Author of the publication

Evaluating the use of model-based requirements verification method: A feasibility study.

, , , and . EmpiRE, page 13-20. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deriving Functional Safety Requirements Using Undesired Combination State Templates., , and . RESACS@RE, page 1-8. IEEE, (2018)Model-based requirements verification method: Conclusions from two controlled experiments., , , and . Inf. Softw. Technol., 56 (3): 321-334 (2014)Exposing off-nominal behaviors in multi-robot coordination., , and . RoSE@ICSE, page 17-24. IEEE / ACM, (2019)Hierarchical Model Exploration for Exposing Off-nominal Behaviors., , and . MoDELS (Satellite Events), volume 2019 of CEUR Workshop Proceedings, page 329-335. CEUR-WS.org, (2017)A Knowledge Acquisition Approach for Off-Nominal Behaviors., , and . RESACS@RE, page 36-43. IEEE, (2018)Addressing the state explosion problem when visualizing off-nominal behaviors in a set of reactive requirements., and . Requir. Eng., 24 (2): 161-180 (2019)A systematic approach to transforming system requirements into model checking specifications., , and . ICSE Companion, page 165-174. ACM, (2014)A combinatorial approach for exposing off-nominal behaviors., , and . ICSE, page 910-920. ACM, (2018)Evaluating the use of model-based requirements verification method: A feasibility study., , , and . EmpiRE, page 13-20. IEEE Computer Society, (2011)Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study., , , and . SEKE, page 397-401. Knowledge Systems Institute Graduate School, (2014)