From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Experiments with destructive updates in a lazy functional language (extended abstract)., и . Functional Programming, стр. 69-82. Springer, (1993)Compilation of Functional Languages using Flow Graph Analysis., , и . Softw. Pract. Exp., 24 (2): 127-173 (1994)Declarative solutions to partitioned-grid problems., , и . Softw. Pract. Exp., 29 (13): 1173-1200 (1999)Mutation Testing of Smart Contracts at Scale., и . TAP@STAF, том 12165 из Lecture Notes in Computer Science, стр. 23-42. Springer, (2020)A Trace Logic for Local Security Properties, , , и . CoRR, (2004)Personal DJ, an architecture for personalised content delivery., , и . WWW, стр. 1-7. ACM, (2001)Formalizing the safety of Java, the Java virtual machine, and Java card., и . ACM Comput. Surv., 33 (4): 517-558 (2001)Two methodologies for physical penetration testing using social engineering., , и . ACSAC, стр. 399-408. ACM, (2010)Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain., , и . ARSPA-WITS, том 6186 из Lecture Notes in Computer Science, стр. 112-129. Springer, (2010)A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks., , , и . PWC, том 2775 из Lecture Notes in Computer Science, стр. 27-39. Springer, (2003)