Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing and Analyzing a Flash File System with Alloy., and . Int. J. Software and Informatics, 3 (2-3): 129-148 (2009)A formal approach for detection of security flaws in the android permission system., , , and . Formal Asp. Comput., 30 (5): 525-544 (2018)Runtime monitoring for safety of intelligent vehicles., , , and . DAC, page 31:1-31:6. ACM, (2018)Quotient for Assume-Guarantee Contracts., , , and . MEMOCODE, page 67-77. IEEE, (2018)Designing minimal effective normative systems with the help of lightweight formal methods., , , and . SIGSOFT FSE, page 50-60. ACM, (2016)AlloyMax: bringing maximum satisfaction to relational specifications., , , , , , and . ESEC/SIGSOFT FSE, page 155-167. ACM, (2021)Alloy*: A General-Purpose Higher-Order Relational Constraint Solver., , , and . ICSE (1), page 609-619. IEEE Computer Society, (2015)An Architectural Mechanism for Resilient IoT Services., , , and . SafeThings@SenSys, page 8-13. ACM, (2017)Optimizing Assume-Guarantee Contracts for Cyber-Physical System Design., , , and . DATE, page 246-251. IEEE, (2019)Components, platforms and possibilities: towards generic automation for MDA., , , , and . EMSOFT, page 39-48. ACM, (2010)