From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling Security Policy and the Effect for End-Users., и . HCI (27), том 8030 из Lecture Notes in Computer Science, стр. 256-265. Springer, (2013)Support Environments for VDM.. VDM Europe, том 252 из Lecture Notes in Computer Science, стр. 110-117. Springer, (1987)Forensic Readiness within the Maritime Sector., и . CyberSA, стр. 1-4. IEEE, (2019)Variable domain transformation for linear PAC analysis of mixed-signal systems., , и . ICCAD, стр. 887-894. IEEE Computer Society, (2007)A Semantics for a Larch/Modula-3 Interface Language.. Larch, стр. 142-158. Springer, (1992)Vision-based tracking and motion estimation for moving targets using small UAVs., , , и . ACC, IEEE, (2006)Generating training events for building cyber-physical security skills., , и . Comput. J., 68 (5): 445-459 (2025)Inevitability of Phase-locking in a Charge Pump Phase Lock Loop using Deductive Verification., и . ACM Great Lakes Symposium on VLSI, стр. 295-300. ACM, (2015)Fast, Non-Monte-Carlo Estimation of Transient Performance Variation Due to Device Mismatch., , и . DAC, стр. 440-443. IEEE, (2007)Larch: Languages and Tools for Formal Specification, , , , , и . Texts and Monographs in Computer Science Springer, (1993)