Author of the publication

Correct or usable? the limits of traditional verification (impact paper award).

, and . SIGSOFT FSE, page 11. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed event processing for activity recognition., , , , , and . DEBS, page 371-372. ACM, (2011)Critical Feature Analysis of a Radiotherapy Machine., , , , and . SAFECOMP, volume 2788 of Lecture Notes in Computer Science, page 221-234. Springer, (2003)Module Dependences in Software Design.. RISSEF, volume 2941 of Lecture Notes in Computer Science, page 198-203. Springer, (2002)αRby - An Embedding of Alloy in Ruby., , and . ABZ, volume 8477 of Lecture Notes in Computer Science, page 56-71. Springer, (2014)A Structure for Dependability Arguments., and . ASM, volume 5977 of Lecture Notes in Computer Science, page 1. Springer, (2010)Object spreadsheets: a new computational model for end-user development of data-centric web applications., , and . Onward!, page 112-127. ACM, (2016)Occupancy monitoring using environmental & context sensors and a hierarchical analysis framework., , , , , , , , , and . BuildSys@SenSys, page 90-99. ACM, (2014)Aspect: Detecting Bugs with Abstract Dependences.. ACM Trans. Softw. Eng. Methodol., 4 (2): 109-145 (1995)Panopticon: a parallel video overview system., , , , , and . UIST, page 123-130. ACM, (2013)Idioms of Logical Modelling.. ICGT, volume 4178 of Lecture Notes in Computer Science, page 14. Springer, (2006)