Author of the publication

Roundtable: Research Opportunities and Challenges for Emerging Software Systems.

, , , , and . J. Comput. Sci. Technol., 30 (5): 935-941 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conviviality-driven access control policy., , , , , , and . Requir. Eng., 20 (4): 363-382 (2015)Stress Testing of Transactional Database Systems., , , , and . JIDM, 4 (3): 279-294 (2013)Composants objets fiables : une approche pragmatique., , , , and . L'OBJET, (1999)Towards a 'Safe' Use of Design Patterns to Improve OO Software Testability., , , and . ISSRE, page 324-331. IEEE Computer Society, (2001)Building Trust into OO Components Using a Genetic Analogy., , , and . ISSRE, page 4-14. IEEE Computer Society, (2000)Testing Security Policies: Going Beyond Functional Testing., , and . ISSRE, page 93-102. IEEE Computer Society, (2007)Model-Based Testing of Obligations., , , and . QSIC, page 1-10. IEEE, (2014)Similarity testing for access control., , , , , , , , and . Information & Software Technology, (2015)Testability-Oriented Hardware/Software Partitioning., , and . ITC, page 725-731. IEEE Computer Society, (1996)Coverage-Based Test Cases Selection for XACML Policies., , , , and . ICST Workshops, page 12-21. IEEE Computer Society, (2014)