Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Modal Logic for Message Passing Processes., and . Acta Inf., 32 (4): 375-393 (1995)Towards a Theory of Bisimulation for the Higher-Order Process Calculi., and . J. Comput. Sci. Technol., 19 (3): 352-363 (2004)User-centric private matching for eHealth networks - A social perspective., , , and . GLOBECOM, page 732-737. IEEE, (2012)Joint Design Model of Multi-period Reverse Logistics Network with the Consideration of Carbon Emissions for E-Commerce Enterprises., , and . ICEBE, page 428-433. IEEE Computer Society, (2015)A description logic-based policy compliance checker for trust negotiation., , and . Peer-to-Peer Networking and Applications, 9 (2): 372-383 (2016)Random Search Enhancement of Incremental Regularized Multiple Hidden Layers ELM., , , , and . IEEE Access, (2019)Fault detection filtering for nonlinear switched systems via event-triggered communication approach., , , , and . Automatica, (2019)ExoApp: Performance Evaluation of Data-Intensive Applications on ExoGENI., , , , and . GREE, page 25-28. IEEE Computer Society, (2013)Deciding Weak Bisimilarity of Normed Context-Free Processes Using Tableau., and . ICTAC, volume 4711 of Lecture Notes in Computer Science, page 337-350. Springer, (2007)Pilot Reuse for Device-to-Device Underlay Massive MIMO Systems., , , , and . VTC Fall, page 1-5. IEEE, (2015)