From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Nepi2 Programming System: A pi-Calculus-Based Approach to Agent-Based Programming., , и . FAABS, том 1871 из Lecture Notes in Computer Science, стр. 90-102. Springer, (2000)Verifying Trace Equivalence of a Shared-Memory-Style Communication System., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (4): 915-922 (2005)Role Interchange for Anonymity and Privacy of Voting., , , и . J. Log. Comput., 20 (6): 1251-1288 (2010)On Computer-Assisted Verification of Timed Anonymity of Multi-Agent Systems., и . ACIT/CSII/BCD, стр. 307-312. IEEE, (2017)Developing Compiler for Nihongo Programming Language PEN., , , , и . ACIT-CSI, стр. 387-392. IEEE, (2015)Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers., , , , , и . NBiS, том 313 из Lecture Notes in Networks and Systems, стр. 188-201. Springer, (2021)A Algorithm with Expected Value: Path Planning That Avoids Stochastic Traffic Obstacles., , , , , и . ICA, стр. 104-105. IEEE, (2016)A Formal Approach to Designing Anonymous Software., и . SERA, стр. 203-212. IEEE Computer Society, (2007)On backward-style verification for timed anonymity of security protocols., и . GCCE, стр. 1-5. IEEE, (2016)Probabilistic anonymity via coalgebraic simulations., , и . Theor. Comput. Sci., 411 (22-24): 2239-2259 (2010)