From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verification of safeness and mutual exclusion properties of algebraically specified token ring LAN protocol., , , , и . Syst. Comput. Jpn., 20 (5): 57-68 (1989)On the maximum value of aliasing probabilities for single input signature registers., , , и . VTS, стр. 267-274. IEEE Computer Society, (1993)An approximation to the weight distribution of binary linear codes., , и . IEEE Trans. Inf. Theory, 31 (6): 769-780 (1985)Graph theoretic approaches to the code construction for the two-user multiple- access binary adder channel., , , и . IEEE Trans. Inf. Theory, 29 (1): 114-130 (1983)Linear block codes for error detection., , и . IEEE Trans. Inf. Theory, 29 (1): 131-136 (1983)Functional Programming and Logical Programming for the Telegram Analysis Problem., , , и . ICSE, стр. 463-472. IEEE Computer Society, (1984)A Result on the Equivalence Problem for Deterministic Pushdown Automata., и . J. Comput. Syst. Sci., 13 (1): 38-50 (1976)On equivalence of safe Petri nets., , , и . FCT, стр. 430-436. Akademie-Verlag, Berlin, (1979)Ianov Schemas Augmented by a Pushdown Memory, , и . SWAT, стр. 84-94. IEEE Computer Society, (1974)Stochastic Multiple Context-Free Grammar for RNA Pseudoknot Modeling., , и . TAG, стр. 57-64. Association for Computational Linguistics, (2006)