Author of the publication

The SCR Method for Formally Specifying, Verifying, and Validating Requirements: Tool Support.

, , and . ICSE, page 610-611. ACM, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Separation virtual machine monitors., , , , and . ACSAC, page 419-428. ACM, (2012)The SCR Method for Formally Specifying, Verifying, and Validating Requirements: Tool Support., , and . ICSE, page 610-611. ACM, (1997)Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications., , , , and . IEEE Trans. Software Eng., 24 (11): 927-948 (1998)The Xenon separation VMM: Secure virtualization infrastructure for military clouds., , , , and . MILCOM, page 1-6. IEEE, (2012)Inducing a lexicon of sociolinguistic variables from code-mixed text., , and . NUT@EMNLP, page 1-6. Association for Computational Linguistics, (2018)Towards robust cross-linguistic comparisons of phonological networks., , , and . SIGMORPHON, page 110-120. Association for Computational Linguistics, (2016)Production of the antimalarial drug precursor artemisinic acid in engineered yeast, , , , , , , , , and 5 other author(s). Nature, 440 (7086): 940--943 (Apr 13, 2006)Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 2890-2906 (2022)Applying the SCR requirements method to a weapons control panel: an experience report., , and . FMSP, page 92-102. ACM, (1998)Re-engineering Xen internals for higher-assurance security., , , , and . Inf. Secur. Tech. Rep., 13 (1): 17-24 (2008)