Author of the publication

An adaptable security manager for real-time transactions.

, , and . ECRTS, page 63-70. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defect Prediction over Software Life Cycle in Automotive Domain - State of the Art and Road Map for Future., , , and . ICSOFT EA, page 377-382. SciTePress, (2014)Virtual organizations and beyond - discover imaginary systems., , , and . Wiley series in practical strategy Wiley, (1997)Refining Design Constraints from a System Services Model for a Real-Time DBMS., , and . RTDB, page 79-86. (1996)An adaptable security manager for real-time transactions., , and . ECRTS, page 63-70. IEEE Computer Society, (2000)Imprecise task scheduling and overload management using OR-ULD., , and . RTCSA, page 307-314. IEEE Computer Society, (2000)Measuring and Visualizing Code Stability - A Case Study at Three Companies., , , , , , and . IWSM/Mensura, page 191-200. IEEE Computer Society, (2013)Identifying risky areas of software code in Agile/Lean software development: An industrial experience report., , , , , , , and . CSMR-WCRE, page 154-163. IEEE Computer Society, (2014)Reducing Simulation Testing Time by Parallel Execution of Loosely Coupled Segments of a Test Scenario., and . ES4CPS@DATE, page 33. ACM, (2014)Effects of measurements on correlations of software code metrics., , and . Empirical Software Engineering, 24 (4): 2764-2818 (2019)Measuring the impact of changes to the complexity and coupling properties of automotive software systems., , , and . J. Syst. Softw., 86 (5): 1275-1293 (2013)