Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KPI-Supported PDCA Model for Innovation Policy Management in Local Government., and . EGOV, volume 6846 of Lecture Notes in Computer Science, page 320-331. Springer, (2011)A Generic Distortion Free Watermarking Technique for Relational Databases., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 252-264. Springer, (2009)Sentence Embedding Models for Similarity Detection of Software Requirements., , , and . SN Comput. Sci., 2 (1): 69 (2021)The Quotient of an Abstract Interpretation., , and . Theor. Comput. Sci., 202 (1-2): 163-192 (1998)Boundary Inference for Enforcing Security Policies in Mobile Ambients., , , and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 383-395. Kluwer, (2002)Non-repudiation analysis using LySa with annotations., and . Comput. Lang. Syst. Struct., 36 (4): 352-377 (2010)Distortion-Free Authentication Watermarking., and . ICSOFT (Selected Papers), volume 170 of Communications in Computer and Information Science, page 205-219. Springer, (2010)Ensuring determinism in blockchain software with GoLiSA: an industrial experience report., , , , , , , , and . SOAP@PLDI, page 23-29. ACM, (2022)Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis, , and . LICS, page 322-327. IEEE Computer Society, (1991)A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities., , and . FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 1539-1547. (2014)