Author of the publication

Fast convolution and correlation computational methods in leakage localization applications.

, and . PCI, page 172-177. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dealing with multiple failures in zanshin: a control-theoretic approach., , and . SEAMS, page 165-174. ACM, (2014)A Metamodel for GDPR-based Privacy Level Agreements., , , and . ER Forum/Demos, volume 1979 of CEUR Workshop Proceedings, page 285-291. CEUR-WS.org, (2017)Leak detection in the pipeline network of an oil refinery - A pattern classification paradigm., , and . PCI, page 178-182. ACM, (2020)Fast convolution and correlation computational methods in leakage localization applications., and . PCI, page 172-177. ACM, (2021)Model predictive control for software systems with CobRA., , , and . SEAMS@ICSE, page 35-46. ACM, (2016)Decision-Making in Security Requirements Engineering with Constrained Goal Models., , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 262-280. Springer, (2017)Requirements and architectural approaches to adaptive software systems: a comparative study., , and . SEAMS, page 23-32. IEEE Computer Society, (2013)From Requirements to Architectures for Better Adaptive Software Systems., , , , and . iStar, volume 978 of CEUR Workshop Proceedings, page 91-96. CEUR-WS.org, (2013)From requirements to statecharts via design refinement., , , , and . SAC, page 995-1000. ACM, (2014)Comparing Model-Based Predictive Approaches to Self-Adaptation: CobRA and PLA., , , , and . SEAMS@ICSE, page 42-53. IEEE Computer Society, (2017)