From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Configuring Data Flows in the Internet of Things for Security and Privacy Requirements., и . FPS, том 11358 из Lecture Notes in Computer Science, стр. 115-130. Springer, (2018)Symboleo2SC: from legal contract specifications to smart contracts., , , , , , и . MoDELS, стр. 300-310. ACM, (2022)Social Dependence Relationships in Requirements Engineering., , , , и . iStar, том 2641 из CEUR Workshop Proceedings, стр. 55-60. CEUR-WS.org, (2020)Immaturity and Potential of Formal Methods: A Personal View.. FIW, стр. 9-13. IOS Press, (2000)Feature Interaction Filtering with Use Case Maps at Requirements Stage., , , и . FIW, стр. 163-178. IOS Press, (2000)Derivation of Useful Execution Trees from LOTOS by using an Interpreter., и . FORTE, стр. 311-325. North-Holland, (1988)Formal Support for Design Techniques: A Timethreads-LOTOS Approach., , , и . FORTE, том 43 из IFIP Conference Proceedings, стр. 57-72. Chapman & Hall, (1995)Typing for Conflict Detection in Access Control Policies., , , , и . MCETECH, том 26 из Lecture Notes in Business Information Processing, стр. 212-226. Springer, (2009)Symboleo: Towards a Specification Language for Legal Contracts., , , , и . RE, стр. 364-369. IEEE, (2020)Feature Execution Trees and Interactions., , и . PDPTA, стр. 1230-1236. CSREA Press, (2002)