Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Debugging VHDL Designs Using Temporal Process Instances., , and . IEA/AIE, volume 2718 of Lecture Notes in Computer Science, page 402-415. Springer, (2003)Fault Localization Based on Abstract Dependencies., and . IEA/AIE, volume 3533 of Lecture Notes in Computer Science, page 357-359. Springer, (2005)Diagnosing Program Errors with Light-Weighted Specifications., and . IEA/AIE, volume 4031 of Lecture Notes in Computer Science, page 639-649. Springer, (2006)Investigating the Effectiveness of Mutation Testing Tools in the Context of Deep Neural Networks., , and . IWANN (1), volume 11506 of Lecture Notes in Computer Science, page 766-777. Springer, (2019)Using Model-Based Reasoning for Enhanced Chatbot Communication., and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 791-798. Springer, (2019)The Right Choice Matters! SMT Solving Substantially Improves Model-Based Debugging of Spreadsheets., , , , , , and . QSIC, page 139-148. IEEE, (2013)Coupling CSP Decomposition Methods and Diagnosis Algorithms for Tree-Structured Systems., and . IJCAI, page 388-393. Morgan Kaufmann, (2003)Real-Time Diagnosis and Repair of Faults of Robot Control Software., , and . RoboCup, volume 4020 of Lecture Notes in Computer Science, page 13-23. Springer, (2005)Test purpose generation in an industrial application., , , and . A-MOST, page 115-125. ACM, (2007)Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing., , , , , and . QRS, page 207-212. IEEE, (2015)