Author of the publication

Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition.

, , and . PPAM, volume 3019 of Lecture Notes in Computer Science, page 298-305. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Run Problem for Weighted Register Automata., , and . ICTAC, volume 11884 of Lecture Notes in Computer Science, page 91-110. Springer, (2019)Reactive Synthesis from Visibly Register Pushdown Automata., , and . ICTAC, volume 12819 of Lecture Notes in Computer Science, page 334-353. Springer, (2021)Active Learning for Deterministic Bottom-Up Nominal Tree Automata., , and . ICTAC, volume 13572 of Lecture Notes in Computer Science, page 342-359. Springer, (2022)An HBAC-based approximation for IBAC programs., and . SIN, page 277-281. ACM, (2013)Security verification of programs with stack inspection., , and . SACMAT, page 31-40. ACM, (2001)Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool., , and . HICSS, IEEE Computer Society, (2004)Analysis and Implementation Method of Program to Detect Inappropriate Information Leak., , , , and . APAQS, page 5-12. IEEE Computer Society, (2001)A Static Analysis using Tree Automata for XML Access Control., , and . Inf. Media Technol., 2 (2): 433-447 (2007)A Static Analysis Using Tree Automata for XML Access Control., , and . ATVA, volume 3707 of Lecture Notes in Computer Science, page 234-247. Springer, (2005)Automatic Generation of History-Based Access Control from Information Flow Specification., and . ATVA, volume 6252 of Lecture Notes in Computer Science, page 259-275. Springer, (2010)