Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code aware resource management., , , , and . Formal Methods in System Design, 42 (2): 146-174 (2013)Towards Robustness for Cyber-Physical Systems., , , and . IEEE Trans. Automat. Contr., 59 (12): 3151-3163 (2014)On the universal and existential fragments of the mu-calculus., , and . Theor. Comput. Sci., 354 (2): 173-186 (2006)Exploiting Symmetries to Speed Up SAT-Based Boolean Matching for Logic Synthesis of FPGAs., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 27 (10): 1751-1760 (2008)Fair watermarking using combinatorial isolation lemmas., , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 23 (11): 1566-1574 (2004)VCG with Communities on Random Ad Hoc Networks., , , and . IJDSN, (2011)Symbolic Control of Stochastic Systems via Approximately Bisimilar Finite Abstractions., , , , and . IEEE Trans. Automat. Contr., 59 (12): 3135-3150 (2014)Quantifying conformance using the Skorokhod metric., , and . Formal Methods in System Design, 50 (2-3): 168-206 (2017)Shrinking Horizon Model Predictive Control with Signal Temporal Logic Constraints under Stochastic Disturbances., , , and . CoRR, (2017)The software model checker Blast., , , and . STTT, 9 (5-6): 505-525 (2007)