Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From C to Interaction Trees: Specifying, Verifying, and Testing a Networked Server., , , , , , , , and . CoRR, (2018)From C to interaction trees: specifying, verifying, and testing a networked server., , , , , , , , and . CPP, page 234-248. ACM, (2019)Reasoning about the garden of forking paths., , and . CoRR, (2021)Verifying an HTTP Key-Value Server with Interaction Trees and VST., , , , , , , , , and . ITP, volume 193 of LIPIcs, page 32:1-32:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Midhaul transmission using edge data centers with split PHY processing and wavelength reassignment for 5G wireless networks., , , , , and . ONDM, page 178-183. IEEE, (2018)Positive-Unlabeled Demand-Aware Recommendation., , , , and . CoRR, (2017)AUV Underwater Positioning Algorithm Based on Interactive Assistance of SINS and LBL., , and . Sensors, 16 (1): 42 (2016)Image Super-Resolution Using VDSR-ResNeXt and SRCGAN., , , and . CoRR, (2018)Performance Analysis of Time Reversal Communication Systems., and . IEEE Communications Letters, 23 (4): 680-683 (2019)A novel technique of recognising multi-stage attack behaviour., , and . IJHPCN, 6 (3/4): 174-180 (2010)