Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Interpretation of Assurance Case Arguments.. JSAI-isAI Workshops, volume 10091 of Lecture Notes in Computer Science, page 331-347. (2015)Disappearing formal methods.. HASE, page 95-96. IEEE Computer Society, (2000)Defeaters and Eliminative Argumentation in Assurance 2.0., , and . CoRR, (2024)Model-Centered Assurance for Autonomous Systems., , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 228-243. Springer, (2020)The enhanced HDM system for specification and verification., and . ACM SIGSOFT Softw. Eng. Notes, 10 (4): 41-43 (1985)Technology and Consciousness., and . CoRR, (2022)Composing Safe Systems.. FACS, volume 7253 of Lecture Notes in Computer Science, page 3-11. Springer, (2011)Trustworthy Self-Integrating Systems.. ICDCIT, volume 9581 of Lecture Notes in Computer Science, page 19-29. Springer, (2016)Inferring and Conveying Intentionality: Beyond Numerical Rewards to Logical Intentions., and . AAAI Spring Symposium: Towards Conscious AI Systems, volume 2287 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Semantic Analysis of Assurance Cases using s(CASP)., , , , , , , , and . ICLP Workshops, volume 3437 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)