Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding Time to Synchronous Process Communications., and . IEEE Trans. Computers, 36 (8): 941-948 (1987)An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control Systems., , , , , , , , , and 1 other author(s). Computer, 51 (11): 46-55 (2018)High-Confidence Medical Device Software and Systems., , , , , , , and . Computer, 39 (4): 33-38 (2006)A Graphical Language for Specifying and Analyzing Real-Time Systems., and . Integr. Comput. Aided Eng., 5 (4): 279-302 (1998)Generating composite behavior of embedded software components based on UML behavioral model and process algebra., , , and . ACM SIGSOFT Softw. Eng. Notes, 36 (1): 1-9 (2011)Testing learning-enabled cyber-physical systems with Large-Language Models: A Formal Approach., , , , , , , and . CoRR, (2023)In and Out-of-Domain Text Adversarial Robustness via Label Smoothing., , , and . CoRR, (2022)Introduction to the special section on runtime verification., , and . Int. J. Softw. Tools Technol. Transf., 14 (3): 243-247 (2012)Verisim: Formal Analysis of Network Simulations., , , , , , and . IEEE Trans. Software Eng., 28 (2): 129-145 (2002)Guaranteed Conformance of Neurosymbolic Models to Natural Constraints., , , and . CoRR, (2022)