dblp.uni-trier.dewww.uni-trier.de

Bruno Dutertre

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
21EEMaria Sorea, Bruno Dutertre, Wilfried Steiner: Modeling and Verification of Time-Triggered Communication Protocols. ISORC 2008: 422-428
2007
20EELeonardo Mendonça de Moura, Bruno Dutertre, Natarajan Shankar: A Tutorial on Satisfiability Modulo Theories. CAV 2007: 20-36
19EEBruno Dutertre: Formal Modeling and Analysis of the Modbus Protocol. Critical Infrastructure Protection 2007: 189-204
2006
18EESteven Cheung, Bruno Dutertre, Ulf Lindqvist: Detecting Disruptive Routers in Wireless Sensor Networks. ADHOC-NOW 2006: 19-31
17EEBruno Dutertre, Leonardo Mendonça de Moura: A Fast Linear-Arithmetic Solver for DPLL(T). CAV 2006: 81-94
2004
16EEBruno Dutertre, Maria Sorea: Modeling and Verification of a Fault-Tolerant Real-Time Startup Protocol Using Calendar Automata. FORMATS/FTRTFT 2004: 199-214
15EEVu Ha, Murali Rangarajan, Darren D. Cofer, Harald Rueß, Bruno Dutertre: Feature-Based Decomposition of Inductive Proofs Applied to Real-Time Avionics Software: An Experience Report. ICSE 2004: 304-313
14EERobert A. Riemenschneider, Hassen Saïdi, Bruno Dutertre: Using Model Checking to Assess the Dependability of Agent-Based Systems. IEEE Intelligent Systems 19(5): 62-70 (2004)
2003
13EEDavid Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro: Forum Session: Security for Wireless Sensor Networks. ACSAC 2003: 106-109
12EEAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: Dependable Intrusion Tolerance: Technology Demo. DISCEX (2) 2003: 128-130
11EEHassen Saïdi, Victoria Stavridou, Bruno Dutertre: Protocol Codesign. Security Protocols Workshop 2003: 106-113
2002
10EEBruno Dutertre: Dynamic Scan Scheduling. IEEE Real-Time Systems Symposium 2002: 327-
9EEBruno Dutertre, Valentin Crettaz, Victoria Stavridou: Intrusion-Tolerant Enclaves. IEEE Symposium on Security and Privacy 2002: 216-
8EEAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: An Architecture for an Adaptive Intrusion-Tolerant Server. Security Protocols Workshop 2002: 158-178
2001
7EEBruno Dutertre, Hassen Saïdi, Victoria Stavridou: Intrusion-Tolerant Group Management in Enclaves. DSN 2001: 203-214
1999
6EEJohn Herbert, Bruno Dutertre, Robert A. Riemenschneider, Victoria Stavridou: A Formalization of Software Architecture. World Congress on Formal Methods 1999: 116-133
1997
5 Bruno Dutertre, Steve Schneider: Using a PVS Embedding of CSP to Verify Authentication Protocols. TPHOLs 1997: 121-136
4EEBruno Dutertre, Victoria Stavridou: Formal Requirements Analysis of an Avionics Control System. IEEE Trans. Software Eng. 23(5): 267-278 (1997)
1996
3 Bruno Dutertre: Elements of Mathematical Analysis in PVS. TPHOLs 1996: 141-156
1995
2 Bruno Dutertre: Complete Proof Systems for First Order Interval Temporal Logic LICS 1995: 36-43
1EEShaoying Liu, Victoria Stavridou, Bruno Dutertre: The practice of formal methods in safety-critical systems. Journal of Systems and Software 28(1): 77-87 (1995)

Coauthor Index

1Magnus Almgren [8] [12]
2David Carman [13]
3Steven Cheung [8] [12] [18]
4Darren D. Cofer [15]
5Daniel Coffin [13]
6Valentin Crettaz [9]
7Yves Deswarte [8] [12]
8Vu Ha [15]
9John Herbert [6]
10Joshua Levy [8] [12]
11Ulf Lindqvist [18]
12Shaoying Liu [1]
13Leonardo Mendonça de Moura [17] [20]
14Murali Rangarajan [15]
15Robert A. Riemenschneider [6] [14]
16Harald Rueß [15]
17Hassen Saïdi [7] [8] [11] [12] [14]
18Steve A. Schneider (Steve Schneider) [5]
19Natarajan Shankar [20]
20Maria Sorea [16] [21]
21Victoria Stavridou [1] [4] [6] [7] [8] [9] [11] [12]
22Wilfried Steiner [21]
23Vipin Swarup [13]
24Tomás E. Uribe [8] [12]
25Alfonso Valdes [8] [12]
26Ronald J. Watro [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)