Author of the publication

Verification-driven slicing of UML/OCL models

, , , and . Proceedings of the IEEE/ACM international conference on Automated software engineering, page 185--194. New York, NY, USA, ACM, (2010)
DOI: 10.1145/1858996.1859038

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structural Analysis and Destabilizing Terrorist Networks., and . DMIN, page 296-302. CSREA Press, (2006)Extended approximate string matching algorithms to detect name aliases., , and . ISI, page 216-219. IEEE, (2011)Modeling Suspicious Email Detection using Enhanced Feature Selection., , , and . CoRR, (2013)Crime Analysis using Open Source Information., , , , , and . CoRR, (2019)Semantic Analysis of FBI News Reports., and . ICONIP (4), volume 7666 of Lecture Notes in Computer Science, page 322-329. Springer, (2012)Verification-driven slicing of UML/OCL models., , , and . ASE, page 185-194. ACM, (2010)Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies, , , and . Intelligence and Security Informatics, volume 5075 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2008)Cluster Based Text Classification Model., , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)CCM: A Text Classification Model by Clustering., , , and . ASONAM, page 461-467. IEEE Computer Society, (2011)Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level., , and . SADFE, page 133-140. IEEE Computer Society, (2010)