From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Measuring Robustness in Cyber-Physical Systems under Sensor Attacks., , , , и . CoRR, (2024)Privacy in Real-Time Systems., , и . MTCS, том 52 из Electronic Notes in Theoretical Computer Science, стр. 295-305. Elsevier, (2001)Compositional Synthesis of Generalized Mealy Machines., и . Fundam. Informaticae, 60 (1-4): 367-382 (2004)Taylor Approximation for Hybrid Systems., и . HSCC, том 3414 из Lecture Notes in Computer Science, стр. 402-416. Springer, (2005)Rule Formats for Non Interference.. ESOP, том 2618 из Lecture Notes in Computer Science, стр. 129-143. Springer, (2003)Compositional Weak Metrics for Group Key Update., , и . MFCS, том 83 из LIPIcs, стр. 72:1-72:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Formal Models of Timing Attacks on Web Privacy., , , , , , и . TOSCA, том 62 из Electronic Notes in Theoretical Computer Science, стр. 229-243. Elsevier, (2001)A Function Elimination Method for Checking Satisfiability of Arithmetical Logics., , и . Fundam. Informaticae, 143 (1-2): 51-71 (2016)Foundational aspects of multiscale modeling of biological systems with process algebras., , , , и . Theor. Comput. Sci., (2012)A Causal Semantics for Timed Default Concurrent Constraint Programming., и . AMAST, том 1816 из Lecture Notes in Computer Science, стр. 228-242. Springer, (2000)