From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security of Practical and Complete Homomorphic Encrypted Computation., и . IACR Cryptology ePrint Archive, (2016)A shallow embedding of Z in HOL., и . Inf. Softw. Technol., 37 (5-6): 269-276 (1995)Microprocessor I/O emulation facilities.. Microprocess. Microsystems, 9 (8): 386-393 (1985)More books about assembler and 16-bit micros: Krantz, D and Stanley, J68000 assembly language: techniques for building programs Addison-Wesley, Reading, MA, USA (1986) £15.95 pp 402.. Microprocess. Microsystems, 12 (2): 119 (1988)Life and work., и . The Turing Guide, Oxford University Press, (2017)POS-formal specification of a Unix tool.. Softw. Eng. J., 4 (1): 67-72 (1989)Safety-critical systems, formal methods and standards., и . Softw. Eng. J., 8 (4): 189-209 (1993)Reviews., , и . IEEE Ann. Hist. Comput., 28 (2): 77-80 (2006)Computational Culture: Transforming Archives Practice and Education for a Post-Covid World., и . ACM Journal on Computing and Cultural Heritage, 15 (3): 47:1-47:18 (2022)Z Logic and its Consequences., , и . Comput. Artif. Intell., 22 (3-4): 381-415 (2003)