2009 | ||
---|---|---|
63 | EE | Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith: Query-Driven Program Testing. VMCAI 2009: 151-166 |
62 | EE | Johannes Kinder, Florian Zuleger, Helmut Veith: An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. VMCAI 2009: 214-228 |
2008 | ||
61 | Orna Grumberg, Helmut Veith: 25 Years of Model Checking - History, Achievements, Perspectives Springer 2008 | |
60 | Iliano Cervesato, Helmut Veith, Andrei Voronkov: Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, LPAR 2008, Doha, Qatar, November 22-27, 2008. Proceedings Springer 2008 | |
59 | EE | Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith: FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement. CAV 2008: 209-213 |
58 | EE | Johannes Kinder, Helmut Veith: Jakstab: A Static Analysis Platform for Binaries. CAV 2008: 423-427 |
57 | EE | Edmund M. Clarke, Muralidhar Talupur, Helmut Veith: Proving Ptolemy Right: The Environment Abstraction Framework for Model Checking Concurrent Systems. TACAS 2008: 33-47 |
2007 | ||
56 | EE | Sagar Chaki, Christian Schallhart, Helmut Veith: Verification Across Intellectual Property Boundaries. CAV 2007: 82-94 |
55 | EE | Andreas Holzer, Johannes Kinder, Helmut Veith: Using Verification Technology to Specify and Detect Malware. EUROCAST 2007: 497-504 |
54 | EE | Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IEEE Symposium on Security and Privacy 2007: 179-186 |
53 | EE | Marko Samer, Helmut Veith: On the Notion of Vacuous Truth. LPAR 2007: 2-14 |
52 | EE | Sagar Chaki, Christian Schallhart, Helmut Veith: Verification Across Intellectual Property Boundaries CoRR abs/cs/0701187: (2007) |
51 | EE | Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith: Software transformations to improve malware detection. Journal in Computer Virology 3(4): 253-265 (2007) |
2006 | ||
50 | EE | Edmund M. Clarke, Muralidhar Talupur, Helmut Veith: Environment Abstraction for Parameterized Verification. VMCAI 2006: 126-141 |
49 | EE | Oleg Pikhurko, Helmut Veith, Oleg Verbitsky: The first order definability of graphs: Upper bounds for quantifier depth. Discrete Applied Mathematics 154(17): 2511-2529 (2006) |
2005 | ||
48 | EE | Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Detecting Malicious Code by Model Checking. DIMVA 2005: 174-187 |
47 | EE | Sagar Chaki, Edmund M. Clarke, Orna Grumberg, Joël Ouaknine, Natasha Sharygina, Tayssir Touili, Helmut Veith: State/Event Software Verification for Branching-Time Specifications. IFM 2005: 53-69 |
46 | Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508 | |
45 | Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Malware Engineering. Sicherheit 2005: 139-148 | |
44 | EE | Marko Samer, Helmut Veith: Deterministic CTL Query Solving. TIME 2005: 156-165 |
43 | Marko Samer, Helmut Veith: From Temporal Logic Queries to Vacuity Detection. VISSAS 2005: 149-167 | |
42 | EE | Edmund M. Clarke, Anubhav Gupta, Himanshu Jain, Helmut Veith: Model Checking: Back and Forth between Hardware and Software. VSTTE 2005: 251-255 |
41 | Edmund M. Clarke, Ansgar Fehnker, Sumit Kumar Jha, Helmut Veith: Temporal Logic Model Checking. Handbook of Networked and Embedded Control Systems 2005: 539-558 | |
40 | EE | Uwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments CoRR abs/cs/0503080: (2005) |
39 | EE | Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: An Iterative Framework for Simulation Conformance. J. Log. Comput. 15(4): 465-488 (2005) |
2004 | ||
38 | EE | Edmund M. Clarke, Muralidhar Talupur, Tayssir Touili, Helmut Veith: Verification by Network Decomposition. CONCUR 2004: 276-291 |
37 | EE | Marko Samer, Helmut Veith: Parameterized Vacuity. FMCAD 2004: 322-336 |
36 | EE | Marko Samer, Helmut Veith: A Syntactic Characterization of Distributive LTL Queries. ICALP 2004: 1099-1110 |
35 | EE | Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. IEEE Trans. Software Eng. 30(6): 388-402 (2004) |
2003 | ||
34 | EE | Marko Samer, Helmut Veith: Validity of CTL Queries Revisited. CSL 2003: 470-483 |
33 | EE | Helmut Veith: Friends or Foes? Communities in Software Verification (Invited Lecture). CSL 2003: 528-529 |
32 | EE | André Adelsbach, Stefan Katzenbeisser, Helmut Veith: Watermarking schemes provably secure against copy and ambiguity attacks. Digital Rights Management Workshop 2003: 111-119 |
