Search for persons
X
?
Theories of Programming and Formal Methods; Lecture Notes in Computer Science ,
2
Assume-Guarantee Reasoning for Additive Hybrid Behaviour:
, In:
?
2023 IEEE 19th International Conference on Factory Communication Systems (WFCS) ,
3
Cost of Robustness of Independent WCRT Analysis for CBS of ..:
, In:
?
2022 11th Mediterranean Conference on Embedded Computing (MECO) ,
4
Balancing Flexible Production and Consumption of Energy usi..:
, In:
?
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
5
The Hazard Value: A Quantitative Network Connectivity Measu..:
, In:
?
2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) ,
6
An Interview Study of how Developers use Execution Logs in ..:
, In:
?
Proceedings of the 43rd International Conference on Software Engineering: Software Engineering in Practice ,
7
An interview study of how developers use execution logs in ..:
, In:
?
2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR) ,
9
Painting Flowers: Reasons for Using Single-State State Mach..:
, In:
?
Proceedings of the 17th International Conference on Mining Software Repositories ,
10
Painting Flowers : Reasons for Using Single-State State ..:
, In:
?
2020 16th IEEE International Conference on Factory Communication Systems (WFCS) ,
11
Work-in-Progress: Layering Concerns for the Analysis of Cre..:
, In:
?
2019 IEEE International Conference on Software Architecture Companion (ICSA-C) ,
12
A Retargetable Fault Injection Framework for Safety Validat..:
, In:
?
Proceedings of the 24th International Conference on Real-Time Networks and Systems ,
14