Author of the publication

Scalable modeling and analysis of requirements preferences: A qualitative approach using CI-Nets.

, , and . RE, page 214-219. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoC Design Approach Using Convertibility Verification., , and . EURASIP J. Embed. Syst., (2008)Representing and Reasoning with Qualitative Preferences for Compositional Systems., , and . CoRR, (2014)Selecting the minimal set of preferred responses to counter detected intrusions., , and . CISRC, page 5:1-5:8. ACM, (2017)Synchronizability for Verification of Asynchronously Communicating Systems., , and . VMCAI, volume 7148 of Lecture Notes in Computer Science, page 56-71. Springer, (2012)Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection., and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 353-362. Springer, (2004)Multi-clock Soc design using protocol conversion., , , and . DATE, page 123-128. IEEE, (2009)Control of Non-Deterministic Systems With $\mu$-Calculus Specifications Using Quotienting., and . IEEE CAA J. Autom. Sinica, 8 (5): 953-970 (2021)Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables., , and . ACC, page 1-6. IEEE, (2006)Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach., , , and . AAAI, page 1408-1414. AAAI Press, (2011)Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude., , , , , and . ASONAM, page 227-231. IEEE, (2020)