Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Bounded Model Checking to Verify Consensus Algorithms., and . DISC, volume 5218 of Lecture Notes in Computer Science, page 466-480. Springer, (2008)Verifying Fault Tolerance of Concurrent Systems by Model Checking., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (11): 2414-2425 (2002)Improving the Robustness of Epidemic Communication in Scale-Free Networks., , and . BioADIT, volume 3853 of Lecture Notes in Computer Science, page 294-305. Springer, (2006)Interactive Goal Model Construction Based on a Flow of Questions., , and . IEICE Trans. Inf. Syst., 103-D (6): 1309-1318 (2020)Constrained detecting arrays: Mathematical structures for fault identification in combinatorial interaction testing., , and . Inf. Softw. Technol., (2023)Using simulated annealing for locating array construction., , , and . Inf. Softw. Technol., (2020)A localized broadcast scheme for minimizing power consumption in wireless mobile ad hoc networks., , and . Parallel and Distributed Computing and Networks, page 7-12. IASTED/ACTA Press, (2007)Expression caching for runtime verification based on parameterized probabilistic models., , and . J. Syst. Softw., (2019)Non-specification-based approaches to logic testing for software., , and . Inf. Softw. Technol., 44 (2): 113-121 (2002)Genetics-based multiprocessor scheduling using task duplication., , and . Microprocess. Microsystems, 22 (3-4): 197-207 (1998)