Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the risk of intercepting VoIP calls., and . Comput. Networks, 52 (12): 2432-2446 (2008)How to Avoid the Formal Verification of a Theorem Prover., , and . Logic Journal of the IGPL, 9 (1): 1-25 (2001)Risk assessment in practice: A real case study., and . Comput. Commun., 31 (15): 3691-3699 (2008)From Ancient to Modern Computing: A History of Information Hiding., and . IEEE Ann. Hist. Comput., 35 (3): 33-39 (2013)Intuitionistic First-Order Logic: Categorical Semantics via the Curry-Howard Isomorphism.. CoRR, (2013)A General Syntax for Nonrecursive Higher Inductive Types., , and . ICTCS, volume 2756 of CEUR Workshop Proceedings, page 223-229. CEUR-WS.org, (2020)A Novel Representation of Graphical Patterns for Graph Convolution Networks., , and . ANNPR, volume 13739 of Lecture Notes in Computer Science, page 16-27. Springer, (2022)Complex Arguments in Adpositional Argumentation., , and . AI³@AI*IA, volume 3086 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Representing Object Code.. Computational Logic, volume 1861 of Lecture Notes in Computer Science, page 538-552. Springer, (2000)Linearity of Client/Server Systems., , , , and . Bulletin of the EATCS, (1995)