Author of the publication

Verification and Analysis of Autonomic Systems for Networked Enterprises.

, , , , , and . ArtDeco, volume 7200 of Lecture Notes in Computer Science, Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ISSTA 2002 panel: is ISSTA research relevant to industrial users?. ISSTA, page 201-202. ACM, (2002)Learning Path Specification for Workplace Learning based on Business Process Management., and . CSEDU (1), page 172-180. SciTePress, (2016)Using Testability Measures for Dependability Assessment., and . ICSE, page 61-70. ACM, (1995)Architectural Verification of Black-Box Component-Based Systems., , and . RISE, volume 4401 of Lecture Notes in Computer Science, page 98-113. Springer, (2006)RETORCH: Resource-Aware End-to-End Test Orchestration., , , , and . QUATIC, volume 1010 of Communications in Computer and Information Science, page 297-310. Springer, (2019)Extending UML Testing Profile Towards Non-functional Test Modeling., , , , and . MODELSWARD, page 488-497. SciTePress, (2014)XML Every-Flavor Testing., , and . WEBIST (1), page 268-273. INSTICC Press, (2006)Learn PAd : Collaborative and Model-based Learning in Public Administrations., , , and . STAF Projects Showcase, volume 1400 of CEUR Workshop Proceedings, page 9-17. CEUR-WS.org, (2015)Testing access control policies against intended access rights., , , and . SAC, page 1641-1647. ACM, (2016)Automatic XACML Requests Generation for Policy Testing., , , and . ICST, page 842-849. IEEE Computer Society, (2012)