Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost-effective Functional Testing of Reactive Software., , , and . ENASE, page 67-77. SciTePress, (2015)On Generating Test Cases from EDT Specifications., , , and . ENASE (Selected Papers), volume 599 of Communications in Computer and Information Science, page 1-20. Springer, (2015)Masking Boundary Value Coverage: Effectiveness and Efficiency., , , , and . TAIC PART, volume 6303 of Lecture Notes in Computer Science, page 8-22. Springer, (2010)Automatic Test Data Generation for C Programs., , , and . SSIRI, page 359-368. IEEE Computer Society, (2009)Scaling up Model-checking, , , and . (2007)Feature based Structuring and Composing of SDLC Artifacts., , , and . SEKE, page 583-586. Knowledge Systems Institute Graduate School, (2010)Proving unreachability using bounded model checking., , and . ISEC, page 73-82. ACM, (2010)STATEMATE to SCADE model translation., , , and . ISEC, page 145-146. ACM, (2008)Over-approximating loops to prove properties using bounded model checking., , , , and . DATE, page 1407-1412. ACM, (2015)Model Checking Visual Specification of Requirements., , and . SEFM, page 202-209. IEEE Computer Society, (2003)