2009 |
63 | EE | Andreas Holzer,
Christian Schallhart,
Michael Tautschnig,
Helmut Veith:
Query-Driven Program Testing.
VMCAI 2009: 151-166 |
62 | EE | Johannes Kinder,
Florian Zuleger,
Helmut Veith:
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
VMCAI 2009: 214-228 |
2008 |
61 | | Orna Grumberg,
Helmut Veith:
25 Years of Model Checking - History, Achievements, Perspectives
Springer 2008 |
60 | | Iliano Cervesato,
Helmut Veith,
Andrei Voronkov:
Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, LPAR 2008, Doha, Qatar, November 22-27, 2008. Proceedings
Springer 2008 |
59 | EE | Andreas Holzer,
Christian Schallhart,
Michael Tautschnig,
Helmut Veith:
FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement.
CAV 2008: 209-213 |
58 | EE | Johannes Kinder,
Helmut Veith:
Jakstab: A Static Analysis Platform for Binaries.
CAV 2008: 423-427 |
57 | EE | Edmund M. Clarke,
Muralidhar Talupur,
Helmut Veith:
Proving Ptolemy Right: The Environment Abstraction Framework for Model Checking Concurrent Systems.
TACAS 2008: 33-47 |
2007 |
56 | EE | Sagar Chaki,
Christian Schallhart,
Helmut Veith:
Verification Across Intellectual Property Boundaries.
CAV 2007: 82-94 |
55 | EE | Andreas Holzer,
Johannes Kinder,
Helmut Veith:
Using Verification Technology to Specify and Detect Malware.
EUROCAST 2007: 497-504 |
54 | EE | Somesh Jha,
Stefan Katzenbeisser,
Christian Schallhart,
Helmut Veith,
Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
IEEE Symposium on Security and Privacy 2007: 179-186 |
53 | EE | Marko Samer,
Helmut Veith:
On the Notion of Vacuous Truth.
LPAR 2007: 2-14 |
52 | EE | Sagar Chaki,
Christian Schallhart,
Helmut Veith:
Verification Across Intellectual Property Boundaries
CoRR abs/cs/0701187: (2007) |
51 | EE | Mihai Christodorescu,
Somesh Jha,
Johannes Kinder,
Stefan Katzenbeisser,
Helmut Veith:
Software transformations to improve malware detection.
Journal in Computer Virology 3(4): 253-265 (2007) |
2006 |
50 | EE | Edmund M. Clarke,
Muralidhar Talupur,
Helmut Veith:
Environment Abstraction for Parameterized Verification.
VMCAI 2006: 126-141 |
49 | EE | Oleg Pikhurko,
Helmut Veith,
Oleg Verbitsky:
The first order definability of graphs: Upper bounds for quantifier depth.
Discrete Applied Mathematics 154(17): 2511-2529 (2006) |
2005 |
48 | EE | Johannes Kinder,
Stefan Katzenbeisser,
Christian Schallhart,
Helmut Veith:
Detecting Malicious Code by Model Checking.
DIMVA 2005: 174-187 |
47 | EE | Sagar Chaki,
Edmund M. Clarke,
Orna Grumberg,
Joël Ouaknine,
Natasha Sharygina,
Tayssir Touili,
Helmut Veith:
State/Event Software Verification for Branching-Time Specifications.
IFM 2005: 53-69 |
46 | | Jana Dittmann,
Stefan Katzenbeisser,
Christian Schallhart,
Helmut Veith:
Ensuring Media Integrity on Third-Party Infrastructures.
SEC 2005: 493-508 |
45 | | Stefan Katzenbeisser,
Christian Schallhart,
Helmut Veith:
Malware Engineering.
Sicherheit 2005: 139-148 |
44 | EE | Marko Samer,
Helmut Veith:
Deterministic CTL Query Solving.
TIME 2005: 156-165 |
43 | | Marko Samer,
Helmut Veith:
From Temporal Logic Queries to Vacuity Detection.
