Author of the publication

Transforming Timing Requirements into CCSL Constraints to Verify Cyber-Physical Systems.

, , , and . ICFEM, volume 10610 of Lecture Notes in Computer Science, page 54-70. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface., , , , and . J. Comput. Sci. Technol., 34 (5): 939-941 (2019)Trust Analysis of Web Services Based on a Trust Ontology., and . KSEM, volume 4798 of Lecture Notes in Computer Science, page 642-648. Springer, (2007)Super-Resolution of Depth Map Exploiting Planar Surfaces., , and . PCM (2), volume 9315 of Lecture Notes in Computer Science, page 632-641. Springer, (2015)Handling non-canonical software requirements based on Annotated Predicate Calculus., , , and . Knowl. Inf. Syst., 11 (1): 85-104 (2007)Revisiting the Meaning of Requirements.. J. Comput. Sci. Technol., 21 (1): 32-40 (2006)The structure and semantics of an object-oriented logic programming language: SCKE.. J. Comput. Sci. Technol., 10 (1): 74-84 (1995)A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements., , and . IJKSS, 3 (1): 1-17 (2012)Measuring the blame of each formula for inconsistent prioritized knowledge bases., , and . J. Log. Comput., 22 (3): 481-516 (2012)Preface., , and . J. Systems Science & Complexity, 21 (4): 485-486 (2008)A Priority-Based Negotiations Approach for Handling Inconsistencies in Multi-Perspective Software Requirements., , and . J. Systems Science & Complexity, 21 (4): 574-596 (2008)