Author of the publication

A test sequence selection method for statecharts.

, , , , and . Softw. Test. Verification Reliab., 10 (4): 203-227 (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification., , , , and . Reliab. Eng. Syst. Saf., 89 (3): 248-260 (2005)Formal verification of functional properties of a SCR-style software requirements specification using PVS., , and . Reliab. Eng. Syst. Saf., 87 (3): 351-363 (2005)Construction of global finite state machine for testing task interactions written in message sequence charts., , and . SEKE, page 369-376. ACM, (2002)Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS., , and . TACAS, volume 2280 of Lecture Notes in Computer Science, page 205-220. Springer, (2002)An empirical evaluation of six methods to detect faults in software., , , and . Softw. Test. Verification Reliab., 12 (3): 155-171 (2002)Generating test sequences using symbolic execution for event-driven real-time systems., and . Microprocess. Microsystems, 27 (10): 523-531 (2003)Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract)., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 404-405. Springer, (2008)FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram., , , , , , and . J. Res. Pract. Inf. Technol., 42 (3): 171-188 (2010)A quantitative approach to estimate a website security risk using whitelist., , , and . Secur. Commun. Networks, 5 (10): 1181-1192 (2012)SAD: web session anomaly detection based on parameter estimation., and . Comput. Secur., 23 (4): 312-319 (2004)