Author of the publication

Managing Verification Activities Using SVM.

, , , , , , and . ICFEM, volume 3308 of Lecture Notes in Computer Science, page 61-75. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Double-Spending Analysis of Bitcoin., , and . PACIS, page 210. (2020)A sports day for programming.. CSERC, page 11:1-11:6. ACM, (2020)Tinkering in Informatics as Teaching Method., , and . CSEDU (1), page 450-457. SCITEPRESS, (2020)Managing Verification Activities Using SVM., , , , , , and . ICFEM, volume 3308 of Lecture Notes in Computer Science, page 61-75. Springer, (2004)Temporal Logic Model Checking, , , and . Handbook of Networked and Embedded Control Systems, Birkhäuser Boston, (2005)Automated Program Analysis for Novice Programmers., and . CoRR, (2017)An Even Better Approach - Improving the B.A.T.M.A.N. Protocol Through Formal Modelling and Analysis., , and . NFM, volume 10811 of Lecture Notes in Computer Science, page 164-178. Springer, (2018)Out for coffee: with Rob.. Acta Informatica, 57 (3-5): 323-327 (2020)Be Lazy and Don't Care: Faster CTL Model Checking for Recursive State Machines., , and . SEFM, volume 13085 of Lecture Notes in Computer Science, page 332-350. Springer, (2021)Efficient Guiding Towards Cost-Optimality in UPPAAL., , , , , and . TACAS, volume 2031 of Lecture Notes in Computer Science, page 174-188. Springer, (2001)