Author of the publication

Assumption Monitoring Using Runtime Verification for UAV Temporal Task Plan Executions.

, , , , and . ICRA, page 6824-6830. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Labelling and the Story of Princess Privacy and the Seven Helpers., , , , , , , , and . CoRR, (2020)Refining Privacy-Aware Data Flow Diagrams., , and . SEFM, volume 13085 of Lecture Notes in Computer Science, page 121-140. Springer, (2021)Timed Dyadic Deontic Logic., , and . JURIX, volume 346 of Frontiers in Artificial Intelligence and Applications, page 197-204. IOS Press, (2021)Incorporating Monitors in Reactive Synthesis Without Paying the Price., , and . ATVA, volume 12971 of Lecture Notes in Computer Science, page 337-353. Springer, (2021)Gray-Box Monitoring of Hyperproperties., , , and . FM, volume 11800 of Lecture Notes in Computer Science, page 406-424. Springer, (2019)Privacy Compliance Via Model Transformations., , and . EuroS&P Workshops, page 120-126. IEEE, (2018)Synchronous Agents, Verification, and Blame - A Deontic View., , , and . ICTAC, volume 14446 of Lecture Notes in Computer Science, page 332-350. Springer, (2023)Runtime Verification: Passing on the Baton., , and . Formal Methods in Outer Space, volume 13065 of Lecture Notes in Computer Science, page 89-107. Springer, (2021)On the Specification and Monitoring of Timed Normative Systems., , , and . RV, volume 12974 of Lecture Notes in Computer Science, page 81-99. Springer, (2021)Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures., , and . NordSec, volume 12556 of Lecture Notes in Computer Science, page 74-91. Springer, (2020)