Author of the publication

A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production.

, and . SAFECOMP, volume 7612 of Lecture Notes in Computer Science, page 13-24. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Geographic Visualization of Risk as Decision Support in Emergency Situations., and . HSI, page 81-88. IEEE, (2012)An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS, , and . CoRR, (2013)Shared-state design modulo weak and strong process fairness.. FORTE, volume C-10 of IFIP Transactions, page 479-498. North-Holland, (1992)A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers.. MPC, volume 947 of Lecture Notes in Computer Science, page 423-451. Springer, (1995)The coras approach for model-based risk management applied to e-commerce domain., , , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 169-181. Kluwer, (2002)A Method for the Development of Totally Correct Shared-State Parallel Programs.. CONCUR, volume 527 of Lecture Notes in Computer Science, page 510-525. Springer, (1991)A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production., and . SAFECOMP, volume 7612 of Lecture Notes in Computer Science, page 13-24. Springer, (2012)Privacy-Aware IoT: State-of-the-Art and Challenges., , and . ICISSP, page 450-461. SciTePress, (2023)A case-based assessment of the FLUIDE framework for specifying emergency response user interfaces., and . EICS, page 97-107. ACM, (2016)Uncertainty, Subjectivity, Trust and Risk: How It All Fits together., and . STM, volume 7170 of Lecture Notes in Computer Science, page 1-5. Springer, (2011)