Author of the publication

A UML Validation Toolset Based on Abstract State Machines.

, , and . ASE, page 315-318. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A logical approach to asymptotic combinatorics II: Monadic second-order properties.. J. Comb. Theory, Ser. A, 50 (1): 110-131 (1989)Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search., , and . SEC, volume 181 of IFIP, page 577-588. Springer, (2005)Logical Definability of Counting Functions., and . Computational Complexity Conference, page 255-266. IEEE Computer Society, (1994)A Deductive System for Existential Least Fixpoint Logic.. J. Log. Comput., 3 (2): 197-213 (1993)Regular Languages in NC¹., , , and . J. Comput. Syst. Sci., 44 (3): 478-499 (1992)The largest set partitioned by a subfamily of a cover., and . J. Comb. Theory, Ser. A, 54 (2): 296-303 (1990)Some methods for computing component distribution probabilities in relational structures.. Discrete Mathematics, 66 (1-2): 59-77 (1987)Lower Bounds for the Complexity of Theories.. Current Trends in Theoretical Computer Science, volume 40 of World Scientific Series in Computer Science, World Scientific, (1993)Execution of A Requirement Model in Software Development., , , , and . IASSE, page 203-208. ISCA, (2004)A Simple Power Analysis Attack on the Serpent Key Schedule., , and . IACR Cryptology ePrint Archive, (2009)