default search action
Helmut Veith
Person information
- affiliation: TU Wien, Vienna, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c98]Nadia Labai, Tomer Kotek, Magdalena Ortiz, Helmut Veith:
Pebble-Intervals Automata and FO2 with Two Orders. LATA 2020: 208-221
2010 – 2019
- 2019
- [i22]Nadia Labai, Tomer Kotek, Magdalena Ortiz, Helmut Veith:
Pebble-Intervals Automata and FO2 with Two Orders (Extended Version). CoRR abs/1912.00171 (2019) - 2018
- [b2]Edmund M. Clarke, Orna Grumberg, Daniel Kroening, Doron A. Peled, Helmut Veith:
Model checking, 2nd Edition. MIT Press 2018, ISBN 978-0-262-03883-6 - [j26]Benjamin Aminof, Tomer Kotek, Sasha Rubin, Francesco Spegni, Helmut Veith:
Parameterized model checking of rendezvous systems. Distributed Comput. 31(3): 187-222 (2018) - [p2]Edmund M. Clarke, Thomas A. Henzinger, Helmut Veith:
Introduction to Model Checking. Handbook of Model Checking 2018: 1-26 - [e7]Edmund M. Clarke, Thomas A. Henzinger, Helmut Veith, Roderick Bloem:
Handbook of Model Checking. Springer 2018, ISBN 978-3-319-10574-1 [contents] - 2017
- [j25]Yulia Demyanova, Thomas Pani, Helmut Veith, Florian Zuleger:
Empirical software metrics for benchmarking of verification tools. Formal Methods Syst. Des. 50(2-3): 289-316 (2017) - [j24]Igor Konnov, Marijana Lazic, Helmut Veith, Josef Widder:
Para2: parameterized path reduction, acceleration, and SMT for reachability in threshold-guarded distributed algorithms. Formal Methods Syst. Des. 51(2): 270-307 (2017) - [j23]Niklas Büscher, Martin Franz, Andreas Holzer, Helmut Veith, Stefan Katzenbeisser:
On compiling Boolean circuits optimized for secure multi-party computation. Formal Methods Syst. Des. 51(2): 308-331 (2017) - [j22]Igor V. Konnov, Helmut Veith, Josef Widder:
On the completeness of bounded model checking for threshold-based distributed algorithms: Reachability. Inf. Comput. 252: 95-109 (2017) - [j21]Moritz Sinn, Florian Zuleger, Helmut Veith:
Complexity and Resource Bound Analysis of Imperative Programs Using Difference Constraints. J. Autom. Reason. 59(1): 3-45 (2017) - [c97]Shachar Itzhaky, Tomer Kotek, Noam Rinetzky, Mooly Sagiv, Orr Tamir, Helmut Veith, Florian Zuleger:
On the Automated Verification of Web Applications with Embedded SQL. ICDT 2017: 16:1-16:18 - [c96]Igor V. Konnov, Marijana Lazic, Helmut Veith, Josef Widder:
A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms. POPL 2017: 719-734 - 2016
- [j20]Roderick Bloem, Swen Jacobs, Ayrat Khalimov, Igor Konnov, Sasha Rubin, Helmut Veith, Josef Widder:
Decidability in Parameterized Verification. SIGACT News 47(2): 53-64 (2016) - [c95]Andreas Haas, Thomas A. Henzinger, Andreas Holzer, Christoph M. Kirsch, Michael Lippautz, Hannes Payer, Ali Sezgin, Ana Sokolova, Helmut Veith:
Local Linearizability for Concurrent Container-Type Data Structures. CONCUR 2016: 6:1-6:15 - [c94]Igor V. Konnov, Tomer Kotek, Qiang Wang, Helmut Veith, Simon Bliudze, Joseph Sifakis:
Parameterized Systems in BIP: Design and Model Checking. CONCUR 2016: 30:1-30:16 - [c93]Tomer Kotek, Helmut Veith, Florian Zuleger:
Monadic Second Order Finite Satisfiability and Unbounded Tree-Width. CSL 2016: 13:1-13:20 - [c92]Yulia Demyanova, Thomas Pani, Helmut Veith, Florian Zuleger:
Empirical software metrics for benchmarking of verification tools. Software Engineering 2016: 67-68 - [c91]Moritz Sinn, Florian Zuleger, Helmut Veith:
A simple and scalable static analysis for bound analysis and amortized complexity analysis. Software Engineering 2016: 101-102 - [i21]Igor Konnov, Marijana Lazic, Helmut Veith, Josef Widder:
A Short Counterexample Property for Safety and Liveness Verification of Fault-tolerant Distributed Algorithms. CoRR abs/1608.05327 (2016) - [i20]Shachar Itzhaky, Tomer Kotek, Noam Rinetzky, Mooly Sagiv, Orr Tamir, Helmut Veith, Florian Zuleger:
