From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An empirical evaluation of six methods to detect faults in software., , , и . Softw. Test. Verification Reliab., 12 (3): 155-171 (2002)Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract)., и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 404-405. Springer, (2008)A quantitative approach to estimate a website security risk using whitelist., , , и . Secur. Commun. Networks, 5 (10): 1181-1192 (2012)Construction of global finite state machine for testing task interactions written in message sequence charts., , и . SEKE, стр. 369-376. ACM, (2002)Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS., , и . TACAS, том 2280 из Lecture Notes in Computer Science, стр. 205-220. Springer, (2002)Masquerade detection based on SVM and sequence-based user commands profile., и . AsiaCCS, стр. 398-400. ACM, (2007)Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech., , , , , и . FGIT-CA/CES3, том 256 из Communications in Computer and Information Science, стр. 112-121. Springer, (2011)Customization of Scrum Methodology for Outsourced E-Commerce Projects., , и . APSEC, стр. 310-315. IEEE Computer Society, (2010)Testing of Timer Function Blocks in FBD., , , , , , и . APSEC, стр. 243-250. IEEE Computer Society, (2006)Applying Model Checking to Concurrent Object-Oriented Software., , , , , и . ISADS, стр. 380-383. IEEE Computer Society, (1999)