| 
 | 
VPT 2013: Author Index| Author | Papers | 
|---|
 | A |  | Ahmed, Abdulbasit | Cryptographic Protocol Verification via Supercompilation (A Case Study) |  | B |  | Ben-Amram, Amir | Ranking Functions for Linear-Constraint Loops |  | D |  | De Angelis, Emanuele | Verification of Imperative Programs through Transformation of Constraint Logic Programs |  | F |  | Finkbeiner, Bernd | Transforming Undecidable Synthesis Problems into Decidable Problems |  | Fioravanti, Fabio | Verification of Imperative Programs through Transformation of Constraint Logic Programs |  | H |  | Hamilton, Geoff | On the Termination of Positive Supercompilation |  | L |  | Leroux, Jerome | Acceleration For Presburger Petri Nets |  | Lisitsa, Alexei | Cryptographic Protocol Verification via Supercompilation (A Case Study) |  | M |  | Mery, Dominique | Transforming Event B Models into Verified C# Implementations |  | Monahan, Rosemary | Transforming Event B Models into Verified C# Implementations |  | N |  | Nemytykh, Andrei | Cryptographic Protocol Verification via Supercompilation (A Case Study) |  | Nepeivoda, Antonina | Ping-Pong Protocols as Prefix Grammars and Turchin Relation |  | P |  | Pettorossi, Alberto | Program Transformation for Program Verification |  | Pettorossi, Alberto | Verification of Imperative Programs through Transformation of Constraint Logic Programs |  | Proietti, Maurizio | Program Transformation for Program Verification Verification of Imperative Programs through Transformation of Constraint Logic Programs |  | T |  | Thompson, Simon | Building trustworthy refactoring tools |  
  |  
  | 
|