From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal specifications design, evolution and reuse., и . CASCON, стр. 184-193. IBM, (1993)Phishing Attacks Modifications and Evolutions., , , , и . ESORICS (1), том 11098 из Lecture Notes in Computer Science, стр. 243-262. Springer, (2018)Testing k-Safe Petri Nets., и . TestCom/FATES, том 5826 из Lecture Notes in Computer Science, стр. 33-48. Springer, (2009)Associativity between Weak and Strict Sequencing.. SAM, том 8769 из Lecture Notes in Computer Science, стр. 96-109. Springer, (2014)Using First-Order Logic to Reason about Submodule Construction.. FMOODS/FORTE, том 5522 из Lecture Notes in Computer Science, стр. 213-218. Springer, (2009)Synchronization in Distributed System Modules.. Berkeley Workshop, стр. 322-339. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, (1978)Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services., и . AIMS, том 6734 из Lecture Notes in Computer Science, стр. 124-135. Springer, (2011)Some Experience with the Use of Formal Specifications., , , , , , , , и . PSTV, стр. 171-185. North-Holland, (1982)Deriving protocol specifications from service specifications written as Predicate/Transition-nets., , , и . Comput. Networks, 51 (1): 258-284 (2007)New Results on Deriving Protocol Specifications from Service Specifications., , и . SIGCOMM, стр. 136-145. ACM, (1989)