Author of the publication

Representing and Reasoning with Qualitative Preferences for Compositional Systems.

, , and . J. Artif. Intell. Res., (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach., , , and . AAAI, page 1408-1414. AAAI Press, (2011)Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark., , and . ICST, page 484-491. IEEE Computer Society, (2017)Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities., , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 209-230. Springer, (2017)Selecting the minimal set of preferred responses to counter detected intrusions., , and . CISRC, page 5:1-5:8. ACM, (2017)Identifying a preferred countermeasure strategy for attack graphs., , and . CSIIRW, page 11. ACM, (2013)Representing and Reasoning with Qualitative Preferences for Compositional Systems., , and . J. Artif. Intell. Res., (2011)Dominance Testing via Model Checking., , and . AAAI, page 357-362. AAAI Press, (2010)Automating analysis of qualitative preferences in goal-oriented requirements engineering., , and . ASE, page 448-451. IEEE Computer Society, (2011)Decomposing the Service Composition Problem., , and . ECOWS, page 163-170. IEEE Computer Society, (2010)Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities., , , and . SCAM, page 79-84. IEEE Computer Society, (2016)