Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Borde, Etienne
add a person with the name Borde, Etienne
 

Other publications of authors with the same name

Automatic Composition of AADL Models for the Verification of Critical Component-Based Embedded Systems., , , and . ICECCS, page 269-274. IEEE Computer Society, (2008)Improving Reusability of Model Transformations by Automating their Composition., , , , and . EUROMICRO-SEAA, page 267-274. IEEE Computer Society, (2015)Directed Acyclic Graph Scheduling for Mixed-Criticality Systems., , and . Ada-Europe, volume 10300 of Lecture Notes in Computer Science, page 217-232. Springer, (2017)Towards verified synthesis of ProCom, a component model for real-time embedded systems., and . CBSE, page 129-138. ACM, (2011)Run or Hide? Both! A Method Based on IPv6 Address Switching to Escape While Being Hidden., , and . MTD@CCS, page 47-56. ACM, (2019)Flexible Semantic-Preserving Flattening of Hierarchical Component Models., , , and . EUROMICRO-SEAA, page 31-38. IEEE Computer Society, (2011)Design Patterns for Rule-Based Refinement of Safety Critical Embedded Systems Models., , , and . ICECCS, page 67-76. IEEE Computer Society, (2012)Configuration et Reconfiguration des Systèmes Temps-Reél Répartis Embarqués Critiques et Adaptatifs. (Configuration and Reconfiguration of Critical and Distributed Real-Time Embedded Systems).. Télécom ParisTech, France, (2009)Towards a model driven refinement process through architecture evaluation., , and . NFPinDSML@MoDELS, page 4:1-4:6. ACM, (2012)Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach., , , and . PRDC, page 27-36. IEEE, (2021)