From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated traceability analysis for UML model refinements, , и . Information and Software Technology, (2008)Enabling the runtime assertion checking of concurrent contracts for the Java modeling language., , и . ICSE, стр. 786-795. ACM, (2011)A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems., , и . MoDELS, том 5795 из Lecture Notes in Computer Science, стр. 47-61. Springer, (2009)Model-Driven, Network-Context Sensitive Intrusion Detection., , , и . MoDELS, том 4735 из Lecture Notes in Computer Science, стр. 61-75. Springer, (2007)Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases., , и . PST, (2005)A Comparative Study of Invariants Generated by Daikon and User-Defined Design Contracts., и . QSIC, стр. 174-183. IEEE, (2014)Comparing transition trees test suites effectiveness for different mutation operators., и . A-TEST@ESEC/SIGSOFT FSE, стр. 10-16. ACM, (2020)Diagram Definition: A Case Study with the UML Class Diagram., и . MoDELS, том 6981 из Lecture Notes in Computer Science, стр. 364-378. Springer, (2011)A Multi-objective Genetic Algorithm to Rank State-Based Test Cases., , и . SSBSE, том 8084 из Lecture Notes in Computer Science, стр. 66-80. Springer, (2013)Combining UML Sequence and State Machine Diagrams for Data-Flow Based Integration Testing., , и . ECMFA, том 7349 из Lecture Notes in Computer Science, стр. 74-89. Springer, (2012)