From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Semantic Approach to Secure Information Flow., и . MPC, том 1422 из Lecture Notes in Computer Science, стр. 254-271. Springer, (1998)Model-Driven Software Verification., и . SPIN, том 2989 из Lecture Notes in Computer Science, стр. 76-91. Springer, (2004)Automated policy-based resource construction in utility computing environments., , , и . NOMS (1), стр. 381-393. IEEE, (2004)Theorem Proving Using Lazy Proof Explication., , , и . CAV, том 2725 из Lecture Notes in Computer Science, стр. 355-367. Springer, (2003)Simulated Annealing Based Integerization of Hidden Weights for Area-Efficient IoT Edge Intelligence., , и . iSES, стр. 427-432. IEEE, (2022)Analysis of Radiation Impact on Memristive Crossbar Arrays., , и . LASCAS, стр. 1-4. IEEE, (2020)Comprehension of Spacecraft Telemetry Using Hierarchical Specifications of Behavior., и . ICFEM, том 8829 из Lecture Notes in Computer Science, стр. 187-202. Springer, (2014)Annotation inference for modular checkers., , и . Inf. Process. Lett., 77 (2-4): 97-108 (2001)Experience with Rule-Based Analysis of Spacecraft Logs., и . FTSCS, том 476 из Communications in Computer and Information Science, стр. 1-16. Springer, (2014)Toward a theory of maximally concurrent programs (shortened version)., и . PODC, стр. 319-328. ACM, (2000)