Author of the publication

A Complete Axiomatization of MSO on Infinite Trees.

, and . LICS, page 390-401. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving Multilayer Neural Networks Using Permutation free Encoding Technique., and . IC-AI, page 32-38. CSREA Press, (2009)Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses., , and . NDSS, The Internet Society, (2016)A Scalable and Privacy-Aware IoT Service for Live Video Analytics., , , , , and . MMSys, page 38-49. ACM, (2017)A Functional (Monadic) Second-Order Theory of Infinite Trees., and . CoRR, (2019)Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications., , , , , and . CVPR Workshops, page 1387-1396. IEEE Computer Society, (2017)Securing Anonymous Communication Channels under the Selective DoS Attack., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 362-370. Springer, (2013)Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice., , , and . IEEE Pervasive Computing, 17 (3): 35-46 (2018)Left-Handed Completeness for Kleene algebra, via Cyclic Proofs., , and . LPAR, volume 57 of EPiC Series in Computing, page 271-289. EasyChair, (2018)Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes., , , , and . WWW, page 1501-1510. ACM, (2017)Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting., , , , and . NDSS, The Internet Society, (2018)