David Basin

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Modeling a hardware synthesis methodology in Isabelle2024-07-05Paper
Practical relational calculus query evaluation2024-04-25Paper
Practical relational calculus query evaluation2024-04-23Paper
Efficient Evaluation of Arbitrary Relational Calculus Queries
Logical Methods in Computer Science
2024-01-16Paper
Real-time policy enforcement with metric first-order temporal logic
Computer Security – ESORICS 2022
2023-07-28Paper
VeriMon: a formally verified monitoring tool
Lecture Notes in Computer Science
2023-07-28Paper
Optimal proofs for linear temporal logic on lasso words
Automated Technology for Verification and Analysis
2023-07-28Paper
Equality of terms containing associative-commutative functions and commutative binding operators is isomorphism complete2023-04-28Paper
Multi-head Monitoring of Metric Dynamic Logic
1517.6825
2022-12-22Paper
A formally verified, optimized monitor for metric first-order dynamic logic2022-11-09Paper
Some normalization properties of Martin-Löf's type theory, and applications
Lecture Notes in Computer Science
2022-08-16Paper
Cutoff bounds for consensus algorithms2022-08-12Paper
Tests and refutation
Automated Technology for Verification and Analysis
2022-08-12Paper
From Nondeterministic to Multi-Head Deterministic Finite-State Transducers2022-07-21Paper
Runtime verification of temporal properties over out-of-order data streams
(available as arXiv preprint)
2022-07-01Paper
Timing-sensitive information flow analysis for synchronous systems
Computer Security – ESORICS 2006
2022-03-09Paper
On obligations
Computer Security – ESORICS 2005
2022-03-09Paper
Natural projection as partial model checking
Journal of Automated Reasoning
2020-11-02Paper
Almost event-rate independent monitoring of metric temporal logic
Tools and Algorithms for the Construction and Analysis of Systems
2020-08-05Paper
Multi-head monitoring of metric temporal logic
Automated Technology for Verification and Analysis
2020-07-20Paper
Adaptive online first-order monitoring
Automated Technology for Verification and Analysis
2020-07-20Paper
CryptHOL: game-based proofs in higher-order logic
Journal of Cryptology
2020-04-28Paper
Symbolic analysis of identity-based protocols2020-03-03Paper
Termination orderings for rippling
Automated Deduction — CADE-12
2020-01-21Paper
Almost event-rate independent monitoring
Formal Methods in System Design
2019-11-25Paper
Runtime Verification over Out-of-order Streams
ACM Transactions on Computational Logic
2019-11-22Paper
From natural projection to partial model checking and back2019-09-16Paper
Structuring metatheory on inductive definitions
Automated Deduction — Cade-13
2019-01-15Paper
Model Checking Security Protocols
Handbook of Model Checking
2018-07-20Paper
Algorithms for monitoring real-time properties
Acta Informatica
2018-06-26Paper
Anchored LTL separation
Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)
2018-04-23Paper
Scalable offline monitoring of temporal specifications
Formal Methods in System Design
2018-02-12Paper
Failure-aware runtime verification of distributed systems2017-07-13Paper
Reflective metalogical frameworks
ACM Transactions on Computational Logic
2017-07-12Paper
Monitoring metric first-order temporal properties
Journal of the ACM
2016-03-24Paper
Monitoring of temporal first-order properties with aggregations
Formal Methods in System Design
2015-10-30Paper
Automated complexity analysis based on ordered resolution
Journal of the ACM
2015-09-20Paper
Alice and Bob meet equational theories
Lecture Notes in Computer Science
2015-09-14Paper
Greedily computing associative aggregations on sliding windows
Information Processing Letters
2014-12-09Paper
Deciding safety and liveness in TPTL
Information Processing Letters
2014-08-28Paper
LTL is closed under topological closure
Information Processing Letters
2014-04-30Paper
Multi-assignment clustering for Boolean data2014-04-01Paper
Deconstructing Alice and Bob2013-09-26Paper
Metareasoning about security protocols using distributed temporal logic2013-09-25Paper
Towards an awareness-based semantics for security protocol analysis
Electronic Notes in Theoretical Computer Science
2013-07-24Paper
Runtime monitoring of metric first-order temporal properties2012-10-19Paper
Enforceable Security Policies Revisited
Lecture Notes in Computer Science
2012-06-29Paper
Provably repairing the ISO/IEC 9798 standard for entity authentication
Lecture Notes in Computer Science
2012-06-29Paper
FAST: an efficient decision procedure for deduction and static equivalence2012-04-24Paper
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications
Foundations of Security Analysis and Design VI
2011-09-16Paper
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
2011-07-18Paper
Degrees of security: protocol guarantees in the face of compromising adversaries
Computer Science Logic
2010-09-03Paper
Labelled tableaux for distributed temporal logic
Journal Of Logic And Computation
2010-01-14Paper
Developing topology discovery in Event-B
Science of Computer Programming
2009-12-11Paper
Let’s Get Physical: Models and Methods for Real-World Security Protocols
