Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authority assignment in distributed multi-player proxy-based games., , , and . NETGAMES, page 5. ACM, (2006)Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools., , , and . ISDFS, page 1-7. IEEE, (2020)On the Scheduling of Hyperperiodic Tasks., and . RTS, page 112-117. IEEE, (1993)A new file transfer protocol., , and . AT&T Tech. J., 64 (10): 2387-2411 (1985)A Calculus for Protocol Specification and Validation., , and . Protocol Specification, Testing, and Verification, page 19-34. North-Holland, (1983)An interference-robust receiver for ultra-wideband radio in SiGe BiCMOS technology., , , , , , , , , and . IEEE J. Solid State Circuits, 40 (12): 2563-2572 (2005)Next Gen PCFG Password Cracking., , and . IEEE Trans. Inf. Forensics Secur., 10 (8): 1776-1791 (2015)Adding Liveness Properties to Coupled Finite-State Machines., , and . ACM Trans. Program. Lang. Syst., 12 (2): 303-339 (1990)Supporting and Motivating Re-integration of Justice-Involved Individuals Through Dynamic Gamification., , , , , , , and . HCI (4), volume 14014 of Lecture Notes in Computer Science, page 258-275. Springer, (2023)An Empirical Study on Efficiency of a Dictionary Based Viterbi Algorithm for Word Segmentation., , , and . IEEE BigData, page 3702-3710. IEEE, (2020)