Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Felix C. Freiling
Felix C. Gärtner
2010 – today
- 2013
[j33]Felix C. Freiling: Im Fokus: Technische und menschliche Aspekte von Cyberkriminalität. Praxis der Informationsverarbeitung und Kommunikation 36(3): 199-200 (2013)
[c102]Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling: Stark - Tamperproof Authentication to Resist Keylogging. Financial Cryptography 2013: 295-312
[c101]
[c100]Martin Wundram, Felix C. Freiling, Christian Moch: Anti-forensics: The Next Step in Digital Forensics Tool Testing. IMF 2013: 83-97
[c99]Sven Kalber, Andreas Dewald, Felix C. Freiling: Forensic Application-Fingerprinting Based on File System Metadata. IMF 2013: 98-112
[c98]Michael Spreitzenbarth, Felix C. Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann: Mobile-sandbox: having a deeper look into android applications. SAC 2013: 1808-1815
[e5]Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt (Eds.): Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013. IEEE 2013, ISBN 978-1-4673-6307-5- 2012
[j32]Stefan Vömel, Felix C. Freiling: Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. Digital Investigation 9(2): 125-137 (2012)
[j31]Matthias Bäcker, Andreas Dewald, Felix C. Freiling, Sven Schmitt: Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren. Datenschutz und Datensicherheit 36(8): 597-602 (2012)
[j30]Carsten Willems, Felix C. Freiling: Reverse Code Engineering - State of the Art and Countermeasures. it - Information Technology 54(2): 53-63 (2012)
[j29]Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola: Secure Failure Detection and Consensus in TrustedPals. IEEE Trans. Dependable Sec. Comput. 9(4): 610-625 (2012)
[c97]Tilo Müller, Benjamin Taubmann, Felix C. Freiling: TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. ACNS 2012: 66-83
[c96]Carsten Willems, Felix C. Freiling, Thorsten Holz: Using memory management to detect and extract illegitimate code for malware analysis. ACSAC 2012: 179-188
[c95]Colin Atkinson, Florian Barth, Ralph Gerbig, Felix C. Freiling, Sebastian Schinzel, Frank Hadasch, Alexander Maedche, Benjamin Mueller: Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems. EDOC Workshops 2012: 11-18
[c94]Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling: Comparing Sources of Location Data from Android Smartphones. IFIP Int. Conf. Digital Forensics 2012: 143-157
[c93]Andreas Dewald, Felix C. Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems: Analyse und Vergleich von BckR2D2-I und II. Sicherheit 2012: 47-58
[c92]Christian Zimmermann, Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling: Forensic Analysis of YAFFS2. Sicherheit 2012: 59-69
[c91]Markus Engelberth, Jan Göbel, Christian Schönbein, Felix C. Freiling: PyBox - A Python Sandbox. Sicherheit 2012: 137-148
[c90]Philipp Trinius, Felix C. Freiling: Filtern von Spam-Nachrichten mit kontextfreien Grammatiken. Sicherheit 2012: 163-174
[e4]Dieter Gollmann, Felix C. Freiling (Eds.): Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8- 2011
[b1]Andreas Dewald, Felix C. Freiling: Forensische Informatik. Books on Demand GmbH 2011, ISBN 978-3-8423-7947-3, pp. I-VIII, 1-123
[j28]Felix C. Freiling, Rachid Guerraoui, Petr Kuznetsov: The failure detector abstraction. ACM Comput. Surv. 43(2): 9 (2011)
[j27]Stefan Vömel, Felix C. Freiling: A survey of main memory acquisition and analysis techniques for the windows operating system. Digital Investigation 8(1): 3-22 (2011)
[j26]Markus Engelberth, Felix C. Freiling, Jan Göbel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems: Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet. Datenschutz und Datensicherheit 35(4): 247-252 (2011)
[j25]Iratxe Soraluze Arriola, Roberto Cortiñas, Alberto Lafuente, Mikel Larrea, Felix C. Freiling: Communication-efficient failure detection and consensus in omission environments. Inf. Process. Lett. 111(6): 262-268 (2011)
[c89]Christian Moch, Felix C. Freiling: Evaluating the Forensic Image Generator Generator. ICDF2C 2011: 238-252
[c88]Andreas Dewald, Felix C. Freiling, Tim Weber: Design and Implementation of a Documentation Tool for Interactive Commandline Sessions. IMF 2011: 62-80
