Author of the publication

Partition Analysis: A Method Combining Testing and Verification.

, and . IEEE Trans. Software Eng., 11 (12): 1477-1490 (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending and Limiting PGraphite-style Persistence., , and . POS, page 74-86. Morgan Kaufmann, (1990)Insider Threat Identification by Process Analysis., , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 251-264. IEEE Computer Society, (2014)Specifying and verifying requirements for election processes., , , and . DG.O, volume 289 of ACM International Conference Proceeding Series, page 63-72. Digital Government Research Center, (2008)A program testing system.. ACM Annual Conference, page 488-491. ACM, (1976)Ensuring reliable datasets for environmental models and forecasts., , , , , , , and . Ecological Informatics, 2 (3): 237-247 (2007)Simulating patient flow through an Emergency Department using process-driven discrete event simulation., , , , and . SEHC@ICSE, page 73-83. IEEE Computer Society, (2009)A Comparison of Data Flow Path Selection Criteria., , , and . ICSE, page 244-251. IEEE Computer Society, (1985)The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification., , and . ICSE, page 37-46. IEEE Computer Society, (2001)Considerations for online deviation detection in medical processes., , and . SEHC@ICSE, page 50-56. IEEE Computer Society, (2013)A Compact Petri Net Representation and Its Implications for Analysis., and . IEEE Trans. Software Eng., 22 (11): 794-811 (1996)