Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending and Limiting PGraphite-style Persistence., , and . POS, page 74-86. Morgan Kaufmann, (1990)Simulating patient flow through an Emergency Department using process-driven discrete event simulation., , , , and . SEHC@ICSE, page 73-83. IEEE Computer Society, (2009)The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification., , and . ICSE, page 37-46. IEEE Computer Society, (2001)Considerations for online deviation detection in medical processes., , and . SEHC@ICSE, page 50-56. IEEE Computer Society, (2013)Ada-Based support for programming-in-the-Large., , and . IEEE Software, 2 (2): 58-71 (1985)Specifying and verifying requirements for election processes., , , and . DG.O, volume 289 of ACM International Conference Proceeding Series, page 63-72. Digital Government Research Center, (2008)A System to Generate Test Data and Symbolically Execute Programs.. IEEE Trans. Software Eng., 2 (3): 215-222 (1976)The AdaPIC Tool Set: Supporting Interface Control and Analysis Throughout the Software Development Process., , and . IEEE Trans. Software Eng., 15 (3): 250-263 (1989)A Compact Petri Net Representation and Its Implications for Analysis., and . IEEE Trans. Software Eng., 22 (11): 794-811 (1996)Process Technology to Facilitate the Conduct of Science., , , , , , and . ISPW, volume 3840 of Lecture Notes in Computer Science, page 403-415. Springer, (2005)