Search results for: Christian Schallhart
Lecture Notes in Computer Science > Leveraging Applications of Formal Methods, Verification, and Validation > New Challenges in the Development of Critical Embedded Systems – An “aeromotive” Perspective > 1-2
Lecture Notes in Computer Science > Runtime Verification > Core Runtime Verification Papers > 126-138
Lecture Notes in Computer Science > Automated Technology for Verification and Analysis > Short Papers > 386-396
Lecture Notes in Computer Science > Verification, Model Checking, and Abstract Interpretation > Submitted Papers > 151-166
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Misuse Detection > 174-187
Lecture Notes in Computer Science > Fundamental Approaches to Software Engineering > Testing: Theory and New Trends > 278-293
Lecture Notes in Computer Science > Model-Based Testing of Reactive Systems > Tools and Case Studies > 391-438
Lecture Notes in Computer Science > Computer Aided Verification > Session 5: Tools – Dynamic Verification > 209-213
Lecture Notes in Computer Science > Computer Aided Verification > Session II: Verification Process > 82-94
Lecture Notes in Computer Science > FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science > Contributed Papers – Track B > 260-272
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 493-507
Theoretical Computer Science > 2015 > 605 > C > 62-79
The VLDB Journal > 2013 > 22 > 5 > 615-640
The VLDB Journal > 2013 > 22 > 1 > 47-72
IEEE Transactions on Dependable and Secure Computing > 2010 > 7 > 4 > 424 - 438
Journal of Logic and Algebraic Programming > 2009 > 78 > 5 > 293-303