Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms for Game Metrics., , , and . FSTTCS, volume 2 of LIPIcs, page 107-118. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2008)Termination Criteria for Solving Concurrent Safety and Reachability Games, , and . CoRR, (2008)Some Like it Hoax: Automated Fake News Detection in Social Networks., , , , and . CoRR, (2017)Algorithms for Game Metrics (Full Version), , , and . Logical Methods in Computer Science, (2010)Model Checking of Probabilistic and Nondeterministic Systems, and . Foundations of Software Technology and Theoretical Computer Science, volume 1026 of Lecture Notes in Computer Science, page 499-513. Springer, (1995)Toward a Social Graph Recommendation Algorithm: Do We Trust Our Friends in Movie Recommendations?, and . OTM Workshops, volume 7567 of Lecture Notes in Computer Science, page 637-647. Springer, (2012)Adaptive Policy Tree Algorithm to Approach Collision-Free Transmissions in Slotted ALOHA., , , , , , , and . MASS, page 138-146. IEEE, (2020)Automating Modular Verification., , , and . CONCUR, volume 1664 of Lecture Notes in Computer Science, page 82-97. Springer, (1999)Symbolic Algorithms for Infinite-State Games., , and . CONCUR, volume 2154 of Lecture Notes in Computer Science, page 536-550. Springer, (2001)Compositional Methods for Probabilistic Systems., , and . CONCUR, volume 2154 of Lecture Notes in Computer Science, page 351-365. Springer, (2001)