Author of the publication

Design-Time to Run-Time Verification of Microservices Based Applications - (Short Paper).

, , and . SEFM Workshops, volume 10729 of Lecture Notes in Computer Science, page 168-173. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combating Memory Corruption Attacks On Scada Devices., and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 141-156. Springer, (2008)What you see is what you have in mind: constructing mental models for formatted text processing, , , , , and . Informatics in schools : local proceedings of the 6th International Conference ISSEP 2013 : selected papers, 6, page 139--147. Universitätsverlag Potsdam, (February 2013)Role Based Access Control Models., , and . Inf. Secur. Tech. Rep., 6 (2): 21-29 (2001)Distributed CTL model checking using MapReduce: theory and practice., , , and . Concurr. Comput. Pract. Exp., 28 (11): 3025-3041 (2016)HyperReal: A modular control architecture for HRT systems., , and . J. Syst. Archit., 42 (6-7): 477-487 (1996)Behind the Shoulders of Bebras Teams: Analyzing How They Interact with the Platform to Solve Tasks., , , and . CSEDU (Selected Papers), volume 1220 of Communications in Computer and Information Science, page 191-210. Springer, (2019)Quantitative Assessment of a Peer-to-peer Cooperative Infrastructure Using Stochastic Well-Formed Nets., , and . PASM, volume 128 of Electronic Notes in Theoretical Computer Science, page 59-77. Elsevier, (2004)TDA: A Time Driven Engine for Predictable Execution of Realtime Systems., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 519-524. Springer, (1998)How Pupils Solve Online Problems: An Analytical View., , , and . CSEDU (2), page 132-139. SciTePress, (2019)Validation of Reverse Engineered Web Application Models., , and . WEC (2), page 125-128. Enformatika, Çanakkale, Turkey, (2005)