Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carrying on the e-learning process with a workflow management engine., , and . SAC, page 940-945. ACM, (2004)Using Graph Transformation Systems to Specify and Verify Data Abstractions., , , and . ECEASST, (2008)Assessing data quality by a cross-layer approach., and . ICUMT, page 1-8. IEEE, (2009)Coverability Analysis of Time Basic Petri Nets with Non-Urgent Behavior., , , and . SYNASC, page 165-172. IEEE, (2016)An Experience on Verification of Aspect Properties., and . IWPSE, page 186-189. ACM, (2001)Software Engineering for Secure Systems, , and . Proceedings of the 28th International Conference on Software Engineering (ICSE), page 1007--1008. ACM, (May 2006)Software engineering for secure systems, , and . SIGSOFT Softw. Eng. Notes, 30 (4): 1--2 (2005)Supporting Nomadic Co-Workers: an Experience with a Peer-To-Peer Configuration Management Tool. Proceedings of the International Symposium on Towards Peta-Bit Ultra-Networks, page 79--87. IEEE, A & I Ltd., Tokyo, (September 2003)Invited paper.The 3rd International Workshop on Software Engineering for Secure Systems SESS07 --- Dependable and secure, , , and . ICSE COMPANION '07: Companion to the proceedings of the 29th International Conference on Software Engineering, page 111--112. ACM, IEEE Computer Society, (May 2007)Supporting Configuration Management for Virtual Workgroups in a Peer-to-Peer Setting, , and . SEKE~'02: Proceedings of the 14th international conference on Software engineering and knowledge engineering, page 507--511. ACM, ACM Press, (July 2002)