Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Identification Based on Frequency Texture Analysis., , , and . ICICIC (2), page 121-125. IEEE Computer Society, (2006)ESIDE: An Integrated Development Environment for Component-Based Embedded Systems., , and . COMPSAC (1), page 305-314. IEEE Computer Society, (2009)Formalizing hardware/software interface specifications., , , , and . ASE, page 143-152. IEEE Computer Society, (2011)Research on a Novel Hashing Stream Cipher., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 481-490. Springer, (2006)Model Checking Büchi Pushdown Systems., , , and . FASE, volume 6603 of Lecture Notes in Computer Science, page 141-155. Springer, (2011)Relational Databases Watermark Technique Based on Content Characteristic., , , , and . ICICIC (3), page 677-680. IEEE Computer Society, (2006)Guiding Component-Based Hardware/Software Co-Verification with Patterns., , and . EUROMICRO-SEAA, page 67-74. IEEE Computer Society, (2007)Efficient Reachability Analysis of Büchi Pushdown Systems for Hardware/Software Co-verification., , , and . CAV, volume 6174 of Lecture Notes in Computer Science, page 339-353. Springer, (2010)Component-Based Abstraction and Refinement., , , and . ICSR, volume 5030 of Lecture Notes in Computer Science, page 39-51. Springer, (2008)An Automata-Theoretic Approach to Hardware/Software Co-verification., , , , and . FASE, volume 6013 of Lecture Notes in Computer Science, page 248-262. Springer, (2010)