From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Model-Based Approach to Testing Software for Critical Behavior and Properties.. ICTSS, том 6435 из Lecture Notes in Computer Science, стр. 15. Springer, (2010)Military Message Systems: Current Status and Future Directions., и . IEEE Trans. Commun., 28 (9): 1645-1654 (1980)Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda., , , , , , , , , и . Requir. Eng., 7 (3): 113-123 (2002)Requirements Models for Critical Systems.. Software and Systems Safety - Specification and Verification, том 30 из NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2011)Model Checking Complete Requirements Specifications Using Abstraction., и . Autom. Softw. Eng., 6 (1): 37-68 (1999)Automated Consistency Checking of Requirements Specifications., , и . ACM Trans. Softw. Eng. Methodol., 5 (3): 231-261 (1996)Evaluating Two Aspects of Direct Manipulation in Advanced Cockpits., , и . CHI, стр. 127-134. ACM, (1992)Panel on design for verification., , и . MEMOCODE, стр. 232-235. IEEE Computer Society, (2005)SCR: A Practical Approach to Building a High Assurance COMSEC System., , и . ACSAC, стр. 109-118. IEEE Computer Society, (1999)High assurance human-centric decision systems., , , , , и . RAISE@ICSE, стр. 35-41. IEEE Computer Society, (2013)