Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verisim: Formal Analysis of Network Simulations., , , , , , and . IEEE Trans. Software Eng., 28 (2): 129-145 (2002)Runtime Verification for Wireless Sensor Network Applications., , , and . Runtime Verification, volume 07011 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Detecting security leaks in hybrid systems with information flow analysis., , , , , and . MEMOCODE, page 14:1-14:11. ACM, (2019)Distributed web-based simulation optimization., , , and . WSC, page 1785-1793. WSC, (2000)PAC Confidence Predictions for Deep Neural Network Classifiers., , , and . ICLR, OpenReview.net, (2021)Guaranteed Conformance of Neurosymbolic Models to Natural Constraints., , , and . L4DC, volume 211 of Proceedings of Machine Learning Research, page 76-89. PMLR, (2023)Resilient Parameter-Invariant Control with Application to Vehicle Cruise Control., , , , , and . CPSW@CISS, volume 449 of Lecture Notes in Control and Information Sciences, page 197-216. Springer, (2013)A Semantic Framework for Mode Change Protocols., , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 91-100. IEEE Computer Society, (2011)Realizing Compositional Scheduling through Virtualization., , , , , , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 13-22. IEEE Computer Society, (2012)Evaluation of a smart alarm for intensive care using clinical data., , , , , and . EMBC, page 166-169. IEEE, (2012)