Author of the publication

Checking General Safety Criteria on UML Statecharts.

, , and . SAFECOMP, volume 2187 of Lecture Notes in Computer Science, page 46-55. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic performance evaluation using component-in-the-loop approach., , , , , and . Int. J. Cloud Comput., 7 (3/4): 336-357 (2018)An optimization based design for integrated dependable real-time embedded systems., , , , and . Des. Autom. Embed. Syst., 13 (4): 245-285 (2009)Empirical Assessment of Resilience., , , and . SERENE, volume 8166 of Lecture Notes in Computer Science, page 1-16. Springer, (2013)Impact Assessment of IT Security Breaches in Cyber-Physical Systems: Short paper., , , , and . LADC, page 1-4. IEEE, (2021)An improved signature analysis based CPU self test.. Microprocess. Microprogramming, 23 (1-5): 167-171 (1988)Message from the general chair.. DSN, page 1. IEEE Computer Society, (2013)Qualitative performance control in supervised IT infrastructures., , , , , and . DSN Workshops, page 59-65. IEEE Computer Society, (2010)Model-Based Approaches for Dependability in Ad-Hoc Mobile Networks and Services., , , , , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 150-174. Springer, (2007)Qualitative Characterization of Quality of Service Interference between Virtual Machines., , , and . ARCS Workshops, VDE-Verlag, (2011)Analytics of resource transients in cloud-based applications., , , , and . Int. J. Cloud Comput., 2 (2/3): 191-212 (2013)