[c87]Felix C. Freiling, Sebastian Schinzel: Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. SEC 2011: 41-55
[c86]Amir Alsbih, Felix C. Freiling, Christian Schindelhauer: A Case Study in Practical Security of Cable Networks. SEC 2011: 92-103
[c85]Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf: Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. IEEE Symposium on Security and Privacy 2011: 96-111
[c84]Christian Gorecki, Felix C. Freiling, Marc Kührer, Thorsten Holz: TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet. SSS 2011: 208-222
[c83]Tilo Müller, Felix C. Freiling, Andreas Dewald: TRESOR Runs Encryption Securely Outside RAM. USENIX Security Symposium 2011
[i2]Felix C. Freiling, Dirk Heckmann, Radim Polcák, Joachim Posegga: Forensic Computing (Dagstuhl Seminar 11401). Dagstuhl Reports 1(10): 1-13 (2011)- 2010
[j24]Markus Bestehorn, Zinaida Benenson, Erik Buchmann, Marek Jawurek, Klemens Böhm, Felix C. Freiling: Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption. Ad Hoc & Sensor Wireless Networks 9(1-2): 85-107 (2010)
[j23]Matthias Bäcker, Felix C. Freiling, Sven Schmitt: Selektion vor der Sicherung - Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien. Datenschutz und Datensicherheit 34(2): 80-85 (2010)
[j22]Zinaida Benenson, Erik-Oliver Blaß, Felix C. Freiling: Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze). it - Information Technology 52(6): 320-324 (2010)
[j21]Ioannis Krontiris, Felix C. Freiling, Tassos Dimitriou: Location privacy in urban sensing networks: research challenges and directions. IEEE Wireless Commun. 17(5): 30-35 (2010)
[c82]Michael Müter, André Groll, Felix C. Freiling: A structured approach to anomaly detection for in-vehicle networks. IAS 2010: 92-98
[c81]Tilo Müller, Andreas Dewald, Felix C. Freiling: AESSE: a cold-boot resistant implementation of AES. EUROSEC 2010: 42-47
[c80]Ioannis Krontiris, Felix C. Freiling: Integrating people-centric sensing with social networks: A privacy research agenda. PerCom Workshops 2010: 620-623
[c79]Andreas Dewald, Thorsten Holz, Felix C. Freiling: ADSandbox: sandboxing JavaScript to fight malicious websites. SAC 2010: 1859-1864
[e3]
2000 – 2009
- 2009
[j20]Felix C. Freiling: Ein Blick auf IT-Sicherheit aus Angreiferperspektive - Vom Wert offensiver Methoden. Datenschutz und Datensicherheit 33(4): 214-217 (2009)
[j19]Marion Liegl, Martin Mink, Felix C. Freiling: Datenschutz in digital-forensischen Lehrveranstaltungen - Sicherer Umgang mit persönlichen Daten. Datenschutz und Datensicherheit 33(4): 222-227 (2009)
[j18]Felix C. Freiling, Dennis Heinson: Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung. Datenschutz und Datensicherheit 33(9): 547-552 (2009)
[j17]Joachim Wilke, Erik-Oliver Blaß, Felix C. Freiling, Martina Zitterbart: A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks. Praxis der Informationsverarbeitung und Kommunikation 32(2): 116-126 (2009)
[j16]Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling: Safe termination detection in an asynchronous distributed system when processes may crash and recover. Theor. Comput. Sci. 410(6-7): 614-628 (2009)
[c78]Thorsten Holz, Markus Engelberth, Felix C. Freiling: Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. ESORICS 2009: 1-18
[c77]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou: Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278
[c76]Thorsten Holz, Markus Engelberth, Felix C. Freiling: Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. GI Jahrestagung 2009: 193
[c75]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner: Multimedia-Forensik als Teildisziplin der digitalen Forensik. GI Jahrestagung 2009: 1537-1551
[c74]Christian Moch, Felix C. Freiling: The Forensic Image Generator Generator (Forensig2). IMF 2009: 78-93
[c73]Carole Delporte-Gallet, Hugues Fauconnier, Andreas Tielmann, Felix C. Freiling, Mahir Kilic: Message-efficient omission-tolerant consensus with limited synchrony. IPDPS 2009: 1-8
[c72]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner: Multimedia Forensics Is Not Computer Forensics. IWCF 2009: 90-103
