Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coherent Modeling and Effective Coordination for Building Emergency Evacuation., , , , and . CASE, page 670-677. IEEE, (2007)Energy-efficient management of eco-communities., , , , , , and . CASE, page 106-111. IEEE, (2013)Stateful Design for Secure Information Systems., , , and . WOSIS, page 277-286. INSTICC Press, (2005)Parallelizing constraint programs.. DAMP, page 3-4. ACM, (2010)Optimizing Network Deployment of Formally-Specified Distributed Systems., , , , and . SEDE, page 230-237. ISCA, (2009)A Systematic Approach to Analyzing Voting Terminal Event Logs., , and . EVT/WOTE, USENIX Association, (2014)A framework for security assurance of access control enforcement code., , and . Computers & Security, 29 (7): 770-784 (2010)A framework of composable access control features: Preserving separation of access control concerns from models to code., , and . Computers & Security, 29 (3): 350-379 (2010)Taking total control of voting systems: firmware manipulations on an optical scan voting terminal., , , , , , , , and . SAC, page 2049-2053. ACM, (2009)Domain Views for Constraint Programming., and . CP, volume 8656 of Lecture Notes in Computer Science, page 705-720. Springer, (2014)