Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From C to Interaction Trees: Specifying, Verifying, and Testing a Networked Server., , , , , , , , and . CoRR, (2018)From C to interaction trees: specifying, verifying, and testing a networked server., , , , , , , , and . CPP, page 234-248. ACM, (2019)Reasoning about the garden of forking paths., , and . CoRR, (2021)Verifying an HTTP Key-Value Server with Interaction Trees and VST., , , , , , , , , and . ITP, volume 193 of LIPIcs, page 32:1-32:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)A novel technique of recognising multi-stage attack behaviour., , and . IJHPCN, 6 (3/4): 174-180 (2010)Band detection in hyperspectral imagery by pixel purity index., , and . WHISPERS, page 1-4. IEEE, (2015)Effects of approximate representation in belief propagation for inference in wireless sensor networks., and . ACSSC, page 532-536. IEEE, (2013)基于多属性最优化的海洋监测数据副本布局策略 (Marine Monitoring Data Replica Layout Strategy Based on Multiple Attribute Optimization)., , , , and . 计算机科学, 45 (6): 72-75 (2018)基于改进的灰色模型的旅游需求预测研究 (Study on Tourism Demand Forecasting Based on Improved Grey Model)., , and . 计算机科学, 45 (1): 122-127 (2018)Collecting Code Coupons Over Generations, , and . CoRR, (2010)