Author of the publication

Lazy Security Controllers.

, , and . STM, volume 7783 of Lecture Notes in Computer Science, page 33-48. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Morphogenesis through moving membranes., and . Nat. Comput., 13 (3): 403-419 (2014)A Compositional Semantics of Reaction Systems with Restriction., , , , and . CiE, volume 7921 of Lecture Notes in Computer Science, page 330-339. Springer, (2013)Objective/MC: A high-level model checking language - Formalization of the imperative core and translation into PRISM., and . J. Intell. Inf. Syst., 52 (3): 533-571 (2019)Formal Modelling and Simulation of Biological Systems with Spatiality.. University of Pisa, Italy, (2011)Lazy Security Controllers., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 33-48. Springer, (2012)Component identification in biochemical pathways., , and . Theor. Comput. Sci., (2015)Modular Verification of Qualitative Pathway Models with Fairness., , , and . Sci. Ann. Comput. Sci., 23 (1): 75-117 (2013)Spatial P systems., , , , and . Nat. Comput., 10 (1): 3-16 (2011)Applications of P Systems in Population Biology and Ecology: The Cases of MPP and APP Systems., , , and . Int. Conf. on Membrane Computing, volume 10105 of Lecture Notes in Computer Science, page 28-48. Springer, (2016)Attributed Probabilistic P Systems and Their Application to the Modelling of Social Interactions in Primates., , , , and . SEFM Workshops, volume 9509 of Lecture Notes in Computer Science, page 176-191. Springer, (2015)