Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model Checking Groupware Protocols., , , and . COOP, page 179-194. IOS, (2004)A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols., , and . Journal of Automata, Languages and Combinatorics, 11 (4): 345-374 (2006)Applying the product lines paradigm to the quantitative analysis of collective adaptive systems., , and . SPLC, page 321-326. ACM, (2015)Software product line analysis with mCRL2., and . SPLC Workshops, page 78-85. ACM, (2014)Supervisory Controller Synthesis for Product Lines Using CIF 3., , and . ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 856-873. (2016)The Legacy of Stefania Gnesi - From Software Engineering to Formal Methods and Tools, and Back., , and . From Software Engineering to Formal Methods and Tools, and Back, volume 11865 of Lecture Notes in Computer Science, page 1-11. Springer, (2019)Detecting policy conflicts by model checking UML state machines., , , and . ICFI, page 59-74. IOS Press, (2009)Quantitative variability modelling and analysis., and . Int. J. Softw. Tools Technol. Transf., 21 (6): 607-612 (2019)Variability meets security: quantitative security modeling and analysis of highly customizable attack scenarios., , , and . VaMoS, page 11:1-11:9. ACM, (2020)Validating reconfigurations of reo circuits in an e-Banking scenario., , and . ISARCS, page 39-48. ACM, (2013)