Author of the publication

Model Checking Techniques for Test Generation from Business Process Models.

, , and . Ada-Europe, volume 5570 of Lecture Notes in Computer Science, page 59-74. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitivity of Green-Up Date to Meteorological Indicators in Hulun Buir Grasslands of China., , , , , , , , , and 1 other author(s). Remote. Sens., 14 (3): 670 (2022)Understanding the Effect of Data Center Resource Disaggregation on Production DBMSs., , , , , , and . Proc. VLDB Endow., 13 (9): 1568-1581 (2020)Automatic Assessment of the Wrist Movement Function in a Haptic Virtual Environment for Home-Based Stroke Rahabilitation., , , and . CCECE, page 1-4. IEEE, (2018)A Feasibility Study on Time-aware Monitoring with Commodity Switches., , , and . SPIN@SIGCOMM, page 22-27. ACM, (2020)Closed-loop Network Performance Monitoring and Diagnosis with SpiderMon., , , , and . NSDI, page 267-285. USENIX Association, (2022)RDC: Energy-Efficient Data Center Network Congestion Relief with Topological Reconfigurability at the Edge., , , , , and . NSDI, page 1267-1288. USENIX Association, (2022)Total Recall: Persistence of Passwords in Android., , and . NDSS, The Internet Society, (2019)Bedrock: Programmable Network Support for Secure RDMA Systems., , , , , and . USENIX Security Symposium, page 2585-2600. USENIX Association, (2022)NetWarden: Mitigating Network Covert Channels while Preserving Performance., , and . USENIX Security Symposium, page 2039-2056. USENIX Association, (2020)Towards Service-Based Business Process Modeling, Prototyping and Integration., and . RISE, volume 3943 of Lecture Notes in Computer Science, page 218-233. Springer, (2005)