From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stratified Abstraction of Access Control Policies., , , , , , , , , и 8 other автор(ы). CAV (1), том 12224 из Lecture Notes in Computer Science, стр. 165-176. Springer, (2020)Abstractions for network update., , , , и . SIGCOMM, стр. 323-334. ACM, (2012)Correct by Construction Networks Using Stepwise Refinement., , , , , , и . NSDI, стр. 683-698. USENIX Association, (2017)Concurrent NetCore: from policies to pipelines., , и . ICFP, стр. 11-24. ACM, (2014)Languages for software-defined networks., , , , , , , , , и 2 other автор(ы). IEEE Commun. Mag., 51 (2): 128-134 (2013)KATch: A Fast Symbolic Verifier for NetKAT., , , , , , , и . Proc. ACM Program. Lang., 8 (PLDI): 1905-1928 (2024)Abstractions for Software-defined Networks. Princeton University, USA, (2015)Block public access: trust safety verification of access control policies., , , , , , , , , и 4 other автор(ы). ESEC/SIGSOFT FSE, стр. 281-291. ACM, (2020)I¿¿¿: a calculus for internet of things automation., , , , и . Onward!, стр. 119-133. ACM, (2017)Tutorial: Practical verification of network programs., , , и . FMCAD, стр. 9-10. IEEE, (2013)