Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk areas in embedded software industry projects.. WESE, page 5. ACM, (2010)Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways., and . MMB/DFT, volume 5987 of Lecture Notes in Computer Science, page 1. Springer, (2010)Representing Embedded System Sequence Diagrams as a Formal Language., and . UML, volume 2185 of Lecture Notes in Computer Science, page 302-316. Springer, (2001)Enabling automatic adaptation in systems with under-specified elements., , and . WOSS, page 55-60. ACM, (2002)Using CAD Tools for Embedded System Design: Obstacles Encountered in an Automotive Case Study.. Integr. Comput. Aided Eng., 5 (1): 85-94 (1998)Large-Block Modular Addition Checksum Algorithms.. CoRR, (2023)How Many Operational Design Domains, Objects, and Events?, and . SafeAI@AAAI, volume 2301 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems., and . PRDC, page 184-191. IEEE Computer Society, (2008)Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems., , , , , and . DSN, page 346-355. IEEE Computer Society, (2005)Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms., and . DSN, page 486-495. IEEE Computer Society, (2005)