Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contracts for security adaptation., and . J. Log. Algebraic Methods Program., 80 (3-5): 154-179 (2011)Integrating Schedulability Analysis and Design Techniques in SD., , , , and . Real Time Syst., 24 (3): 267-302 (2003)Context-Aware Composition and Adaptation based on Model Transformation., , and . J. Univers. Comput. Sci., 17 (5): 777-806 (2011)aSPIN: A tool for abstract model checking., , , and . Int. J. Softw. Tools Technol. Transf., 5 (2-3): 165-184 (2004)Composing Programs in a Rewriting Logic for Declarative Programming, and . CoRR, (2002)Continuous QoS-compliant Orchestration in the Cloud-Edge Continuum., , , and . CoRR, (2023)A Cloud-Based Internet of Things Platform for Ambient Assisted Living., , and . Sensors, 14 (8): 14070-14105 (2014)A Service-Oriented Model for Embedded Peer-to-Peer Systems., , , , and . FOCLASA, volume 194 of Electronic Notes in Theoretical Computer Science, page 5-22. Elsevier, (2007)Dynamic Contextual Adaptation., , , , and . FOCLASA, volume 175 of Electronic Notes in Theoretical Computer Science, page 81-95. Elsevier, (2006)Compatibility and inheritance in software architectures., , and . Sci. Comput. Program., 41 (2): 105-138 (2001)