1. 2017
  2. Published

    A coordination language for databases. / Li, Ximeng; Wu, Xi; Lluch Lafuente, Alberto; Nielson, Flemming; Nielson, Hanne Riis.

    In: Logical Methods in Computer Science, Vol. 13, No. 1, 2017.

    Publication: Research - peer-reviewJournal article – Annual report year: 2016

  3. Accepted/In press

    Asynchronous Distributed Execution of Fixpoint-Based Computational Fields. / Lluch Lafuente, Alberto; Loreti, Michele ; Montanari, Ugo .

    In: Logical Methods in Computer Science, 2017.

    Publication: Research - peer-reviewJournal article – Annual report year: 2017

  4. Published

    Atomistic Galois insertions for flow sensitive integrity. / Nielson, Flemming; Nielson, Hanne Riis.

    In: Computer Languages, Systems and Structures, Vol. 50, 2017, p. 82-107.

    Publication: Research - peer-reviewJournal article – Annual report year: 2017

  5. E-pub ahead of print

    Automated specification and verification of Web-based applications. / ter Beek, Maurice H. ; Lluch Lafuente, Alberto.

    In: Journal of Logical and Algebraic Methods in Programming, 2017.

    Publication: ResearchEditorial – Annual report year: 2017

  6. E-pub ahead of print

    Choreographing Cyber-Physical Distributed Control Systems for the Energy Sector. / López-Acosta, Hugo-Andrés; Heussen, Kai.

    Proceedings of SAC 2017. Association for Computing Machinery, 2017.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

  7. Published

    Formal Analysis of Graphical Security Models. / Aslanyan, Zaruhi; Nielson, Flemming (Supervisor); Probst, Christian W. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark (DTU), 2017. 208 p. (DTU Compute PHD-2016; No. 421).

    Publication: ResearchPh.D. thesis – Annual report year: 2017

  8. Published

    Formalizing and proving a typing result for security protocols in Isabelle/HOL. / Hess, Andreas Viktor; Modersheim, Sebastian.

    Proceedings of 2017 IEEE 30th Computer Security Foundations Symposium. IEEE, 2017. p. 451-63 (I E E E Computer Security Foundations Symposium. Proceedings).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

  9. Published

    Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services. / Yesuf, Ahmed; Wolos, Lars Peter; Rannenberg, Kai.

    Exploring Services Science. Vol. 279 Springer, 2017. p. 323-336 (Lecture Notes in Business Information Processing, Vol. 279).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

  10. Published

    Improving Loop Dependence Analysis. / Jensen, Nicklas Bo; Karlsson, Sven .

    In: Acm Transactions on Architecture and Code Optimization, Vol. 14, No. 3, 2017, p. 1-24.

    Publication: Research - peer-reviewJournal article – Annual report year: 2017

  11. Published

    Information Flow for Timed Automata. / Nielson, Flemming; Nielson, Hanne Riis; Vasilikos, Panagiotis.

    Models, Algorithms, Logics and Tools. Vol. 10460 Springer, 2017. p. 3-21 (Lecture Notes in Computer Science, Vol. 10460).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2017

Previous 1 2 3 4 5 6 7 8 ...16 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word