dblp.uni-trier.dewww.uni-trier.de

Wolfgang Reif

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
76EEKurt Stenzel, Holger Grandy, Wolfgang Reif: Verification of Java Programs with Generics. AMAST 2008: 315-329
75EEAndriy Dunets, Gerhard Schellhorn, Wolfgang Reif: Automating Algebraic Specifications of Non-freely Generated Data Types. ATVA 2008: 141-155
74EEHolger Grandy, Markus Bischof, Kurt Stenzel, Gerhard Schellhorn, Wolfgang Reif: Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code. FM 2008: 165-180
73 Florian Nafz, Frank Ortmeier, Hella Seebach, Wolfgang Reif: Organic Computing for Health Care Systems - Possible Benefits and Challenges. HEALTHINF (2) 2008: 286-290
72EEMichael Balser, Simon Bäumler, Wolfgang Reif, Gerhard Schellhorn: Interactive Verification of Concurrent Systems using Symbolic Execution. LPAR Workshops 2008
71EEAndriy Dunets, Gerhard Schellhorn, Wolfgang Reif: Bounded Relational Analysis of Free Data Types. TAP 2008: 99-115
70EESimon Bäumler, Florian Nafz, Michael Balser, Wolfgang Reif: Compositional Proofs with Symbolic Execution. VERIFY 2008
69EEDominik Haneberg, Gerhard Schellhorn, Holger Grandy, Wolfgang Reif: Verification of Mondex electronic purses with KIV: from transactions to a security protocol. Formal Asp. Comput. 20(1): 41-59 (2008)
2007
68EEHolger Grandy, Kurt Stenzel, Wolfgang Reif: A Refinement Method for Java Programs. FMOODS 2007: 221-235
67EENina Moebius, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn: A Modeling Framework for the Development of Provably Secure E-Commerce Applications. ICSEA 2007: 8
66EEHella Seebach, Frank Ortmeier, Wolfgang Reif: Design and construction of organic computing systems. IEEE Congress on Evolutionary Computation 2007: 4215-4221
65EEDominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn: Verifying Smart Card Applications: An ASM Approach. IFM 2007: 313-332
64EEMatthias Güdemann, Andreas Angerer, Frank Ortmeier, Wolfgang Reif: Modeling of self-adaptive systems with SCADE. ISCAS 2007: 2922-2925
63EEMatthias Güdemann, Frank Ortmeier, Wolfgang Reif: Using Deductive Cause-Consequence Analysis (DCCA) with SCADE. SAFECOMP 2007: 465-478
62EEHolger Grandy, Robert Bertossi, Kurt Stenzel, Wolfgang Reif: ASN1-light: A Verified Message Encoding for Security Protocols. SEFM 2007: 195-204
61 Frank Ortmeier, Wolfgang Reif, Giovanna Di Marzo Serugendo, Hartmut Schmeck: WG2: Software engineering for organic computing applications (SE4OC). Software Engineering 2007: 275-276
2006
60EEMatthias Güdemann, Frank Ortmeier, Wolfgang Reif: Formal Modeling and Verification of Systems with Self-x Properties. ATC 2006: 38-47
59EEHolger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel: Developing Provable Secure M-Commerce Applications. ETRICS 2006: 115-129
58EEGerhard Schellhorn, Holger Grandy, Dominik Haneberg, Wolfgang Reif: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. FM 2006: 16-31
57EEJonathan Schmitt, Alwin Hoffmann, Michael Balser, Wolfgang Reif, Mar Marcos: Interactive Verification of Medical Guidelines. FM 2006: 32-47
56 Matthias Güdemann, Florian Nafz, Wolfgang Reif, Hella Seebach: Towards Safe and Secure Organic Computing Applications. GI Jahrestagung (1) 2006: 153-160
55EESimon Bäumler, Michael Balser, Andriy Dunets, Wolfgang Reif, Jonathan Schmitt: Verification of Medical Guidelines by Model Checking - A Case Study. SPIN 2006: 219-233
