Author of the publication

Merlot: A Tool for Analysis of Real-Time Specifications.

, , and . IWSSD, page 110-119. IEEE Computer Society, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What you see is what you have in mind: constructing mental models for formatted text processing, , , , , and . Informatics in schools : local proceedings of the 6th International Conference ISSEP 2013 : selected papers, 6, page 139--147. Universitätsverlag Potsdam, (February 2013)Combating Memory Corruption Attacks On Scada Devices., and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 141-156. Springer, (2008)Distributed CTL model checking using MapReduce: theory and practice., , , and . Concurr. Comput. Pract. Exp., 28 (11): 3025-3041 (2016)Role Based Access Control Models., , and . Inf. Secur. Tech. Rep., 6 (2): 21-29 (2001)HyperReal: A modular control architecture for HRT systems., , and . J. Syst. Archit., 42 (6-7): 477-487 (1996)TDA: A Time Driven Engine for Predictable Execution of Realtime Systems., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 519-524. Springer, (1998)Behind the Shoulders of Bebras Teams: Analyzing How They Interact with the Platform to Solve Tasks., , , and . CSEDU (Selected Papers), volume 1220 of Communications in Computer and Information Science, page 191-210. Springer, (2019)How Pupils Solve Online Problems: An Analytical View., , , and . CSEDU (2), page 132-139. SciTePress, (2019)Quantitative Assessment of a Peer-to-peer Cooperative Infrastructure Using Stochastic Well-Formed Nets., , and . PASM, volume 128 of Electronic Notes in Theoretical Computer Science, page 59-77. Elsevier, (2004)Reachability Analysis of Time Basic Petri Nets: A Time Coverage Approach., and . SYNASC, page 110-117. IEEE Computer Society, (2011)