Author of the publication

Supporting configuration management for virtual workgroups ini a peer-to-peer setting.

, , and . SEKE, page 507-511. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coverability Analysis of Time Basic Petri Nets with Non-Urgent Behavior., , , and . SYNASC, page 165-172. IEEE, (2016)Supporting Nomadic Co-Workers: an Experience with a Peer-To-Peer Configuration Management Tool. Proceedings of the International Symposium on Towards Peta-Bit Ultra-Networks, page 79--87. IEEE, A & I Ltd., Tokyo, (September 2003)Invited paper.The 3rd International Workshop on Software Engineering for Secure Systems SESS07 --- Dependable and secure, , , and . ICSE COMPANION '07: Companion to the proceedings of the 29th International Conference on Software Engineering, page 111--112. ACM, IEEE Computer Society, (May 2007)Supporting Configuration Management for Virtual Workgroups in a Peer-to-Peer Setting, , and . SEKE~'02: Proceedings of the 14th international conference on Software engineering and knowledge engineering, page 507--511. ACM, ACM Press, (July 2002)Slicing AspectJ Woven Code, , , and . Proceedings of the Foundations of Aspect-Oriented Languages workshop (FOAL2005), (March 2005)Using Graph Transformation Systems to Specify and Verify Data Abstractions, , , and . Proceedings of the Seventh International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2008), volume X of Electronic Communications of the EASST, page 277--290. EASST, European Association of Software Science and Technology, (March 2008)Software Engineering for Secure Systems, , and . Proceedings of the 28th International Conference on Software Engineering (ICSE), page 1007--1008. ACM, (May 2006)Software engineering for secure systems, , and . SIGSOFT Softw. Eng. Notes, 30 (4): 1--2 (2005)Learning Objects and Tests, , and . Proceedings of the IASTED International Conference on Web-Based Education, IASTED, (February 2004)Primi salti del Kangourou dell'informatica, , , , , and . DIDAMATICA 2008 --- Informatica per la didattica, page 65--70. AICA, Giuseppe Laterza, Bari, (April 2008)