From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Targeting Security Vulnerabilities: From Specification to Detection (Short Paper)., , , , и . QSIC, стр. 97-102. IEEE Computer Society, (2008)Tau laws for pi calculus., и . Theor. Comput. Sci., 308 (1-3): 55-130 (2003)A Hybrid Approach for Safe Memory Management in C., , , и . AMAST, том 5140 из Lecture Notes in Computer Science, стр. 377-391. Springer, (2008)The Ground Congruence for Chi Calculus., и . FSTTCS, том 1974 из Lecture Notes in Computer Science, стр. 385-396. Springer, (2000)Team Edit Automata for Testing Security Property., , и . IAS, стр. 235-240. IEEE Computer Society, (2007)Analyzing and Enhancing Clarification Strategies for Ambiguous References in Consumer Service Interactions., , , , , , , и . SIGDIAL, стр. 289-296. Association for Computational Linguistics, (2024)Chi Calculus with Mismatch., и . CONCUR, том 1877 из Lecture Notes in Computer Science, стр. 596-610. Springer, (2000)MPEG4 Compatible Video Browsing and Retrieval over Low Bitrate Channel., и . IEEE Pacific Rim Conference on Multimedia, том 2532 из Lecture Notes in Computer Science, стр. 1221-1226. Springer, (2002)AOP Extension for Security Testing of Programs., , , и . CCECE, стр. 647-650. IEEE, (2006)