Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk areas in embedded software industry projects.. WESE, page 5. ACM, (2010)Representing Embedded System Sequence Diagrams as a Formal Language., and . UML, volume 2185 of Lecture Notes in Computer Science, page 302-316. Springer, (2001)Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways., and . MMB/DFT, volume 5987 of Lecture Notes in Computer Science, page 1. Springer, (2010)Enabling automatic adaptation in systems with under-specified elements., , and . WOSS, page 55-60. ACM, (2002)Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems., and . PRDC, page 184-191. IEEE Computer Society, (2008)Data management mechanisms for embedded system gateways., and . DSN, page 175-184. IEEE Computer Society, (2009)Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems., , , , , and . DSN, page 346-355. IEEE Computer Society, (2005)Quantifying the Reliability of Proven SPIDER Group Membership Service Guarantees., , and . DSN, page 275-284. IEEE Computer Society, (2004)Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms., and . DSN, page 486-495. IEEE Computer Society, (2005)Comparing the Robustness of POSIX Operating Systems., and . FTCS, page 30-37. IEEE Computer Society, (1999)