VISSAS 2005: 149-167 |
42 | EE | Edmund M. Clarke,
Anubhav Gupta,
Himanshu Jain,
Helmut Veith:
Model Checking: Back and Forth between Hardware and Software.
VSTTE 2005: 251-255 |
41 | | Edmund M. Clarke,
Ansgar Fehnker,
Sumit Kumar Jha,
Helmut Veith:
Temporal Logic Model Checking.
Handbook of Networked and Embedded Control Systems 2005: 539-558 |
40 | EE | Uwe Hermann,
Stefan Katzenbeisser,
Christian Schallhart,
Helmut Veith:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
CoRR abs/cs/0503080: (2005) |
39 | EE | Sagar Chaki,
Edmund M. Clarke,
Somesh Jha,
Helmut Veith:
An Iterative Framework for Simulation Conformance.
J. Log. Comput. 15(4): 465-488 (2005) |
2004 |
38 | EE | Edmund M. Clarke,
Muralidhar Talupur,
Tayssir Touili,
Helmut Veith:
Verification by Network Decomposition.
CONCUR 2004: 276-291 |
37 | EE | Marko Samer,
Helmut Veith:
Parameterized Vacuity.
FMCAD 2004: 322-336 |
36 | EE | Marko Samer,
Helmut Veith:
A Syntactic Characterization of Distributive LTL Queries.
ICALP 2004: 1099-1110 |
35 | EE | Sagar Chaki,
Edmund M. Clarke,
Alex Groce,
Somesh Jha,
Helmut Veith:
Modular Verification of Software Components in C.
IEEE Trans. Software Eng. 30(6): 388-402 (2004) |
2003 |
34 | EE | Marko Samer,
Helmut Veith:
Validity of CTL Queries Revisited.
CSL 2003: 470-483 |
33 | EE | Helmut Veith:
Friends or Foes? Communities in Software Verification (Invited Lecture).
CSL 2003: 528-529 |
32 | EE | André Adelsbach,
Stefan Katzenbeisser,
Helmut Veith:
Watermarking schemes provably secure against copy and ambiguity attacks.
Digital Rights Management Workshop 2003: 111-119 |
31 | EE | Sagar Chaki,
Edmund M. Clarke,
Alex Groce,
Somesh Jha,
Helmut Veith:
Modular Verification of Software Components in C.
ICSE 2003: 385-395 |
30 | EE | Edmund M. Clarke,
Muralidhar Talupur,
Helmut Veith,
Dong Wang:
SAT Based Predicate Abstraction for Hardware Verification.
SAT 2003: 78-92 |
29 | | Sagar Chaki,
Pascal Fenkam,
Harald Gall,
Somesh Jha,
Engin Kirda,
Helmut Veith:
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform.
SEKE 2003: 510-517 |
28 | EE | Edmund M. Clarke,
Helmut Veith:
Counterexamples Revisited: Principles, Algorithms, Applications.
Verification: Theory and Practice 2003: 208-224 |
27 | EE | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Counterexample-guided abstraction refinement for symbolic model checking.
J. ACM 50(5): 752-794 (2003) |
2002 |
26 | EE | Pankaj Chauhan,
Edmund M. Clarke,
James H. Kukula,
Samir Sapra,
Helmut Veith,
Dong Wang:
Automated Abstraction Refinement for Model Checking Large State Spaces Using SAT Based Conflict Analysis.
FMCAD 2002: 33-51 |
25 | EE | Edmund M. Clarke,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Tree-Like Counterexamples in Model Checking.
LICS 2002: 19-29 |
24 | EE | Georg Gottlob,
Erich Grädel,
Helmut Veith:
Datalog LITE: a deductive query language with linear time model checking.
ACM Trans. Comput. Log. 3(1): 42-79 (2002) |
23 | | Thomas Eiter,
Helmut Veith:
On the complexity of data disjunctions.
Theor. Comput. Sci. 288(1): 101-128 (2002) |
2001 |
22 | EE | Pankaj Chauhan,
Edmund M. Clarke,
Somesh Jha,
James H. Kukula,
Helmut Veith,
Dong Wang:
Using Combinatorial Optimization Methods for Quantification Scheduling.
