From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computing refactorings of state machines, и . Software and Systems Modeling, 6 (4): 381--399 (December 2007)A Taxonomy of Model-Based Testing Approaches, , и . Softw. Test. Verif. Reliab., 22 (5): 297–312 (2012)Personalization on the Web, и . Information and Telecommunication Technology Center, (1999)Data Protection in a Cloud-Enabled Smart Grid., , и . SmartGridSec, том 7823 из Lecture Notes in Computer Science, стр. 96-107. Springer, (2012)Defining a Software Maintainability Dataset: Collecting, Aggregating and Analysing Expert Evaluations of Software Maintainability., , и . ICSME, стр. 278-289. IEEE, (2020)Ethics in the Software Development Process: From Codes of Conduct to Ethical Deliberation., , , , , и . CoRR, (2020)Mechanisms for usage control., , , , и . AsiaCCS, стр. 240-244. ACM, (2008)From Checking to Inference: Actual Causality Computations as Optimization Problems., и . ATVA, том 12302 из Lecture Notes in Computer Science, стр. 343-359. Springer, (2020)Poking the bear: lessons learned from probing three Android malware datasets., и . A-Mobile@ASE, стр. 19-24. ACM, (2018)Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models., , и . ESSoS, том 10953 из Lecture Notes in Computer Science, стр. 108-115. Springer, (2018)