Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Bounded Model Checking of Timed Automata., , , and . FormaliSE@ICSE, page 97-110. IEEE, (2021)SAFER-HRC: Safety Analysis Through Formal vERification in Human-Robot Collaboration., , , and . SAFECOMP, volume 9922 of Lecture Notes in Computer Science, page 283-295. Springer, (2016)A Multi-Agent Architecture for Health Information Systems., , , , , and . KES-AMSTA, volume 252 of Frontiers in Artificial Intelligence and Applications, page 375-384. IOS Press, (2013)Temporal Pattern Recognition in Large Scale Graphs., , and . DEBS, page 250-251. ACM, (2019)A tool for verification of big-data applications., , , and . QUDOS@ISSTA, page 44-45. ACM, (2016)On How Bit-Vector Logic Can Help Verify LTL-Based Specifications., , and . IEEE Trans. Software Eng., 48 (4): 1154-1168 (2022)A temporal logic for micro- and macro-step-based real-time systems: Foundations and applications., , , and . Theor. Comput. Sci., (2016)Context Awareness in the Travel Companion of the Shift2Rail Initiative., , , and . SEBD, volume 2646 of CEUR Workshop Proceedings, page 202-209. CEUR-WS.org, (2020)Towards the UML-Based Formal Verification of Timed Systems., , , and . FMCO, volume 6957 of Lecture Notes in Computer Science, page 267-286. Springer, (2010)Monte Carlo Tree Search for Automatic Differential Characteristics Search: Application to SPECK., , , and . INDOCRYPT, volume 13774 of Lecture Notes in Computer Science, page 373-397. Springer, (2022)