Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to Special Issue on Software for Critical Systems., and . IEEE Trans. Software Eng., 19 (1): 1-2 (1993)The Need for New Paradigms in Safety Engineering.. SSS, page 3-20. Springer, (2009)New Year's Resolutions for Software Quality., , , , , , , , , and . IEEE Softw., 21 (1): 12-13 (2004)Analyzing Safety and Fault Tolerance Using Time Petri Nets., and . TAPSOFT, Vol.2, volume 186 of Lecture Notes in Computer Science, page 339-355. Springer, (1985)Experiences in Designing and Using Formal Specification Languages for Embedded Control Software.. HSCC, volume 1790 of Lecture Notes in Computer Science, page 3. Springer, (2000)On the Use of Visualization in Formal Requirements Specification., , , and . RE, page 71-80. IEEE Computer Society, (2002)Integrated Safety Analysis of Requirements Specifications., , , , and . RE, page 148-159. IEEE Computer Society, (1997)Intent Specifications: An Approach to Building Human-Centered Specifications.. ICRE, page 204-213. IEEE Computer Society, (1998)Investigating Safety and Cybersecurity Design Tradespace for Manned-Unmanned Aerial Systems Integration Using Systems Theoretic Process Analysis., and . GI-Jahrestagung, volume P-232 of LNI, page 643-647. GI, (2014)Safety Verification of Ada Programs Using Software Fault Trees., , and . IEEE Softw., 8 (4): 48-59 (1991)