Author of the publication

Towards Assurance for Plug & Play Medical Systems.

, , , , , , and . SAFECOMP, volume 9337 of Lecture Notes in Computer Science, page 228-242. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Model Checking for Real-Time Systems (Extended Abstract)., and . CAV, volume 939 of Lecture Notes in Computer Science, page 211-224. Springer, (1995)The Concurrency Factory: A Development Environment for Concurrent Systems., , , and . CAV, volume 1102 of Lecture Notes in Computer Science, page 398-401. Springer, (1996)Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System., , , , and . IEEE Trans. Parallel Distributed Syst., 26 (11): 3108-3121 (2015)Take Me Home: Reversing Distribution Shifts using Reinforcement Learning., , , , , and . CoRR, (2023)07011 Executive Summary -- Runtime Verification., , , and . Runtime Verification, volume 07011 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)iCareLoop: Closed-Loop Sensing and Intervention for Gerontological Social Isolation and Loneliness., , , , , , , , , and 4 other author(s). ICCPS, page 272-273. ACM, (2023)Is runtime verification applicable to cheat detection?, , , , , , and . NETGAMES, page 134-138. ACM, (2004)Compositional Analysis of Multi-mode Systems., , and . ECRTS, page 197-206. IEEE Computer Society, (2010)High-Confidence Data Programming for Evaluating Suppression of Physiological Alarms., , , , , , and . CHASE, page 70-81. IEEE, (2021)Verisim: Formal analysis of network simulations., , , , , , and . ISSTA, page 2-13. ACM, (2000)