Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Five Major Reasons Why Safety and Security Haven't Married (Yet)., , , , and . ERCIM News, (2015)Spacecraft early design validation using formal methods., , , , , , , , and . Reliab. Eng. Syst. Saf., (2014)Formal correctness, safety, dependability, and performance analysis of a satellite., , , , and . ICSE, page 1022-1031. IEEE Computer Society, (2012)Memoised Garbage Collection for Software Model Checking., and . TACAS, volume 5505 of Lecture Notes in Computer Science, page 201-214. Springer, (2009)MoonWalker: Verification of .NET Programs., , and . TACAS, volume 5505 of Lecture Notes in Computer Science, page 170-173. Springer, (2009)Incremental Hashing for Spin., and . SPIN, volume 5156 of Lecture Notes in Computer Science, page 232-249. Springer, (2008)Trustworthy spacecraft design using formal methods.. RWTH Aachen University, (2013)Atlastic Reputation AI: Four Years of Advancing and Applying a SOTA NLP Classifier., , , , , , and . DSAA, page 1-2. IEEE, (2021)Selected dynamic issues in software model checking., and . Int. J. Softw. Tools Technol. Transf., 15 (4): 337-362 (2013)Model Checking Markov Chains Using Krylov Subspace Methods: An Experience Report., , and . EPEW, volume 6342 of Lecture Notes in Computer Science, page 115-130. Springer, (2010)