From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Weird Machines as Insecure Compilation., , , , , , и . CoRR, (2019)A Semantic Reference Model for Capturing System Development and Evaluation., , , , , , , , , и . ICSC, стр. 173-174. IEEE, (2022)RACK: A Semantic Model and Triplestore for Curation of Assurance Case Evidence., , , , , , , , и . SAFECOMP Workshops, том 14182 из Lecture Notes in Computer Science, стр. 149-160. Springer, (2023)Continuous Formal Verification of Amazon s2n., , , , , , , , , и 2 other автор(ы). CAV (2), том 10982 из Lecture Notes in Computer Science, стр. 430-446. Springer, (2018)Enabling Development of an Extensible, Multi-Perspective Ontology., , , , , , и . ICSC, стр. 77-80. IEEE, (2024)Application-Scale Secure Multiparty Computation., , , и . ESOP, том 8410 из Lecture Notes in Computer Science, стр. 8-26. Springer, (2014)TrackOS: A Security-Aware Real-Time Operating System., , , , и . RV, том 10012 из Lecture Notes in Computer Science, стр. 302-317. Springer, (2016)Aviation Certification Powered by the Semantic Web Stack., , , , , и . ISWC, том 14266 из Lecture Notes in Computer Science, стр. 345-361. Springer, (2023)