Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unprovability of Consistency Statements in Fragments of Bounded Arithmetic., and . Ann. Pure Appl. Logic, 74 (3): 221-244 (1995)Delineating Classes of Computational Complexity via Second Order Theories with Weak Set Existence Principles, I.. J. Symb. Log., 60 (1): 103-121 (1995)Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency., , and . DCOSS, page 286-288. IEEE Computer Society, (2013)CSI-MIMO: Indoor Wi-Fi fingerprinting system., , , and . LCN, page 202-209. IEEE Computer Society, (2014)Improved VCF normalization for accurate VCF comparison., , , and . Bioinformatics, 33 (7): 964-970 (2017)Detecting, Representing and Querying Collusion in Online Rating Systems, , , , , and . CoRR, (2012)Some applications of logic to feasibility in higher types., and . ACM Trans. Comput. Log., 5 (2): 332-350 (2004)A novel intermittent fault Markov model for deep sub-micron processors., , , and . ACM Great Lakes Symposium on VLSI, page 13-18. ACM, (2013)DoSGuard: Protecting pipelined MPSoCs against hardware Trojan based DoS attacks., , , and . ASAP, page 45-52. IEEE Computer Society, (2017)Optimal synthesis of latency and throughput constrained pipelined MPSoCs targeting streaming applications., , , and . CODES+ISSS, page 75-84. ACM, (2010)