Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the practical mutation testing of AspectJ programs., , and . Sci. Comput. Program., 78 (9): 1639-1662 (2013)JAT: A Test Automation Framework for Multi-Agent Systems., , , , , and . ICSM, page 425-434. IEEE Computer Society, (2007)On to Aspect Persistence.. GCSE, volume 2177 of Lecture Notes in Computer Science, page 26-36. Springer, (2000)A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement., , and . ACM Comput. Surv., 48 (1): 15:1-15:54 (2015)Weak Signals as Predictors of Real-World Phenomena in Social Media., , and . ASONAM, page 864-871. ACM, (2015)The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game., , , , and . IEEE Trans. Software Eng., 45 (5): 521-536 (2019)Systematic Change Impact Determination in Complex Object Database Schemata., , , and . ECOOP Workshop for PhD Students in OO Systems, page 31-40. (1999)The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems., , , , and . SOUPS, USENIX Association, (2017)Discovering Early Aspects., , , , , and . IEEE Software, 23 (1): 61-70 (2006)Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study., and . RE Workshops, page 97-103. IEEE Computer Society, (2017)