Author of the publication

A Predictive Runtime Verification Framework for Cyber-Physical Systems.

, , and . SERE (Companion), page 223-227. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Modified Secant Method for Computing the Fair Share Rate., and . J. Comput. Inf. Technol., 13 (3): 247-254 (2005)Factors correlated with the perceived usefulness of online reviews for consumers: a meta-analysis of the moderating effects of product type., , and . Aslib J. Inf. Manag., 74 (2): 265-288 (2022)Privacy-Preserving and Cross-Domain Human Sensing by Federated Domain Adaptation with Semantic Knowledge Correction., , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 8 (1): 6:1-6:26 (March 2024)Edge-Centric Programming for IoT Applications With Automatic Code Partitioning., and . IEEE Trans. Computers, 71 (10): 2408-2422 (2022)A decision optimization method for emergency maintenance of regional rail transit based on genetic algorithm., , , , and . ICCMS, page 185-194. ACM, (2021)Joint Multi-view Texture Super-resolution and Intrinsic Decomposition., , , and . BMVC, page 15. BMVA Press, (2019)Extension-Compression Learning: A deep learning code search method that simulates reading habits., , , , , and . ICECCS, page 195-200. IEEE, (2022)A Contract-based Approach to Specifying and Verifying Safety Critical Systems., , and . FESCA@ETAPS, volume 176 of Electronic Notes in Theoretical Computer Science, page 89-103. Elsevier, (2006)Analysis on Technique for Code Obfuscation., , , , and . CNCIT, page 241-245. ACM, (2023)Minimizing Update Bits of NVM-Based Main Memory Using Bit Flipping and Cyclic Shifting., , , , , , and . HPCC/CSS/ICESS, page 290-295. IEEE, (2015)