From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe?, и . CoRR, (2014)An Approach to the Specification and Verification of a Hardware Compilation Scheme., и . The Journal of Supercomputing, 19 (1): 23-39 (2001)Continuity aspects of embedded reconfigurable computing., и . ISSE, 1 (1): 41-53 (2005)Formalization of Data Flow Computing and a Coinductive Approach to Verifying Flowware Synthesis., и . Transactions on Computational Science, (2008)Decompilation: The Enumeration of Types and Grammars., и . ACM Trans. Program. Lang. Syst., 16 (5): 1613-1647 (1994)Selected Z Bibliography.. Z User Workshop, стр. 353-373. Springer, (1990)PRG Archive Server.. Z User Workshop, стр. 379-379. Springer, (1990)Select Z Bibliography.. ZUM, том 1493 из Lecture Notes in Computer Science, стр. 367-406. Springer, (1998)Comp.specification.z and Z FORUM Frequently Asked Questions.. ZUM, том 967 из Lecture Notes in Computer Science, стр. 561-569. Springer, (1995)Ten Commandments of Formal Methods... Ten Years On., и . Conquering Complexity, Springer, (2012)