Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The use of mTags for mandatory security: a case study., , , and . Softw. Pract. Exp., 44 (12): 1511-1523 (2014)Energy-Efficient Multiple Producer-Consumer., , and . IEEE Trans. Parallel Distributed Syst., 30 (3): 560-574 (2019)Attack Resilient Heterogeneous Vehicle Platooning Using Secure Distributed Nonlinear Model Predictive Control., , and . MED, page 307-312. IEEE, (2020)Deep Learning for System Trace Restoration., , , and . IJCNN, page 1-8. IEEE, (2019)An open platform for mixed-criticality real-time ethernet., and . DATE, page 153-156. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Perphecy: Performance Regression Test Selection Made Simple but Effective., , , , and . ICST, page 103-113. IEEE Computer Society, (2017)Runtime verification of LTL on lossy traces., , and . SAC, page 1379-1386. ACM, (2017)Predictive Run-Time Verification of Discrete-Time Reachability Properties in Black-Box Systems Using Trace-Level Abstraction and Statistical Learning., , and . RV, volume 11237 of Lecture Notes in Computer Science, page 187-204. Springer, (2018)Palisade: A Framework for Anomaly Detection in Embedded Systems Dataset., , , , , and . (June 2020)Impact of Community Structure on SAT Solver Performance., , , , and . SAT, volume 8561 of Lecture Notes in Computer Science, page 252-268. Springer, (2014)