Author of the publication

Compositional Object Synthesis in Game of Life Cellular Automata Using SAT Solver.

, and . ICSI (2), volume 12690 of Lecture Notes in Computer Science, page 543-552. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic grid quorum: a reconfigurable grid quorum and its power optimization algorithm., , , and . Serv. Oriented Comput. Appl., 4 (4): 245-260 (2010)Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols., , and . IACR Cryptology ePrint Archive, (2010)Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction., , and . IEICE Trans. Inf. Syst., 98-D (10): 1744-1754 (2015)C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments., and . SECRYPT, page 819-826. SCITEPRESS, (2021)Towards a guideline for clinical trials in the development of human assistive robots., , , , and . ROBIO, page 751-756. IEEE, (2010)Highly Available Primary-Backup Mechanism for Internet Services with Optimistic Consensus., , and . IC2E, page 410-416. IEEE Computer Society, (2014)Playstyle Generation for Geister With Genetic Algorithm and Clustering., and . ICAART (3), page 916-922. SCITEPRESS, (2023)Model Checking of BPMN Models for Reconfigurable Workflows., , , and . CoRR, (2016)Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols., , and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 33-56. Springer, (2009)CapaCon: access control mechanism for inter-device communications through TCP connections., , , , and . SAC, page 706-712. ACM, (2010)