Get my own profile
Public access
View all22 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Xiaoshan LiAssociate Professor of Computer Science, University of MacauVerified email at umac.mo
Anders P. RavnAalborg UniversityVerified email at cs.aau.dk
Volker StolzHøgskulen på Vestlandet & Universitetet i OsloVerified email at foldr.org
Zhenbang ChenAssociate Professor, College of Computer, National University of Defense Technology, Changsha, ChinaVerified email at nudt.edu.cn
Naijun ZhanInstitute of Software Chinese Academy of SciencesVerified email at ios.ac.cn
Quan LongUniversity of CalgaryVerified email at ucalgary.ca
Charles MorissetSenior Lecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Jonathan P. BowenEmeritus Professor of Computing, London South Bank UniversityVerified email at lsbu.ac.uk
Wei KeMacao Polytechnic InstituteVerified email at ipm.edu.mo
Esther PalomarUniversity of AlcalaVerified email at uah.es
Peter T. BreuerIndependent ResearcherVerified email at hecusys.com
Nafees QamarGovernors State UniversityVerified email at govst.edu
Jim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
Taolue ChenDepartment of Computer Science, Birkbeck, University of LondonVerified email at bbk.ac.uk
Martin SchaefAmazon Web ServicesVerified email at amazon.com
Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at tees.ac.uk
Xia ZengSouthwest UniversityVerified email at swu.edu.cn
Zhengfeng YangEast China Normal UniversityVerified email at sei.ecnu.edu.cn
Cristiano BertoliniResearcher, Federal University of PernambucoVerified email at cin.ufpe.br
Johannes FaberUnited Nations University, International Institute for Software Technology (UNU-IIST)Verified email at iist.unu.edu