Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Merging Ontologies and Data from Electronic Health Records., , , and . Future Internet, 16 (2): 62 (February 2024)T-wise combinatorial interaction test suites construction based on coverage inheritance., and . Softw. Test. Verification Reliab., 22 (7): 507-526 (2012)A Framework for Incremental Covering Arrays Construction., and . CSOC (2), volume 349 of Advances in Intelligent Systems and Computing, page 283-294. Springer, (2015)VSC 2015 Track Report: Validating Software for Critical Systems., and . WETICE, page 197. IEEE Computer Society, (2015)Virtual Home Environment for Multimedia Services in 3rd Generation Networks., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 1221-1226. Springer, (2002)Combinatorial Validation Testing of Java Card Byte Code Verifiers., and . WETICE, page 347-352. IEEE Computer Society, (2013)Random versus combinatorial effectiveness in software conformance testing: a case study., , and . SAC, page 1797-1802. ACM, (2015)Mobility and quality of service across heterogeneous wireless networks., , and . Comput. Networks, 47 (2): 203-217 (2005)A Formal Logic Approach to Constrained Combinatorial Testing., and . J. Autom. Reason., 45 (4): 331-358 (2010)Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions., and . COMPSAC Workshops, page 493-498. IEEE Computer Society, (2013)