54EEAnnette ten Teije, Mar Marcos, Michael Balser, Joyce van Croonenborg, Christoph Duelli, Frank van Harmelen, Peter J. F. Lucas, Silvia Miksch, Wolfgang Reif, Kitty Rosenbrand, Andreas Seyfang: Improving medical protocols by formal methods. Artificial Intelligence in Medicine 36(3): 193-209 (2006)
2005
53EEDominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn: Verifying Security Protocols: An ASM Approach. Abstract State Machines 2005: 247-262
52EEFrank Ortmeier, Wolfgang Reif, Gerhard Schellhorn: Formal Safety Analysis of a Radio-Based Railroad Crossing Using Deductive Cause-Consequence Analysis (DCCA). EDCC 2005: 210-224
51EEHolger Grandy, Kurt Stenzel, Wolfgang Reif: Object Oriented Verification Kernels for Secure Java Applications. SEFM 2005: 170-179
2004
50 Hartmut Ehrig, Werner Damm, Jörg Desel, Martin Große-Rhode, Wolfgang Reif, Eckehard Schnieder, Engelbert Westkämper: Integration of Software Specification Techniques for Applications in Engineering, Priority Program SoftSpez of the German Research Foundation (DFG), Final Report Springer 2004
49EEFrank Ortmeier, Wolfgang Reif: Safety Optimization: A Combination of Fault Tree Analysis and Optimization Techniques. DSN 2004: 651-658
48EEDominik Haneberg, Wolfgang Reif, Kurt Stenzel: A Construction Kit for Modeling the Security of M-commerce Applications. FORTE Workshops 2004: 72-85
47EEMichael Balser, Simon Bäumler, Alexander Knapp, Wolfgang Reif, Andreas Thums: Interactive Verification of UML State Machines. ICFEM 2004: 434-448
46 Wolfgang Reif, Frank Ortmeier, Andreas Thums, Gerhard Schellhorn: Integrated formal methods for safety analysis of train systems. IFIP Congress Topical Sessions 2004: 637-642
45EEAndreas Thums, Gerhard Schellhorn, Frank Ortmeier, Wolfgang Reif: Interactive Verification of Statecharts. SoftSpez Final Report 2004: 355-373
44EEFrank Ortmeier, Wolfgang Reif, Gerhard Schellhorn: Introduction to Subject Area "Verification". SoftSpez Final Report 2004: 419-422
43EEFrank Ortmeier, Andreas Thums, Gerhard Schellhorn, Wolfgang Reif: Combining Formal Methods and Safety Analysis - The ForMoSA Approach. SoftSpez Final Report 2004: 474-493
42 Dominik Haneberg, Kurt Stenzel, Wolfgang Reif: Electronic-Onboard-Ticketing: Software Challenges of an State-of-the-Art M-Commerce Application. Workshop Mobile Commerce 2004: 103-113
2003
41 Dominik Haneberg, Alexander Kreibich, Wolfgang Reif, Kurt Stenzel: Design for Trust: Security im M-Commerce. GI Jahrestagung (1) 2003: 91-94
40EERudolf Berghammer, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn: Special Issue on Tools for System Design and Verification. J. UCS 9(2): 86-87 (2003)
2002
39EEDominik Haneberg, Wolfgang Reif, Kurt Stenzel: A Method for Secure Smartcard Applications. AMAST 2002: 319-333
38EEFrank Ortmeier, Gerhard Schellhorn, Andreas Thums, Wolfgang Reif, Bernhard Hering, Helmut Trappschuh: Safety Analysis of the Height Control System for the Elbtunnel. SAFECOMP 2002: 296-308
37EEMichael Balser, Christoph Duelli, Wolfgang Reif, Gerhard Schellhorn: Verifying Concurrent Systems with Symbolic Execution. J. Log. Comput. 12(4): 549-560 (2002)
36 Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll: Verified Formal Security Models for Multiapplicative Smart Cards. Journal of Computer Security 10(4): 339-368 (2002)
2001
35EEWolfgang Reif, Gerhard Schellhorn, Andreas Thums: Flaw Detection in Formal Specifications. IJCAR 2001: 642-657