31 | EE | Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. ICSE 2003: 385-395 |
30 | EE | Edmund M. Clarke, Muralidhar Talupur, Helmut Veith, Dong Wang: SAT Based Predicate Abstraction for Hardware Verification. SAT 2003: 78-92 |
29 | Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith: Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. SEKE 2003: 510-517 | |
28 | EE | Edmund M. Clarke, Helmut Veith: Counterexamples Revisited: Principles, Algorithms, Applications. Verification: Theory and Practice 2003: 208-224 |
27 | EE | Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5): 752-794 (2003) |
2002 | ||
26 | EE | Pankaj Chauhan, Edmund M. Clarke, James H. Kukula, Samir Sapra, Helmut Veith, Dong Wang: Automated Abstraction Refinement for Model Checking Large State Spaces Using SAT Based Conflict Analysis. FMCAD 2002: 33-51 |
25 | EE | Edmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith: Tree-Like Counterexamples in Model Checking. LICS 2002: 19-29 |
24 | EE | Georg Gottlob, Erich Grädel, Helmut Veith: Datalog LITE: a deductive query language with linear time model checking. ACM Trans. Comput. Log. 3(1): 42-79 (2002) |
23 | Thomas Eiter, Helmut Veith: On the complexity of data disjunctions. Theor. Comput. Sci. 288(1): 101-128 (2002) | |
2001 | ||
22 | EE | Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang: Using Combinatorial Optimization Methods for Quantification Scheduling. CHARME 2001: 293-309 |
21 | EE | Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang: Non-linear Quantification Scheduling in Image Computation. ICCAD 2001: 293- |
20 | Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. ICSE 2001: 443-452 | |
19 | EE | Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Progress on the State Explosion Problem in Model Checking. Informatics 2001: 176-194 |
18 | Matthias Baaz, Petr Hájek, Franco Montagna, Helmut Veith: Complexity of t-tautologies. Ann. Pure Appl. Logic 113(1-3): 3-11 (2001) | |
2000 | ||
17 | Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-Guided Abstraction Refinement. CAV 2000: 154-169 | |
16 | EE | Edmund M. Clarke, Steven M. German, Yuan Lu, Helmut Veith, Dong Wang: Executable Protocol Specification in ESL. FMCAD 2000: 197-216 |
15 | Matthias Baaz, Christian G. Fermüller, Helmut Veith: An Analytic Calculus for Quantified Propositional Gödel Logic. TABLEAUX 2000: 112-126 | |
1999 | ||
14 | EE | Matthias Baaz, Agata Ciabattoni, Christian G. Fermüller, Helmut Veith: On the Undecidability of some Sub-Classical First-Order Logics. FSTTCS 1999: 258-268 |
13 | Georg Gottlob, Nicola Leone, Helmut Veith: Succinctness as a Source of Complexity in Logical Formalisms. Ann. Pure Appl. Logic 97(1-3): 231-260 (1999) | |
12 | EE | Matthias Baaz, Helmut Veith: Interpolation in fuzzy logic. Arch. Math. Log. 38(7): 461-489 (1999) |
1998 | ||
11 | Matthias Baaz, Helmut Veith: Quantifier Elimination in Fuzzy Logic. CSL 1998: 399-414 | |
10 | EE | Helmut Veith: A General Method to Determine the Expression Complexity of Database Query Languages. Grundlagen von Datenbanken 1998: 134-137 |
9 | EE | Helmut Veith: How to Encode a Logical Structure by an OBDD. IEEE Conference on Computational Complexity 1998: 122-131 |
8 | EE | Matthias Baaz, Agata Ciabattoni, Christian G. Fermüller, Helmut Veith: Proof Theory of Fuzzy Logics: Urquhart's C and Related Logics. MFCS 1998: 203-212 |
7 | Helmut Veith: Succinct Representation, Leaf Languages, and Projection Reductions. Inf. Comput. 142(2): 207-236 (1998) | |
1997 | ||
6 | EE | Thomas Eiter, Georg Gottlob, Helmut Veith: Generalized Quantifiers in Logic Programs. ESSLLI 1997: 72-98 |
5 | Thomas Eiter, Georg Gottlob, Helmut Veith: Modular Logic Programming and Generalized Quantifiers. LPNMR 1997: 290-309 | |
4 | EE | Helmut Veith: Languages Represented by Boolean Formulas. Inf. Process. Lett. 63(5): 251-256 (1997) |
1996 | ||
3 | EE | Helmut Veith: Succinct Representation, Leaf Languages, and Projection Reductions. IEEE Conference on Computational Complexity 1996: 118-126 |
1995 | ||
2 | Georg Gottlob, Nicola Leone, Helmut Veith: Second Order Logic and the Weak Exponential Hierarchies. MFCS 1995: 66-81 | |
1 | EE | Helmut Veith: Succinct Representation and Leaf Languages Electronic Colloquium on Computational Complexity (ECCC) 2(48): (1995) |