Author of the publication

A Software Exoskeleton to Protect and Support Citizen's Ethics and Privacy in the Digital World.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Constraints as Views in Deductice Databases., , and . FMLDO, page 133-140. University of Magedeburg, Faculty of Computer Science, (1996)PLASTIC: Providing lightweight & adaptable service technology for pervasive information & communication., , , , , and . ASE Workshops, page 65-70. IEEE, (2008)Quantitative resource-oriented analysis of Java (Adaptable) applications., and . WOSP, page 15-25. ACM, (2007)Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework., , and . FASE, volume 4422 of Lecture Notes in Computer Science, page 57-71. Springer, (2007)ESP-MC: An Experiment in the Use of Verification Tools., , and . ASIAN, volume 1023 of Lecture Notes in Computer Science, page 396-410. Springer, (1995)Modelling Interoperability by CHAM: A Case Study., and . COORDINATION, volume 1061 of Lecture Notes in Computer Science, page 428-431. Springer, (1996)Deriving performance models of software architectures from message sequence charts., , , and . Workshop on Software and Performance, page 47-57. ACM, (2000)A Strategy to Deal with Divergent Rewrite Systems., and . CTRS, volume 656 of Lecture Notes in Computer Science, page 458-467. Springer, (1992)Graphical Scenarios for Specifying Temporal Properties : an Automated Approach, , and . Automated Software Engineering, (2007)Introduction to Special Issue on Distributed and Mobile Software Engineering., and . Autom. Softw. Eng., 11 (3): 203-205 (2004)