Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Globalizing Modeling Languages., , , , , and . IEEE Computer, 47 (6): 68-71 (2014)Towards a 'Safe' Use of Design Patterns to Improve OO Software Testability., , , and . ISSRE, page 324-331. IEEE Computer Society, (2001)Building Trust into OO Components Using a Genetic Analogy., , , and . ISSRE, page 4-14. IEEE Computer Society, (2000)Testing Security Policies: Going Beyond Functional Testing., , and . ISSRE, page 93-102. IEEE Computer Society, (2007)Deriving Usage Model Variants for Model-Based Testing: An Industrial Case Study., , , , and . ICECCS, page 77-80. IEEE Computer Society, (2014)Tailored Shielding and Bypass Testing of Web Applications., , , , and . ICST, page 210-219. IEEE Computer Society, (2011)Mitigating Browser Fingerprint Tracking: Multi-level Reconfiguration and Diversification., , and . SEAMS@ICSE, page 98-108. IEEE Computer Society, (2015)Model-Driven Engineering for Requirements Analysis., , and . EDOC, page 459-466. IEEE Computer Society, (2007)Producing a Global Requirement Model from Multiple Requirement Specifications., , , , and . EDOC, page 390-404. IEEE Computer Society, (2007)Barriers to systematic model transformation testing., , , , , and . Commun. ACM, 53 (6): 139-143 (2010)