Author of the publication

Contract-based design of control protocols for safety-critical cyber-physical systems.

, , , and . DATE, page 1-4. European Design and Automation Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rialto: a bridge between description and implementation of control algorithms for wireless sensor networks., , and . EMSOFT, page 183-186. ACM, (2005)Task generation and compile-time scheduling for mixed data-control embedded software., , , , , , , and . DAC, page 489-494. ACM, (2000)Formal Verification of Embedded Systems based on CFSM Networks., , , , and . DAC, page 568-571. ACM Press, (1996)Automatic Synthesis of Interfaces Between Incompatible Protocols., , and . DAC, page 8-13. ACM Press, (1998)A Novel VLSI Layout Fabric for Deep Sub-Micron Applications., , , , and . DAC, page 491-496. ACM Press, (1999)Reduced Offsets for Two-Level Multi-Valued Logic Minimization., , , and . DAC, page 290-296. IEEE Computer Society Press, (1990)Testability Solutions: Who Really Wants Them? (Panel Abstract).. DAC, page 611. ACM, (1991)Optimum Functional Decomposition Using Encoding., , and . DAC, page 408-414. ACM Press, (1994)Simultaneous Placement and Module Optimization of Analog IC's., , , and . DAC, page 31-35. ACM Press, (1994)A Verification Technique for Gated Clock., , and . DAC, page 123-127. ACM Press, (1993)