Author of the publication

Towards Network Virtualization Management for Federated Cloud Systems.

, , and . IEEE CLOUD, page 597. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic synthesis and verification of real-time embedded software for mobile and ubiquitous systems., and . Comput. Lang. Syst. Struct., 34 (4): 153-169 (2008)Counterexample-Guided Assume-Guarantee Synthesis through Learning., and . IEEE Trans. Computers, 60 (5): 734-750 (2011)Model Checking Prioritized Timed Automata., , , and . ATVA, volume 3707 of Lecture Notes in Computer Science, page 370-384. Springer, (2005)Model Checking Timed Systems with Urgencies., , , , , , , and . ATVA, volume 4218 of Lecture Notes in Computer Science, page 67-81. Springer, (2006)VERTAF: An Application Framework for the Design and Verification of Embedded Real-Time Software., , , , , and . IEEE Trans. Software Eng., 30 (10): 656-674 (2004)A Quantum interpretation of separating conjunction for local reasoning of Quantum programs based on separation logic., , , and . Proc. ACM Program. Lang., 6 (POPL): 1-27 (2022)Oracle-Supported Dynamic Exploit Generation for Smart Contracts., , , , , and . CoRR, (2019)Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack., , , , , , , and . CoRR, (2020)SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices., , , , and . CoRR, (2020)CSim2: Compositional Top-down Verification of Concurrent Systems using Rely-Guarantee., , , and . ACM Trans. Program. Lang. Syst., 43 (1): 2:1-2:46 (2021)