Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time Java from an automated code generation perspective., and . JTRES, page 63-72. ACM, (2007)A New Strategy for the HRT-HOOD to Ada Mapping., and . Ada-Europe, volume 3555 of Lecture Notes in Computer Science, page 51-66. Springer, (2005)Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach., and . Ada-Europe, volume 4498 of Lecture Notes in Computer Science, page 114-127. Springer, (2007)Limited preemptive scheduling of non-independent task sets., , and . EMSOFT, page 18:1-18:10. IEEE, (2013)WCET analysis methods: Pitfalls and challenges on their trustworthiness., , , , , , , , and . SIES, page 39-48. IEEE, (2015)On the Construction of New-Generation On-Board Real-Time Systems.. Integr. Comput. Aided Eng., 5 (3): 227-244 (1998)Probabilistic Worst-Case Timing Analysis: Taxonomy and Comprehensive Survey., , , , , and . ACM Comput. Surv., 52 (1): 14:1-14:35 (2019)Report of session: analysis of the J consortium real-time Java proposal., and . IRTAW, page 17-18. ACM, (2000)Tasking profiles (session summary)., , and . IRTAW, page 5-7. ACM, (1997)A Little Look Outside of the Box.. MDE4IoT/ModComp@MoDELS, volume 2442 of CEUR Workshop Proceedings, page 55-56. CEUR-WS.org, (2019)