Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient WCRT analysis of synchronous programs using reachability., , and . DAC, page 480-485. ACM, (2011)Towards direct execution of esterel programs on reactive processors., , and . EMSOFT, page 240-248. ACM, (2004)Security of Pacemakers using Runtime Verification., , , and . MEMOCODE, page 51-61. IEEE, (2018)SystemJ: A GALS language for system level design., , , and . Comput. Lang. Syst. Struct., 36 (4): 317-344 (2010)Synthesizing Globally Asynchronous Locally Synchronous Systems With IEC 61499., , , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1465-1477 (2012)Model Based Verification of Spiking Neural Networks in Cyber Physical Systems., , , and . IEEE Trans. Computers, 72 (9): 2426-2439 (September 2023)A compositional approach for real-time machine learning., , , and . MEMOCODE, page 7:1-7:5. ACM, (2019)Formal modelling of attack scenarios and mitigation strategies in IEEE 1588., , and . MEMOCODE, page 134-141. ACM, (2021)Synthesizing IEC 61499 Function Blocks to hardware., and . ICEIC, page 1-6. IEEE, (2019)Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach., , , , and . ESOP, volume 10801 of Lecture Notes in Computer Science, page 86-113. Springer, (2018)