Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The ACID model checker and code generator for transaction processing., and . HPCS, page 138-144. IEEE, (2009)Economic Evaluation of Interactive Audio Media for Securing Internet Services., , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 46-53. Springer, (2011)Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection., , , , and . CRITIS, volume 7722 of Lecture Notes in Computer Science, page 143-154. Springer, (2012)Security-aware elasticity for NoSQL databases in multi-cloud environments., , , and . Int. J. Intell. Inf. Database Syst., 10 (3/4): 168-190 (2017)Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems., , , , and . Int. J. Softw. Tools Technol. Transf., 22 (1): 3-32 (2020)A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach.. Inf. Softw. Technol., 51 (2): 235-257 (2009)Sboing4Real: A real-time crowdsensing-based traffic management system., , , , , , , , , and 3 other author(s). J. Parallel Distributed Comput., (2022)On Neural Network Equivalence Checking Using SMT Solvers., , , and . FORMATS, volume 13465 of Lecture Notes in Computer Science, page 237-257. Springer, (2022)Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions., , , and . SECRYPT, page 28-40. SciTePress, (2016)Securing Legacy Code with the TRACER Platform., , , , , , , and . Panhellenic Conference on Informatics, page 26:1-26:6. ACM, (2014)