Author of the publication

Formal Modeling and Verification of Safety-Critical Software.

, , and . IEEE Software, 26 (3): 42-49 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract)., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 404-405. Springer, (2008)Formal verification of functional properties of a SCR-style software requirements specification using PVS., , and . Reliab. Eng. Syst. Saf., 87 (3): 351-363 (2005)An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification., , , , and . Reliab. Eng. Syst. Saf., 89 (3): 248-260 (2005)Construction of global finite state machine for testing task interactions written in message sequence charts., , and . SEKE, page 369-376. ACM, (2002)Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS., , and . TACAS, volume 2280 of Lecture Notes in Computer Science, page 205-220. Springer, (2002)Generating test sequences using symbolic execution for event-driven real-time systems., and . Microprocess. Microsystems, 27 (10): 523-531 (2003)An empirical evaluation of six methods to detect faults in software., , , and . Softw. Test. Verification Reliab., 12 (3): 155-171 (2002)Automated test case generation for FBD programs implementing reactor protection system software., , , , and . Softw. Test. Verification Reliab., 24 (8): 608-628 (2014)FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram., , , , , , and . J. Res. Pract. Inf. Technol., 42 (3): 171-188 (2010)A quantitative approach to estimate a website security risk using whitelist., , , and . Secur. Commun. Networks, 5 (10): 1181-1192 (2012)