Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ITiCSE 2023 Preview., and . ACM SIGCSE Bull., 55 (2): 6-7 (2023)Coverability Analysis of Time Basic Petri Nets with Non-Urgent Behavior., , , and . SYNASC, page 165-172. IEEE, (2016)Carrying on the e-learning process with a workflow management engine., , and . SAC, page 940-945. ACM, (2004)Using Graph Transformation Systems to Specify and Verify Data Abstractions., , , and . ECEASST, (2008)Assessing data quality by a cross-layer approach., and . ICUMT, page 1-8. IEEE, (2009)Supporting Nomadic Co-Workers: an Experience with a Peer-To-Peer Configuration Management Tool. Proceedings of the International Symposium on Towards Peta-Bit Ultra-Networks, page 79--87. IEEE, A & I Ltd., Tokyo, (September 2003)Invited paper.The 3rd International Workshop on Software Engineering for Secure Systems SESS07 --- Dependable and secure, , , and . ICSE COMPANION '07: Companion to the proceedings of the 29th International Conference on Software Engineering, page 111--112. ACM, IEEE Computer Society, (May 2007)Slicing AspectJ Woven Code, , , and . Proceedings of the Foundations of Aspect-Oriented Languages workshop (FOAL2005), (March 2005)Software Engineering for Secure Systems, , and . Proceedings of the 28th International Conference on Software Engineering (ICSE), page 1007--1008. ACM, (May 2006)Software engineering for secure systems, , and . SIGSOFT Softw. Eng. Notes, 30 (4): 1--2 (2005)