Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Immaturity and Potential of Formal Methods: A Personal View.. FIW, page 9-13. IOS Press, (2000)Feature Interaction Filtering with Use Case Maps at Requirements Stage., , , and . FIW, page 163-178. IOS Press, (2000)Derivation of Useful Execution Trees from LOTOS by using an Interpreter., and . FORTE, page 311-325. North-Holland, (1988)Formal Support for Design Techniques: A Timethreads-LOTOS Approach., , , and . FORTE, volume 43 of IFIP Conference Proceedings, page 57-72. Chapman & Hall, (1995)Typing for Conflict Detection in Access Control Policies., , , , and . MCETECH, volume 26 of Lecture Notes in Business Information Processing, page 212-226. Springer, (2009)Configuring Data Flows in the Internet of Things for Security and Privacy Requirements., and . FPS, volume 11358 of Lecture Notes in Computer Science, page 115-130. Springer, (2018)Symboleo2SC: from legal contract specifications to smart contracts., , , , , , and . MoDELS, page 300-310. ACM, (2022)Social Dependence Relationships in Requirements Engineering., , , , and . iStar, volume 2641 of CEUR Workshop Proceedings, page 55-60. CEUR-WS.org, (2020)Symboleo: Towards a Specification Language for Legal Contracts., , , , and . RE, page 364-369. IEEE, (2020)Specifying features and analysing their interactions in a LOTOS environment., and . FIW, page 136-151. IOS Press, (1994)