Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System., , , , and . IEEE Trans. Parallel Distributed Syst., 26 (11): 3108-3121 (2015)Take Me Home: Reversing Distribution Shifts using Reinforcement Learning., , , , , and . CoRR, (2023)High-Confidence Data Programming for Evaluating Suppression of Physiological Alarms., , , , , , and . CHASE, page 70-81. IEEE, (2021)Verisim: Formal analysis of network simulations., , , , , , and . ISSTA, page 2-13. ACM, (2000)iCareLoop: Closed-Loop Sensing and Intervention for Gerontological Social Isolation and Loneliness., , , , , , , , , and 4 other author(s). ICCPS, page 272-273. ACM, (2023)Local Model Checking for Real-Time Systems (Extended Abstract)., and . CAV, volume 939 of Lecture Notes in Computer Science, page 211-224. Springer, (1995)The Concurrency Factory: A Development Environment for Concurrent Systems., , , and . CAV, volume 1102 of Lecture Notes in Computer Science, page 398-401. Springer, (1996)07011 Executive Summary -- Runtime Verification., , , and . Runtime Verification, volume 07011 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Is runtime verification applicable to cheat detection?, , , , , , and . NETGAMES, page 134-138. ACM, (2004)Compositional Analysis of Multi-mode Systems., , and . ECRTS, page 197-206. IEEE Computer Society, (2010)