From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification., , , , и . Reliab. Eng. Syst. Saf., 89 (3): 248-260 (2005)Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract)., и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 404-405. Springer, (2008)Construction of global finite state machine for testing task interactions written in message sequence charts., , и . SEKE, стр. 369-376. ACM, (2002)Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS., , и . TACAS, том 2280 из Lecture Notes in Computer Science, стр. 205-220. Springer, (2002)An empirical evaluation of six methods to detect faults in software., , , и . Softw. Test. Verification Reliab., 12 (3): 155-171 (2002)Generating test sequences using symbolic execution for event-driven real-time systems., и . Microprocess. Microsystems, 27 (10): 523-531 (2003)Formal verification of functional properties of a SCR-style software requirements specification using PVS., , и . Reliab. Eng. Syst. Saf., 87 (3): 351-363 (2005)FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram., , , , , , и . J. Res. Pract. Inf. Technol., 42 (3): 171-188 (2010)SAD: web session anomaly detection based on parameter estimation., и . Comput. Secur., 23 (4): 312-319 (2004)A quantitative approach to estimate a website security risk using whitelist., , , и . Secur. Commun. Networks, 5 (10): 1181-1192 (2012)