Author of the publication

Correctness and Completeness of Generalised Concurrent Model Synchronisation Based on Triple Graph Grammars.

, , , , , , and . AMT@MoDELS, volume 1077 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognition: A Tool for Reinforcing Security in Software Defined Networks, , , , and . EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V, volume 288 of Advances in Intelligent Systems and Computing, Springer International Publishing, (2014)Smart Cards - the Personal Safe in an E-Commerce World., , and . International Conference on Internet Computing, page 343-346. CSREA Press, (2000)Measuring anonymity using network coordinate systems., , and . ISCIT, page 366-371. IEEE, (2011)Physikalische Chemie, and . Pearson Studium, München u.a., (2006)Law-aware access control for international financial environments., and . MobiDE, page 33-40. ACM, (2009)An ad-hoc Wireless Sensor Networks with Application to Air Pollution Detection., , and . SNA, page 48-53. ISCA, (2009)Controlled data collection of Mini-Sinks for maximizing packet delivery ratio and throughput using multiple paths in Wireless Sensor Networks., , and . PIMRC, page 758-764. IEEE, (2012)Law-Aware Access Control: About Modeling Context and Transforming Legislation., and . JSAI-isAI Workshops, volume 6284 of Lecture Notes in Computer Science, page 73-86. Springer, (2009)GCC2011 - 25 years of computational chemistry meetings., , and . J. Cheminformatics, 4 (S-1): 1 (2012)System-level monitoring of floating-point performance to improve effective system utilization., , , , , , and . SC State of the Practice Reports, page 5:1-5:6. ACM, (2011)