Author of the publication

Report on the Workshop on Formal Foundations of Embedded Software and Component-based Software Architectures (FESCA)

, , , and . Newsletter of the European Association of Software Science and Technology (EASST), (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online strategies for dynamic power management in systems with multiple power-saving states, , and . Trans. on Embedded Computing Sys., 2 (3): 325--346 (2003)Report on the Workshop on Formal Foundations of Embedded Software and Component-based Software Architectures (FESCA), , , and . Newsletter of the European Association of Software Science and Technology (EASST), (2004)I/O Automata Based Verification of Finite State Distributed Systems: Complexity Issues (Abstract)., , , , and . PODC, page 122. ACM, (1996)Structured Component Composition Frameworks for Embedded System Design., , and . HiPC, volume 2552 of Lecture Notes in Computer Science, page 663-678. Springer, (2002)Formal Verification of Hierarchically Distributed Agent Based Protection Scheme in Smart Grid., and . SPIN, volume 7385 of Lecture Notes in Computer Science, page 137-154. Springer, (2012)Guest Editors' Introduction: Special Section on Science of Design for Safety Critical Systems., and . IEEE Trans. Computers, 60 (8): 1057-1058 (2011)Coprocessor design space exploration using high level synthesis., , and . ISQED, page 879-884. IEEE, (2010)Observations on Self-Stabilizing Graph Algorithms for Anonymous Networks, , and . Proceedings of the 2nd Workshop on Self-Stabilizing Systems (WSS-95), page 7.1--7.15. Las Vegas, NE, (1995)Storage efficient blockchain models for constrained applications., , , and . Clust. Comput., 26 (4): 2163-2181 (August 2023)ArkThor: Threat Categorization Based on Malware's C2 Communication., , , , and . ICISSP, page 203-210. SCITEPRESS, (2024)