On the automated verification of web applications with embedded SQL. CoRR abs/1610.02101 (2016) - 2015
- [b1]Roderick Bloem, Swen Jacobs, Ayrat Khalimov, Igor Konnov, Sasha Rubin, Helmut Veith, Josef Widder:
Decidability of Parameterized Verification. Synthesis Lectures on Distributed Computing Theory, Morgan & Claypool Publishers 2015, ISBN 978-3-031-00883-2 - [j19]Thomas Pani, Helmut Veith, Florian Zuleger:
Loop Patterns in C Programs. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 72 (2015) - [j18]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Closure properties and complexity of rational sets of regular languages. Theor. Comput. Sci. 605: 62-79 (2015) - [c90]Igor Konnov, Helmut Veith, Josef Widder:
SMT and POR Beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms. CAV (1) 2015: 85-102 - [c89]Yulia Demyanova, Thomas Pani, Helmut Veith, Florian Zuleger:
Empirical Software Metrics for Benchmarking of Verification Tools. CAV (1) 2015: 561-579 - [c88]Igor V. Konnov, Helmut Veith, Josef Widder:
What You Always Wanted to Know About Model Checking of Fault-Tolerant Distributed Algorithms. Ershov Memorial Conference 2015: 6-21 - [c87]Moritz Sinn, Florian Zuleger, Helmut Veith:
Difference Constraints: An adequate Abstraction for Complexity Analysis of Imperative Programs. FMCAD 2015: 144-151 - [c86]Azadeh Farzan, Andreas Holzer, Helmut Veith:
Perspectives on White-Box Testing: Coverage, Concurrency, and Concolic Execution. ICST 2015: 1-11 - [c85]Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Extending ALCQIO with Trees. LICS 2015: 511-522 - [c84]Martin Franz, Andreas Holzer, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Compilation for Secure Two-Party Computations. Software Engineering & Management 2015: 143-145 - [i19]Andreas Haas, Thomas A. Henzinger, Andreas Holzer, Christoph M. Kirsch, Michael Lippautz, Hannes Payer, Ali Sezgin, Ana Sokolova, Helmut Veith:
Local Linearizability. CoRR abs/1502.07118 (2015) - [i18]Tomer Kotek, Helmut Veith, Florian Zuleger:
Monadic second order finite satisfiability and unbounded tree-width. CoRR abs/1505.06622 (2015) - [i17]Moritz Sinn, Florian Zuleger, Helmut Veith:
Difference Constraints: An adequate Abstraction for Complexity Analysis of Imperative Programs. CoRR abs/1508.04958 (2015) - 2014
- [c83]Moritz Sinn, Florian Zuleger, Helmut Veith:
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis. CAV 2014: 745-761 - [c82]Martin Franz, Andreas Holzer, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations. CC 2014: 244-249 - [c81]Benjamin Aminof, Tomer Kotek, Sasha Rubin, Francesco Spegni, Helmut Veith:
Parameterized Model Checking of Rendezvous Systems. CONCUR 2014: 109-124 - [c80]Igor Konnov, Helmut Veith, Josef Widder:
On the Completeness of Bounded Model Checking for Threshold-Based Distributed Algorithms: Reachability. CONCUR 2014: 125-140 - [c79]Diego Calvanese, Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Shape and Content: Incorporating Domain Knowledge into Shape Analysis. Description Logics 2014: 124-127 - [c78]Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Towards a Description Logic for Program Analysis: Extending ALCQIO with Reachability. Description Logics 2014: 591-594 - [c77]Diego Calvanese, Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Shape and Content - A Database-Theoretic Perspective on the Analysis of Data Structures. IFM 2014: 3-17 - [c76]Matthias Baaz, Thomas Eiter, Helmut Veith:
Vienna Summer of Logic. KR 2014 - [c75]Gergely Kovásznai, Helmut Veith, Andreas Fröhlich, Armin Biere:
On the Complexity of Symbolic Verification and Decision Problems in Bit-Vector Logic. MFCS (2) 2014: 481-492 - [c74]Andreas Fröhlich, Gergely Kovásznai, Armin Biere, Helmut Veith:
