Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , and . CoRR, (2000)Teaching predictive modeling to junior software engineers - seminar format and its evaluation: poster., , , and . ICSE (Companion Volume), page 339-340. IEEE Computer Society, (2017)Predictability of Enforcement., and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 73-86. Springer, (2011)Approximate Reasoning for Contextual Databases.. ICTAI, page 308-315. IEEE Computer Society, (1996)Managing Evolution by Orchestrating Requirements and Testing Engineering Processes., , , and . ICST, page 834-841. IEEE Computer Society, (2012)A Security-by-Contract Architecture for Pervasive Services., , , , and . SECPerU, page 49-54. IEEE Computer Society, (2007)FuturesMEX: Secure, Distributed Futures Market Exchange., , , , and . IEEE Symposium on Security and Privacy, page 335-353. IEEE Computer Society, (2018)TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses., , , , , , , , and . Software Engineering, volume P-320 of LNI, page 65-67. Gesellschaft für Informatik e.V., (2022)Lightweight Parsing and Slicing for Bug Identification in C., , , and . ARES, page 114:1-114:10. ACM, (2022)Programmable enforcement framework of information flow policies., and . ICTCS, volume 1231 of CEUR Workshop Proceedings, page 197-211. CEUR-WS.org, (2014)