Author of the publication

Analyzing tabular requirements specifications using infinite state model checking.

, and . MEMOCODE, page 7-16. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Consistency Checking of Requirements Specifications., , and . ACM Trans. Softw. Eng. Methodol., 5 (3): 231-261 (1996)A Model-Based Approach to Testing Software for Critical Behavior and Properties.. ICTSS, volume 6435 of Lecture Notes in Computer Science, page 15. Springer, (2010)Military Message Systems: Current Status and Future Directions., and . IEEE Trans. Commun., 28 (9): 1645-1654 (1980)Model Checking Complete Requirements Specifications Using Abstraction., and . Autom. Softw. Eng., 6 (1): 37-68 (1999)Requirements Models for Critical Systems.. Software and Systems Safety - Specification and Verification, volume 30 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2011)Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda., , , , , , , , , and . Requir. Eng., 7 (3): 113-123 (2002)Evaluating Two Aspects of Direct Manipulation in Advanced Cockpits., , and . CHI, page 127-134. ACM, (1992)High assurance human-centric decision systems., , , , , and . RAISE@ICSE, page 35-41. IEEE Computer Society, (2013)An Algorithm for Strengthening State Invariants Generated from Requirements Specifications., and . RE, page 182-193. IEEE Computer Society, (2001)A. Software Environment for Custom Simulation and Monitoring of Real-Time Specifications., , , , and . HASE, page 78-84. IEEE Computer Society, (1997)