Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Test-Algebra-Based Fault Location Analysis for the Concurrent Combinatorial Testing., , , , and . IEEE Trans. Reliab., 67 (3): 802-831 (2018)Randomized post-optimization of covering arrays., , and . Eur. J. Comb., 34 (1): 91-103 (2013)Detecting Arrays for Main Effects., and . CAI, volume 11545 of Lecture Notes in Computer Science, page 112-123. Springer, (2019)Failed disk recovery in double erasure RAID arrays., and . J. Discrete Algorithms, 5 (1): 115-128 (2007)The fine structure of threefold triple systems: u = 1 or 3 (mod 6)., , , and . Discret. Math., 92 (1-3): 49-64 (1991)Repeated edges in 2-factorizations., and . J. Graph Theory, 14 (1): 5-24 (1990)One-test-at-a-time heuristic search for interaction test suites., and . GECCO, page 1082-1089. ACM, (2007)Partial Covering Arrays: Algorithms and Asymptotics., , , and . IWOCA, volume 9843 of Lecture Notes in Computer Science, page 437-448. Springer, (2016)Steiner Systems for Topology-Transparent Access Control in MANETs., , and . ADHOC-NOW, volume 2865 of Lecture Notes in Computer Science, page 247-258. Springer, (2003)Boolean Aspects of Network Reliability., , and . Boolean Models and Methods, Cambridge University Press, (2010)