Colin J. Fidge
Person information
- affiliation: Queensland University of Technology, Brisbane, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [c83]Mahesh Fernando, Colin J. Fidge, Tony Sahama:
An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records. ACSW 2019: 23:1-23:10 - [c82]Chathurika Wickramage, Colin J. Fidge, Chun Ouyang, Tony Sahama:
Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling. ACSW 2019: 35:1-35:10 - [c81]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Business Object Centric Microservices Patterns. OTM Conferences 2019: 476-495 - [c80]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Availability and Scalability Optimized Microservice Discovery from Enterprise Systems. OTM Conferences 2019: 496-514 - 2018
- [j48]Andrei Furda
, Colin J. Fidge
, Alistair Barros
:
A practical approach for detecting multi-tenancy data interference. Sci. Comput. Program. 163: 160-173 (2018) - [j47]Andrei Furda
, Colin J. Fidge
, Olaf Zimmermann, Wayne Kelly, Alistair Barros
:
Migrating Enterprise Legacy Source Code to Microservices: On Multitenancy, Statefulness, and Data Consistency. IEEE Software 35(3): 63-72 (2018) - [c79]Mahesh Fernando, Colin J. Fidge
, Tony Sahama, K. Priyantha Hewagamage:
Employees' perceptions of sharing employer-sponsored personal health records. ACSW 2018: 35:1-35:10 - [c78]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros
, Artem Polyvyanyy
, Colin J. Fidge
:
Function-Splitting Heuristics for Discovery of Microservices in Enterprise Systems. ICSOC 2018: 37-53 - [c77]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros
, Colin J. Fidge
, Artem Polyvyanyy
:
Discovering Microservices in Enterprise Systems Using a Business Object Containment Heuristic. OTM Conferences (2) 2018: 60-79 - 2017
- [j46]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
:
Scalable and efficient data distribution for distributed computing of all-to-all comparison problems. Future Generation Comp. Syst. 67: 152-162 (2017) - [j45]Anastasiia Pika, Michael Leyer, Moe Thandar Wynn
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Wil M. P. van der Aalst
:
Mining Resource Profiles from Event Logs. ACM Trans. Management Inf. Syst. 8(1): 1:1-1:30 (2017) - [c76]Daniel Hunter, Jack Parry, Kenneth Radke, Colin J. Fidge
:
Authenticated encryption for time-sensitive critical infrastructure. ACSW 2017: 19:1-19:10 - [c75]Chathurika Wickramage, Colin J. Fidge
, Tony Sahama, Roy Wong:
Challenges for Log Based Detection of Privacy Violations during Healthcare Emergencies. GLOBECOM 2017: 1-6 - [c74]Pramitha Perera, Yu-Chu Tian
, Colin J. Fidge
, Wayne Kelly:
A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic. ICONIP (1) 2017: 445-454 - 2016
- [j44]Subrata Chakraborty
, Kerrie L. Mengersen, Colin J. Fidge
, Lin Ma, David Lassen:
A Bayesian Network-based customer satisfaction model: a tool for management decisions in railway transport. Decision Analytics 3: 4 (2016) - [j43]Anastasiia Pika, Wil M. P. van der Aalst
, Moe Thandar Wynn
, Colin J. Fidge
, Arthur H. M. ter Hofstede
:
Evaluating and predicting overall process risk using event logs. Inf. Sci. 352-353: 98-120 (2016) - [j42]Yi-Fan Zhang
, Yu-Chu Tian
, Colin J. Fidge
, Wayne Kelly:
Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems. J. Parallel Distrib. Comput. 93-94: 87-101 (2016) - [c73]Donna Teague, Colin J. Fidge
, Yue Xu
:
Combining unsupervised and invigilated assessment of introductory programming. ACSW 2016: 9 - [c72]Jack Parry, Daniel Hunter, Kenneth Radke, Colin J. Fidge
:
A network forensics tool for precise data packet capture and replay in cyber-physical systems. ACSW 2016: 22 - [c71]Chathurika Wickramage, Tony R. Sahama, Colin J. Fidge
:
Anatomy of log files: Implications for information accountability measures. HealthCom 2016: 1-6 - [c70]Mahesh Fernando, Tony Sahama, Colin J. Fidge
, K. Priyantha Hewagamage:
