Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption., , , , , and . IJES, 7 (3/4): 216-229 (2015)Taming Asynchrony for Attractor Detection in Large Boolean Networks (Technical Report)., , , and . CoRR, (2017)Learning probabilistic models for model checking: an evolutionary approach and an empirical study., , , and . STTT, 20 (6): 689-704 (2018)Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study., , , and . CoRR, (2016)ASSA-PBN: An Approximate Steady-State Analyser of Probabilistic Boolean Networks., , and . ATVA, volume 9364 of Lecture Notes in Computer Science, page 214-220. Springer, (2015)Probabilistic Model Checking of the PDGF Signaling Pathway., , , , , and . Trans. Computational Systems Biology, (2012)Parallel approximate steady-state analysis of large probabilistic Boolean networks., , and . SAC, page 1-8. ACM, (2016)Fast Simulation of Probabilistic Boolean Networks (Technical Report)., , and . CoRR, (2016)A new decomposition-based method for detecting attractors in synchronous Boolean networks., , , and . Sci. Comput. Program., (2019)GPU-accelerated steady-state computation of large probabilistic Boolean networks., , and . Formal Asp. Comput., 31 (1): 27-46 (2019)