Author of the publication

Failure-Equivalent Transformation of Transition Systems to Avoid Internal Actions.

, , , and . Inf. Process. Lett., 44 (6): 333-343 (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using URL shorteners to compare phishing and malware attacks., , , , and . eCrime, page 1-13. IEEE, (2018)Some notes on the history of protocol engineering., , and . Comput. Networks, 54 (18): 3197-3209 (2010)Grade-of-service differentiated static resource allocation schemes in WDM networks., , , and . Opt. Switch. Netw., 5 (2-3): 107-122 (2008)Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services., and . AIMS, volume 6734 of Lecture Notes in Computer Science, page 124-135. Springer, (2011)Some Experience with the Use of Formal Specifications., , , , , , , , and . PSTV, page 171-185. North-Holland, (1982)A Formal Method for Synthesizing Optimized Protocol Converters and Its Application to Mobile Data Networks., , and . Mob. Networks Appl., 2 (3): 259-269 (1997)Synchronization and Specification Issues in Protocol Testing., and . IEEE Trans. Commun., 32 (4): 389-395 (1984)Deriving protocol specifications from service specifications written as Predicate/Transition-nets., , , and . Comput. Networks, 51 (1): 258-284 (2007)Test Selection Based on Finite State Models., , , , and . IEEE Trans. Software Eng., 17 (6): 591-603 (1991)Semantic Evaluation from Left to Right.. Commun. ACM, 19 (2): 55-62 (1976)