Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Christian W. Probst
2010 – today
- 2013
[j10]Markus Aleksy, Ralf Gitzel, Andreas Krall, Hanspeter Mössenböck, Christian W. Probst, Ben Stephenson: Foreword. Sci. Comput. Program. 78(5): 423-424 (2013)
[c25]Florian Kammüller, Christian W. Probst: Invalidating Policies using Structural Information. IEEE Symposium on Security and Privacy Workshops 2013: 76-81
[i3]Lars F. Bonnichsen, Sven Karlsson, Christian W. Probst: ELB-Trees, An Efficient and Lock-free B-tree Derivative. CoRR abs/1308.6145 (2013)- 2012
[c24]Wolter Pieters, Sanne H. G. van der Ven, Christian W. Probst: A move in the security measurement stalemate: elo-style ratings to quantify vulnerability. NSPW 2012: 1-14
[p2]Christian W. Probst, Martina Angela Sasse, Wolter Pieters, Trajce Dimkov, Erik Luysterborg, Michel Arnaud: Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. European Data Protection 2012: 251-265
[i2]Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian W. Probst: Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). Dagstuhl Reports 2(12): 37-48 (2012)- 2011
[j9]Christian W. Probst: Identifying and Mitigating Insider Threats. it - Information Technology 53(4): 202-206 (2011)
[c23]Martin Schoeberl, Pascal Schleuniger, Wolfgang Puffitsch, Florian Brandner, Christian W. Probst: Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach. PPES 2011: 11-21
[e7]Christian W. Probst, Christian Wimmer (Eds.): Proceedings of the 9th International Conference on Principles and Practice of Programming in Java, PPPJ 2011, Kongens Lyngby, Denmark, August 24-26, 2011. ACM 2011, ISBN 978-1-4503-0935-6
[i1]Sabrina De Capitani di Vimercati, Wolter Pieters, Christian W. Probst: Secure Architectures in the Cloud (Dagstuhl Seminar 11492). Dagstuhl Reports 1(12): 11-26 (2011)- 2010
[j8]Rocco De Nicola, Daniele Gorla, René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst, Rosario Pugliese: From Flow Logic to static type systems for coordination languages. Sci. Comput. Program. 75(6): 376-397 (2010)
[c22]Sören Bleikertz, Matthias Schunter, Christian W. Probst, Dimitrios Pendarakis, Konrad Eriksson: Security audits of multi-tier virtual infrastructures in public infrastructure clouds. CCSW 2010: 93-102
[c21]
[c20]Matthieu Quéva, Christian W. Probst, Laurent Ricci: Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction. STAIRS 2010: 251-263
[p1]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop: Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15
[e6]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (Eds.): Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6
2000 – 2009
- 2009
[c19]
[c18]
[c17]Christian W. Probst, Jeffrey Hunker: The Risk of Risk Analysis-And its relation to the Economics of Insider Threats. WEIS 2009
[e5]Ben Stephenson, Christian W. Probst (Eds.): Proceedings of the 7th International Conference on Principles and Practice of Programming in Java, PPPJ 2009, Calgary, Alberta, Canada, August 27-28, 2009. ACM 2009, ISBN 978-1-60558-598-7- 2008
[j7]Christian W. Probst, René Rydhof Hansen: An extensible analysable system model. Inf. Sec. Techn. Report 13(4): 235-246 (2008)
[j6]Andreas Gal, Christian W. Probst, Michael Franz: Java bytecode verification via static single assignment form. ACM Trans. Program. Lang. Syst. 30(4) (2008)
[c16]René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst: Static Validation of Licence Conformance Policies. ARES 2008: 1104-1111
[c15]Rocco De Nicola, Daniele Gorla, René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst, Rosario Pugliese: From Flow Logic to Static Type Systems for Coordination Languages. COORDINATION 2008: 100-116
[e4]Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji (Eds.): Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9- 2007
[j5]Christian W. Probst, Ulrich Kremer, Luca Benini, Peter Schelkens: Power-aware computing systems. IJES 3(1/2): 3-7 (2007)
