Author of the publication

Security Metrics for Java Bytecode Programs (S).

, , and . SEKE, page 394-399. Knowledge Systems Institute Graduate School, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Metrics for Java Bytecode Programs (S)., , and . SEKE, page 394-399. Knowledge Systems Institute Graduate School, (2013)A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications., and . IEEE Congress on Evolutionary Computation, page 3226-3233. IEEE, (2009)Integrating Real-Time Scheduling Theory and Program Refinement., , , and . FME, volume 1051 of Lecture Notes in Computer Science, page 327-346. Springer, (1996)Business Object Centric Microservices Patterns., , , and . OTM Conferences, volume 11877 of Lecture Notes in Computer Science, page 476-495. Springer, (2019)A Formal Model of Real-Time Program Compilation., and . ARTS, volume 1601 of Lecture Notes in Computer Science, page 192-210. Springer, (1999)Specification and Verification of Real-Time Behaviour Using Z and RTL.. FTRTFT, volume 571 of Lecture Notes in Computer Science, page 393-409. Springer, (1992)Access Control Requirements for Processing Electronic Health Records., and . Business Process Management Workshops, volume 4928 of Lecture Notes in Computer Science, page 371-382. Springer, (2007)Interactively Verifying a Simple Real-time Scheduler., , and . CAV, volume 939 of Lecture Notes in Computer Science, page 395-408. Springer, (1995)Preface.. CATS, volume 42 of Electronic Notes in Theoretical Computer Science, page 282-283. Elsevier, (2001)Partial Orders for Parallel Debugging.. Workshop on Parallel and Distributed Debugging, page 183-194. ACM, (1988)