Author of the publication

RE Theory Meets Software Practice: Lessons from the Software Development Trenches.

, , , and . RE, page 265-268. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Translation Templates to Support Strategy Development in PVS., and . STRATEGIES@IJCAR, volume 174 of Electronic Notes in Theoretical Computer Science, page 59-79. Elsevier, (2006)Analyzing Security-Enhanced Linux Policy Specifications., , and . POLICY, page 158-. IEEE Computer Society, (2003)Applying Formal Methods to an Information Security Device: An Experience Report., , and . HASE, page 81-88. IEEE Computer Society, (1999)Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit., , , and . TPHOLs, volume A-20 of IFIP Transactions, page 427-447. North-Holland/Elsevier, (1992)Partial Implementations of Abstract Data Types: Theory and Practice. University of Illinois Urbana-Champaign, USA, (1988)Can We Build an Automatic Program Verifier? Invariant Proofs and Other Challenges.. VSTTE, volume 4171 of Lecture Notes in Computer Science, page 308-317. Springer, (2005)SCR: A Practical Approach to Building a High Assurance COMSEC System., , and . ACSAC, page 109-118. IEEE Computer Society, (1999)Extended abstract: organizing automaton specifications to achieve faithful representation., and . MEMOCODE, page 245-246. IEEE Computer Society, (2005)PM: A Proof Manager for HOL and Other Provers., , and . TPHOLs, page 286-304. IEEE Computer Society, (1991)Partial Implementations of Abstract Data Types: A Dissenting view on Errors., and . Semantics of Data Types, volume 173 of Lecture Notes in Computer Science, page 317-336. Springer, (1984)