From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rule Formats for Non Interference.. ESOP, том 2618 из Lecture Notes in Computer Science, стр. 129-143. Springer, (2003)Taylor Approximation for Hybrid Systems., и . HSCC, том 3414 из Lecture Notes in Computer Science, стр. 402-416. Springer, (2005)Compositional Weak Metrics for Group Key Update., , и . MFCS, том 83 из LIPIcs, стр. 72:1-72:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Formal Models of Timing Attacks on Web Privacy., , , , , , и . TOSCA, том 62 из Electronic Notes in Theoretical Computer Science, стр. 229-243. Elsevier, (2001)Measuring Robustness in Cyber-Physical Systems under Sensor Attacks., , , , и . CoRR, (2024)Privacy in Real-Time Systems., , и . MTCS, том 52 из Electronic Notes in Theoretical Computer Science, стр. 295-305. Elsevier, (2001)Compositional Synthesis of Generalized Mealy Machines., и . Fundam. Informaticae, 60 (1-4): 367-382 (2004)Compositional semantics and behavioral equivalences for P Systems, , , и . Theor. Comput. Sci., 395 (1): 77--100 (апреля 2008)Dynamic Hierarchical Machines, , , и . Fundam. Inform., 54 (2-3): 237--252 (2003)A comparison of Statecharts step semantics, , и . Theoretical Computer Science, 290 (1): 465--498 (января 2003)