Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Safety Analysis to Software Requirements., , and . IEEE Trans. Software Eng., 24 (7): 573-584 (1998)Architectural analysis of component-based systems.. ACM SIGSOFT Softw. Eng. Notes, 25 (1): 96-97 (2000)The practice of formal methods in safety-critical systems., , and . J. Syst. Softw., 28 (1): 77-87 (1995)Intrusion-Tolerant Enclaves., , and . S&P, page 216-224. IEEE Computer Society, (2002)Formal Methods in Circuit Design. Cambridge Tracts in Theoretical Computer Science Cambridge University Press, (1993)Provably dependable software architectures., and . ISAW@FSE, page 133-136. ACM, (1998)A Formalization of Software Architecture., , , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 116-133. Springer, (1999)The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective., and . FME, volume 670 of Lecture Notes in Computer Science, page 183-195. Springer, (1993)Formal Specification and Verification of Hardware: A Comparative Case Study., , and . DAC, page 197-204. ACM, (1988)Protocol Codesign (Discussion).. Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, page 114-118. Springer, (2003)