Personal health records as sources of productivity evidence. ICC 2016: 1-6 - 2015
- [j41]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge
:
LibVM: an architecture for shared library sandboxing. Softw., Pract. Exper. 45(12): 1597-1617 (2015) - [c69]Ayodeji J. Akande, Colin J. Fidge, Ernest Foo:
Component Modeling for SCADA Network Mapping. ACSC 2015: 91-100 - [c68]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
, Jing Gao:
Application of Simulated Annealing to Data Distribution for All-to-All Comparison Problems in Homogeneous Systems. ICONIP (3) 2015: 683-691 - [c67]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
:
Distributed computing of all-to-all comparison problems in heterogeneous systems. IECON 2015: 2053-2058 - [c66]Samuel A. Brian, Richard N. Thomas, James M. Hogan, Colin J. Fidge
:
Planting Bugs: A System for Testing Students' Unit Tests. ITiCSE 2015: 45-50 - 2014
- [j40]Suriadi Suriadi, Burkhard Weiß, Axel Winkelmann, Arthur H. M. ter Hofstede, Michael Adams, Raffaele Conforti, Colin J. Fidge, Marcello La Rosa, Chun Ouyang, Anastasiia Pika, Michael Rosemann, Moe Thandar Wynn:
Current Research in Risk-aware Business Process Management―Overview, Comparison, and Gap Analysis. CAIS 34: 52 (2014) - [j39]Guosong Tian, Yu-Chu Tian
, Colin J. Fidge
:
Precise relative clock synchronization for distributed control using TSC registers. J. Network and Computer Applications 44: 63-71 (2014) - [j38]Madhushika M. E. Karunarathna, Yu-Chu Tian
, Colin J. Fidge
:
Domain-specific application analysis for customized instruction identification. Microprocessors and Microsystems - Embedded Hardware Design 38(7): 637-648 (2014) - [c65]Anastasiia Pika, Moe Thandar Wynn
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Michael Leyer, Wil M. P. van der Aalst
:
An Extensible Framework for Analysing Resource Behaviour Using Event Logs. CAiSE 2014: 564-579 - [c64]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
:
A distributed computing framework for All-to-All comparison problems. IECON 2014: 2499-2505 - 2013
- [c63]Colin J. Fidge, Jim Hogan, Raymond Lister:
What vs. how: comparing students' testing and coding skills. ACE 2013: 97-106 - [c62]Anastasiia Pika, Wil M. P. van der Aalst
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Moe Thandar Wynn
:
Profiling Event Logs to Configure Risk Indicators for Process Delays. CAiSE 2013: 465-481 - [c61]Christophe Hauser, Frederic Tronel, Colin J. Fidge
, Ludovic Mé:
Intrusion detection in distributed systems, an approach based on taint marking. ICC 2013: 1962-1967 - [c60]Madhushika M. E. Karunarathna, Yu-Chu Tian
, Colin J. Fidge
, Ross Hayward:
Algorithm clustering for multi-algorithm processor design. ICCD 2013: 451-454 - [c59]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Java Bytecode Programs (S). SEKE 2013: 394-399 - [p2]Bandar Alhaqbani, Michael Adams, Colin J. Fidge
, Arthur H. M. ter Hofstede
:
Privacy-Aware Workflow Management. Business Process Management 2013: 111-128 - 2012
- [j37]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge
:
A Hardware Virtualization Based Component Sandboxing Architecture. JSW 7(9): 2107-2118 (2012) - [c58]Chris Mills, Colin J. Fidge, Diane Corney:
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. AISC 2012: 59-70 - [c57]Christopher Doble, Colin J. Fidge, Diane Corney:
Data Flow Analysis of Embedded Program Expressions. AISC 2012: 71-82 - [c56]Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge:
A taint marking approach to confidentiality violation detection. AISC 2012: 83-90 - [c55]Anastasiia Pika, Wil M. P. van der Aalst
, Colin J. Fidge, Arthur H. M. ter Hofstede, Moe Thandar Wynn:
Predicting Deadline Transgressions Using Event Logs. Business Process Management Workshops 2012: 211-216 - 2011
- [j36]Moe Thandar Wynn
, Chun Ouyang, Arthur H. M. ter Hofstede
, Colin J. Fidge
:
Data and process requirements for product recall coordination. Computers in Industry 62(7): 776-786 (2011) - [j35]Lifeng Ai, Maolin Tang
