Author of the publication

Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example.

, , , , , , , and . ACM Trans. Priv. Secur., 20 (2): 5:1-5:31 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The AdaPIC Tool Set: Supporting Interface Control and Analysis Throughout the Software Development Process., , and . IEEE Trans. Software Eng., 15 (3): 250-263 (1989)Extending and Limiting PGraphite-style Persistence., , and . POS, page 74-86. Morgan Kaufmann, (1990)A Comparison of Data Flow Path Selection Criteria., , , and . ICSE, page 244-251. IEEE Computer Society, (1985)Ada-Based support for programming-in-the-Large., , and . IEEE Software, 2 (2): 58-71 (1985)A System to Generate Test Data and Symbolically Execute Programs.. IEEE Trans. Software Eng., 2 (3): 215-222 (1976)A Compact Petri Net Representation and Its Implications for Analysis., and . IEEE Trans. Software Eng., 22 (11): 794-811 (1996)Applying Static Analysis to Software Architectures., , , and . ESEC / SIGSOFT FSE, volume 1301 of Lecture Notes in Computer Science, page 77-93. Springer, (1997)A Coding Framework for Usability Evaluation of Digital Health Technologies., , , , , , , , , and 1 other author(s). HCI (1), volume 13302 of Lecture Notes in Computer Science, page 185-196. Springer, (2022)A program testing system.. ACM Annual Conference, page 488-491. ACM, (1976)Efficient Composite Data Flow Analysis Applied to Concurrent Programs., , and . PASTE, page 51-58. ACM, (1998)