From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark., , и . ICST, стр. 484-491. IEEE Computer Society, (2017)Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities., , , и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 209-230. Springer, (2017)Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach., , , и . AAAI, стр. 1408-1414. AAAI Press, (2011)Selecting the minimal set of preferred responses to counter detected intrusions., , и . CISRC, стр. 5:1-5:8. ACM, (2017)Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities., , , и . SCAM, стр. 79-84. IEEE Computer Society, (2016)Decomposing the Service Composition Problem., , и . ECOWS, стр. 163-170. IEEE Computer Society, (2010)Web Service Substitution Based on Preferences Over Non-functional Attributes., , и . IEEE SCC, стр. 210-217. IEEE Computer Society, (2009)Dominance Testing via Model Checking., , и . AAAI, стр. 357-362. AAAI Press, (2010)Automating analysis of qualitative preferences in goal-oriented requirements engineering., , и . ASE, стр. 448-451. IEEE Computer Society, (2011)Representing and Reasoning with Qualitative Preferences for Compositional Systems., , и . J. Artif. Intell. Res., (2011)