Author of the publication

X-by-Construction Meets Runtime Verification.

, , , and . ISoLA (1), volume 13701 of Lecture Notes in Computer Science, page 141-148. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model Checking Groupware Protocols., , , and . COOP, page 179-194. IOS, (2004)An Experience on Formal Analysis of a High-Level Graphical SOA Design., , and . FM+AM, volume P-179 of LNI, page 79-98. GI, (2010)Sensoria Results Applied to the Case Studies.. Results of the SENSORIA Project, volume 6582 of Lecture Notes in Computer Science, Springer, (2011)Software product line analysis with mCRL2., and . SPLC Workshops, page 78-85. ACM, (2014)Applying the product lines paradigm to the quantitative analysis of collective adaptive systems., , and . SPLC, page 321-326. ACM, (2015)Supervisory Controller Synthesis for Product Lines Using CIF 3., , and . ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 856-873. (2016)The Legacy of Stefania Gnesi - From Software Engineering to Formal Methods and Tools, and Back., , and . From Software Engineering to Formal Methods and Tools, and Back, volume 11865 of Lecture Notes in Computer Science, page 1-11. Springer, (2019)Detecting policy conflicts by model checking UML state machines., , , and . ICFI, page 59-74. IOS Press, (2009)Variability meets security: quantitative security modeling and analysis of highly customizable attack scenarios., , , and . VaMoS, page 11:1-11:9. ACM, (2020)Validating reconfigurations of reo circuits in an e-Banking scenario., , and . ISARCS, page 39-48. ACM, (2013)