Language-Based Technology

  1. Published

    Abstraction and Model Checking in the PEPA Plug-in for Eclipse. / Smith, Michael James Andrew.

    Proceedings of the 7th International Conference on Quantitative Evaluation of Systems (QEST 2010). IEEE Computer Society Press, 2010. p. 155-156.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  2. Published

    Abstraction by Set-Membership : Verifying Security Protocols and Web Services with Databases. / Mödersheim, Sebastian Alexander.

    Proceedings of the 17th ACM Conference on Computer and Communications Security. New York : Association for Computing Machinery, 2010. p. 351-360.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  3. Published

    Active Evaluation Contexts for Reaction Semantics. / Pilegaard, Henrik; Nielson, Flemming; Nielson, Hanne Riis.

    Electronic Notes in Theoretical Computer Science. Vol. 175 Elsevier, 2007. p. 57-70.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  4. Published

    Adapt or Become Extinct! : The Case for a Unified Framework for Deployment-Time Optimization. / Goumas, Georgios; McKee, Sally A.; Själander, Magnus; Gross, Thomas R.; Karlsson, Sven; Probst, Christian W.; Zhang, Lixin.

    EXADAPT '11 Proceedings of the 1st International Workshop on Adaptive Self-Tuning Computing Systems for the Exaflop Era. University of Strathclyde, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  5. Published

    Advice for Coordination. / Hankin, Chris; Nielson, Flemming; Nielson, Hanne Riis; Yang, Fan.

    10th international conference on Coordination Models and Languages (Coordination'08). ed. / Doug Lea; Gianluigi Zavattaro. Germany : Springer, 2008. p. 153-168 (Lecture Notes in Computer Science; No. 5052).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  6. Published

    Advice from Belnap Policies. / Hankin, Chris; Nielson, Flemming; Nielson, Hanne Riis.

    Computer Security Foundations Symposium, IEEE. Vol. 0 2009. p. 234-247.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  7. Published

    A formal analysis for capturing replay attacks in cryptographic protocols. / Gao, Han; Bodei, Chiara; Degano, Pierpaolo; Nielson, Hanne Riis.

    12th Asian Computing Science Conference, ASIAN 2007: Lecture Notes in Computer Science. Vol. 4846 Springer, 2007. p. 150-165.

    Publication: ResearchArticle in proceedings – Annual report year: 2007

  8. Published

    A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. / Gao, Han; Bodei, Chiara; Degano, Pierpaolo.

    Lecture Notes in Computer Science. Vol. 5140 Springer, 2008. p. 167-183.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  9. Published

    A Formal Model of Identity Mixer. / Camenisch, Jan; Mödersheim, Sebastian Alexander; Sommer, Dieter.

    Proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems. Heidelberg : Springer, 2010. p. 198-214 (Lecture Notes in Computer Science; No. LNCS 6371).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  10. Published

    A Framework for Constraint-Programming based Configuration. / Queva, Matthieu Stéphane Benoit; Probst, Christian W. (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. 227 p. (IMM-PHD-2011; No. 260).

    Publication: ResearchPh.D. thesis – Annual report year: 2011

Previous 1 2 3 4 5 6 7 8 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word