From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An HBAC-based approximation for IBAC programs., и . SIN, стр. 277-281. ACM, (2013)Security verification of programs with stack inspection., , и . SACMAT, стр. 31-40. ACM, (2001)Optimal Run Problem for Weighted Register Automata., , и . ICTAC, том 11884 из Lecture Notes in Computer Science, стр. 91-110. Springer, (2019)Active Learning for Deterministic Bottom-Up Nominal Tree Automata., , и . ICTAC, том 13572 из Lecture Notes in Computer Science, стр. 342-359. Springer, (2022)Reactive Synthesis from Visibly Register Pushdown Automata., , и . ICTAC, том 12819 из Lecture Notes in Computer Science, стр. 334-353. Springer, (2021)Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool., , и . HICSS, IEEE Computer Society, (2004)Analysis and Implementation Method of Program to Detect Inappropriate Information Leak., , , , и . APAQS, стр. 5-12. IEEE Computer Society, (2001)A Static Analysis using Tree Automata for XML Access Control., , и . Inf. Media Technol., 2 (2): 433-447 (2007)Flexible Category Structure for Supporting WWW Retrieval., , и . ER (Workshops), том 1921 из Lecture Notes in Computer Science, стр. 165-177. Springer, (2000)Automatic Generation of History-Based Access Control from Information Flow Specification., и . ATVA, том 6252 из Lecture Notes in Computer Science, стр. 259-275. Springer, (2010)