From post

Observations on Self-Stabilizing Graph Algorithms for Anonymous Networks

, , и . Proceedings of the 2nd Workshop on Self-Stabilizing Systems (WSS-95), стр. 7.1--7.15. Las Vegas, NE, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ArkThor: Threat Categorization Based on Malware's C2 Communication., , , , и . ICISSP, стр. 203-210. SCITEPRESS, (2024)I/O Automata Based Verification of Finite State Distributed Systems: Complexity Issues (Abstract)., , , , и . PODC, стр. 122. ACM, (1996)Concurrency in System Level Design: Conflict Between Simulation and Synthesis Goals., , и . IWLS, стр. 407-411. (2002)Coprocessor design space exploration using high level synthesis., , и . ISQED, стр. 879-884. IEEE, (2010)Structured Component Composition Frameworks for Embedded System Design., , и . HiPC, том 2552 из Lecture Notes in Computer Science, стр. 663-678. Springer, (2002)Pluggable Integrity Layer for Property Registration., , , и . BCCA, стр. 396-403. IEEE, (2023)AProctor - A practical on-device antidote for Android malware., , , и . ACSW, стр. 82-91. ACM, (2023)Observations on Self-Stabilizing Graph Algorithms for Anonymous Networks, , и . Proceedings of the 2nd Workshop on Self-Stabilizing Systems (WSS-95), стр. 7.1--7.15. Las Vegas, NE, (1995)Metamodeling: What is it good for?. IEEE Des. Test Comput., 26 (3): 96 (2009)Model-Driven Validation of SystemC Designs., и . EURASIP J. Embed. Syst., (2008)