Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Operational Semantics to Denotational Semantics for Verilog, , and . (2001)UTP semantics for the MCA ARMv8 architecture., and . J. Syst. Archit., (2022)A Security Calculus for Wireless Networks of Named Data Networking., , , and . ICFEM, volume 11852 of Lecture Notes in Computer Science, page 170-185. Springer, (2019)From Operational Semantics to Denotational Semantics for Verilog, , and . (2001)Verifying Static Aspects of UML models using Prolog (S)., , , , and . SEKE, page 259-342. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Formalization and Verification of RTPS StatefulWriter Module Using CSP., , , , and . SEKE, page 147-198. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Formal Verification of HPS-based Master-Slave Scheme in MEC with Timed Automata., , and . TrustCom, page 68-75. IEEE, (2021)SC4MEC: Automated Implementation of A Secure Hierarchical Calculus for Mobile Edge Computing., , and . DATE, page 990-993. IEEE, (2021)Enhancement and formal verification of the ICC mechanism with a sandbox approach in android system., , , and . Softw. Qual. J., 32 (3): 1175-1202 (September 2024)Modeling and verifying SDN under Multi-controller architectures using CSP., , , and . Concurr. Comput. Pract. Exp., (2021)