Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Untraceability of mobile agents., and . AAMAS, page 1233-1234. ACM, (2005)Modeling Fault Trees Using Petri Nets., , and . SAFECOMP, page 90-100. Springer, (1995)Software Engineering Education: A Dragging-Through Approach.. CSEE, volume 895 of Lecture Notes in Computer Science, page 31-44. Springer, (1995)Extending GQM by Argument Structures., and . CEE-SET, volume 5082 of Lecture Notes in Computer Science, page 26-39. Springer, (2007)Formal specification and verification of a real-time kernel., and . RTS, page 205-211. IEEE, (1994)Experience with instantiating an automated testing process in the context of incremental and evolutionary software development., and . e Informatica Softw. Eng. J., 5 (1): 51-63 (2011)AgileSafe - a method of introducing agile practices into safety-critical software development processes., and . FedCSIS, volume 8 of Annals of Computer Science and Information Systems, page 1549-1552. IEEE, (2016)Object Oriented Safety Analysis of an Extra High Voltage Substation Bay., and . SAFECOMP, volume 1516 of Lecture Notes in Computer Science, page 306-315. Springer, (1998)An Approach to Trust Case Development., , , , and . SAFECOMP, volume 2788 of Lecture Notes in Computer Science, page 193-206. Springer, (2003)Sticky variables and memory optimization.. ACM SIGPLAN Notices, 13 (6): 38-48 (1978)