Language-Based Technology

  1. Research › Journal article
  2. Published

    A portable virtual machine target for proof-carrying code. / Franz, Michael; Chandra, Deepak; Gal, Andreas; Haldar, Vivek; Probst, Christian W.; Reig, Fermin; Wang, Ning.

    In: Science of Computer Programming, Vol. 57, No. 3, 2005, p. 275-294.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

  3. Published

    Java bytecode verification via static single assignment form. / Gal, Andreas; Probst, Christian W.; Franz, Michael.

    In: ACM Transactions on Programming Languages and Systems, Vol. 30, No. 4, 2008, p. 1-21.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  4. Published

    CaPiTo: protocol stacks for services. / Gao, Han; Nielson, Flemming; Nielson, Hanne Riis.

    In: Formal Aspects of Computing, Vol. 23, No. 4, 2011, p. 541-565.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  5. Published

    Probabilistic Reachability for Parametric Markov Models. / Hahn, Ernst Moritz; Hermanns, Holger; Zhang, Lijun.

    In: International Journal on Software Tools for Technology Transfer, Vol. 13, No. 1, 2011, p. 3-19.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  6. Published

    Probabilistic Logical Characterization. / Hermanns, Holger; Parma, Augusto; Segala, Roberto; Wachter, Björn; Zhang, Lijun.

    In: Information and Computation, Vol. 209, No. 2, 2011, p. 154-172.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  7. Published
  8. Published

    Insiders and Insider Threats : An Overview of Definitions and Mitigation Techniques. / Hunker, Jeffrey; Probst, Christian W.

    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1, 2011, p. 4-27.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  9. Published

    Constraint Differentiation : Search-Space Reduction for the Constraint-Based Analysis of Security Protocols. / Mödersheim, Sebastian Alexander; Basin, David; Viganò, Luca.

    In: Journal of Computer Security, Vol. 18, No. 4, 2010, p. 575-618.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  10. Published

    A Framework for Security Analysis of Mobile Wireless Networks. / Nanz, Sebastian; Hankin, Chris.

    In: Theoretical Computer Science, Vol. 367, No. 1-2, 2006, p. 203-227.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  11. Published

    Static analysis of topology-dependent broadcast networks. / Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis.

    In: Information and Computation, Vol. 208, No. 2, 2010, p. 117-139.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

Previous 1 2 3 4 5 6 7 8 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word