Author of the publication

Model Checking Computational Tree Logic Using Sticker Automata.

, , , and . BIC-TA (1), volume 681 of Communications in Computer and Information Science, page 12-20. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integral Attack Against Bit-Oriented Block Ciphers., , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 102-118. Springer, (2015)Investment project assessment by a MAGDM method based on the ranking of interval type-2 fuzzy sets., , and . J. Intell. Fuzzy Syst., 35 (2): 1875-1888 (2018)ChoreoNet: Towards Music to Dance Synthesis with Choreographic Action Unit., , , , , , and . ACM Multimedia, page 744-752. ACM, (2020)A high-precision forest fire smoke detection approach based on ARGNet., , , , , and . Comput. Electron. Agric., (2022)Chicken swarm optimization with an enhanced exploration-exploitation tradeoff and its application., , , , and . Soft Comput., 27 (12): 8013-8028 (June 2023)Optimal allocation of heterogeneous resources: a control-theoretic approach., , , and . CDC, page 1953-1958. IEEE, (2001)Multi-Task Deep Learning for User Intention Understanding in Speech Interaction Systems., , , , , , and . AAAI, page 161-167. AAAI Press, (2017)On the Standardization of Semantic Web Services-based Network Monitoring Operations., , and . I3E (2), volume 252 of IFIP Advances in Information and Communication Technology, page 34-40. Springer, (2007)Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE., and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 1-16. Springer, (2014)H2O: A Benchmark for Visual Human-human Object Handover Analysis., , , , , and . ICCV, page 15742-15751. IEEE, (2021)