Dexter Kozen

Results: 9



#Item
1The Design and Analysis of Algorithms Dexter C. Kozen Cornell University December 1990 c Copyright Springer-Verlag, Inc., 1991.

The Design and Analysis of Algorithms Dexter C. Kozen Cornell University December 1990 c Copyright Springer-Verlag, Inc., 1991.

Add to Reading List

Source URL: www.cs.cornell.edu

- Date: 2012-05-29 09:35:12
    2A Coalgebraic Decision Procedure for NetKAT Nate Foster Dexter Kozen  Matthew Milano

    A Coalgebraic Decision Procedure for NetKAT Nate Foster Dexter Kozen Matthew Milano

    Add to Reading List

    Source URL: www.cs.cornell.edu

    - Date: 2014-11-04 09:34:07
      3The Constructive in Logic and Applications A Conference in Honor of the 60th Birthday of Sergei Artemov Conference Schedule May 23, 2012, 8:30 9:00 - 9:15

      The Constructive in Logic and Applications A Conference in Honor of the 60th Birthday of Sergei Artemov Conference Schedule May 23, 2012, 8:30 9:00 - 9:15

      Add to Reading List

      Source URL: fsw01.bcc.cuny.edu

      Language: English - Date: 2012-05-16 01:10:11
      4The Ackermann Award 2015 Anuj Dawar, Dexter Kozen, and Simona Ronchi Della Rocca Members of the Jury of the EACSL Ackermann Award Abstract The eleventh Ackermann Award is presented at CSL’15 in Berlin, Germany. This ye

      The Ackermann Award 2015 Anuj Dawar, Dexter Kozen, and Simona Ronchi Della Rocca Members of the Jury of the EACSL Ackermann Award Abstract The eleventh Ackermann Award is presented at CSL’15 in Berlin, Germany. This ye

      Add to Reading List

      Source URL: drops.dagstuhl.de

      Language: English - Date: 2015-09-07 05:28:01
      5Dexter Campbell Kozen May 2, 2015 Office Computer Science Department 436 Gates Hall Cornell University

      Dexter Campbell Kozen May 2, 2015 Office Computer Science Department 436 Gates Hall Cornell University

      Add to Reading List

      Source URL: www.cs.cornell.edu

      Language: English - Date: 2015-05-26 17:53:30
      6Language-Based Security for Malicious Mobile Code Fred B. Schneider [removed] Dexter Kozen [removed]

      Language-Based Security for Malicious Mobile Code Fred B. Schneider [removed] Dexter Kozen [removed]

      Add to Reading List

      Source URL: www.cs.cornell.edu

      Language: English - Date: 2005-07-08 16:43:04
      7Citations for the Test-of-Time Award from 1994 Awards Committee: Tierry Coquand Dexter Kozen (chair) Leonid Libkin Frank Pfenning

      Citations for the Test-of-Time Award from 1994 Awards Committee: Tierry Coquand Dexter Kozen (chair) Leonid Libkin Frank Pfenning

      Add to Reading List

      Source URL: lics.rwth-aachen.de

      Language: English - Date: 2014-07-13 10:46:56
      8Logical Aspects of Set Constraints Dexter Kozen Computer Science Department Cornell University Ithaca, New York 14853, USA [removed]

      Logical Aspects of Set Constraints Dexter Kozen Computer Science Department Cornell University Ithaca, New York 14853, USA [removed]

      Add to Reading List

      Source URL: www.cs.cornell.edu

      Language: English - Date: 2012-05-29 09:46:24
      9A Completeness Theorem for Kleene Algebras and the Algebra of Regular Events Dexter Kozen Department of Computer Science Cornell University

      A Completeness Theorem for Kleene Algebras and the Algebra of Regular Events Dexter Kozen Department of Computer Science Cornell University

      Add to Reading List

      Source URL: www.cs.cornell.edu

      Language: English - Date: 2012-05-29 09:45:27