Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tag Machine Based Performance Evaluation Method for Job-Shop Schedules., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 29 (7): 1028-1041 (2010)An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment., , , and . Int. J. Digit. Crime Forensics, 13 (2): 77-93 (2021)Some Inference Rules for Integer Arithmetic for Verification of Flowchart Programs on Integers., and . IEEE Trans. Software Eng., 15 (1): 1-9 (1989)FairFlow Protocol: Equitable Maximal Extractable Value (MEV) mitigation in Ethereum.. CoRR, (2023)Diagnosability of delay-deadline failures in fair real time discrete event models., , and . Int. J. Syst. Sci., 41 (7): 763-782 (2010)Model checking on state transition diagram., , and . ASP-DAC, page 412-417. IEEE Computer Society, (2004)SamaTulyataOne: A Path Based Equivalence Checker., , and . ISEC, page 21:1-21:5. ACM, (2019)On-Line Testing of Digital Circuits for n-Detect and Bridging Fault Models., , , , , and . Asian Test Symposium, page 88-93. IEEE Computer Society, (2005)Validating SPARK: High Level Synthesis Compiler., , and . ISVLSI, page 195-198. IEEE Computer Society, (2015)A Value Propagation Based Equivalence Checking Method for Verification of Code Motion Techniques., , , and . ISED, page 67-71. IEEE, (2012)