Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IBM Research Division cloud computing initiative., , , , , , , , , and 1 other author(s). IBM J. Res. Dev., 53 (4): 1 (2009)Combining System Level Modeling with Assertion Based Verification., , , , , , , , and . ISQED, page 310-315. IEEE Computer Society, (2005)Toward transforming business continuity services., , , , , , , , , and 7 other author(s). IBM J. Res. Dev., 53 (6): 7 (2009)Coverage-Directed Test Generation Using Symbolic Techniques., , , , , and . FMCAD, volume 1166 of Lecture Notes in Computer Science, page 143-158. Springer, (1996)Style Control in the Quill Document Editing Systems.. Softw. Pract. Exp., 21 (6): 625-638 (1991)Optimal Covering of Cacti by Vertex-Disjoint Paths., and . Theor. Comput. Sci., 84 (2): 179-197 (1991)Formal verification: is it real enough?, and . DAC, page 670-671. ACM, (2005)Visualizing Insider Threats: An Effective Interface for Security Analytics., , , and . IUI Companion, page 39-42. ACM, (2017)AVPGEN-A test generator for architecture verification., , , , , , , , , and 1 other author(s). IEEE Trans. Very Large Scale Integr. Syst., 3 (2): 188-200 (1995)Abstract for the ISOLA Special Session on "Industrial use of tools for Formal Analysis".. ISoLA (Preliminary proceedings), volume TR-2004-6 of Technical Report, page 190-190. Department of Computer Science, University of Cyprus, (2004)