Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a Password-based Authentication Method for Wireless Networks., , and . WINSYS, page 9-16. INSTICC Press, (2007)Qualitative and Quantitative Monitoring of Spatio-Temporal Properties with SSTL., , , , and . Logical Methods in Computer Science, (2018)A uniform definition of stochastic process calculi., , , and . ACM Comput. Surv., 46 (1): 5:1-5:35 (2013)Property-Preserving Refinement of Concurrent Systems., and . TGC, volume 6084 of Lecture Notes in Computer Science, page 222-236. Springer, (2010)Tools for Ensemble Design and Runtime., , , , , , , , , and 5 other author(s). The ASCENS Approach, volume 8998 of Lecture Notes in Computer Science, Springer, (2015)Quantitative Analysis of Services., , , , , , and . Results of the SENSORIA Project, volume 6582 of Lecture Notes in Computer Science, Springer, (2011)A uniform framework for modeling nondeterministic, probabilistic, stochastic, or mixed processes and their behavioral equivalences., , and . Inf. Comput., (2013)An infrastructure language for open nets., , and . SAC, page 373-377. ACM, (2002)Structured Nets in KLAIM., , and . SAC (1), page 174-180. ACM, (2000)A Language-Based Approach to Autonomic Computing., , , and . FMCO, volume 7542 of Lecture Notes in Computer Science, page 25-48. Springer, (2011)