Author of the publication

An MDE-Based Process for the Design, Implementation and Validation of Safety-Critical Systems.

, , , and . ICECCS, page 319-324. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of Replication Architectures in AADL., and . ICECCS, page 365-370. IEEE Computer Society, (2009)Overload provisioning in mixed-criticality cyber-physical systems., , , and . ACM Trans. Embedded Comput. Syst., 11 (4): 83:1-83:24 (2012)Software Rejuvenation for Secure Tracking Control., , , and . CoRR, (2018)Combining Symbolic Runtime Enforcers for Cyber-Physical Systems., , and . RV, volume 10548 of Lecture Notes in Computer Science, page 68-84. Springer, (2017)On Resource Overbooking in an Unmanned Aerial Vehicle., , , , and . ICCPS, page 97-106. IEEE Computer Society, (2012)Deriving the average-case performance of bandwidth-like interfaces for tasksets with infinite minimum inter-arrival time, equal task density, uniformly distributed deadlines, and infinite number of tasks., , , and . SIGBED Review, 14 (3): 16-23 (2017)Integrated Task and Interrupt Management for Real-Time Systems., , and . ACM Trans. Embedded Comput. Syst., 11 (2): 32:1-32:31 (2012)Semantic Importance Sampling for Statistical Model Checking., , , , and . TACAS, volume 9035 of Lecture Notes in Computer Science, page 241-255. Springer, (2015)Behavioral complexity quantification (Becom-Q)., , and . WETSoM@ICSE, page 29-35. ACM, (2016)Resource allocation contracts for open analytic runtime models., , , and . EMSOFT, page 13-22. ACM, (2011)