Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BOWL: augmenting the Semantic Web with beliefs., , , , , and . Innov. Syst. Softw. Eng., 11 (3): 203-215 (2015)A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata., , , , , , , and . IEEE Trans. Software Eng., 41 (1): 3-18 (2015)A Semantic Foundation for TCOZ in Unifying Theories of Programming., , and . FME, volume 2805 of Lecture Notes in Computer Science, page 321-340. Springer, (2003)TCOZ Approach to OWL-S Process Model Design., , , and . SEKE, page 354-359. (2005)Evolution and Runtime Monitoring of Software Systems., , and . SEKE, page 343-348. Knowledge Systems Institute Graduate School, (2007)Empirical Study on Transformer-based Techniques for Software Engineering., , , , , and . CoRR, (2023)Formal object modelling techniques and denotational semantics studies. University of Queensland, Australia, (1995)Axiom-oriented Reasoning to Deal with Inconsistency Between Ontology and Knowledge Base., , , and . URSW, volume 327 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)Fair Model Checking with Process Counter Abstraction., , , , and . FM, volume 5850 of Lecture Notes in Computer Science, page 123-139. Springer, (2009)Verifying Parameterized Timed Security Protocols., , , and . FM, volume 9109 of Lecture Notes in Computer Science, page 342-359. Springer, (2015)