Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploratory testing supported by automated reengineering of model of the system under test., , and . Clust. Comput., 20 (1): 855-865 (2017)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)Testing the consistency of business data objects using extended static testing of CRUD matrices., , , and . Clust. Comput., 22 (Suppl 1): 963-976 (2019)Mapping Study on Constraint Consistency Checking in Distributed Enterprise Systems., , , , , , , and . RACS, page 167-174. ACM, (2020)On Persistent Implications of E2E Testing., and . ICEIS (Revised Selected Papers), volume 455 of Lecture Notes in Business Information Processing, page 326-338. Springer, (2021)Formal specification to support advanced model based testing., , and . FedCSIS, page 1311-1314. (2012)Aspects of Quality in Internet of Things (IoT) Solutions: A Systematic Mapping Study., , , and . IEEE Access, (2019)Pex Extension for Generating User Input Validation Code for Web Applications., , and . ICSOFT EA, page 315-320. SciTePress, (2014)Transformation of IFML schemas to automated tests., , and . RACS, page 509-511. ACM, (2015)On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends., , , , , , , , and . RACS, page 175-180. ACM, (2020)