Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dipl.-Ing. Karl Kübler

Approach for manufacturer independent automated machine tool control software test, , , , and . Progress in production engineering; selected, peer reviewed papers from the 2015 WGP Congress, September 7 - 8, 2015, Hamburg, Germany, 794, page 347-354. Pfaffikon, Trans Tech Publ., (2015)
 

Other publications of authors with the same name

Frequency-domain magnetic resonance spectroscopy of molecular magnetic materials, , , , , , , , , and 1 other author(s). Phys. Chem. Chem. Phys., 5 (18): 3837-3843 (2003)LEED, STM, and TDS Studies of Ordered Thin Films of the Rhombus-Shaped Polycondensed Aromatic Hydrocarbon C54H22, on MoS2, GeS, and Graphite, , , , , , , and . Langmuir, 21 (2): 656-665 (2005)A risk informed defense-in-depth framework for existing and advanced reactors., and . Rel. Eng. & Sys. Safety, 78 (3): 205-225 (2002)Reasoning about Programs., and . Artif. Intell., 5 (3): 235-316 (1974)Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques., , and . Softw. Test., Verif. Reliab., 7 (4): 201-227 (1997)Arguing About Firewall Policy., , , and . COMMA, volume 245 of Frontiers in Artificial Intelligence and Applications, page 91-102. IOS Press, (2012)Argument Schemes for Reasoning about Trust., , , , , , , and . COMMA, volume 245 of Frontiers in Artificial Intelligence and Applications, page 430-441. IOS Press, (2012)Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach., , and . IEEE Symposium on Security and Privacy, page 175-187. IEEE Computer Society, (1997)Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit., , , and . TPHOLs, volume A-20 of IFIP Transactions, page 427-447. North-Holland/Elsevier, (1992)Some Problems in Sanitizing Network Data., , , , and . WETICE, page 307-312. IEEE Computer Society, (2006)