Author of the publication

A Safety-Assured Development Approach for Real-Time Software.

, , , , , and . RTCSA, page 133-142. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On 2-rainbow domination of generalized Petersen graphs., , , , , , and . Discret. Appl. Math., (2019)On extremal multiplicative Zagreb indices of trees with given domination number., , and . Appl. Math. Comput., (2018)Security Analysis of Lightweight Authentication Protocol from WISTP 2013., , , and . IACR Cryptol. ePrint Arch., (2013)A Causality Analysis Framework for Component-Based Real-Time Systems., , , , , and . RV, volume 8174 of Lecture Notes in Computer Science, page 285-303. Springer, (2013)NeRF-MS: Neural Radiance Fields with Multi-Sequence., , , , , and . ICCV, page 18545-18554. IEEE, (2023)A Safety-Assured Development Approach for Real-Time Software., , , , , and . RTCSA, page 133-142. IEEE Computer Society, (2010)Research on mechanisms of providing electronic public services for information vulnerable groups in China.. ICEGOV, volume 444 of ACM International Conference Proceeding Series, page 295-300. ACM, (2010)The Values of Public Library in Promoting an Open Government Environment., , and . DG.O, page 481-490. ACM, (2016)Structure Properties of Koch Networks Based on Networks Dynamical Systems., , and . Complex., (2017)Multiplicative Zagreb indices of k-trees., and . Discret. Appl. Math., (2015)