Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Model of Real-Time Program Compilation., and . ARTS, volume 1601 of Lecture Notes in Computer Science, page 192-210. Springer, (1999)Access Control Requirements for Processing Electronic Health Records., and . Business Process Management Workshops, volume 4928 of Lecture Notes in Computer Science, page 371-382. Springer, (2007)Specification and Verification of Real-Time Behaviour Using Z and RTL.. FTRTFT, volume 571 of Lecture Notes in Computer Science, page 393-409. Springer, (1992)Integrating Real-Time Scheduling Theory and Program Refinement., , , and . FME, volume 1051 of Lecture Notes in Computer Science, page 327-346. Springer, (1996)A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications., and . IEEE Congress on Evolutionary Computation, page 3226-3233. IEEE, (2009)Formally Analysing a Security Protocol for Replay Attacks., and . ASWEC, page 171-180. IEEE Computer Society, (2006)Security Metrics for Object-Oriented Class Designs., , and . QSIC, page 11-20. IEEE Computer Society, (2009)Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling., , , and . ACSW, page 35:1-35:10. ACM, (2019)Animation of Data Refinements., and . APSEC, page 137-146. IEEE Computer Society, (2002)Preface.. CATS, volume 42 of Electronic Notes in Theoretical Computer Science, page 282-283. Elsevier, (2001)