Author of the publication

Assigning Safe Executed Systems to Meanings.

, , and . RSSRail, volume 13294 of Lecture Notes in Computer Science, page 130-142. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An overview of JML tools and applications., , , , , , , and . Int. J. Softw. Tools Technol. Transf., 7 (3): 212-232 (2005)Assigning Safe Executed Systems to Meanings., , and . RSSRail, volume 13294 of Lecture Notes in Computer Science, page 130-142. Springer, (2022)The B-Method for the Construction of Microkernel-Based Systems., , , and . B, volume 4355 of Lecture Notes in Computer Science, page 257-259. Springer, (2007)Formal Development of an Embedded Verifier for Java Card Byte Code., , and . DSN, page 51-58. IEEE Computer Society, (2002)Extending B with Control Flow Breaks., and . ZB, volume 2651 of Lecture Notes in Computer Science, page 513-527. Springer, (2003)Développement formel d'un vérifieur embarqué de byte-code Java., , and . Technique et Science Informatiques, 22 (1): 33-60 (2003)JACK - A Tool for Validation of Security and Behaviour of Java Applications., , , , , , , and . FMCO, volume 4709 of Lecture Notes in Computer Science, page 152-174. Springer, (2006)Existence Proof Obligations for Constraints, Properties and Invariants in Atelier B., , and . ABZ, volume 12071 of Lecture Notes in Computer Science, page 255-259. Springer, (2020)Java Applet Correctness: A Developer-Oriented Approach., , and . FME, volume 2805 of Lecture Notes in Computer Science, page 422-439. Springer, (2003)Formal Proofs for the NYCT Line 7 (Flushing) Modernization Project., , , and . ABZ, volume 7316 of Lecture Notes in Computer Science, page 369-372. Springer, (2012)