Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testability-Oriented Hardware/Software Partitioning., , and . ITC, page 725-731. IEEE Computer Society, (1996)Business and Information System Alignment: A Formal Solution for Telecom Services., , , , and . ICSEA, page 278-283. IEEE Computer Society, (2010)Coverage-Based Test Cases Selection for XACML Policies., , , , and . ICST Workshops, page 12-21. IEEE Computer Society, (2014)A Tridimensional Approach for Studying the Formal Verification of Model Transformations., , , , , , , and . ICST, page 921-928. IEEE Computer Society, (2012)Tailored Shielding and Bypass Testing of Web Applications., , , , and . ICST, page 210-219. IEEE Computer Society, (2011)Suspicious electric consumption detection based on multi-profiling using live machine learning., , , , , , and . SmartGridComm, page 891-896. IEEE, (2015)Impact of System Partitioning on Test Cost., , and . IEEE Design & Test of Computers, 14 (1): 64-74 (1997)Towards flexible evolution of Dynamically Adaptive Systems., , , , , , , and . ICSE, page 1353-1356. IEEE Computer Society, (2012)Access control enforcement testing., , , and . AST, page 64-70. IEEE Computer Society, (2013)Towards automated testing and fixing of re-engineered feature models., , , , and . ICSE, page 1245-1248. IEEE Computer Society, (2013)