Author of the publication

Exploiting Behavioral Hierarchy for Efficient Model Checking.

, , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 338-342. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictable programs in barcodes., , , and . CASES, page 298-303. ACM, (2002)A model-based approach to integrating security policies for embedded devices., , and . EMSOFT, page 211-219. ACM, (2004)Multi-Gait Locomotion Planning and Tracking for Tendon-Actuated Terrestrial Soft Robot (TerreSoRo)., , , , , and . IROS, page 2542-2549. (2023)Exploiting Behavioral Hierarchy for Efficient Model Checking., , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 338-342. Springer, (2002)Monitoring Assumptions in Assume-Guarantee Contracts., , , and . PrePost@IFM, volume 208 of EPTCS, page 46-53. (2016)Macroeconomics, and . International student edition McGraw-Hill, Auckland u.a., 6. ed edition, (1980)Lehrbuch der makroökonomischen Theorie, and . Fischer, Stuttgart, (1972)Low complexity channel models for approximating flat Rayleigh fading in network simulations.. Texas A&M University, College Station, USA, (2004)base-search.net (fttexasamuniv:oai:oaktrust.library.tamu.edu:1969.1/294).Sensitivity of wireless network simulations to a two-state Markov model channel approximation., and . GLOBECOM, page 697-701. IEEE, (2003)Lehrbuch der makroökonomischen Theorie, and . Fischer, Stuttgart, 2., durchges. und verb. dt. Aufl. edition, (1974)