34EEWolfgang Reif, Gerhard Schellhorn: J.UCS Special Issue on Tools for System Design and Verification - Part 1. J. UCS 7(1): 1-2 (2001)
33EEWolfgang Reif, Gerhard Schellhorn: J.UCS Special Issue on Tools for System Design and Verification - Part 2. J. UCS 7(2): 105-106 (2001)
32EEWolfgang Reif, Gerhard Schellhorn, Tobias Vollmer, Jürgen Ruf: Correctness of Efficient Real-Time Model Checking. J. UCS 7(2): 194-209 (2001)
2000
31EEGerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll: Verification of a Formal Security Model for Multiapplicative Smart Cards. ESORICS 2000: 17-36
30EEMichael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Andreas Thums: Formal System Development with KIV. FASE 2000: 363-366
29EEWolfgang Reif, Jürgen Ruf, Gerhard Schellhorn, Tobias Vollmer: Do You Trust Your Model Checker? FMCAD 2000: 179-196
1999
28EEWolfgang Reif: Formale Methoden für sicherheitskritische Software - Der KIV-Ansatz. Inform., Forsch. Entwickl. 14(4): 193-202 (1999)
27EEReiner Hähnle, Wolfram Menzel, Peter H. Schmitt, Wolfgang Reif: J.UCS Special Issue on Integration of Deduction Systems. J. UCS 5(3): (1999)
1998
26 Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: KIV 3.0 for Provably Correct Systems. FM-Trends 1998: 330-337
25 Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: VSE: Controlling the Complexity in Formal Software Developments. FM-Trends 1998: 351-358
24 Wolfgang Reif: Interaktives Theorembeweisen und seine Anwendungen in der Softwaretechnik. KI 12(4): 42-48 (1998)
1997
23 Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Proving System Correctness with KIV 3.0. CADE 1997: 69-72
22 Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Proving System Correctness with KIV. TAPSOFT 1997: 859-862
1995
21 Wolfgang Reif: The KIV-Approach to Software Verification. KORSO Book 1995: 339-370
20 Thomas Fuchß, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Three Selected Case Studies in Verification. KORSO Book 1995: 371-387
1994
19 Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Formal Specification and Verification Using KIV. FTRTFT 1994: 787-787
18 Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Tactics in KIV. Elektronische Informationsverarbeitung und Kybernetik 30(5/6): 293-310 (1994)
1993
17 Wolfgang Reif, Kurt Stenzel: Reuse of Proofs in Software Verification. FSTTCS 1993: 284-293
16 Wolfgang Reif: An Approach to Parameterized First-Order Specifications: Semantics, Correctness, Parameter Passing. Formal Methods in Programming and Their Applications 1993: 67-80
15 Heinrich Hußmann, Jacques Loeckx, Wolfgang Reif: KORSO: Das Verbundprojekt "Korrekte Software". GI Jahrestagung 1993: 266-271
14 Rainer Drexler, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Werner Stephan, Andreas Wolpers: The KIV System: A Tool for Formal Program Development. STACS 1993: 704-705
13 Markus Ullmann, H. Hauff, D. Loevenich, P. Kejwal, R. Förster, P. Baur, Wolfgang Reif, Werner Stephan, Andreas Wolpers, Jürgen Cleve, Dieter Hutter, Claus Sengler, E. Canver: VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. VIS 1993: 175-190
1992
12 Wolfgang Reif: The KIV System: Systematic Construction of Verified Software. CADE 1992: 753-757
11 Wolfgang Reif: Verification of Large Software Systems. FSTTCS 1992: 241-252
10 Wolfgang Reif: Correctness of Generic Modules. LFCS 1992: 406-417
