From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sentence Embedding Models for Similarity Detection of Software Requirements., , , и . SN Comput. Sci., 2 (1): 69 (2021)The Quotient of an Abstract Interpretation., , и . Theor. Comput. Sci., 202 (1-2): 163-192 (1998)KPI-Supported PDCA Model for Innovation Policy Management in Local Government., и . EGOV, том 6846 из Lecture Notes in Computer Science, стр. 320-331. Springer, (2011)A Generic Distortion Free Watermarking Technique for Relational Databases., и . ICISS, том 5905 из Lecture Notes in Computer Science, стр. 252-264. Springer, (2009)Ensuring determinism in blockchain software with GoLiSA: an industrial experience report., , , , , , , , и . SOAP@PLDI, стр. 23-29. ACM, (2022)Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis, , и . LICS, стр. 322-327. IEEE Computer Society, (1991)Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems., , , , , , и . EuroS&P Workshops, стр. 57-66. IEEE, (2019)Distortion-Free Authentication Watermarking., и . ICSOFT (Selected Papers), том 170 из Communications in Computer and Information Science, стр. 205-219. Springer, (2010)Boundary Inference for Enforcing Security Policies in Mobile Ambients., , , и . IFIP TCS, том 223 из IFIP Conference Proceedings, стр. 383-395. Kluwer, (2002)Non-repudiation analysis using LySa with annotations., и . Comput. Lang. Syst. Struct., 36 (4): 352-377 (2010)