iDQ: Instantiation-Based DQBF Solving. POS@SAT 2014: 103-116 - [c73]Dirk Beyer, Andreas Holzer, Michael Tautschnig, Helmut Veith:
Reusing Information in Multi-Goal Reachability Analyses. Software Engineering 2014: 97-98 - [c72]Azadeh Farzan, Andreas Holzer, Niloofar Razavi, Helmut Veith:
Concolic Testing of Concurrent Programs. Software Engineering 2014: 101-102 - [c71]Annu Gmeiner, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Tutorial on Parameterized Model Checking of Fault-Tolerant Distributed Algorithms. SFM 2014: 122-171 - [c70]Cezara Dragoi, Thomas A. Henzinger, Helmut Veith, Josef Widder, Damien Zufferey:
A Logic-Based Framework for Verifying Consensus Algorithms. VMCAI 2014: 161-181 - [i16]Moritz Sinn, Florian Zuleger, Helmut Veith:
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis. CoRR abs/1401.5842 (2014) - [i15]Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Extending ALCQIO with reachability. CoRR abs/1402.6804 (2014) - 2013
- [j17]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification across Intellectual Property Boundaries. ACM Trans. Softw. Eng. Methodol. 22(2): 15:1-15:12 (2013) - [c69]Andreas Holzer, Nikolaos P. Karvelas, Stefan Katzenbeisser, Helmut Veith, Martin Franz:
Challenges in compiler construction for secure two-party computation. PETShop@CCS 2013: 3-6 - [c68]Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith:
The first workshop on language support for privacy-enhancing technologies (PETShop'13). CCS 2013: 1485-1486 - [c67]Dirk Beyer, Andreas Holzer, Michael Tautschnig, Helmut Veith:
Information Reuse for Multi-goal Reachability Analyses. ESOP 2013: 472-491 - [c66]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Parameterized model checking of fault-tolerant distributed algorithms by abstraction. FMCAD 2013: 201-209 - [c65]Yulia Demyanova, Helmut Veith, Florian Zuleger:
On the concept of variable roles and its use in software analysis. FMCAD 2013: 226-230 - [c64]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
On the Structure and Complexity of Rational Sets of Regular Languages. FSTTCS 2013: 377-388 - [c63]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Brief announcement: parameterized model checking of fault-tolerant distributed algorithms by abstraction. PODC 2013: 119-121 - [c62]Azadeh Farzan, Andreas Holzer, Niloofar Razavi, Helmut Veith:
Con2colic testing. ESEC/SIGSOFT FSE 2013: 37-47 - [c61]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Towards Modeling and Model Checking Fault-Tolerant Distributed Algorithms. SPIN 2013: 209-226 - [e6]Natasha Sharygina, Helmut Veith:
Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. Lecture Notes in Computer Science 8044, Springer 2013, ISBN 978-3-642-39798-1 [contents] - [e5]Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith:
PETShop'13, Proceedings of the 2013 ACM Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with CCS 2013, November 4, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2489-2 [contents] - [i14]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
On the Structure and Complexity of Rational Sets of Regular Languages. CoRR abs/1305.6074 (2013) - [i13]Yulia Demyanova, Helmut Veith, Florian Zuleger:
On the Concept of Variable Roles and its Use in Software Analysis. CoRR abs/1305.6745 (2013) - [i12]Diego Calvanese, Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Shape and Content: Incorporating Domain Knowledge into Shape Analysis. CoRR abs/1312.6624 (2013) - 2012
- [j16]Helmut Veith:
Special Issue: Games in Verification. J. Comput. Syst. Sci. 78(2): 393 (2012) - [c60]Andreas Holzer, Martin Franz, Stefan Katzenbeisser, Helmut Veith:
