Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of complex systems using incremental operational specifications., , , and . Inf. Sci., (1991)Software Trustability Analysis., and . ACM Trans. Softw. Eng. Methodol., 4 (1): 36-64 (1995)Linear and Structural Event Sequence Analysis., and . ISSTA, page 98-106. ACM, (1996)Software trustability., and . ISSRE, page 143-151. IEEE Computer Society, (1994)Theoretical and Empirical Studies of Program Testing.. ICSE, page 305-311. IEEE Computer Society, (1978)Test Frameworks for Elusive Bug Testing., and . ICSOFT (SE), page 250-257. INSTICC Press, (2007)Elusive Bugs, Bounded Exhaustive Testing and Incomplete Oracles.. ICSOFT (SE/MUSE/GSDCA), page 115-121. INSTICC Press, (2008)Temporal Event Analysis and Program Understanding., and . COMPSAC, page 4-11. IEEE Computer Society, (1995)Superfit Combinational Elusive Bug Detection., , , and . COMPSAC, page 144-151. IEEE Computer Society, (2008)Applicability of BET to Elusive Bugs in Diverse Application Areas., , , , , , and . ICSOFT (1), page 277-282. INSTICC Press, (2009)