Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint satisfaction techniques for diagnosing errors in design by contract software., , and . ACM SIGSOFT Softw. Eng. Notes, (2006)Stateful Firewalling for Wireless Mesh Networks., , , and . NTMS, page 1-5. IEEE, (2008)A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models., , and . RCIS, page 1-6. IEEE, (2011)A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets., , and . SECRYPT, page 430-441. INSTICC Press, (2008)Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets., , and . ARES, page 229-236. IEEE Computer Society, (2008)Mesh Network Firewalling with Bloom Filters., , , and . ICC, page 1546-1551. IEEE, (2007)Model-Based Development of firewall rule sets: Diagnosing model inconsistencies., , and . Inf. Softw. Technol., 51 (5): 894-915 (2009)An integration of model-based techniques for determining the minimal diagnosis., , , and . Inteligencia Artif., 10 (31): 41-52 (2006)Metodología Semicualitativa para Razonar sobre Sistemas Dinámicos., , , , , , and . Computación y Sistemas, (2005)Contract-based test generation for data flow of business processes using constraint programming., , and . RCIS, page 1-12. IEEE, (2011)