Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validating Reasoning Heuristics Using Next-Generation Theorem-Provers., and . MSVVEIS, page 43-52. INSTICC PRESS, (2007)Planning as model checking: the performance of ProB vs NuSMV., and . SAICSIT, volume 338 of ACM International Conference Proceeding Series, page 114-123. ACM, (2008)An Ant-based Mobile Agent Approach to Resource Discovery in Grid Computing., , and . SAICSIT, page 1. ACM, (2014)Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol., , and . INC, page 113-122. University of Plymouth, (2012)Implementing Deterministic Finite State Machines using Guard-Stage-Milestone., , and . SAICSIT, page 22:1-22:10. ACM, (2016)A Framework to Assist Organizations with IT Adoption Governance., , and . CloudCom, page 1007-1014. IEEE Computer Society, (2014)Metrics for the Case Management Modeling and Notation (CMMN) Specification., , and . SAICSIT, page 28:1-28:10. ACM, (2015)Democratic detection of malicious behaviour in MANET: A voting process., , and . ISSA, page 1-7. IEEE, (2013)Measuring Method Complexity of the Case Management Modeling and Notation (CMMN)., , and . SAICSIT, page 209. ACM, (2014)Towards a model on security challenges during closed source software to OSS migrations., , and . ICITST, page 274-283. IEEE, (2014)