[j4]Vasanth Venkatachalam, Michael Franz, Christian W. Probst: A new way of estimating compute-boundedness and its application to dynamic voltage scaling. IJES 3(1/2): 17-30 (2007)
[c14]Luca Benini, Naehyuck Chang, Ulrich Kremer, Christian W. Probst: 07041 Summary - Power-aware Computing Systems. Power-aware Computing Systems 2007
[c13]Luca Benini, Naehyuck Chang, Ulrich Kremer, Christian W. Probst: 07041 Abstracts Collection - Power-aware Computing Systems. Power-aware Computing Systems 2007
[c12]Chris J. Bleakley, Tom Clerckx, Harald Devos, Matthias Grumer, Alex Janek, Ulrich Kremer, Christian W. Probst, Phillip Stanley-Marbell, Christian Steger, Vasanth Venkatachalam, Manuel Wendt: 07041 Working Group - Towards Interfaces for Integrated Performance and Power Analysis and Simulation. Power-aware Computing Systems 2007
[c11]Michael Franz, Andreas Gal, Christian W. Probst: Automatic generation of machine emulators: Efficient synthesis of robust virtual machines for legacy software migration. Software Engineering 2007: 83-94
[e3]Luca Benini, Naehyuck Chang, Ulrich Kremer, Christian W. Probst (Eds.): Power-aware Computing Systems, 21.01. - 26.01.2007. Dagstuhl Seminar Proceedings 07041, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007- 2006
[c10]René Rydhof Hansen, Christian W. Probst, Flemming Nielson: Sandboxing in myKlaim. ARES 2006: 174-181
[c9]Christian W. Probst, Andreas Gal, Robert Grimm, Olaf Spinczyk: Linguistic support for modern operating systems workshop on programming languages and operating systems 2006 (PLOS 2006). PLOS 2006: 1
[c8]Julia L. Lawall, Christian W. Probst, Ulrik Pagh Schultz: Issues in holistic system design. PLOS 2006: 12
[c7]Christian W. Probst, René Rydhof Hansen, Flemming Nielson: Where Can an Insider Attack? Formal Aspects in Security and Trust 2006: 127-142
[c6]Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen: Program Partitioning Using Dynamic Trust Models. Formal Aspects in Security and Trust 2006: 170-184
[c5]Andreas Gal, Christian W. Probst, Michael Franz: HotpathVM: an effective JIT compiler for resource-constrained devices. VEE 2006: 144-153
[e2]Christian W. Probst (Ed.): Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, PLOS 2006, San Jose, California, USA, October 22, 2006. ACM 2006, ISBN 1-59593-577-0- 2005
[j3]Andreas Gal, Christian W. Probst, Michael Franz: Integrated Java Bytecode Verification. Electr. Notes Theor. Comput. Sci. 131: 27-38 (2005)
[j2]Andreas Gal, Christian W. Probst, Michael Franz: Structural Encoding of Static Single Assignment Form. Electr. Notes Theor. Comput. Sci. 141(2): 85-102 (2005)
[j1]Michael Franz, Deepak Chandra, Andreas Gal, Vivek Haldar, Christian W. Probst, Fermín Reig, Ning Wang: A portable virtual machine target for proof-carrying code. Sci. Comput. Program. 57(3): 275-294 (2005)
[c4]Luca Benini, Ulrich Kremer, Christian W. Probst, Peter Schelkens: 05141 Summary - Power-aware Computing Systems. Power-aware Computing Systems 2005
[c3]Luca Benini, Ulrich Kremer, Christian W. Probst, Peter Schelkens: 05141 Abstracts Collection - Power-aware Computing Systems. Power-aware Computing Systems 2005
[c2]Vasanth Venkatachalam, Christian W. Probst, Michael Franz: A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing. Power-aware Computing Systems 2005
[e1]Luca Benini, Ulrich Kremer, Christian W. Probst, Peter Schelkens (Eds.): Power-aware Computing Systems, 3.-8. April 2005. Dagstuhl Seminar Proceedings 05141, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany 2005- 2004
[b2]Christian W. Probst: A demand-driven solver for constraint-based control flow analysis. Saarland University 2004- 2002
[b1]Christian W. Probst: A demand-driven solver for constraint-based control flow analysis. COD Verlag 2002, ISBN 978-3-9807096-0-6, pp. I-XVI, 1-133
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:56 CEST by the dblp team



