Search Results - Stolen, Ketil
- Showing 1 – 19 results of 19
-
1A denotational model for mobile point-to-point dataflow networksPublished 1995Call Number: Loading…Table of Contents
Located: Loading…
Book Loading… -
2A formal method for hardware/software co-designPublished 1995Call Number: Loading…
Located: Loading…Book Loading… -
3Refinement principles supporting the transition from asynchronous to synchronous communicationPublished 1995Call Number: Loading…
Located: Loading…Book Loading… -
4A refinement relation supporting the transition from unbounded to bounded communication buffersPublished 1994Call Number: Loading…
Located: Loading…Book Loading… -
5Model-driven risk analysis: the CORAS approachPublished 2011Call Number: Loading…Table of Contents
Located: Loading…
Book Loading… -
6Specification and development of interactive systems: focus on streams, interfaces and refinementPublished 2001Call Number: Loading…Read online (freely available)
Located: Loading…
Table of Contents
Book Loading… -
7Assumption/commitment rules for data-flow networks: with an emphasis on completenessPublished 1995Call Number: Loading…
Located: Loading…Book Loading… -
8A denotational model for mobile many-to-many data-flow networksPublished 1996Call Number: Loading…
Located: Loading…Book Loading… -
9Specification and refinement of finite dataflow networks: a relational approachPublished 1994Call Number: Loading…
Located: Loading…Book Loading… -
10An attempt to embed a restricted version of SDL as a target language in focusPublished 1994Call Number: Loading…
Located: Loading…Book Loading… -
11Assumption commitment rules for networks of asynchronously communicating agentsPublished 1993Call Number: Loading…Table of Contents
Located: Loading…
Book Loading… -
12Development of a distributed min max componentPublished 1993Call Number: Loading…
Located: Loading…Book Loading… -
13Cyber-risk managementPublished 2015Call Number: Loading…Table of Contents
Located: Loading…
Read online (LMU)
Available at the library of LMU.
Read online (HM)
Available at the library of Hochschule Munich University of Applied Sciences (HM).
Order via interlibrary loanElectronic eBook Loading… -
14Model-Driven Risk Analysis: the CORAS ApproachPublished 2011Call Number: Loading…Read online (LMU)
Located: Loading…
Available at the library of LMU.
Read online (HM)
Available at the library of Hochschule Munich University of Applied Sciences (HM).
Order via interlibrary loanElectronic eBook Loading… -
15Technology Research Explained: Design of Software, Architectures, Methods, and Technology in GeneralPublished 2023Call Number: Loading…Read online (LMU)
Located: Loading…
Available at the library of LMU.
Read online (HM)
Available at the library of Hochschule Munich University of Applied Sciences (HM).
Order via interlibrary loanElectronic eBook Loading… -
16Specification and development of interactive systems: focus on streams, interfaces and refinementPublished 2001Call Number: Loading…Order via interlibrary loan
Located: Loading…Book Loading… -
17Cyber-risk managementPublished 2015Call Number: Loading…Order via interlibrary loan
Located: Loading…Book Loading… -
18Specification and Development of Interactive Systems: Focus on Streams, Interfaces, and RefinementPublished 2001Call Number: Loading…Order via interlibrary loan
Located: Loading…Electronic eBook Loading… -
19Graphical models for security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papersPublished 2018Other Authors: “…Stolen, Ketil…”
Call Number: Loading…Read online
Located: Loading…
Electronic Conference Proceedings eBook Loading…