Author of the publication

Preface.

, , and . VODCA@FOSAD, volume 236 of Electronic Notes in Theoretical Computer Science, page 1-3. Elsevier, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deontic Logical Framework for Modelling Product Families., , , and . VaMoS, volume 37 of ICB-Research Report, page 37-44. Universität Duisburg-Essen, (2010)A case study on the automated verification of groupware protocols., , , , , and . ICSE, page 596-603. ACM, (2005)Supervisory Controller Synthesis for Product Lines Using CIF 3., , and . ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 856-873. (2016)Detecting policy conflicts by model checking UML state machines., , , and . ICFI, page 59-74. IOS Press, (2009)Variability meets security: quantitative security modeling and analysis of highly customizable attack scenarios., , , and . VaMoS, page 11:1-11:9. ACM, (2020)Validating reconfigurations of reo circuits in an e-Banking scenario., , and . ISARCS, page 39-48. ACM, (2013)The Legacy of Stefania Gnesi - From Software Engineering to Formal Methods and Tools, and Back., , and . From Software Engineering to Formal Methods and Tools, and Back, volume 11865 of Lecture Notes in Computer Science, page 1-11. Springer, (2019)Software product line analysis with mCRL2., and . SPLC Workshops, page 78-85. ACM, (2014)Model Checking Groupware Protocols., , , and . COOP, page 179-194. IOS, (2004)Sensoria Results Applied to the Case Studies.. Results of the SENSORIA Project, volume 6582 of Lecture Notes in Computer Science, Springer, (2011)