, Colin J. Fidge
:
Partitioning composite web services for decentralized execution using a genetic algorithm. Future Generation Comp. Syst. 27(2): 157-172 (2011) - [c54]Chun Ouyang, Moe Thandar Wynn, Jan-Christian Kuhr, Michael Adams, Thomas Becker, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow support for scheduling in surgical care processes. ECIS 2011: 30 - [c53]Lifeng Ai, Maolin Tang
, Colin J. Fidge
:
Resource Allocation and Scheduling of Multiple Composite Web Services in Cloud Computing Using Cooperative Coevolution Genetic Algorithm. ICONIP (2) 2011: 258-267 - [c52]Li Gui, Yu-Chu Tian
, Colin J. Fidge
:
A conditional retransmission enabled transport protocol for real-time networked control systems. LCN 2011: 231-234 - [c51]Bandar Alshammari, Colin J. Fidge
, Diane Corney:
A Hierarchical Security Assessment Model for Object-Oriented Programs. QSIC 2011: 218-227 - 2010
- [j34]Lifeng Ai, Maolin Tang, Colin J. Fidge:
QoS-oriented Resource Allocation and Scheduling of Multiple CompositeWeb Services in a Hybrid Cloud Using a Random-Key Genetic Algorithm. Austr. J. Intelligent Information Processing Systems 12(1) (2010) - [j33]Bandar Alhaqbani, Colin J. Fidge
:
Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance. IJISP 4(4): 35-59 (2010) - [c50]Bandar Alshammari, Colin J. Fidge
, Diane Corney:
Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs. APSEC 2010: 186-195 - [c49]Bandar Alshammari, Colin J. Fidge
, Diane Corney:
Security Metrics for Object-Oriented Designs. Australian Software Engineering Conference 2010: 55-64 - [c48]Maolin Tang, Colin J. Fidge:
Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. AISC 2010: 12-21 - [c47]Reza Hassanzadeh, Tony R. Sahama, Colin J. Fidge:
A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards. E-HEALTH 2010: 102-113 - [c46]Guosong Tian, Yu-Chu Tian
, Colin J. Fidge
:
Performance analysis of IEEE 802.11 DCF based WNCS networks. LCN 2010: 496-503 - [c45]Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge
:
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. NSS 2010: 351-356 - [p1]Moe Thandar Wynn
, Anne Rozinat, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede
, Colin J. Fidge
:
Process Mining and Simulation. Modern Business Process Automation 2010: 437-457
2000 – 2009
- 2009
- [j32]Anne Rozinat, Moe Thandar Wynn
, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede
, Colin J. Fidge
:
Workflow simulation for operational decision support. Data Knowl. Eng. 68(9): 834-850 (2009) - [j31]Bandar Alhaqbani, Audun Jøsang, Colin J. Fidge:
A Medical Data Reliability Assessment Model. JTAER 4(2): 64-63 (2009) - [c44]Maolin Tang
, Colin J. Fidge
:
A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications. IEEE Congress on Evolutionary Computation 2009: 3226-3233 - [c43]Raymond Lister, Colin J. Fidge
, Donna Teague:
Further evidence of a relationship between explaining, tracing and writing skills in introductory programming. ITiCSE 2009: 161-165 - [c42]Colin J. Fidge
, Diane Corney:
Integrating hardware and software information flow analyses. LCTES 2009: 157-166 - [c41]Guosong Tian, Colin J. Fidge
, Yu-Chu Tian
:
Hybrid system simulation of computer control applications over communication networks. MASCOTS 2009: 1-10 - [c40]Bandar Alshammari, Colin J. Fidge
, Diane Corney:
Security Metrics for Object-Oriented Class Designs. QSIC 2009: 11-20 - 2008
- [c39]Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Marlon Dumas:
Product flow analysis in distribution networks with a fixed time horizon. ACSC 2008: 73-81 - [c38]Colin J. Fidge:
Relative simulation and model checking of real-time processes. ACSC 2008: 157-165 - [c37]Anne Rozinat, Moe Thandar Wynn, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow Simulation for Operational Decision Support Using Design, Historic and State Information. BPM 2008: 196-211 - [c36]Guosong Tian, Yu-Chu Tian
