Author of the publication

Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach.

, , and . Journal of Systems and Software, 79 (7): 962-968 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach., , and . Journal of Systems and Software, 79 (7): 962-968 (2006)Deriving Test Cases from B Machines Using Class Vectors., and . MSVVEIS, page 71-76. INSTICC Press, (2005)A Synergistic Interweaving of Formal and Informal Methods., and . COMPSAC, page 257-262. IEEE Computer Society, (2003)Design and Verification of Distributed Recovery Blocks with CSP., and . Formal Methods in System Design, 22 (3): 225-248 (2003)System development with communicating sequential processes : formalisation and related studies.. Staffordshire University, UK, (1991)British Library, EThOS.Efficiency of task allocation based on contract net protocol with audience restriction in a manufacturing control application.. Int. J. Computer Integrated Manufacturing, 31 (10): 1005-1017 (2018)Verifying Choreographic Descriptions of Web Services Based on CSP., , and . SCW, page 97-104. IEEE Computer Society, (2006)An Interface Theory Based Approach to Verification of Web Services., , , , and . COMPSAC (2), page 139-144. IEEE Computer Society, (2006)0-7695-2655-1.Formalizing exception handling in WS-CDL and WS-BPEL for conformance verification.. SOCA, page 1-8. IEEE Computer Society, (2009)Mapping WS-CDL and BPEL into CSP for Behavioural Specification and Verification of Web Services.. ECOWS, page 297-305. IEEE Computer Society, (2006)