Author of the publication

Reuse of Specification Patterns with the B Method.

, , and . ZB, volume 2651 of Lecture Notes in Computer Science, page 40-57. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Requirements Modeling and Verification for Critical Systems.. ICEIS (1), page 19. SCITEPRESS, (2020)Design of an Automatic Prover Dedicated to the Refinement of Database Applications., and . FME, volume 2805 of Lecture Notes in Computer Science, page 834-854. Springer, (2003)Model-driven Engineering of Functional Security Policies., , , , , , and . ICEIS (3), page 374-379. SciTePress, (2010)A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress., , , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 218-226. Springer, (2011)Modeling and Verification of Solidity Smart Contracts with the B Method., , , and . ICECCS, volume 14784 of Lecture Notes in Computer Science, page 159-178. Springer, (2024)Reuse of Specification Patterns with the B Method., , and . ZB, volume 2651 of Lecture Notes in Computer Science, page 40-57. Springer, (2003)A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction., and . APSEC (1), page 438-445. IEEE Computer Society, (2014)Assessment of a Formal Requirements Modeling Approach on a Transportation System., , , , , and . ICFEM, volume 11852 of Lecture Notes in Computer Science, page 470-486. Springer, (2019)Using Variants in KAOS Goal Modelling., , , and . ICEIS (3-2), page 339-344. (2008)978-989-8111-38-8.Supporting Variability in Goal-based Requirements., , and . RCIS, page 237-246. IEEE, (2009)