9EEWolfgang Reif: Correctness of Full First-Order Specifications. SEKE 1992: 276-283
1990
8 Maritta Heisel, Wolfgang Reif, Werner Stephan: Tactical Theorem Proving in Program Verification. CADE 1990: 117-131
1989
7 Maritta Heisel, Wolfgang Reif, Werner Stephan: Machine-Assisted Program Construction and Modification. GWAI 1989: 338-347
6 Maritta Heisel, Wolfgang Reif, Werner Stephan: A Dynamic Logic for Program Verification. Logic at Botik 1989: 134-145
1988
5 Maritta Heisel, Wolfgang Reif, Werner Stephan: Implementing Verification Strategies in the KIV-System. CADE 1988: 131-140
4 Maritta Heisel, Wolfgang Reif: Bericht über den Workshop ``Logik und Wissensrepräsentation''. KI 2(3): 15-17 (1988)
1987
3 Maritta Heisel, Wolfgang Reif, Werner Stephan: Program Verification Using Dynamic Logic. CSL 1987: 102-117
2 Maritta Heisel, Wolfgang Reif, Werner Stephan: Program Verification by Symbolic Execution and Induction. GWAI 1987: 201-210
1986
1 Reiner Hähnle, Maritta Heisel, Wolfgang Reif, Werner Stephan: An Interactive Verification System Based on Dynamic Logic. CADE 1986: 306-315

Coauthor Index

1Andreas Angerer [64]
2Vernon Austel [31] [36]
3Michael Balser [25] [26] [30] [37] [47] [54] [55] [57] [70] [72]
4Simon Bäumler [47] [55] [70] [72]
5P. Baur [13]
6Rudolf Berghammer [40]
7Robert Bertossi [62]
8Markus Bischof [74]
9E. Canver [13]
10Jürgen Cleve [13]
11Joyce van Croonenborg [54]
12Werner Damm [50]
13Jörg Desel [50]
14Rainer Drexler [14]
15Christoph Duelli [37] [54]
16Andriy Dunets [55] [71] [75]
17Hartmut Ehrig [50]
18R. Förster [13]
19Thomas Fuchß [20]
20Holger Grandy [51] [53] [58] [59] [62] [65] [68] [69] [74] [76]
21Martin Große-Rhode [50]
22Matthias Güdemann [56] [60] [63] [64]
23Reiner Hähnle [1] [27]
24Dominik Haneberg [39] [40] [41] [42] [48] [53] [58] [59] [65] [67] [69]
25Frank van Harmelen [54]
26H. Hauff [13]
27Maritta Heisel [1] [2] [3] [4] [5] [6] [7] [8]
28Bernhard Hering [38]
29Alwin Hoffmann [57]
30Heinrich Hußmann (Heinrich Hussmann) [15]
31Dieter Hutter [13] [25]
32Paul A. Karger [31] [36]
33P. Kejwal [13]
34Alexander Knapp [47]
35Alexander Kreibich [41]
36Jacques Loeckx [15]
37D. Loevenich [13]
38Peter J. F. Lucas [54]
39Heiko Mantel [25]
40Mar Marcos [54] [57]
41Wolfram Menzel [27]
42Silvia Miksch [54]
43Nina Moebius [67]
44Florian Nafz [56] [70] [73]
45Frank Ortmeier [38] [43] [44] [45] [46] [49] [52] [60] [61] [63] [64] [66] [73]
46Georg Rock [25]
47Kitty Rosenbrand [54]
48Jürgen Ruf [29] [32]
49Axel Schairer [31] [36]
50Gerhard Schellhorn [14] [18] [19] [20] [22] [23] [25] [26] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [40] [43] [44] [45] [46] [52] [53] [58] [65] [67] [69] [71] [72] [74] [75]
51Hartmut Schmeck [61]
52Jonathan Schmitt [55] [57]
53Peter H. Schmitt [27]
54Eckehard Schnieder [50]
55Hella Seebach [56] [66] [73]
56Claus Sengler [13]
57Giovanna Di Marzo Serugendo [61]
58Andreas Seyfang [54]
59Kurt Stenzel [14] [17] [18] [19] [20] [22] [23] [25] [26] [30] [39] [41] [42] [48] [51] [59] [62] [68] [74] [76]
60Werner Stephan [1] [2] [3] [5] [6] [7] [8] [13] [14] [25]
61Annette ten Teije [54]
62Andreas Thums [30] [35] [38] [43] [45] [46] [47]
63David C. Toll [31] [36]
64Helmut Trappschuh [38]
65Markus Ullmann [13]
66Tobias Vollmer [29] [32]
67Engelbert Westkämper [50]
68Andreas Wolpers [13] [14] [25]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)