CHARME 2001: 293-309 |
21 | EE | Pankaj Chauhan,
Edmund M. Clarke,
Somesh Jha,
James H. Kukula,
Thomas R. Shiple,
Helmut Veith,
Dong Wang:
Non-linear Quantification Scheduling in Image Computation.
ICCAD 2001: 293- |
20 | | Alexis Campailla,
Sagar Chaki,
Edmund M. Clarke,
Somesh Jha,
Helmut Veith:
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision.
ICSE 2001: 443-452 |
19 | EE | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Progress on the State Explosion Problem in Model Checking.
Informatics 2001: 176-194 |
18 | | Matthias Baaz,
Petr Hájek,
Franco Montagna,
Helmut Veith:
Complexity of t-tautologies.
Ann. Pure Appl. Logic 113(1-3): 3-11 (2001) |
2000 |
17 | | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Counterexample-Guided Abstraction Refinement.
CAV 2000: 154-169 |
16 | EE | Edmund M. Clarke,
Steven M. German,
Yuan Lu,
Helmut Veith,
Dong Wang:
Executable Protocol Specification in ESL.
FMCAD 2000: 197-216 |
15 | | Matthias Baaz,
Christian G. Fermüller,
Helmut Veith:
An Analytic Calculus for Quantified Propositional Gödel Logic.
TABLEAUX 2000: 112-126 |
1999 |
14 | EE | Matthias Baaz,
Agata Ciabattoni,
Christian G. Fermüller,
Helmut Veith:
On the Undecidability of some Sub-Classical First-Order Logics.
FSTTCS 1999: 258-268 |
13 | | Georg Gottlob,
Nicola Leone,
Helmut Veith:
Succinctness as a Source of Complexity in Logical Formalisms.
Ann. Pure Appl. Logic 97(1-3): 231-260 (1999) |
12 | EE | Matthias Baaz,
Helmut Veith:
Interpolation in fuzzy logic.
Arch. Math. Log. 38(7): 461-489 (1999) |
1998 |
11 | | Matthias Baaz,
Helmut Veith:
Quantifier Elimination in Fuzzy Logic.
CSL 1998: 399-414 |
10 | EE | Helmut Veith:
A General Method to Determine the Expression Complexity of Database Query Languages.
Grundlagen von Datenbanken 1998: 134-137 |
9 | EE | Helmut Veith:
How to Encode a Logical Structure by an OBDD.
IEEE Conference on Computational Complexity 1998: 122-131 |
8 | EE | Matthias Baaz,
Agata Ciabattoni,
Christian G. Fermüller,
Helmut Veith:
Proof Theory of Fuzzy Logics: Urquhart's C and Related Logics.
MFCS 1998: 203-212 |
7 | | Helmut Veith:
Succinct Representation, Leaf Languages, and Projection Reductions.
Inf. Comput. 142(2): 207-236 (1998) |
1997 |
6 | EE | Thomas Eiter,
Georg Gottlob,
Helmut Veith:
Generalized Quantifiers in Logic Programs.
ESSLLI 1997: 72-98 |
5 | | Thomas Eiter,
Georg Gottlob,
Helmut Veith:
Modular Logic Programming and Generalized Quantifiers.
LPNMR 1997: 290-309 |
4 | EE | Helmut Veith:
Languages Represented by Boolean Formulas.
Inf. Process. Lett. 63(5): 251-256 (1997) |
1996 |
3 | EE | Helmut Veith:
Succinct Representation, Leaf Languages, and Projection Reductions.
IEEE Conference on Computational Complexity 1996: 118-126 |
1995 |
2 | | Georg Gottlob,
Nicola Leone,
Helmut Veith:
Second Order Logic and the Weak Exponential Hierarchies.
MFCS 1995: 66-81 |
1 | EE | Helmut Veith:
Succinct Representation and Leaf Languages
Electronic Colloquium on Computational Complexity (ECCC) 2(48): (1995) |