Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disappearing formal methods.. HASE, page 95-96. IEEE Computer Society, (2000)A Mechanically Assisted Examination of Begging the Question in Anselm's Ontological Argument.. FLAP, 5 (7): 1473-1496 (2018)On the Interpretation of Assurance Case Arguments.. JSAI-isAI Workshops, volume 10091 of Lecture Notes in Computer Science, page 331-347. (2015)The enhanced HDM system for specification and verification., and . ACM SIGSOFT Softw. Eng. Notes, 10 (4): 41-43 (1985)Composing Safe Systems.. FACS, volume 7253 of Lecture Notes in Computer Science, page 3-11. Springer, (2011)Evaluating the Assessment of Software Fault-Freeness., , and . CoRR, (2014)Trustworthy Self-Integrating Systems.. ICDCIT, volume 9581 of Lecture Notes in Computer Science, page 19-29. Springer, (2016)Inferring and Conveying Intentionality: Beyond Numerical Rewards to Logical Intentions., and . AAAI Spring Symposium: Towards Conscious AI Systems, volume 2287 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Assurance and Assurance Cases.. Dependable Software Systems Engineering, volume 50 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2017)Using model checking to help discover mode confusions and other automation surprises.. Rel. Eng. & Sys. Safety, 75 (2): 167-177 (2002)