Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code Generation from Hybrid Systems Models for Distributed Embedded Systems., , and . ISORC, page 166-173. IEEE Computer Society, (2005)Robust Test Generation and Coverage for Hybrid Systems., , , , and . HSCC, volume 4416 of Lecture Notes in Computer Science, page 329-342. Springer, (2007)Generating Reliable Code from Hybrid-Systems Models., , , , and . IEEE Trans. Computers, 59 (9): 1281-1294 (2010)Quantifying eavesdropping vulnerability in sensor networks., , and . DMSN, volume 96 of ACM International Conference Proceeding Series, page 3-9. ACM, (2005)Sensor Network Security: More Interesting Than You Think., , , , and . HotSec, USENIX Association, (2006)Formal Modeling and Analysis of the AFDX Frame Management Design., , , and . ISORC, page 393-399. IEEE Computer Society, (2006)A dynamic scheduling approach to designing flexible safety-critical systems., , , and . EMSOFT, page 67-74. ACM, (2007)Specification and Analysis of Network Resource Requirements of Control Systems., , , and . HSCC, volume 5469 of Lecture Notes in Computer Science, page 381-395. Springer, (2009)Challenges and opportunities in deeply embedded systems security., and . SIGBED Rev., 5 (1): 25 (2008)Compositional Analysis Framework Using EDP Resource Models., , and . RTSS, page 129-138. IEEE Computer Society, (2007)