conditions for Security in Imperative Languages | 2008-04-24 | Paper |
Tools and Algorithms for the Construction and Analysis of Systems | 2007-09-28 | Paper |
Controlling information release in the \(\pi\)-calculus | 2007-08-23 | Paper |
Trustworthy Global Computing | 2006-11-01 | Paper |
Program Development in Computational Logic | 2005-12-23 | Paper |
Foundations of Software Science and Computational Structures | 2005-11-10 | Paper |
Verifying persistent security properties | 2004-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4736985 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4475098 | 2004-08-06 | Paper |
Sequence-based abstract interpretation of Prolog | 2004-03-01 | Paper |
Properties of Input-Consuming Derivations | 2004-03-01 | Paper |
On modular termination proofs of general logic programs | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414391 | 2003-07-25 | Paper |
Semantics of well-moded input-consuming logic programs | 2002-03-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q2767054 | 2002-01-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2763687 | 2002-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4499239 | 2001-03-05 | Paper |
Automated verification of Prolog programs | 1999-11-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4282511 | 1994-03-17 | Paper |