The SCEAS System
Navigation Menu

Search the dblp DataBase


Dilsun Kirli Kaynar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hongping Lim, Dilsun Kirli Kaynar, Nancy A. Lynch, Sayan Mitra
    Translating Timed I/O Automata Specifications for Theorem Proving in PVS. [Citation Graph (0, 0)][DBLP]
    FORMATS, 2005, pp:17-31 [Conf]
  2. Dilsun Kirli Kaynar, Nancy A. Lynch
    Decomposing Verification of Timed I/O Automata. [Citation Graph (0, 0)][DBLP]
    FORMATS/FTRTFT, 2004, pp:84-101 [Conf]
  3. Dilsun Kirli Kaynar, Nancy A. Lynch, Roberto Segala, Frits W. Vaandrager
    Timed I/O Automata: A Mathematical Framework for Modeling and Analyzing Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    RTSS, 2003, pp:166-177 [Conf]
  4. Toh Ne Win, Michael D. Ernst, Stephen J. Garland, Dilsun Kirli Kaynar, Nancy A. Lynch
    Using Simulated Execution in Verifying Distributed Algorithms. [Citation Graph (0, 0)][DBLP]
    VMCAI, 2003, pp:283-297 [Conf]
  5. Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala
    Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols. [Citation Graph (0, 0)][DBLP]
    DISC, 2006, pp:238-253 [Conf]
  6. Dilsun Kirli Kaynar
    Distributed call-tracking for security. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 2002, v:28, n:1, pp:129-154 [Journal]
  7. Toh Ne Win, Michael D. Ernst, Stephen J. Garland, Dilsun Kirli Kaynar, Nancy A. Lynch
    Using simulated execution in verifying distributed algorithms. [Citation Graph (0, 0)][DBLP]
    STTT, 2004, v:6, n:1, pp:67-76 [Journal]
  8. Chris Walton, Dilsun Kirli Kaynar, Stephen Gilmore
    An abstract machine model of dynamic module replacement. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:7, pp:793-808 [Journal]

  9. Modeling Computational Security in Long-Lived Systems. [Citation Graph (, )][DBLP]

  10. Compositional Security for Task-PIOAs. [Citation Graph (, )][DBLP]

  11. A Logic of Secure Systems and its Application to Trusted Computing. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002