Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Priami, Corrado
add a person with the name Priami, Corrado
 

Other publications of authors with the same name

Preface to the special issue on Security in global computing.. Int. J. Inf. Sec., 2 (3-4): 125 (2004)An Automatic Translation of SBML into Beta-Binders., , and . IEEE/ACM Trans. Comput. Biology Bioinform., 5 (1): 80-90 (2008)Evaluation of Tools for the Analysis of Communicating Systems., and . Bulletin of the EATCS, (1991)Communicating by compatibility., , and . J. Log. Algebr. Program., 75 (2): 167-181 (2008)Analysis of Facile Programs: A Case Study., , , and . LOMAPS, volume 1192 of Lecture Notes in Computer Science, page 345-369. Springer, (1996)Efficient formulation of the rejection-based algorithm for biochemical reactions with delays., , and . IJBRA, 15 (2): 159-173 (2019)Enhanced operational semantics., and . ACM Comput. Surv., 33 (2): 135-176 (2001)Authentication primitives for secure protocol specifications., , , and . Future Generation Comp. Syst., 21 (4): 645-653 (2005)Towards the integration of computational systems biology and high-throughput data: supporting differential analysis of microarray gene expression data., , and . J. Integrative Bioinformatics, (2008)Performance Analysis of a UML Micro-business Case Study., , and . Global Computing, volume 3267 of Lecture Notes in Computer Science, page 107-126. Springer, (2004)