Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging privacy profiles to empower users in the digital society., , , and . Autom. Softw. Eng., 31 (1): 16 (June 2024)A Framework for Analyzing and Testing the Performance of Software Services., , , , , and . ISoLA, volume 17 of Communications in Computer and Information Science, page 206-220. Springer, (2008)A Strategy to Deal with Divergent Rewrite Systems., and . CTRS, volume 656 of Lecture Notes in Computer Science, page 458-467. Springer, (1992)Deriving performance models of software architectures from message sequence charts., , , and . Workshop on Software and Performance, page 47-57. ACM, (2000)Deadlock-free software architectures for COM/DCOM Applications., and . J. Syst. Softw., 65 (3): 173-183 (2003)Software architecture-based analysis and testing: a look into achievements and future challenges., , and . Computing, 95 (8): 633-648 (2013)PLASTIC: Providing lightweight & adaptable service technology for pervasive information & communication., , , , , and . ASE Workshops, page 65-70. IEEE, (2008)A Comprehensive Setting for Matching and Unification over Iterative Terms., , and . Fundam. Informaticae, 39 (3): 273-304 (1999)Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework., , and . FASE, volume 4422 of Lecture Notes in Computer Science, page 57-71. Springer, (2007)ESP-MC: An Experiment in the Use of Verification Tools., , and . ASIAN, volume 1023 of Lecture Notes in Computer Science, page 396-410. Springer, (1995)