, Colin J. Fidge
:
High-Precision Relative Clock Synchronization Using Time Stamp Counters. ICECCS 2008: 69-78 - 2007
- [c35]Benjamin W. Long, Colin J. Fidge, David A. Carrington:
Cross-Layer Verification of Type Flaw Attacks on Security Protocols. ACSC 2007: 171-180 - [c34]Moe Thandar Wynn
, Marlon Dumas
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Wil M. P. van der Aalst
:
Business Process Simulation for Operational Decision Support. Business Process Management Workshops 2007: 66-77 - [c33]Bandar Alhaqbani, Colin J. Fidge
:
Access Control Requirements for Processing Electronic Health Records. Business Process Management Workshops 2007: 371-382 - [c32]Li Gui, Yu-Chu Tian, Colin J. Fidge:
Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. ESA 2007: 121-126 - 2006
- [j30]Andrew Rae, Colin J. Fidge
, Luke Wildman:
Fault Evaluation for Security-Critical Communications Devices. IEEE Computer 39(5): 61-68 (2006) - [j29]Karl Lermer, Colin J. Fidge
:
Procedure compilation in the refinement calculus. Formal Asp. Comput. 18(2): 152-180 (2006) - [j28]Colin J. Fidge
:
Formal change impact analyses for emulated control software. STTT 8(4-5): 321-335 (2006) - [c31]Colin J. Fidge, Tim McComb:
Tracing secure information flow through mode changes. ACSC 2006: 303-310 - [c30]Benjamin W. Long, Colin J. Fidge
:
Formally Analysing a Security Protocol for Replay Attacks. ASWEC 2006: 171-180 - [c29]Phil Cook, Colin J. Fidge
:
Well-Measuring Programs. ASWEC 2006: 253-261 - [c28]Colin J. Fidge, Yu-Chu Tian:
Functional Analysis of a Real-Time Protocol for Networked Control Systems. ATVA 2006: 446-460 - 2005
- [j27]Andrew Rae, Colin J. Fidge:
Identifying Critical Components During Information Security Evaluations. Journal of Research and Practice in Information Technology 37(4) (2005) - [j26]Andrew Rae, Colin J. Fidge
:
Information Flow Analysis for Fail-Secure Devices. Comput. J. 48(1): 17-26 (2005) - [j25]Karl Lermer, Colin J. Fidge
, Ian J. Hayes
:
A theory for execution-time derivation in real-time programs. Theor. Comput. Sci. 346(1): 3-27 (2005) - [c27]Colin J. Fidge
, Phil Cook:
Model Checking Interrupt-Dependent Software. APSEC 2005: 51-58 - [c26]Colin J. Fidge
, Peter J. Robinson, Steve Dunne:
Refinement Laws for Verifying Library Subroutine Adaptation. Australian Software Engineering Conference 2005: 224-232 - 2003
- [j24]Karl Lermer, Colin J. Fidge
, Ian J. Hayes
:
Formal Semantics for Program Paths. Electr. Notes Theor. Comput. Sci. 78: 58-81 (2003) - [j23]Colin J. Fidge
, Carron Shankland
:
But What if I Don't Want to Wait Forever? Formal Asp. Comput. 14(3): 281-294 (2003) - [j22]Luke Wildman, Colin J. Fidge
, David A. Carrington:
The Variety of Variables in Automated Real-Time Refinement. Formal Asp. Comput. 15(2-3): 258-279 (2003) - [j21]Karl Lermer, Colin J. Fidge
, Ian J. Hayes
:
Linear Approximation of Execution-Time Constraints. Formal Asp. Comput. 15(4): 319-348 (2003) - [j20]Colin J. Fidge
:
Foreword. Theor. Comput. Sci. 293(3): 477 (2003) - [c25]Colin J. Fidge
:
Verifying Emulation of Legacy Mission Computer Systems. FME 2003: 187-207 - [c24]Benjamin W. Long, Colin J. Fidge
, Antonio Cerone:
A Z Based Approach to Verifying Security Protocols. ICFEM 2003: 375-395 - [c23]Geoffrey Watson, Colin J. Fidge
:
A Partial-Correctness Semantics for Modelling Assembler Programs. SEFM 2003: 82-90 - 2002
- [j19]Luke Wildman, Colin J. Fidge
:
The variety of variables in computer-aided real-time programming. Electr. Notes Theor. Comput. Sci. 70(3): 21-36 (2002) - [j18]Karl Lermer, Colin J. Fidge
:
A formal model of real-time program compilation. Theor. Comput. Sci. 282(1): 151-190 (2002) - [c22]Neil J. Robinson, Colin J. Fidge
:
Animation of Data Refinements. APSEC 2002: 137-146 - [c21]Colin J. Fidge
:
Contextual Matching of Software Library Components. APSEC 2002: 297-306 - [c20]Colin J. Fidge
:
