Author of the publication

Workflow-Driven Tool Integration Using Model Transformations.

, , , , , , , , , , and . Graph Transformations and Model-Driven Engineering, volume 5765 of Lecture Notes in Computer Science, page 224-248. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic performance evaluation using component-in-the-loop approach., , , , , and . Int. J. Cloud Comput., 7 (3/4): 336-357 (2018)An optimization based design for integrated dependable real-time embedded systems., , , , and . Des. Autom. Embed. Syst., 13 (4): 245-285 (2009)Empirical Assessment of Resilience., , , and . SERENE, volume 8166 of Lecture Notes in Computer Science, page 1-16. Springer, (2013)An improved signature analysis based CPU self test.. Microprocess. Microprogramming, 23 (1-5): 167-171 (1988)Impact Assessment of IT Security Breaches in Cyber-Physical Systems: Short paper., , , , and . LADC, page 1-4. IEEE, (2021)Qualitative performance control in supervised IT infrastructures., , , , , and . DSN Workshops, page 59-65. IEEE Computer Society, (2010)Message from the general chair.. DSN, page 1. IEEE Computer Society, (2013)Model-Based Approaches for Dependability in Ad-Hoc Mobile Networks and Services., , , , , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 150-174. Springer, (2007)Towards cyber-physical system technologies over Apache VCL., , , , , and . Int. J. Cloud Comput., 5 (1/2): 91-111 (2016)Analytics of resource transients in cloud-based applications., , , , and . Int. J. Cloud Comput., 2 (2/3): 191-212 (2013)