Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Analyses of IOT Event Monitoring Systems., , , , , , , , and . CAV (1), volume 13964 of Lecture Notes in Computer Science, page 27-39. Springer, (2023)ASCCS: Architecture for Secure Communication Using Cloud Services., and . SocProS (2), volume 437 of Advances in Intelligent Systems and Computing, page 19-25. Springer, (2015)Java Ranger at SV-COMP 2020 (Competition Contribution)., , , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 393-397. Springer, (2020)Counterexample-Guided Inductive Repair of Reactive Contracts., , , , and . FormaliSE@ICSE, page 46-57. ACM, (2022)A Conceptual Framework for Achieving Sustainability in Supply Chain Using Industry 4.0 Technologies in Emerging Economies., , and . TDIT (3), volume 699 of IFIP Advances in Information and Communication Technology, page 15-22. Springer, (2022)State Merging with Quantifiers in Symbolic Execution., , , and . CoRR, (2023)A Physics-Informed Neural Network Modeling Approach to Direct Ink Writing 3D Printing Process., , and . CASE, page 1-7. IEEE, (2023)Counterexample Guided Inductive Repair of Reactive Contracts., , , , and . ASE, page 1190-1192. IEEE, (2021)A Probabilistic Approach to Apriori Algorithm., and . GrC, page 402-408. IEEE Computer Society, (2010)User authentication and identification from user interface interactions on touch-enabled devices., and . WISEC, page 1-11. ACM, (2017)