Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Run-time generation, transformation, and verification of access control models for self-protection., , , , and . SEAMS, page 135-144. ACM, (2014)Goal-Directed Modeling of Self-adaptive Software Architecture., , , and . BMMDS/EMMSAD, volume 29 of Lecture Notes in Business Information Processing, page 313-325. Springer, (2009)Locating bugs without looking back., , and . MSR, page 286-290. ACM, (2016)Improving the Build Architecture of Legacy C/C++ Software Systems., , , and . FASE, volume 3442 of Lecture Notes in Computer Science, page 96-110. Springer, (2005)Visualization Enables the Programmer to Reduce Cache Misses., , and . IASTED PDCS, page 774-781. IASTED/ACTA Press, (2002)Dynamic Gas Estimation of Loops Using Machine Learning., , , , and . BlockSys, volume 1267 of Communications in Computer and Information Science, page 428-441. Springer, (2020)JPT: A Java Parallelization Tool., , and . PVM/MPI, volume 1697 of Lecture Notes in Computer Science, page 173-180. Springer, (1999)Challenges in model-based evolution and merging of access control policies., , and . EVOL/IWPSE, page 116-120. ACM, (2011)From Goals to High-Variability Software Design., , , , and . ISMIS, volume 4994 of Lecture Notes in Computer Science, page 1-16. Springer, (2008)An RE'22 Workshop on Environment-Driven Requirements Engineering (EnviRE'22)., , and . RE Workshops, page 1. IEEE, (2022)