1. 2016
  2. Published

    An Adaptive Middleware for Improved Computational Performance. / Bonnichsen, Lars Frydendal.

    Kgs. Lyngby : Technical University of Denmark (DTU), 2016. 134 p. (DTU Compute PHD-2015; No. 390).

    Research output: Book/ReportPh.D. thesis – Annual report year: 2016Research

  3. Published

    Analysis of Security Protocols in Embedded Systems. / Bruni, Alessandro.

    Kgs. Lyngby : Technical University of Denmark (DTU), 2016. 155 p. (DTU Compute PHD-2016; No. 389).

    Research output: Book/ReportPh.D. thesis – Annual report year: 2016Research

  4. Published

    Fine-grained Information Flow for Concurrent Computation. / Li, Ximeng.

    Kgs. Lyngby : Technical University of Denmark (DTU), 2016. 182 p. (DTU Compute PHD-2015; No. 388).

    Research output: Book/ReportPh.D. thesis – Annual report year: 2016Research

  5. Published

    Security Protocols: Specification, Verification, Implementation, and Composition. / Almousa, Omar.

    Kgs. Lyngby : Technical University of Denmark (DTU), 2016. 164 p. (DTU Compute PHD-2015; No. 391).

    Research output: Book/ReportPh.D. thesis – Annual report year: 2016Research

  6. 2015
  7. Published

    A calculus for attribute-based communication. / Alrahman, Yehia Abd; De Nicola, Rocco; Loreti, Michele; Tiezzi, Francesco; Vigo, Roberto.

    Proceedings of the 30th Annual ACM Symposium on Applied Computing (SAC '15). Association for Computing Machinery, 2015. p. 1840-1845.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2016Researchpeer-review

  8. Published

    A calculus of quality for robustness against unreliable communication. / Nielson, Hanne Riis; Nielson, Flemming; Vigo, Roberto.

    In: The Journal of Logic and Algebraic Programming, Vol. 84, No. 5, 2015, p. 611-639.

    Research output: Contribution to journalJournal article – Annual report year: 2015Researchpeer-review

  9. Published

    A Fixpoint-Based Calculus for Graph-Shaped Computational Fields. / Lluch Lafuente, Alberto; Loreti, Michele; Montanari, Ugo.

    Coordination Models and Languages: Proceedings of the 17th IFIP WG 6.1 International Conference (COORDINATION 2015). ed. / Tom Holvoet; Mirko Viroli. Springer, 2015. p. 101-116 (Lecture Notes in Computer Science, Vol. 9037).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2015Researchpeer-review

  10. Published

    Alice and Bob: Reconciling Formal Models and Implementation. / Almousa, Omar; Mödersheim, Sebastian Alexander; Viganò, Luca.

    Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday. Springer, 2015. p. 66-85 (Lecture Notes in Computer Science, Vol. 9465).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter – Annual report year: 2015Researchpeer-review

  11. Published

    A Probabilistic Analysis Framework for Malicious Insider Threats. / Chen, Taolue ; Kammuller, Florian; Nemli, Ibrahim ; Probst, Christian W.

    Proceedings of the third International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). ed. / Theo Tryfonas; Ioannis Askoxylakis. Springer, 2015. p. 178-189 (Lecture Notes in Computer Science, Vol. 9190).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2015Researchpeer-review

  12. Published

    A SAT-Based Analysis of a Calculus for Wireless Sensor Networks. / Wu, Xi; Nielson, Hanne Riis; Zhu, Huibiao.

    Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering (TASE 2015). IEEE, 2015. p. 23-30.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2015Researchpeer-review

Previous 1 2 3 4 5 6 7 8 ...12 Next