Author of the publication

A Simplification of a Conversation Design Scheme Using Petri Nets.

, and . IEEE Trans. Software Eng., 15 (5): 658-660 (1989)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and efficient key management in mobile ad hoc networks., , , , and . J. Netw. Comput. Appl., 30 (3): 937-954 (2007)Security Patterns and A Methodology to Apply them.. Security and Dependability for Ambient Intelligence, volume 45 of Advances in Information Security, Springer, (2009)Scheduling as a Graph Transformation., and . IBM J. Res. Dev., 20 (6): 551-559 (1976)Using Security Patterns to Develop Secure Systems - Ten Years Later., , and . Int. J. Syst. Softw. Secur. Prot., 9 (4): 46-57 (2018)CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development., , , , , , , , , and 1 other author(s). Int. J. Syst. Softw. Secur. Prot., 12 (2): 68-85 (2021)Enterprise security pattern: A model-driven architecture instance., , , and . Comput. Stand. Interfaces, 36 (4): 748-758 (2014)A System Architecture for Fault Tolerance in Concurrent Software., , , , and . Computer, 23 (10): 23-32 (1990)A Simplification of a Conversation Design Scheme Using Petri Nets., and . IEEE Trans. Software Eng., 15 (5): 658-660 (1989)Abstract Entity Patterns for Sensors and Actuators., , , and . Comput., 12 (5): 93 (2023)A pattern system of underlying theories for process improvement., and . PLoP, page 8:1-8:24. ACM, (2010)