The SCEAS System
Navigation Menu

Search the dblp DataBase


Robin Sharp: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Brinklov, Robin Sharp
    Incremental Trust in Grid Computing. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2007, pp:135-144 [Conf]
  2. Michael R. Hansen, Robin Sharp
    Using interval logics for temporal analysis of security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:24-31 [Conf]
  3. Robin Sharp, Ole Rasmussen
    Rewriting with Constraints in T-Ruby. [Citation Graph (0, 0)][DBLP]
    CHARME, 1993, pp:226-241 [Conf]
  4. Robin Sharp, Ole Rasmussen
    Transformational Rewriting with Ruby. [Citation Graph (0, 0)][DBLP]
    CHDL, 1993, pp:243-260 [Conf]
  5. Simon Mørk, Jens Chr. Godskesen, Michael R. Hansen, Robin Sharp
    A Timed Semantics for SDL. [Citation Graph (0, 0)][DBLP]
    FORTE, 1996, pp:295-309 [Conf]
  6. Robin Sharp, Ole Rasmussen
    Using a Language of Functions and Relations for VLSI Specification. [Citation Graph (0, 0)][DBLP]
    FPCA, 1995, pp:45-54 [Conf]
  7. Lars Rossen, Robin Sharp
    Sequence Semantics of Ruby. [Citation Graph (0, 0)][DBLP]
    Designing Correct Circuits, 1992, pp:159-171 [Conf]
  8. Allan Pedersen, Anders Hedegaard, Robin Sharp
    Designing a Secure Point-of-Sale System. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:51-65 [Conf]
  9. Niels Nørup Pedersen, Robin Sharp
    Analysis of channel access schemes for high-speed LANs. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:164-171 [Journal]
  10. Robin Sharp, Ole Rasmussen
    The T-Ruby Design System. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 1997, v:11, n:3, pp:239-264 [Journal]
  11. Henrik Pilegaard, Michael R. Hansen, Robin Sharp
    An Approach to Analyzing Availability Properties of Security Protocols. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 2003, v:10, n:4, pp:337-0 [Journal]
  12. Robin Sharp, Michael R. Hansen
    Timed Traces and Strand Spaces. [Citation Graph (0, 0)][DBLP]
    CSR, 2007, pp:373-386 [Conf]

  13. Report: CC-Based Design of Secure Application Systems. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002