Author of the publication

Recovery of CFSM-based protocol and service design from protocol execution traces.

, , and . Inf. Softw. Technol., 41 (11-12): 839-852 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E-Commerce Authentication: An Effective Countermeasures Design Model., and . ICEIS (3), page 447-455. (2003)On the Additive Complexity of Matrix Multiplication.. SIAM J. Comput., 5 (2): 187-203 (1976)Validation-directed specification of communications systems., , and . Inf. Softw. Technol., 37 (8): 403-410 (1995)Communications software engineering (CSE)., and . Inf. Softw. Technol., 41 (11-12): 695-696 (1999)An Application of Explanation-Based Learning to Protocol Conformance Testing., , , and . IEEE Expert, 5 (5): 45-60 (1990)Model-based regression test suite generation using dependence analysis., , and . A-MOST, page 54-62. ACM, (2007)Life-Cycle E-commerce Testing with OO-TTCN-3., , and . FORTE Workshops, volume 3236 of Lecture Notes in Computer Science, page 16-29. Springer, (2004)Efficient Procedures for Using Matrix Algorithms., and . ICALP, volume 14 of Lecture Notes in Computer Science, page 413-427. Springer, (1974)Formalization of ISDN LAPD for Conformance Testing., , , and . INFOCOM, page 234-246. IEEE Computer Society, (1989)Recovery of Communications Protocol Design from Run Time Protocol Traces., , and . ICECCS, page 265-272. IEEE Computer Society, (1996)