Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the maximum value of aliasing probabilities for single input signature registers., , , and . VTS, page 267-274. IEEE Computer Society, (1993)Verification of safeness and mutual exclusion properties of algebraically specified token ring LAN protocol., , , , and . Syst. Comput. Jpn., 20 (5): 57-68 (1989)An approximation to the weight distribution of binary linear codes., , and . IEEE Trans. Inf. Theory, 31 (6): 769-780 (1985)Graph theoretic approaches to the code construction for the two-user multiple- access binary adder channel., , , and . IEEE Trans. Inf. Theory, 29 (1): 114-130 (1983)Linear block codes for error detection., , and . IEEE Trans. Inf. Theory, 29 (1): 131-136 (1983)Functional Programming and Logical Programming for the Telegram Analysis Problem., , , and . ICSE, page 463-472. IEEE Computer Society, (1984)A Result on the Equivalence Problem for Deterministic Pushdown Automata., and . J. Comput. Syst. Sci., 13 (1): 38-50 (1976)Ianov Schemas Augmented by a Pushdown Memory, , and . SWAT, page 84-94. IEEE Computer Society, (1974)Multilevel block coded 8-PSK modulations using unequal error protection codes for the Rayleigh fading channel., , and . PIMRC, page 486-490. (1995)A translation method from natural language specifications into formal specifications using contextual dependencies., , and . RE, page 232-239. IEEE Computer Society, (1993)