Author of the publication

Model-Based Analysis of Money Accountability in Electronic Purses.

, , , , , and . WINE, volume 3828 of Lecture Notes in Computer Science, page 346-355. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Equivalence Checking of Two Statechart Specifications., , , and . IEEE International Workshop on Rapid System Prototyping, page 46-51. IEEE Computer Society, (2000)Geographic scheduling of directional transmission for periodic safety messages in IEEE WAVE., , , , , and . Computer Communications, (2016)Generating composite behavior of embedded software components based on UML behavioral model and process algebra., , , and . ACM SIGSOFT Software Engineering Notes, 36 (1): 1-9 (2011)Measurement-based multi-call voice frame grouping in Internet telephony., , and . IEEE Communications Letters, 6 (5): 199-201 (2002)Real-time visualization of network attacks on high-speed links., , and . IEEE Network, 18 (5): 30-39 (2004)Preventing Session Table Explosion in Packet Inspection Computers., , , and . IEEE Trans. Computers, 54 (2): 238-240 (2005)Reducing TCP response time in face of wireless uplink losses., , and . VTC Fall, page 262-266. IEEE, (2001)On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics., , , and . VTC Fall, page 1-6. IEEE, (2006)Model-Based Analysis of Money Accountability in Electronic Purses., , , , , and . WINE, volume 3828 of Lecture Notes in Computer Science, page 346-355. Springer, (2005)Taming Large Classifiers with Rule Reference Locality., , , , and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 928-937. Springer, (2003)