Author of the publication

Modeling and Analysis of Real-Time Systems with Mutex Components.

, , and . Int. J. Found. Comput. Sci., 23 (4): 831-852 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Vulnerability Testing of VoIP Software - The MEGACO/H.248 System as an Example., , , and . ICETE (2), page 216-222. INSTICC Press, (2004)Digital Rights Management Platform Based on Blockchain Technology., , and . HCC, volume 12634 of Lecture Notes in Computer Science, page 173-183. Springer, (2020)Using Entropy for Trust Measure in Collaborative Filtering., , , and . HCC, volume 13795 of Lecture Notes in Computer Science, page 107-118. Springer, (2021)Termination and Boundedness for Well-Structured Pushdown Systems., , and . TASE, page 22-29. IEEE Computer Society, (2016)Minimum-Energy Computation Offloading in Mobile Edge Computing with Hybrid PSO-DE Algorithm., , , , , and . ChineseCSCW (1), volume 1491 of Communications in Computer and Information Science, page 424-436. Springer, (2021)Knowledge Aware Bisimulation and Anonymity., , and . ICCS (1), volume 5544 of Lecture Notes in Computer Science, page 53-62. Springer, (2009)Well-Structured Pushdown Systems., and . CONCUR, volume 8052 of Lecture Notes in Computer Science, page 121-136. Springer, (2013)Measuring Anonymity., and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 183-194. Springer, (2009)Hardness Results for Coverability Problem of Well-Structured Pushdown Systems., and . LATA, volume 10168 of Lecture Notes in Computer Science, page 435-446. (2017)A Collaborative Filtering Algorithm based on Entropy and Trust Optimized Neighbor Selection., , , and . CSCWD, page 1293-1298. IEEE, (2022)