Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bisimulations for Verifying Strategic Abilities with an Application to ThreeBallot., , , , and . AAMAS, page 1286-1295. ACM, (2017)Real-Time Automata.. Journal of Automata, Languages and Combinatorics, 6 (1): 3-23 (2001)An algebraic theory of real-time formal languages. (Théorie algébrique des langages formels temps réel).. Joseph Fourier University, Grenoble, France, (2001)A Nonarchimedian Discretization for Timed Languages.. Fundam. Informaticae, 131 (3-4): 389-407 (2014)On the computation of covert channel capacity., and . RAIRO Theor. Informatics Appl., 44 (1): 37-58 (2010)Removing All Silent Transitions from Timed Automata., and . FORMATS, volume 5813 of Lecture Notes in Computer Science, page 118-132. Springer, (2009)Bisimulations for verifying strategic abilities with an application to the ThreeBallot voting protocol., , , , and . Inf. Comput., (2021)Computationally Feasible Strategies., and . AAMAS, page 784-792. ACM, (2023)Revisiting Satisfiability and Model-Checking for CTLK with Synchrony and Perfect Recall.. CLIMA, volume 5405 of Lecture Notes in Computer Science, page 117-131. Springer, (2008)A Class of Automata for Computing Reachability Relations in Timed Systems.. VISSAS, volume 1 of NATO Security through Science Series D: Information and Communication Security, page 69-89. IOS Press, (2005)