From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Integrity Constraints as Views in Deductice Databases., , и . FMLDO, стр. 133-140. University of Magedeburg, Faculty of Computer Science, (1996)Leveraging privacy profiles to empower users in the digital society., , , и . Autom. Softw. Eng., 31 (1): 16 (июня 2024)Software architecture-based analysis and testing: a look into achievements and future challenges., , и . Computing, 95 (8): 633-648 (2013)Deadlock-free software architectures for COM/DCOM Applications., и . J. Syst. Softw., 65 (3): 173-183 (2003)Quantitative resource-oriented analysis of Java (Adaptable) applications., и . WOSP, стр. 15-25. ACM, (2007)Deriving performance models of software architectures from message sequence charts., , , и . Workshop on Software and Performance, стр. 47-57. ACM, (2000)A Strategy to Deal with Divergent Rewrite Systems., и . CTRS, том 656 из Lecture Notes in Computer Science, стр. 458-467. Springer, (1992)Automatic synthesis of behavior protocols for composable web-services., , , и . ESEC/SIGSOFT FSE, стр. 141-150. ACM, (2009)Introduction to Special Issue on Distributed and Mobile Software Engineering., и . Autom. Softw. Eng., 11 (3): 203-205 (2004)Graphical Scenarios for Specifying Temporal Properties : an Automated Approach, , и . Automated Software Engineering, (2007)