Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitive state-space exploration., , , and . CDC, page 4049-4054. IEEE, (2008)Control software model checking using bisimulation functions for nonlinear systems., , , , , and . CDC, page 4024-4029. IEEE, (2008)Learning and Visualizing Music Specifications Using Pattern Graphs., , , , , and . ISMIR, page 192-198. (2016)Guided search for hybrid systems based on coarse-grained space abstractions., , , , , , , and . STTT, 18 (4): 449-467 (2016)On Temporal Logic and Signal Processing., , , , , and . ATVA, volume 7561 of Lecture Notes in Computer Science, page 92-106. Springer, (2012)Producing a Set of Models for the Iron Homeostasis Network., , , and . HSB, volume 125 of EPTCS, page 92-98. (2013)Control Improvisation with Probabilistic Temporal Specifications., , , , , and . IoTDI, page 187-198. IEEE Computer Society, (2016)BreachFlows: Simulation-Based Design with Formal Requirements for Industrial CPS (Extended Abstract).. ASD@DATE, volume 79 of OASIcs, page 5:1-5:5. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Statistical Model Checking of Mixed-Analog Circuits with an Application to a Third Order Delta-Sigma Modulator., , and . Haifa Verification Conference, volume 5394 of Lecture Notes in Computer Science, page 149-163. Springer, (2008)Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications., , , , , , and . Lectures on Runtime Verification, volume 10457 of Lecture Notes in Computer Science, Springer, (2018)