Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-tolerant functional reactive programming (extended version)., and . J. Funct. Program., (2020)Compositional verification of a communication protocol for a remotely operated aircraft., and . Sci. Comput. Program., 78 (7): 813-827 (2013)Roll your own test bed for embedded real-time protocols: a haskell experience., , and . Haskell, page 61-68. ACM, (2009)Reasoning about Concurrency for Security Tunnels., and . CSF, page 64-78. IEEE Computer Society, (2007)Copilot: monitoring embedded systems., , , and . Innov. Syst. Softw. Eng., 9 (4): 235-255 (2013)Assuring the Guardians., , and . RV, volume 9333 of Lecture Notes in Computer Science, page 87-101. Springer, (2015)Governing AI safety through independent audits., , , , , , , , , and 10 other author(s). Nat. Mach. Intell., 3 (7): 566-571 (2021)Predictable programs in barcodes., , , and . CASES, page 298-303. ACM, (2002)From Requirements to Autonomous Flight: An Overview of the Monitoring ICAROUS Project., , , , , , , , , and . FMAS, volume 329 of EPTCS, page 23-30. (2020)Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle., and . FMICS, volume 5825 of Lecture Notes in Computer Science, page 86-101. Springer, (2009)