[c71]Felix C. Freiling, Christian Lambertz, Mila E. Majster-Cederbaum: Modular Consensus Algorithms for the Crash-Recovery Model. PDCAT 2009: 287-292
[c70]Ralf Hund, Thorsten Holz, Felix C. Freiling: Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. USENIX Security Symposium 2009: 383-398- 2008
[j15]Neeraj Mittal, Felix C. Freiling, Subbarayan Venkatesan, Lucia Draque Penso: On termination detection in crash-prone distributed systems with failure detectors. J. Parallel Distrib. Comput. 68(6): 855-875 (2008)
[c69]Zinaida Benenson, Markus Bestehorn, Erik Buchmann, Felix C. Freiling, Marek Jawurek: Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. ADHOC-NOW 2008: 279-292
[c68]Felix C. Freiling, Thorsten Holz, Martin Mink: Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. IMF 2008: 125-142
[c67]Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling: Measuring and Detecting Fast-Flux Service Networks. NDSS 2008
[c66]Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. LEET 2008
[c65]Ali Ikinci, Thorsten Holz, Felix C. Freiling: Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. Sicherheit 2008: 407-421
[c64]Michael Becher, Felix C. Freiling: Towards Dynamic Malware Analysis to Increase Mobile Device Security423. Sicherheit 2008: 423-433
[c63]Felix C. Freiling, Jens Liebchen: Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests. Sicherheit 2008: 435-447
[c62]Felix C. Freiling, Christian Lambertz, Mila E. Majster-Cederbaum: Easy Consensus Algorithms for the Crash-Recovery Model. DISC 2008: 507-508
[e2]Irene Eusgeld, Felix C. Freiling, Ralf Reussner (Eds.): Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]. Lecture Notes in Computer Science 4909, Springer 2008, ISBN 978-3-540-68946-1- 2007
[j14]Carsten Willems, Thorsten Holz, Felix C. Freiling: Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy 5(2): 32-39 (2007)
[c61]Felix C. Freiling, Matthias Majuntke, Neeraj Mittal: On Detecting Termination in the Crash-Recovery Model. Euro-Par 2007: 629-638
[c60]Felix C. Freiling, Bastian Schwittay: A Common Process Model for Incident Response and Computer Forensics. IMF 2007: 19-40
[c59]Harish Daiya, Maximillian Dornseif, Felix C. Freiling: Testing Forensic Hash Tools on Sparse Files. IMF 2007: 113-124
[c58]Felix C. Freiling, Bastian Schwittay: Towards Reliable Rootkit Detection in Live Response. IMF 2007: 125-144
[c57]Zinaida Benenson, Felix C. Freiling, Peter M. Cholewinski: Advanced Evasive Data Storage in Sensor Networks. MDM 2007: 146-151
[c56]Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola: Secure Failure Detection in TrustedPals. SSS 2007: 173-188
[c55]Felix C. Freiling, Arshad Jhumka: Global Predicate Detection in Distributed Systems with Small Faults. SSS 2007: 296-310
[c54]Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling, Lucia Draque Penso, Andreas Tielmann: From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors. DISC 2007: 165-178
[e1]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman (Eds.): From Security to Dependability, 10.09. - 15.09.2006. Dagstuhl Seminar Proceedings 06371, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007- 2006
[j13]Helmut Reimer, Jana Dittmann, Claus Vielhauer, Felix C. Freiling, Francesca Saglietti, Manfred Reitenspieß, Andreas Lang: Veranstaltungsbesprechungen. Datenschutz und Datensicherheit 30(4): 258-259 (2006)
[j12]Arshad Jhumka, Felix C. Freiling, Christof Fetzer, Neeraj Suri: An approach to synthesise safe systems. IJSN 1(1/2): 62-74 (2006)
[j11]Felix C. Freiling, Hagen Völzer: Illustrating the impossibility of crash-tolerant consensus in asynchronous systems. Operating Systems Review 40(2): 105-109 (2006)
[c53]Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso: Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65
[c52]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006
[c51]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006
[c50]Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner: Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178
