From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Requirements Models for Critical Systems.. Software and Systems Safety - Specification and Verification, том 30 из NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2011)Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda., , , , , , , , , и . Requir. Eng., 7 (3): 113-123 (2002)Automated Consistency Checking of Requirements Specifications., , и . ACM Trans. Softw. Eng. Methodol., 5 (3): 231-261 (1996)Military Message Systems: Current Status and Future Directions., и . IEEE Trans. Commun., 28 (9): 1645-1654 (1980)A Model-Based Approach to Testing Software for Critical Behavior and Properties.. ICTSS, том 6435 из Lecture Notes in Computer Science, стр. 15. Springer, (2010)Model Checking Complete Requirements Specifications Using Abstraction., и . Autom. Softw. Eng., 6 (1): 37-68 (1999)Evaluating Two Aspects of Direct Manipulation in Advanced Cockpits., , и . CHI, стр. 127-134. ACM, (1992)An Algorithm for Strengthening State Invariants Generated from Requirements Specifications., и . RE, стр. 182-193. IEEE Computer Society, (2001)A. Software Environment for Custom Simulation and Monitoring of Real-Time Specifications., , , , и . HASE, стр. 78-84. IEEE Computer Society, (1997)SCR: A Practical Approach to Building a High Assurance COMSEC System., , и . ACSAC, стр. 109-118. IEEE Computer Society, (1999)