From post

A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production.

, и . SAFECOMP, том 7612 из Lecture Notes in Computer Science, стр. 13-24. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Geographic Visualization of Risk as Decision Support in Emergency Situations., и . HSI, стр. 81-88. IEEE, (2012)Shared-state design modulo weak and strong process fairness.. FORTE, том C-10 из IFIP Transactions, стр. 479-498. North-Holland, (1992)A case-based assessment of the FLUIDE framework for specifying emergency response user interfaces., и . EICS, стр. 97-107. ACM, (2016)Uncertainty, Subjectivity, Trust and Risk: How It All Fits together., и . STM, том 7170 из Lecture Notes in Computer Science, стр. 1-5. Springer, (2011)The coras approach for model-based risk management applied to e-commerce domain., , , и . Communications and Multimedia Security, том 228 из IFIP Conference Proceedings, стр. 169-181. Kluwer, (2002)A Method for the Development of Totally Correct Shared-State Parallel Programs.. CONCUR, том 527 из Lecture Notes in Computer Science, стр. 510-525. Springer, (1991)A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production., и . SAFECOMP, том 7612 из Lecture Notes in Computer Science, стр. 13-24. Springer, (2012)A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers.. MPC, том 947 из Lecture Notes in Computer Science, стр. 423-451. Springer, (1995)An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS, , и . CoRR, (2013)Privacy-Aware IoT: State-of-the-Art and Challenges., , и . ICISSP, стр. 450-461. SciTePress, (2023)