Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositional verification of a medical device system., , , and . HILT, page 51-64. ACM, (2013)DesCert: Design for Certification., , , , , , , , , and 1 other author(s). CoRR, (2022)From Requirements to Code: Model Based Development of a Medical Cyber Physical System., , , , , , , , and . FHIES/SEHC, volume 9062 of Lecture Notes in Computer Science, page 96-112. Springer, (2014)Design Considerations for Modeling Modes in Cyber-Physical Systems., , , and . IEEE Des. Test, 32 (5): 66-73 (2015)Multisession Video Packet Scheduling., , and . ISI, volume 235 of Advances in Intelligent Systems and Computing, page 31-39. Springer, (2013)Reinforcement Learning based System-of-Systems Approach for UAV Swarms Behavioral Evolution., and . SysCon, page 1-8. IEEE, (2022)Semantic Analysis of Assurance Cases using s(CASP)., , , , , , , , and . ICLP Workshops, volume 3437 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Modeling and requirements on the physical side of cyber-physical systems., , , and . TwinPeaks@ICSE, page 1-7. IEEE Computer Society, (2013)Linking abstract analysis to concrete design: A hierarchical approach to verify medical CPS safety., , , , , and . ICCPS, page 139-150. IEEE Computer Society, (2014)Using Quantifier Elimination to Enhance the Safety Assurance of Deep Neural Networks., , and . CoRR, (2019)