Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concurrent Usage Control Implementation Verification Using the SPIN Model Checker., , and . CNSA, volume 89 of Communications in Computer and Information Science, page 214-223. Springer, (2010)Formal Analysis of Hybrid Systems Using Feature Indented Assertions., and . CoRR, (2017)Early Analysis of Critical Faults: An Approach to Test Generation From Formal Specifications., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 31 (3): 447-451 (2012)Assertions for Protecting Mixed-Signal Latency Contracts in Power Management., , , and . IEEE Trans. Very Large Scale Integr. Syst., 28 (8): 1745-1756 (2020)Robust f0 extraction from monophonic signals using adaptive sub-band filtering., , , and . Speech Commun., (2020)CoVerPlan: A Comprehensive Verification Planning Framework Leveraging PSS Specifications., , , and . ACM Trans. Design Autom. Electr. Syst., 28 (1): 9:1-9:32 (January 2023)Algorithms for Generating Ordered Solutions for Explicit AND/OR Structures., , , and . CoRR, (2014)Safe Reinforcement Learning through Phasic Safety-Oriented Policy Optimization., , and . SafeAI@AAAI, volume 3381 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Formal Verification of Security Policy Implementations in Enterprise Networks., , and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 117-131. Springer, (2009)Generating Tiny Deep Neural Networks for ECG Classification on Micro-Controllers., , , , and . PerCom Workshops, page 392-397. IEEE, (2023)