Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software model checking takes off., , and . Commun. ACM, 53 (2): 58-64 (2010)Requirements Capture and Evaluation in Nimbus: The Light-Control Case Study., , and . J. Univers. Comput. Sci., 6 (7): 731-757 (2000)Model-Checking of Safety-Critical Software for Avionics., , and . ERCIM News, (2008)Machine-Checked Proofs for Realizability Checking Algorithms., , and . VSTTE, volume 9593 of Lecture Notes in Computer Science, page 110-123. Springer, (2015)Inductive Validity Cores., , , and . IEEE Trans. Software Eng., 47 (2): 279-299 (2021)The Risks of Coverage-Directed Test Case Generation., , , and . IEEE Trans. Software Eng., 41 (8): 803-819 (2015)Your "What" Is My "How": Iteration and Hierarchy in System Design., , , , , and . IEEE Softw., 30 (2): 54-60 (2013)Development of Security Software: A High Assurance Methodology., , , , and . ICFEM, volume 5885 of Lecture Notes in Computer Science, page 266-285. Springer, (2009)Architectural Modeling and Analysis for Safety Engineering., , , and . IMBSA, volume 10437 of Lecture Notes in Computer Science, page 97-111. Springer, (2017)Unsatisfiability Proofs for Distributed Clause-Sharing SAT Solvers., , , , and . TACAS (1), volume 13993 of Lecture Notes in Computer Science, page 348-366. Springer, (2023)