Author of the publication

Runtime Verification Monitor Construction for Three-valued PPTL.

, , , and . SOFL+MSVL, volume 10189 of Lecture Notes in Computer Science, page 144-159. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically extracting T-S fuzzy models using cooperative random learning particle swarm optimization., , , , and . Appl. Soft Comput., 10 (3): 938-944 (2010)The effect of chord-wise flexibility on the aerodynamic force generation of flapping wings: Experimental studies., , , and . ICRA, page 4207-4212. IEEE, (2009)Scene Segmentation by Oscillatory Correlation.. RITA, 7 (2): 73-88 (2000)Architecture approach for ICT supply chain integrity., , , and . ICT, page 1-5. IEEE, (2013)A new approach for software testability analysis.. ICSE, page 985-988. ACM, (2006)A Primal-Dual Approximation Algorithm for the Survivable Network Design Problem in Hypergraph., , and . STACS, volume 2010 of Lecture Notes in Computer Science, page 478-489. Springer, (2001)A practical system for optimized assignment of shelters to evacuees.. IHTC, page 42-45. IEEE, (2017)A Study on Variable Control of Sound Vibration Form (SVF) for Media Art Creation., , , and . Culture Computing, page 136-142. IEEE Computer Society, (2017)Linear-tree rule structure for firewall optimization., , and . Communications, Internet, and Information Technology, page 67-72. IASTED/ACTA Press, (2007)A linear time 5/3-approximation for the minimum strongly-connected spanning subgraph problem., , and . Inf. Process. Lett., 86 (2): 63-70 (2003)