[c49]Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan: TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. ESORICS 2006: 34-48
[c48]Philip Anderson, Maximillian Dornseif, Felix C. Freiling, Thorsten Holz, Alastair Irons, Christopher Laing, Martin Mink: A Comparative Study of Teaching Forensics at a University Degree Level. IMF 2006: 116-127
[c47]Martin Mink, Felix C. Freiling: Is attack better than defense?: teaching information security the right way. InfoSecCD 2006: 44-48
[c46]Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling: Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover. OPODIS 2006: 126-141
[c45]Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks: Authenticated Query Flooding in Sensor Networks. PerCom Workshops 2006: 644-647
[c44]Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling: The Nepenthes Platform: An Efficient Approach to Collect Malware. RAID 2006: 165-184
[c43]Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis: Authenticated Query Flooding in Sensor Networks. SEC 2006: 38-49
[c42]Hans-Georg Eßer, Felix C. Freiling: Kapazitätsmessung eines verdeckten Zeitkanals über HTTP. Sicherheit 2006: 115-118
[c41]Timo Warns, Felix C. Freiling, Wilhelm Hasselbring: Solving Consensus Using Structural Failure Models. SRDS 2006: 212-224
[c40]Felix C. Freiling, Matthias Majuntke, Neeraj Mittal: Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures. SSS 2006: 572-573- 2005
[c39]Irene Eusgeld, Felix C. Freiling: Introduction to Dependability Metrics. Dependability Metrics 2005: 1-4
[c38]
[c37]
[c36]Felix C. Freiling, Max Walter: Reliability vs. Security: A Subjective Overview. Dependability Metrics 2005: 255-257
[c35]Gildas Avoine, Felix C. Gärtner, Rachid Guerraoui, Marko Vukolic: Gracefully Degrading Fair Exchange with Security Modules. EDCC 2005: 55-71
[c34]Felix C. Freiling, Thorsten Holz, Georg Wicherski: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. ESORICS 2005: 319-335
[c33]Marc Shapiro, Idit Keidar, Felix C. Freiling, Luís Rodrigues: Topic 8 - Distributed Systems and Algorithms. Euro-Par 2005: 593
[c32]Felix C. Freiling, Neeraj Mittal, Lucia Draque Penso: Transformations in Secure and Fault-Tolerant Distributed Computation. GI Jahrestagung (1) 2005: 410-412
[c31]Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling: Revisiting Failure Detection and Consensus in Omission Failure Environments. ICTAC 2005: 394-408
[c30]Felix C. Freiling, Maurice Herlihy, Lucia Draque Penso: Optimal Randomized Fair Exchange with Secret Shared Coins. OPODIS 2005: 61-72
[c29]Zinaida Benenson, Peter M. Cholewinski, Felix C. Freiling: Simple Evasive Data Storage in Sensor Networks. IASTED PDCS 2005: 779-784
[c28]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: Secure Multi-Party Computation with Security Modules. Sicherheit 2005: 41-52
[c27]
[c26]Neeraj Mittal, Felix C. Freiling, Subbarayan Venkatesan, Lucia Draque Penso: Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System. DISC 2005: 93-107- 2004
[j10]Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz: Vulnerability Assessment using Honeypots. Praxis der Informationsverarbeitung und Kommunikation 27(4): 195-201 (2004)
[c25]Christian Bunse, Felix C. Freiling, Nicole Lévy: A Taxonomy on Component-Based Software Engineering Methods. Architecting Systems with Trustworthy Components 2004: 103-119
[c24]Felix C. Freiling, Thomas Santen: On the Composition of Compositional Reasoning. Architecting Systems with Trustworthy Components 2004: 137-151
[c23]Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz: Ermittlung von Verwundbarkeiten mit elektronischen Ködern. DIMVA 2004: 129-141
[c22]Felix C. Gärtner, Arshad Jhumka: Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications. FORMATS/FTRTFT 2004: 183-198
[c21]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: User Authentication in Sensor Networks. GI Jahrestagung (2) 2004: 385-389
[p1]Alejandro P. Buchmann, Christof Bornhövd, Mariano Cilia, Ludger Fiege, Felix C. Gärtner, Christoph Liebig, Matthias Meixner, Gero Mühl: DREAM: Distributed Reliable Event-Based Application Management. Web Dynamics 2004: 319-352
