Author of the publication

Modeling and Verifying Distributed Systems Using Priorities: A Case Study.

, , , and . Software - Concepts and Tools, 17 (2): 50-62 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Joris van Slageren University of Stuttgart

Electrocatalytic proton reduction: Metal based fused diporphyrins with proton relays for efficient catalysis, , , , , , , , and . Dataset, (2024)Related to: Chandra, S., Singha Hazari, A., Song, Q., Hunger, D., Neuman, N. I., van Slageren, J., Klemm, E. & Sarkar, B. (2023). Remarkable Enhancement of Catalytic Activity of Cu-Complexes in the Electrochemical Hydrogen Evolution Reaction by Using Triply Fused Porphyrin. ChemSusChem 16, e202201146. doi: 10.1002/cssc.202201146.
 

Other publications of authors with the same name

An Algebraic Theory of Process Efficiency., and . LICS, page 63-72. IEEE Computer Society, (1996)An FPGA Implementation of Improved AODV Routing Protocol for Route Repair Scheme., , , , and . ICETET, page 971-974. IEEE Computer Society, (2008)Android based malware detection using a multifeature collaborative decision fusion approach., , and . Neurocomputing, (2015)Predictability of real-time systems: a process-algebraic approach., and . RTSS, page 82-91. IEEE Computer Society, (1996)Priority and Abstraction in Process Algebra., , , and . FSTTCS, volume 880 of Lecture Notes in Computer Science, page 217-230. Springer, (1994)Detection of StegoBot: a covert social network botnet., , and . SECURIT, page 36-41. ACM, (2012)Priority in Process Algebra., , and . Handbook of Process Algebra, North-Holland / Elsevier, (2001)Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks., , and . ICIA, page 70:1-70:5. ACM, (2016)Hybrid robust watermarking for color images., , and . Computers & Electrical Engineering, 40 (3): 920-930 (2014)Security for Energy Constrained RFID System., , , and . AutoID, page 181-186. IEEE Computer Society, (2005)