Author of the publication

Efficient generation of test data structures using constraint logic programming and program transformation.

, , and . J. Log. Comput., 25 (6): 1263-1283 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application of SMC to continuous validation of heterogeneous systems., , , , , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 4 (11): e2 (2017)Efficient generation of test data structures using constraint logic programming and program transformation., , and . J. Log. Comput., 25 (6): 1263-1283 (2015)Generation of Test Data Structures Using Constraint Logic Programming., and . TAP@TOOLS, volume 7305 of Lecture Notes in Computer Science, page 115-131. Springer, (2012)Towards a Formal Approach to Mobile Cloud Computing., , , , and . PDP, page 743-750. IEEE Computer Society, (2014)Sensitive information protection in blockchain-based supply-chain management for aerospace., , , and . COINS, page 1-8. IEEE, (2022)Stochastically timed predicate-based communication primitives for autonomic computing., , , and . QAPL, volume 154 of EPTCS, page 1-16. (2014)Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures., , , and . SECRYPT, page 499-506. SCITEPRESS, (2022)Secure outsourcing of manufacturing compliance checks., , , , and . Int. J. Inf. Sec., 23 (1): 609-627 (February 2024)Application of Model-Based Safety Assessment to the Validation of Avionic Electrical Power Systems., , , and . IMBSA, volume 10437 of Lecture Notes in Computer Science, page 243-254. Springer, (2017)Homomorphic Encryption in Manufacturing Compliance Checks., , , , , and . TrustBus, volume 13582 of Lecture Notes in Computer Science, page 81-95. Springer, (2022)