From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Validating Reasoning Heuristics Using Next-Generation Theorem-Provers., и . MSVVEIS, стр. 43-52. INSTICC PRESS, (2007)Planning as model checking: the performance of ProB vs NuSMV., и . SAICSIT, том 338 из ACM International Conference Proceeding Series, стр. 114-123. ACM, (2008)An Ant-based Mobile Agent Approach to Resource Discovery in Grid Computing., , и . SAICSIT, стр. 1. ACM, (2014)A Framework to Assist Organizations with IT Adoption Governance., , и . CloudCom, стр. 1007-1014. IEEE Computer Society, (2014)Implementing Deterministic Finite State Machines using Guard-Stage-Milestone., , и . SAICSIT, стр. 22:1-22:10. ACM, (2016)Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol., , и . INC, стр. 113-122. University of Plymouth, (2012)Towards a model on security challenges during closed source software to OSS migrations., , и . ICITST, стр. 274-283. IEEE, (2014)Democratic detection of malicious behaviour in MANET: A voting process., , и . ISSA, стр. 1-7. IEEE, (2013)Metrics for the Case Management Modeling and Notation (CMMN) Specification., , и . SAICSIT, стр. 28:1-28:10. ACM, (2015)Measuring Method Complexity of the Case Management Modeling and Notation (CMMN)., , и . SAICSIT, стр. 209. ACM, (2014)