Author of the publication

Generalized fair reachability analysis for cyclic protocols: part 1.

, and . PSTV, volume 1 of IFIP Conference Proceedings, page 271-286. Chapman & Hall, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction and Development Strategy of Cross-border E-commerce Ecosystem in Era of Digital Economy.. ICETT, page 60-65. ACM, (2021)Iterative frequency-domain channel estimation and equalization for single-carrier transmissions without cyclic-prefix., and . IEEE Trans. Wirel. Commun., 7 (10): 3686-3691 (2008)Physical unclonable functions based secret keys scheme for securing big data infrastructure communication., , , , and . Inf. Sci., (2019)A Survey on Cognitive Radio Networks., , and . MOBILWARE, volume 48 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 487-498. Springer, (2010)Cyberentity Security in the Internet of Things., , and . Computer, 46 (4): 46-53 (2013)An Efficient and Accurate Inverse Kinematics for 7-DOF Redundant Manipulators Based on a Hybrid of Analytical and Numerical Method., , , and . IEEE Access, (2020)An Online Initialization and Self-Calibration Method for Stereo Visual-Inertial Odometry., , and . IEEE Trans. Robotics, 36 (4): 1153-1170 (2020)Hadamard Matrix Guided Online Hashing., , , , , and . Int. J. Comput. Vis., 128 (8): 2279-2306 (2020)H.264 error resilience adaptation to IPTV applications., , , and . BMSB, page 1-6. IEEE, (2012)A construction approach for software agents using components., , and . ACM SIGSOFT Softw. Eng. Notes, 24 (3): 76-79 (1999)