From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Limits and Possibilities of Automated Protocol Analysis.. PSTV, стр. 339-344. North-Holland, (1987)An analysis of bistate hashing.. PSTV, том 38 из IFIP Conference Proceedings, стр. 301-314. Chapman & Hall, (1995)Code Clarity.. IEEE Software, 33 (2): 22-25 (2016)The Theory and Practice of A Formal Method: NewCoRe.. IFIP Congress (1), том A-51 из IFIP Transactions, стр. 35-44. North-Holland, (1994)Curve Balls.. IEEE Software, 35 (2): 18-21 (2018)Code Vault.. IEEE Software, 35 (5): 85-87 (2018)The Pandora System: An Interactive System for the Design of Data Communication Protocols.. Comput. Networks, (1984)Designing bug-free protocols with SPIN.. Comput. Commun., 20 (2): 97-105 (1997)An Improved Protocol Reachability Analysis Technique.. Softw. Pract. Exp., 18 (2): 137-161 (1988)An Analysis of Bitstate Hashing.. Formal Methods Syst. Des., 13 (3): 289-307 (1998)