From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach., , , и . AAAI, стр. 1408-1414. AAAI Press, (2011)SoC Design Approach Using Convertibility Verification., , и . EURASIP J. Embed. Syst., (2008)Multi-clock Soc design using protocol conversion., , , и . DATE, стр. 123-128. IEEE, (2009)Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection., и . ICDCIT, том 3347 из Lecture Notes in Computer Science, стр. 353-362. Springer, (2004)Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables., , и . ACC, стр. 1-6. IEEE, (2006)Synchronizability for Verification of Asynchronously Communicating Systems., , и . VMCAI, том 7148 из Lecture Notes in Computer Science, стр. 56-71. Springer, (2012)Disrupting Diffusion: Critical Nodes in Network., , , и . WI/IAT, стр. 397-404. IEEE, (2020)Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude., , , , , и . ASONAM, стр. 227-231. IEEE, (2020)Automated Choreography Repair., и . FASE, том 9633 из Lecture Notes in Computer Science, стр. 13-30. Springer, (2016)iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants., , и . ITNG, стр. 479-484. IEEE Computer Society, (2014)