Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synchronizing Java Threads Using Assertions., , and . TOOLS (31), page 51-60. IEEE Computer Society, (1999)The Riemann problem for the shallow water equations with discontinuous topography: The wet-dry case., and . J. Comput. Phys., (2019)Component adaptation through flexible subservicing., , and . Sci. Comput. Program., 63 (1): 39-56 (2006)Automated Synthesis and Ranking of Secure BPMN Orchestrators., , , , , and . Int. J. Secur. Softw. Eng., 5 (2): 44-64 (2014)Workshop on Seamless Adaptive Multi-cloud Management of Service-Based Applications (SeaCloudS): Preface., and . ESOCC Workshops, volume 508 of Communications in Computer and Information Science, page 247-248. Springer, (2014)Applying Data Abstraction to XML Formal Designs., , , and . SNPD, page 315-321. ACIS, (2003)An Approach to Predictive Analysis of Self-Adaptive Systems in Design Time., , and . ICSOC Workshops, volume 10797 of Lecture Notes in Computer Science, page 363-368. Springer, (2017)Deployment over Heterogeneous Clouds with TOSCA and CAMP., , , and . CLOSER (1), page 170-177. SciTePress, (2016)Applying Distributed Shared Memory Techniques for Implementing Distributed Objects., , and . ECOOP Workshops, volume 1357 of Lecture Notes in Computer Science, page 499-506. Springer, (1997)An Efficient Software Protection Scheme., and . SEC, volume 193 of IFIP Conference Proceedings, page 385-402. Kluwer, (2001)