From post

Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure.

, , , и . FACS, том 7684 из Lecture Notes in Computer Science, стр. 205-223. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-clock Soc design using protocol conversion., , , и . DATE, стр. 123-128. IEEE, (2009)Representing and Reasoning with Qualitative Preferences for Compositional Systems., , и . CoRR, (2014)SoC Design Approach Using Convertibility Verification., , и . EURASIP J. Embed. Syst., (2008)Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection., и . ICDCIT, том 3347 из Lecture Notes in Computer Science, стр. 353-362. Springer, (2004)Synchronizability for Verification of Asynchronously Communicating Systems., , и . VMCAI, том 7148 из Lecture Notes in Computer Science, стр. 56-71. Springer, (2012)Control of Non-Deterministic Systems With $\mu$-Calculus Specifications Using Quotienting., и . IEEE CAA J. Autom. Sinica, 8 (5): 953-970 (2021)Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach., , , и . AAAI, стр. 1408-1414. AAAI Press, (2011)Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables., , и . ACC, стр. 1-6. IEEE, (2006)Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude., , , , , и . ASONAM, стр. 227-231. IEEE, (2020)Automata-Based Verification of Security Requirements of Composite Web Services., , , и . ISSRE, стр. 348-357. IEEE Computer Society, (2010)