Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A compositional synthesis of failure-free connectors for correct components assembly, and . Proceedings of the 6th ICSE Workshop on Component-Based Software Engineering, (2003)Leveraging privacy profiles to empower users in the digital society., , , and . Autom. Softw. Eng., 31 (1): 16 (June 2024)A Comprehensive Setting for Matching and Unification over Iterative Terms., , and . Fundam. Informaticae, 39 (3): 273-304 (1999)Integrity Constraints as Views in Deductice Databases., , and . FMLDO, page 133-140. University of Magedeburg, Faculty of Computer Science, (1996)Quantitative resource-oriented analysis of Java (Adaptable) applications., and . WOSP, page 15-25. ACM, (2007)Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework., , and . FASE, volume 4422 of Lecture Notes in Computer Science, page 57-71. Springer, (2007)ESP-MC: An Experiment in the Use of Verification Tools., , and . ASIAN, volume 1023 of Lecture Notes in Computer Science, page 396-410. Springer, (1995)Modelling Interoperability by CHAM: A Case Study., and . COORDINATION, volume 1061 of Lecture Notes in Computer Science, page 428-431. Springer, (1996)Deriving performance models of software architectures from message sequence charts., , , and . Workshop on Software and Performance, page 47-57. ACM, (2000)A Strategy to Deal with Divergent Rewrite Systems., and . CTRS, volume 656 of Lecture Notes in Computer Science, page 458-467. Springer, (1992)