Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new file transfer protocol., , and . AT&T Tech. J., 64 (10): 2387-2411 (1985)A Calculus for Protocol Specification and Validation., , and . Protocol Specification, Testing, and Verification, page 19-34. North-Holland, (1983)Authority assignment in distributed multi-player proxy-based games., , , and . NETGAMES, page 5. ACM, (2006)On the Scheduling of Hyperperiodic Tasks., and . RTS, page 112-117. IEEE, (1993)An interference-robust receiver for ultra-wideband radio in SiGe BiCMOS technology., , , , , , , , , and . IEEE J. Solid State Circuits, 40 (12): 2563-2572 (2005)Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools., , , and . ISDFS, page 1-7. IEEE, (2020)Next Gen PCFG Password Cracking., , and . IEEE Trans. Inf. Forensics Secur., 10 (8): 1776-1791 (2015)Adding Liveness Properties to Coupled Finite-State Machines., , and . ACM Trans. Program. Lang. Syst., 12 (2): 303-339 (1990)An Empirical Study on Efficiency of a Dictionary Based Viterbi Algorithm for Word Segmentation., , , and . IEEE BigData, page 3702-3710. IEEE, (2020)Supporting and Motivating Re-integration of Justice-Involved Individuals Through Dynamic Gamification., , , , , , , and . HCI (4), volume 14014 of Lecture Notes in Computer Science, page 258-275. Springer, (2023)