Secure two-party computations in ANSI C. CCS 2012: 772-783 - [c59]Andreas Holzer, Daniel Kroening, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Proving Reachability Using FShell - (Competition Contribution). TACAS 2012: 538-541 - [i11]Florian Zuleger, Sumit Gulwani, Moritz Sinn, Helmut Veith:
Bound Analysis of Imperative Programs with the Size-change Abstraction (extended version). CoRR abs/1203.5303 (2012) - [i10]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Starting a Dialog between Model Checking and Fault-tolerant Distributed Algorithms. CoRR abs/1210.3839 (2012) - [i9]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Counter Attack on Byzantine Generals: Parameterized Model Checking of Fault-tolerant Distributed Algorithms. CoRR abs/1210.3846 (2012) - 2011
- [c58]Andreas Holzer, Visar Januzaj, Stefan Kugele, Boris Langer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Seamless Testing for Models and Code. FASE 2011: 278-293 - [c57]Florian Zuleger, Sumit Gulwani, Moritz Sinn, Helmut Veith:
Bound Analysis of Imperative Programs with the Size-Change Abstraction. SAS 2011: 280-297 - [r1]Stefan Katzenbeisser, Johannes Kinder, Helmut Veith:
Malware Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 752-755 - [i8]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
Decision Procedures in Soft, Hard and Bio-ware - Follow Up (Dagstuhl Seminar 11272). Dagstuhl Reports 1(7): 23-35 (2011) - 2010
- [j15]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Proactive Detection of Computer Worms Using Model Checking. IEEE Trans. Dependable Secur. Comput. 7(4): 424-438 (2010) - [j14]Marko Samer, Helmut Veith:
On the distributivity of LTL specifications. ACM Trans. Comput. Log. 11(3): 20:1-20:26 (2010) - [j13]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Semantic integrity in large-scale online simulations. ACM Trans. Internet Techn. 10(1): 2:1-2:24 (2010) - [c56]Edmund M. Clarke, Robert P. Kurshan, Helmut Veith:
The Localization Reduction and Counterexample-Guided Abstraction Refinement. Essays in Memory of Amir Pnueli 2010: 61-71 - [c55]Johannes Kinder, Helmut Veith:
Precise static analysis of untrusted driver binaries. FMCAD 2010: 43-50 - [c54]Andreas Holzer, Michael Tautschnig, Christian Schallhart, Helmut Veith:
An Introduction to Test Specification in FQL. Haifa Verification Conference 2010: 9-22 - [c53]Visar Januzaj, Stefan Kugele, Boris Langer, Christian Schallhart, Helmut Veith:
New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective. ISoLA (1) 2010: 1-2 - [c52]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
How did you specify your test suite. ASE 2010: 407-416 - [e4]Anuj Dawar, Helmut Veith:
Computer Science Logic, 24th International Workshop, CSL 2010, 19th Annual Conference of the EACSL, Brno, Czech Republic, August 23-27, 2010. Proceedings. Lecture Notes in Computer Science 6247, Springer 2010, ISBN 978-3-642-15204-7 [contents] - [e3]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
Decision Procedures in Software, Hardware and Bioware, 18.04. - 23.04.2010. Dagstuhl Seminar Proceedings 10161, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i7]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
10161 Abstracts Collection - Decision Procedures in Software, Hardware and Bioware. Decision Procedures in Software, Hardware and Bioware 2010 - [i6]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
10161 Executive Summary - Decision Procedures in Software, Hardware and Bioware. Decision Procedures in Software, Hardware and Bioware 2010
2000 – 2009
- 2009
- [c51]Péter Bokor, Marco Serafini, Neeraj Suri, Helmut Veith:
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support. ICFEM 2009: 147-166 - [c50]Marko Samer, Helmut Veith:
Encoding Treewidth into SAT. SAT 2009: 45-50 - [c49]Helmut Veith:
Embedding Formal Methods into Systems Engineering. SYNASC 2009: 11 - [c48]Helmut Veith:
Automated Software Analysis. SYNASC 2009: 18 - [c47]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Query-Driven Program Testing. VMCAI 2009: 151-166 - [c46]Johannes Kinder, Florian Zuleger, Helmut Veith:
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. VMCAI 2009: 214-228 - [c45]Péter Bokor, Marco Serafini, Neeraj Suri, Helmut Veith:
Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction. DISC 2009: 289-290 - 2008
- [c44]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement. CAV 2008: 209-213 - [c43]Johannes Kinder, Helmut Veith:
Jakstab: A Static Analysis Platform for Binaries. CAV 2008: 423-427 - [c42]Edmund M. Clarke, Muralidhar Talupur, Helmut Veith:
Proving Ptolemy Right: The Environment Abstraction Framework for Model Checking Concurrent Systems. TACAS 2008: 33-47 - [e2]Iliano Cervesato, Helmut Veith, Andrei Voronkov:
Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, LPAR 2008, Doha, Qatar, November 22-27, 2008. Proceedings. Lecture Notes in Computer Science 5330, Springer 2008, ISBN 978-3-540-89438-4 [contents] - [e1]Orna Grumberg, Helmut Veith:
25 Years of Model Checking - History, Achievements, Perspectives. Lecture Notes in Computer Science 5000, Springer 2008, ISBN 978-3-540-69849-4 [contents] - 2007
- [j12]Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith:
Software transformations to improve malware detection. J. Comput. Virol. 3(4): 253-265 (2007) - [c41]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification Across Intellectual Property Boundaries. CAV 2007: 82-94 - [c40]Andreas Holzer, Johannes Kinder, Helmut Veith:
Using Verification Technology to Specify and Detect Malware. EUROCAST 2007: 497-504 - [c39]Marko Samer, Helmut Veith:
On the Notion of Vacuous Truth. LPAR 2007: 2-14 - [c38]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. S&P 2007: 179-186 - [i5]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification Across Intellectual Property Boundaries. CoRR abs/cs/0701187 (2007) - [i4]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IACR Cryptol. ePrint Arch. 2007: 56 (2007) - 2006
- [j11]Oleg Pikhurko, Helmut Veith, Oleg Verbitsky:
The first order definability of graphs: Upper bounds for quantifier depth. Discret. Appl. Math. 154(17): 2511-2529 (2006) - [c37]Edmund M. Clarke, Muralidhar Talupur, Helmut Veith:
Environment Abstraction for Parameterized Verification. VMCAI 2006: 126-141 - 2005
- [j10]Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith:
An Iterative Framework for Simulation Conformance. J. Log. Comput. 15(4): 465-488 (2005) - [c36]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Detecting Malicious Code by Model Checking. DIMVA 2005: 174-187 - [c35]Sagar Chaki, Edmund M. Clarke, Orna Grumberg, Joël Ouaknine, Natasha Sharygina, Tayssir Touili, Helmut Veith:
State/Event Software Verification for Branching-Time Specifications. IFM 2005: 53-69 - [c34]Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508 - [c33]Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Malware Engineering. Sicherheit 2005: 139-148 - [c32]Marko Samer, Helmut Veith:
Deterministic CTL Query Solving. TIME 2005: 156-165 - [c31]Marko Samer, Helmut Veith:
From Temporal Logic Queries to Vacuity Detection. VISSAS 2005: 149-167 - [c30]Edmund M. Clarke, Anubhav Gupta, Himanshu Jain, Helmut Veith:
Model Checking: Back and Forth between Hardware and Software. VSTTE 2005: 251-255 - [p1]Edmund M. Clarke, Ansgar Fehnker, Sumit Kumar Jha, Helmut Veith:
Temporal Logic Model Checking. Handbook of Networked and Embedded Control Systems 2005: 539-558 - [i3]Uwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. CoRR abs/cs/0503080 (2005) - 2004
- [j9]