From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Model-Based Method for Security Configuration Verification., , и . IWSEC, том 4266 из Lecture Notes in Computer Science, стр. 60-75. Springer, (2006)Script-Free Scenario Authoring in MediaDesc., , , и . ACM Multimedia, стр. 273-278. ACM, (1998)A Static Analysis of Dynamic Fault Trees with Priority-AND Gates., , , , , и . LADC, стр. 58-67. IEEE Computer Society, (2013)Applying a Model-Based Approach to IT Systems Development Using SysML Extension., , , , , и . MoDELS, том 6981 из Lecture Notes in Computer Science, стр. 563-577. Springer, (2011)Automatic Static Fault Tree Analysis from System Models., и . PRDC, стр. 241-242. IEEE Computer Society, (2010)Automatic Synthesis of Static Fault Trees from System Models., , , и . SSIRI, стр. 127-136. IEEE Computer Society, (2011)Combinatorial Analysis of Dynamic Fault Trees with Priority-AND Gates., , , , , и . ISSRE Workshops, стр. 3-4. IEEE Computer Society, (2012)Evaluation of IT systems considering characteristics as system of systems., , , , , и . SoSE, стр. 43-48. IEEE, (2011)Virtualized server infrastructure for resilient voice communication service., , , , , , и . NOMS, стр. 1-8. IEEE, (2014)Efficient Analysis of Fault Trees with Voting Gates., , , , , , и . ISSRE, стр. 230-239. IEEE Computer Society, (2011)