Lecture Notes in Computer Science
2009-10-20Paper
Midpoints Versus Endpoints: From Protocols to Firewalls
Applied Cryptography and Network Security
2009-03-10Paper
BAP: Broadcast Authentication Using Cryptographic Puzzles
Applied Cryptography and Network Security
2009-03-10Paper
Developing Topology Discovery in Event-B
Lecture Notes in Computer Science
2009-02-24Paper
A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols
Lecture Notes in Computer Science
2008-09-02Paper
Algebraic Intruder Deductions
Logic for Programming, Artificial Intelligence, and Reasoning
2008-05-27Paper
Verifying a signature architecture: a comparative case study
Formal Aspects of Computing
2007-04-19Paper
On the semantics of Alice \& Bob specifications of security protocols
Theoretical Computer Science
2007-01-09Paper
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
Logic Journal of the IGPL
2006-03-30Paper
FM 2005: Formal Methods
Lecture Notes in Computer Science
2006-01-10Paper
Program Development in Computational Logic
Lecture Notes in Computer Science
2005-12-23Paper
Rippling: Meta-Level Guidance for Mathematical Reasoning2005-07-28Paper
scientific article; zbMATH DE number 2102730 (Why is no real title available?)2004-09-24Paper
scientific article; zbMATH DE number 2090150 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2087621 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2080191 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080008 (Why is no real title available?)2004-08-03Paper
scientific article; zbMATH DE number 1979551 (Why is no real title available?)2003-09-14Paper
Bytecode verification by model checking
Journal of Automated Reasoning
2003-09-09Paper
Decision procedures for inductive Boolean functions based on alternating automata
Theoretical Computer Science
2003-07-30Paper
scientific article; zbMATH DE number 1946752 (Why is no real title available?)2003-07-07Paper
scientific article; zbMATH DE number 1927414 (Why is no real title available?)2003-06-12Paper
scientific article; zbMATH DE number 1903364 (Why is no real title available?)2003-05-01Paper
Current trends in logical frameworks and metalanguages
Journal of Automated Reasoning
2003-02-16Paper
Structuring metatheory on inductive definitions
Information and Computation
2003-01-14Paper
Combining WS1S and HOL2002-07-22Paper
A recipe for the complexity analysis of non-classical logics2002-07-14Paper
Program development schemata as derived rules
Journal of Symbolic Computation
2002-02-27Paper
scientific article; zbMATH DE number 1670776 (Why is no real title available?)2001-11-11Paper
scientific article; zbMATH DE number 1670771 (Why is no real title available?)2001-11-11Paper
A higher-order interpretation of deductive tableau
Journal of Symbolic Computation
2001-07-22Paper
Maude versus Haskell: An experimental comparison in security protocol analysis2001-05-07Paper
scientific article; zbMATH DE number 1368960 (Why is no real title available?)2001-04-01Paper
Natural deduction for non-classical logics
Studia Logica
2001-02-14Paper
scientific article; zbMATH DE number 1523046 (Why is no real title available?)2000-10-30Paper
Labelled modal logics: Quantifiers
Journal of Logic, Language and Information
2000-03-29Paper
scientific article; zbMATH DE number 1354137 (Why is no real title available?)1999-10-31Paper
scientific article; zbMATH DE number 1348478 (Why is no real title available?)1999-10-10Paper
scientific article; zbMATH DE number 1331927 (Why is no real title available?)1999-09-02Paper
scientific article; zbMATH DE number 1231653 (Why is no real title available?)1999-01-07Paper
scientific article; zbMATH DE number 1223610 (Why is no real title available?)1998-11-15Paper
Search in games with incomplete information: a case study using Bridge card play
Artificial Intelligence
1998-08-13Paper
scientific article; zbMATH DE number 1140672 (Why is no real title available?)1998-04-13Paper
Labelled propositional modal logics: theory and practice
Journal Of Logic And Computation
1998-03-25Paper
scientific article; zbMATH DE number 1088193 (Why is no real title available?)1998-01-07Paper
Adding metatheoretic facilities to first-order theories
Journal of Logic and Computation
1997-08-03Paper
A recursion planning analysis of inductive completion
Annals of Mathematics and Artificial Intelligence
1997-05-12Paper
Middle-out reasoning for synthesis and induction
Journal of Automated Reasoning
1996-06-11Paper
A calculus for and termination of rippling
Journal of Automated Reasoning
1996-06-11Paper
scientific article; zbMATH DE number 827981 (Why is no real title available?)1996-05-27Paper
A term equality problem equivalent to graph isomorphism
Information Processing Letters
1994-09-05Paper
scientific article; zbMATH DE number 65529 (Why is no real title available?)1992-09-27Paper
scientific article; zbMATH DE number 4126684 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4101139 (Why is no real title available?)1989-01-01Paper
scientific article; zbMATH DE number 4074542 (Why is no real title available?)1988-01-01Paper


Research outcomes over time


This page was built for person: David Basin