1. Patricia Derler, Edward A. Lee & Alberto Sangiovanni-Vincentelli (2012): Modeling Cyber-Physical Systems. Proceedings of the IEEE (special issue on CPS) 100(1), pp. 13 – 28. Available at
  2. Thomas Gibson-Robinson, Philip Armstrong, Alexandre Boulgakov & AndrewW. Roscoe (2014): FDR3 – A Modern Refinement Checker for CSP. In: TACAS, LNCS 8413. Springer, pp. 187–201. Available at
  3. Simon Hudon & ThaiSon Hoang (2013): Systems Design Guided by Progress Concerns. In: Integrated Formal Methods, LNCS 7940. Springer, pp. 16–30. Available at
  4. Ryszard Janicki, DavidLorge Parnas & Jeffery Zucker (1997): Tabular Representations in Relational Documents. In: Relational Methods in Computer Science, Advances in Computing Sciences. Springer Vienna, pp. 184–196. Available at
  5. Kim G. Larsen, Paul Pettersson & Wang Yi (1997): UPPAAL in a Nutshell. International Journal on Software Tools for Technology Transfer 1(1–2), pp. 134–152. Available at
  6. JonathanS. Ostroff, Chen-Wei Wang, Simon Hudon, Yang Liu & Jun Sun (2014): TTM/PAT: Specifying and Verifying Timed Transition Models. In: FTSCS, Communications in Computer and Information Science 419. Springer, pp. 107–124. Available at
  7. A.W. Roscoe (2010): Understanding Concurrent Systems, 1st edition. Springer. Available at
  8. Jun Sun, Yang Liu, Jin Song Dong, Yan Liu, Ling Shi & Étienne André (2013): Modeling and verifying hierarchical real-time systems using stateful timed CSP. ACM Trans. Softw. Eng. Methodol. 22(1), pp. 3:1–3:29. Available at
  9. Jun Sun, Yang Liu, Jin Song Dong & Jun Pang (2009): PAT: Towards Flexible Verification under Fairness. In: CAV, LNCS 5643, pp. 709 – 714. Available at
  10. C.-W. Wang, J. S. Ostroff & S. Hudon (2014): Using Indexed and Synchronous Events to Model and Validate Cyber-Physical Systems. Tech Report EECS-2014-03. York University.
  11. A. Wassyng & M. Lawford (2006): Software tools for safety-critical software development. STTT 8(4-5), pp. 337–354. Available at
  12. A. Wassyng, M. Lawford & X. Hu (2005): Timing Tolerances in Safety-Critical Software. In: FM, pp. 157–172. Available at

Comments and questions to:
For website issues: