Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On equivalence of safe Petri nets., , , and . FCT, page 430-436. Akademie-Verlag, Berlin, (1979)Optimizations in a Processor of Attribute Grammars, , , and . Papers of Tech. Group, SF20-5. IPS Japan, (1987)Principles of algebraic language ASL., , , and . Syst. Comput. Jpn., 18 (7): 11-20 (1987)An Efficiency Improvement on an Unlinkable Divisible Electronic Cash System., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (10): 2326-2335 (2002)A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups., and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 336-347. Springer, (2004)Logical Programming for the Telegram Analysis Problem., , , , and . Comput. Lang., 12 (1): 9-20 (1987)Quantifying a design process based on experiments., , , and . J. Syst. Softw., 9 (2): 129-136 (1989)ASL program written in abstract sequential machine style and its compiler., , and . Syst. Comput. Jpn., 23 (7): 1-11 (1992)A fast method for timing verification that uses the conditions that cause changes in the output values of gates., and . Syst. Comput. Jpn., 32 (1): 38-44 (2001)Functional Programming and Logical Programming for the Telegram Analysis Problem., , , and . ICSE, page 463-472. IEEE Computer Society, (1984)