From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security., , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 334-349. Springer, (2007)Bounded model checking of strategy ability with perfect recall.. Artif. Intell., (2015)Symbolic Synthesis of Knowledge-based Program Implementations with Synchronous Semantics., и . TARK, (2013)Towards the Quantification of Safety Risks in Deep Neural Networks., , и . CoRR, (2020)Scene Text Recognition via Dual-path Network with Shape-driven Attention Alignment., , , , , , и . ACM Trans. Multim. Comput. Commun. Appl., 20 (4): 107:1-107:20 (апреля 2024)An Epistemic Strategy Logic., и . ACM Trans. Comput. Log., 19 (4): 26:1-26:45 (2018)A game-based approximate verification of deep neural networks with provable guarantees., , , , и . Theor. Comput. Sci., (2020)An Overview of Verification and Validation Challenges for Inspection Robots., , , , , , , , , и 7 other автор(ы). Robotics, 10 (2): 67 (2021)Risk Controlled Image Retrieval., , , и . CoRR, (2023)BayLIME: Bayesian Local Interpretable Model-Agnostic Explanations., , , и . CoRR, (2020)