Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You keep using that word.. ACM SIGLOG News, 2 (4): 17-25 (2015)Towards Realizability Checking of Contracts Using Theories., , , , and . NFM, volume 9058 of Lecture Notes in Computer Science, page 173-187. Springer, (2015)Cyberassured Systems Engineering at Scale., , , , , , , , , and 2 other author(s). IEEE Secur. Priv., 20 (3): 52-64 (2022)Model-Checking Complex Software - A Memory Perspective., and . RISSEF, volume 2941 of Lecture Notes in Computer Science, page 283-296. Springer, (2002)Composition of Fault Forests., , , , and . SAFECOMP, volume 12852 of Lecture Notes in Computer Science, page 258-275. Springer, (2021)Feature-Based Decomposition of Inductive Proofs Applied to Real-Time Avionics Software: An Experience Report., , , , and . ICSE, page 304-313. IEEE Computer Society, (2004)A Formal Architecture Pattern for Real-Time Distributed Systems., , , , , and . RTSS, page 161-170. IEEE Computer Society, (2009)AADL-Based safety analysis using formal methods applied to aircraft digital systems., , , , , and . Reliab. Eng. Syst. Saf., (2021)Supervisory control of real-time discrete-event systems using lattice theory., and . IEEE Trans. Autom. Control., 41 (2): 199-209 (1996)Formal Verification of Overhead Accounting in an Avionics RTOS., and . RTSS, page 181-190. IEEE Computer Society, (2002)