Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An introduction to model-based systems., , and . AI Commun., 20 (1): 1-6 (2007)Binding Environmental Sciences and Artificial Intelligence., , and . AI Commun., 18 (4): 243-245 (2005)Impact analysis of SCRs using single and multi-label machine learning classification., and . ESEM, ACM, (2010)Planning-Based Security Testing of the SSL/TLS Protocol., , , and . ICST Workshops, page 347-355. IEEE Computer Society, (2017)Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing., , , , , and . QRS, page 207-212. IEEE, (2015)Test purpose generation in an industrial application., , , and . A-MOST, page 115-125. ACM, (2007)Investigating the Effectiveness of Mutation Testing Tools in the Context of Deep Neural Networks., , and . IWANN (1), volume 11506 of Lecture Notes in Computer Science, page 766-777. Springer, (2019)Using Model-Based Reasoning for Enhanced Chatbot Communication., and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 791-798. Springer, (2019)Real-Time Diagnosis and Repair of Faults of Robot Control Software., , and . RoboCup, volume 4020 of Lecture Notes in Computer Science, page 13-23. Springer, (2005)Coupling CSP Decomposition Methods and Diagnosis Algorithms for Tree-Structured Systems., and . IJCAI, page 388-393. Morgan Kaufmann, (2003)