Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining System Level Modeling with Assertion Based Verification., , , , , , , , and . ISQED, page 310-315. IEEE Computer Society, (2005)Visualizing Insider Threats: An Effective Interface for Security Analytics., , , and . IUI Companion, page 39-42. ACM, (2017)Abstract for the ISOLA Special Session on "Industrial use of tools for Formal Analysis".. ISoLA (Preliminary proceedings), volume TR-2004-6 of Technical Report, page 190-190. Department of Computer Science, University of Cyprus, (2004)Coverage-Directed Test Generation Using Symbolic Techniques., , , , , and . FMCAD, volume 1166 of Lecture Notes in Computer Science, page 143-158. Springer, (1996)Formal verification: is it real enough?, and . DAC, page 670-671. ACM, (2005)Optimal Covering of Cacti by Vertex-Disjoint Paths., and . Theor. Comput. Sci., 84 (2): 179-197 (1991)From VISION Cloud to Cloudwave: Towards the Future Internet and a New Generation of Services., , , , , and . INCoS, page 641-646. IEEE, (2014)A Study in Coverage-Driven Test Generation., , , , , and . DAC, page 970-975. ACM Press, (1999)Coverability Analysis Using Symbolic Model Checking., , and . CHARME, volume 2144 of Lecture Notes in Computer Science, page 155-160. Springer, (2001)FoCs: Automatic Generation of Simulation Checkers from Formal Specifications., , , , and . CAV, volume 1855 of Lecture Notes in Computer Science, page 538-542. Springer, (2000)