Author of the publication

Automatic and Continuous Software Architecture Validation.

, and . ICSE (2), page 59-68. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Machine Learning to Detect Noisy Neighbors in 5G Networks., , , , , and . CoRR, (2016)Compositional Synthesis of Reactive Systems from Live Sequence Chart Specifications., and . TACAS, volume 5505 of Lecture Notes in Computer Science, page 77-91. Springer, (2009)Deep convolutional neural networks for detecting noisy neighbours in cloud infrastructure., , , , , and . ESANN, (2017)Using binary decision diagrams for combinatorial test design., , and . ISSTA, page 254-264. ACM, (2011)Using combinatorial benchmark construction to improve the assessment of concurrency bug detection tools., , , , and . PADTAD, page 25-35. ACM, (2012)The Resh Programming Language for Multirobot Orchestration., , and . ICRA, page 4026-4032. IEEE, (2021)Using Projections to Debug Large Combinatorial Models., , and . ICST Workshops, page 311-320. IEEE Computer Society, (2013)Simplified Modeling of Combinatorial Test Spaces., , and . ICST, page 573-579. IEEE Computer Society, (2012)Common Patterns in Combinatorial Models., , and . ICST, page 624-629. IEEE Computer Society, (2012)Optimizing Virtual Backup Allocation for Middleboxes., , , and . IEEE/ACM Trans. Netw., 25 (5): 2759-2772 (2017)