Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Rejuvenation for Secure Tracking Control., , , and . CoRR, (2018)Overload provisioning in mixed-criticality cyber-physical systems., , , and . ACM Trans. Embed. Comput. Syst., 11 (4): 83:1-83:24 (2012)Verification of Replication Architectures in AADL., and . ICECCS, page 365-370. IEEE Computer Society, (2009)Formal Verification of a Timing Enforcer Implementation., and . ACM Trans. Embed. Comput. Syst., 16 (5s): 168:1-168:19 (2017)Many suspensions, many problems: a review of self-suspending tasks in real-time systems., , , , , , , , , and 3 other author(s). Real Time Syst., 55 (1): 144-207 (2019)Utility-Based Resource Overbooking for Cyber-Physical Systems., , , and . ACM Trans. Embed. Comput. Syst., 13 (5s): 162:1-162:25 (2014)Mixed-Trust Computing for Real-Time Systems., , , , , , and . RTCSA, page 1-11. IEEE, (2019)Real-Time Scheduling of Interrupt Requests over Conventional PC Hardware., , and . ENC, page 27-36. IEEE Computer Society, (2006)Abnormal Events Handling for Dependable Embedded Systems., , and . ENC, page 81-91. IEEE Computer Society, (2006)An MDE-Based Process for the Design, Implementation and Validation of Safety-Critical Systems., , , and . ICECCS, page 319-324. IEEE Computer Society, (2010)