[i1]Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz: Ermittlung von Verwundbarkeiten mit elektronischen Koedern. CoRR cs.CR/0406059 (2004)- 2003
[j9]
[j8]Felix C. Gärtner, Levente Buttyán, Klaus Kursawe: Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. IEEE Distributed Systems Online 4(9) (2003)
[j7]Felix C. Gärtner: Beobachten des Internet: Traum und Wirklichkeit (How to observe the Internet). it - Information Technology 45(6): 353-355 (2003)
[j6]Holger Vogt, Felix C. Gärtner, Henning Pagnia: Supporting Fair Exchange in Mobile Environments. MONET 8(2): 127-136 (2003)
[c20]Felix C. Gärtner, Klaus Kursawe, Levente Buttyán: PoDSy 2003: Principles of Dependable Systems. DSN 2003: 763
[c19]Felix C. Gärtner: Byzantine Failures and Security: Arbitrary is not (always) Random. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 127-138
[c18]Ludger Fiege, Andreas Zeidler, Felix C. Gärtner, Sidath B. Handurukande: Dealing with Uncertainty in Mobile Publish/Subscribe Middleware. Middleware Workshops 2003: 60-67
[c17]Ludger Fiege, Felix C. Gärtner, Oliver Kasten, Andreas Zeidler: Supporting Mobility in Content-Based Publish/Subscribe Middleware. Middleware 2003: 103-122
[c16]Jürgen Bohn, Felix C. Gärtner, Harald Vogt: Dependability Issues of Pervasive Computing in a Healthcare Environment. SPC 2003: 53-70
[c15]Felix C. Gärtner, Henning Pagnia: Time-Efficient Self-Stabilizing Algorithms through Hierarchical Structures. Self-Stabilizing Systems 2003: 154-168- 2002
[j5]Ludger Fiege, Gero Mühl, Felix C. Gärtner: Modular event-based systems. Knowledge Eng. Review 17(4): 359-388 (2002)
[c14]Felix C. Gärtner: Revisiting Liveness Properties in the Context of Secure Systems. FASec 2002: 221-238
[c13]Gero Mühl, Ludger Fiege, Felix C. Gärtner, Alejandro P. Buchmann: Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe Systems. MASCOTS 2002: 167-176
[c12]Ludger Fiege, Gero Mühl, Felix C. Gärtner: A modular approach to build structured event-based systems. SAC 2002: 385-392
[c11]Felix C. Gärtner, Stefan Pleisch: Failure Detection Sequencers: Necessary and Sufficient Information about Failures to Solve Predicate Detection. DISC 2002: 280-294- 2001
[c10]Holger Vogt, Henning Pagnia, Felix C. Gärtner: Using Smart Cards for Fair Exchange. WELCOM 2001: 101-113
[c9]Felix C. Gärtner, Stefan Pleisch: (Im)Possibilities of Predicate Detection in Crash-Affected Systems. WSS 2001: 98-113- 2000
[j4]Heiko Mantel, Felix C. Gärtner: A case study in the mechanical verification of fault tolerance. J. Exp. Theor. Artif. Intell. 12(4): 473-487 (2000)
[c8]Heiko Mantel, Felix C. Gärtner: A Case Study in the Mechanical Verification of Fault Tolerance. FLAIRS Conference 2000: 341-345
[c7]Henning Pagnia, Holger Vogt, Felix C. Gärtner, Uwe G. Wilhelm: Solving Fair Exchange with Mobile Agents. ASA/MA 2000: 57-72
[c6]Felix C. Gärtner, Sven Kloppenburg: Consistent Detection of Global Predicates under a Weak Fault Assumption. SRDS 2000: 94-103
1990 – 1999
- 1999
[j3]Felix C. Gärtner: Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments. ACM Comput. Surv. 31(1): 1-26 (1999)
[j2]Felix C. Gärtner: Transformational Approaches to the Specification and Verification of Fault-Tolerant Systems: Formal Background and Classification. J. UCS 5(10): 668-692 (1999)
[c5]Holger Vogt, Henning Pagnia, Felix C. Gärtner: Modular Fair Exchange Protocols for Electronic Commerce. ACSAC 1999: 3-11
[c4]Felix C. Gärtner, Marc Theisen: Transformationen zur parallelisierten und fehlertoleranten Informationsverarbeitung. GI Jahrestagung 1999: 207-214
[c3]Felix C. Gärtner, Henning Pagnia, Holger Vogt: Approaching a Formal Definition of Fairness in Electronic Commerce. SRDS 1999: 354-359
[c2]Oliver E. Theel, Felix C. Gärtner: An exercise in proving convergence through transfer functions. WSS 1999: 41-47
[c1]Felix C. Gärtner, Henning Pagnia: Self-stabilizing load distribution for replicated servers on a per-access basis. WSS 1999: 102-109- 1998
[j1]Felix C. Gärtner: Aller Jahre wieder ... Eine fiktive Leidensgeschichte. Informatik Spektrum 21(3): 161 (1998)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:06 CEST by the dblp team



