Publication | Date of Publication | Type |
---|
Efficient Evaluation of Arbitrary Relational Calculus Queries | 2024-01-16 | Paper |
Real-time policy enforcement with metric first-order temporal logic | 2023-07-28 | Paper |
VeriMon: a formally verified monitoring tool | 2023-07-28 | Paper |
Optimal proofs for linear temporal logic on lasso words | 2023-07-28 | Paper |
Multi-head Monitoring of Metric Dynamic Logic | 2022-12-22 | Paper |
A formally verified, optimized monitor for metric first-order dynamic logic | 2022-11-09 | Paper |
Some normalization properties of martin-löf's type theory, and applications | 2022-08-16 | Paper |
Cutoff bounds for consensus algorithms | 2022-08-12 | Paper |
Tests and Refutation | 2022-08-12 | Paper |
From Nondeterministic to Multi-Head Deterministic Finite-State Transducers | 2022-07-21 | Paper |
Runtime verification of temporal properties over out-of-order data streams | 2022-07-01 | Paper |
Timing-Sensitive Information Flow Analysis for Synchronous Systems | 2022-03-09 | Paper |
On Obligations | 2022-03-09 | Paper |
Natural projection as partial model checking | 2020-11-02 | Paper |
Almost Event-Rate Independent Monitoring of Metric Temporal Logic | 2020-08-05 | Paper |
Adaptive Online First-Order Monitoring | 2020-07-20 | Paper |
Multi-head Monitoring of Metric Temporal Logic | 2020-07-20 | Paper |
CryptHOL: game-based proofs in higher-order logic | 2020-04-28 | Paper |
Symbolic analysis of identity-based protocols | 2020-03-03 | Paper |
Termination orderings for rippling | 2020-01-21 | Paper |
Almost event-rate independent monitoring | 2019-11-25 | Paper |
Runtime Verification over Out-of-order Streams | 2019-11-22 | Paper |
From natural projection to partial model checking and back | 2019-09-16 | Paper |
Structuring metatheory on inductive definitions | 2019-01-15 | Paper |
Model Checking Security Protocols | 2018-07-20 | Paper |
Algorithms for monitoring real-time properties | 2018-06-26 | Paper |
Anchored LTL separation | 2018-04-23 | Paper |
Scalable offline monitoring of temporal specifications | 2018-02-12 | Paper |
Failure-aware Runtime Verification of Distributed Systems | 2017-07-13 | Paper |
Reflective metalogical frameworks | 2017-07-12 | Paper |
Monitoring Metric First-Order Temporal Properties | 2016-03-24 | Paper |
Monitoring of temporal first-order properties with aggregations | 2015-10-30 | Paper |
Automated complexity analysis based on ordered resolution | 2015-09-20 | Paper |
Alice and Bob Meet Equational Theories | 2015-09-14 | Paper |
Greedily computing associative aggregations on sliding windows | 2014-12-09 | Paper |
Deciding safety and liveness in TPTL | 2014-08-28 | Paper |
LTL is closed under topological closure | 2014-04-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q5405126 | 2014-04-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2848475 | 2013-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2848036 | 2013-09-25 | Paper |
Towards an Awareness-Based Semantics for Security Protocol Analysis | 2013-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q3165946 | 2012-10-19 | Paper |
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication | 2012-06-29 | Paper |
Enforceable Security Policies Revisited | 2012-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q5389067 | 2012-04-24 | Paper |
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications | 2011-09-16 | Paper |
Distributed temporal logic for the analysis of security protocol models | 2011-07-18 | Paper |
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries | 2010-09-03 | Paper |
Labelled Tableaux for Distributed Temporal Logic | 2010-01-14 | Paper |
Developing topology discovery in Event-B | 2009-12-11 | Paper |
Let’s Get Physical: Models and Methods for Real-World Security Protocols | 2009-10-20 | Paper |
Midpoints Versus Endpoints: From Protocols to Firewalls | 2009-03-10 | Paper |
BAP: Broadcast Authentication Using Cryptographic Puzzles | 2009-03-10 | Paper |
Developing Topology Discovery in Event-B | 2009-02-24 | Paper |
A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols | 2008-09-02 | Paper |
Algebraic Intruder Deductions | 2008-05-27 | Paper |
Verifying a signature architecture: a comparative case study | 2007-04-19 | Paper |
On the semantics of Alice \& Bob specifications of security protocols | 2007-01-09 | Paper |
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis | 2006-03-30 | Paper |
FM 2005: Formal Methods | 2006-01-10 | Paper |
Program Development in Computational Logic | 2005-12-23 | Paper |
Rippling: Meta-Level Guidance for Mathematical Reasoning | 2005-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4818817 | 2004-09-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4808843 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738465 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472433 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472191 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4427904 | 2003-09-14 | Paper |
Bytecode verification by model checking | 2003-09-09 | Paper |
Decision procedures for inductive Boolean functions based on alternating automata | 2003-07-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4411077 | 2003-07-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484331 | 2003-06-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4804908 | 2003-05-01 | Paper |
Current trends in logical frameworks and metalanguages | 2003-02-16 | Paper |
Structuring metatheory on inductive definitions | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2782479 | 2002-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q2782480 | 2002-07-14 | Paper |
Program development schemata as derived rules | 2002-02-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2754076 | 2001-11-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q2754082 | 2001-11-11 | Paper |
A higher-order interpretation of deductive tableau | 2001-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q2703702 | 2001-05-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4702604 | 2001-04-01 | Paper |
Natural deduction for non-classical logics | 2001-02-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4511321 | 2000-10-30 | Paper |
Labelled modal logics: Quantifiers | 2000-03-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4268451 | 1999-10-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4264732 | 1999-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4261732 | 1999-09-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4222978 | 1999-01-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4218920 | 1998-11-15 | Paper |
Search in games with incomplete information: a case study using Bridge card play | 1998-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4385437 | 1998-04-13 | Paper |
Labelled propositional modal logics: theory and practice | 1998-03-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364506 | 1998-01-07 | Paper |
Adding metatheoretic facilities to first-order theories | 1997-08-03 | Paper |
A recursion planning analysis of inductive completion | 1997-05-12 | Paper |
Middle-out reasoning for synthesis and induction | 1996-06-11 | Paper |
A calculus for and termination of rippling | 1996-06-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4858947 | 1996-05-27 | Paper |
A term equality problem equivalent to graph isomorphism | 1994-09-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4012877 | 1992-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4206388 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3826519 | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3805962 | 1988-01-01 | Paper |