Timing Analysis of Assembler Code Control-Flow Paths. FME 2002: 370-389 - 2001
- [j17]Ian J. Hayes
, Colin J. Fidge
, Karl Lermer:
Semantic characterisation of dead control-flow paths. IEE Proceedings - Software 148(6): 175-186 (2001) - [j16]Andrew P. Martin
, Colin J. Fidge
:
Lifting in Z. Electr. Notes Theor. Comput. Sci. 42: 197-219 (2001) - [j15]Colin J. Fidge
:
Preface. Electr. Notes Theor. Comput. Sci. 42: 282-283 (2001) - [c19]Colin J. Fidge:
Compilation of Specifications. APSEC 2001: 355-362 - [c18]Neil J. Robinson, Colin J. Fidge
:
Visualisation of Refinements. Australian Software Engineering Conference 2001: 244-254 - 2000
- [j14]Graeme Smith, Colin J. Fidge:
Incremental Development of Real-Time Requirements: The Light Control Case Study. J. UCS 6(7): 704-730 (2000) - [j13]Luke Wildman, Colin J. Fidge
, David A. Carrington:
Computer-aided development of a real-time program. Software - Concepts and Tools 19(4): 190-202 (2000) - [c17]Colin J. Fidge
:
The Algebra of Multi-tasking. AMAST 2000: 213-227
1990 – 1999
- 1999
- [j12]Colin J. Fidge
, Ian J. Hayes, Geoffrey Watson:
The deadline command. IEE Proceedings - Software 146(2): 104-111 (1999) - [c16]Karl Lermer, Colin J. Fidge
:
A Formal Model of Real-Time Program Compilation. ARTS 1999: 192-210 - [c15]Colin J. Fidge
:
Modelling Discrete Behaviour in a Continuous-Time Formalism. IFM 1999: 170-188 - 1998
- [j11]Colin J. Fidge
:
A Limitation of Vector Timestamps for Reconstructing Distributed Computations. Inf. Process. Lett. 68(2): 87-91 (1998) - [j10]Colin J. Fidge
:
Real-Time Schedulability Tests for Preemptive Multitasking. Real-Time Systems 14(1): 61-93 (1998) - [c14]Colin J. Fidge
, Ian J. Hayes, Brendan P. Mahony:
Defining Differentiation and Integration in Z. ICFEM 1998: 64-75 - [c13]Colin J. Fidge, Ian J. Hayes
, Andrew P. Martin, Axel Wabenhorst:
A Set-Theoretic Model for Real-Time Specification and Reasoning. MPC 1998: 188-206 - 1997
- [j9]Colin J. Fidge
, Andy J. Wellings:
An Action-Based Formal Model for Concurrent Real-Time Systems. Formal Asp. Comput. 9(2): 175-207 (1997) - [j8]Colin J. Fidge
, Peter Kearney, Mark Utting
:
A Formal Method for Building Concurrent Real-Time Software. IEEE Software 14(2): 99-106 (1997) - [c12]Colin J. Fidge
:
Refinement Rules for Real-Time Multi-tasking Programs. AMAST 1997: 199-215 - [c11]Karl Lermer, Colin J. Fidge
:
A Methodology for Compilation of High-Integrity Real-Time Programs. Euro-Par 1997: 1274-1281 - 1996
- [j7]Colin J. Fidge
:
Fundamentals of Distributed System Observation. IEEE Software 13(6): 77-83 (1996) - [c10]Colin J. Fidge
, Mark Utting, Peter Kearney, Ian J. Hayes
:
Integrating Real-Time Scheduling Theory and Program Refinement. FME 1996: 327-346 - 1995
- [c9]Colin J. Fidge
, Peter Kearney, Mark Utting:
Interactively Verifying a Simple Real-time Scheduler. CAV 1995: 395-408 - 1994
- [c8]Colin J. Fidge
:
Adding Real Time to Formal Program Development. FME 1994: 618-638 - [c7]Colin J. Fidge
:
Proof Obligations for Real-Time Refinement. Refine 1994: 279-305 - 1993
- [j6]Colin J. Fidge
:
A Formal Definition of Priority in CSP. ACM Trans. Program. Lang. Syst. 15(4): 681-705 (1993) - [c6]Colin J. Fidge
:
Real-Time Refinement. FME 1993: 314-331 - 1992
- [j5]Colin J. Fidge
, Andrew M. Lister:
Disciplined approach to real-time systems design. Information & Software Technology 34(9): 603-610 (1992) - [c5]Colin J. Fidge:
A constraint-oriented real-time process calculus. FORTE 1992: 363-378 - [c4]Colin J. Fidge
:
Specification and Verification of Real-Time Behaviour Using Z and RTL. FTRTFT 1992: 393-409 - 1991
- [j4]Colin J. Fidge
:
Logical Time in Distributed Computing Systems. IEEE Computer 24(8): 28-33 (1991) - [c3]Colin J. Fidge:
Process Algebra Traces Augmented with Causal Relationships. FORTE 1991: 527-541 - 1990
- [c2]Colin J. Fidge:
A LOTOS Interpreter for Simulating Real-Time Behaviour. FORTE 1990: 523-526
1980 – 1989
- 1988
- [j3]