Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WCET analysis methods: Pitfalls and challenges on their trustworthiness., , , , , , , , and . SIES, page 39-48. IEEE, (2015)Real-time Java from an automated code generation perspective., and . JTRES, page 63-72. ACM, (2007)Limited preemptive scheduling of non-independent task sets., , and . EMSOFT, page 18:1-18:10. IEEE, (2013)A Little Look Outside of the Box.. MDE4IoT/ModComp@MoDELS, volume 2442 of CEUR Workshop Proceedings, page 55-56. CEUR-WS.org, (2019)Report of session: analysis of the J consortium real-time Java proposal., and . IRTAW, page 17-18. ACM, (2000)Tasking profiles (session summary)., , and . IRTAW, page 5-7. ACM, (1997)A New Strategy for the HRT-HOOD to Ada Mapping., and . Ada-Europe, volume 3555 of Lecture Notes in Computer Science, page 51-66. Springer, (2005)Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach., and . Ada-Europe, volume 4498 of Lecture Notes in Computer Science, page 114-127. Springer, (2007)IEC-61508 SIL 3 Compliant Pseudo-Random Number Generators for Probabilistic Timing Analysis., , , , , , and . DSD, page 677-684. IEEE Computer Society, (2015)Tool support for the construction of statically analysable hard real-time Ada systems.. RTSS, page 129-135. IEEE Computer Society, (1996)