Author of the publication

A Novel and Unifying View of Trustworthiness in Cyberphysical Systems.

, and . MMM-ACNS, volume 10446 of Lecture Notes in Computer Science, page 327-338. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AI in Real Time: Is This Feasible?. ICCI, page 286-289. IEEE Computer Society, (1992)Distance between the pseudosections of the vocal tract as the criterion in the speaker recognition process.. ECST, page 2341. ISCA, (1987)Developing Component-Based Software for Real-Time Systems.. EUROMICRO, page 80-. IEEE Computer Society, (2001)Formal Methods: Yes but How ?. NATO ASI RTC, volume 127 of NATO ASI Series, page 622-624. Springer, (1992)Specification and Verification of a Safety Shell with Statecharts and Extended Timed Graphs., , , , and . SAFECOMP, volume 1943 of Lecture Notes in Computer Science, page 37-52. Springer, (2000)A Tool for Databus Safety Analysis Using Fault Injection., , and . SAFECOMP, volume 4166 of Lecture Notes in Computer Science, page 261-274. Springer, (2006)Computers, cognition and communication: introduction to the special section.. Annu. Rev. Control., 27 (1): 1-2 (2003)Small is Beautiful: Embedded Systems Projects in an Undergraduate Software Engineering Program., , and . E2LP@FedCSIS, volume 4 of Annals of Computer Science and Information Systems, page 35-41. (2014)Experimental evaluation of software development tools for safety-critical real-time systems., and . Innov. Syst. Softw. Eng., 1 (2): 176-188 (2005)Chaim Selig Slonimski and His Adding Devices., , and . IEEE Ann. Hist. Comput., 35 (3): 42-53 (2013)