Author of the publication

Contract-based test generation for data flow of business processes using constraint programming.

, , and . RCIS, page 1-12. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stateful Firewalling for Wireless Mesh Networks., , , and . NTMS, page 1-5. IEEE, (2008)A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets., , and . SECRYPT, page 430-441. INSTICC Press, (2008)A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models., , and . RCIS, page 1-6. IEEE, (2011)Mesh Network Firewalling with Bloom Filters., , , and . ICC, page 1546-1551. IEEE, (2007)Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets., , and . ARES, page 229-236. IEEE Computer Society, (2008)An integration of model-based techniques for determining the minimal diagnosis., , , and . Inteligencia Artif., 10 (31): 41-52 (2006)Contract-based test generation for data flow of business processes using constraint programming., , and . RCIS, page 1-12. IEEE, (2011)OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes., and . CISIS, volume 85 of Advances in Intelligent and Soft Computing, page 213-222. Springer, (2010)FT-FW: Efficient Connection Failover in Cluster-based Stateful Firewalls., , and . PDP, page 573-580. IEEE Computer Society, (2008)hFT-FW: Hybrid Fault-Tolerance for Cluster-Based Stateful Firewalls., , and . ICPADS, page 525-532. IEEE Computer Society, (2008)