Search the dblp DataBase
Ulrich Ultes-Nitsche :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dominik Jungo , David Buchmann , Ulrich Ultes-Nitsche Assessment of Code Quality through Classification of Unit Tests in VeriNeC. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:177-182 [Conf ] Ulrich Ultes-Nitsche , Stephanie Teufel Secure Access to Medical Data over the Internet. [Citation Graph (0, 0)][DBLP ] ECIS, 2000, pp:- [Conf ] Ulrich Ultes-Nitsche Satisfaction up to Liveness. [Citation Graph (0, 0)][DBLP ] FORTE, 2000, pp:237-248 [Conf ] Ulrich Ultes-Nitsche , Simon St. James Testing Liveness Properties: Approximating Liveness Properties by Safety Properties. [Citation Graph (0, 0)][DBLP ] FORTE, 2001, pp:369-376 [Conf ] David Buchmann , Dominik Jungo , Ulrich Ultes-Nitsche Automated configuration distribution in verinec. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:304-309 [Conf ] InSeon Yoo , Ulrich Ultes-Nitsche Towards Run-Time Protocol Anomaly Detection and Verification. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:299-304 [Conf ] Eleanor Hepworth , Ulrich Ultes-Nitsche Security aspects of a Java-servlet-based web-hosted e-mail system. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 1999, pp:117-130 [Conf ] Simon St. James , Ulrich Ultes-Nitsche An Optimised Partial-Order Approach to the Verification of System Components. [Citation Graph (0, 0)][DBLP ] NDDL/VVEIS, 2003, pp:69-81 [Conf ] Simon St. James , Ulrich Ultes-Nitsche Computing property-preserving behaviour abstractions from trace reductions: abstraction-based verification of linear-time properties under fairness. [Citation Graph (0, 0)][DBLP ] PODC, 2001, pp:238-245 [Conf ] Ulrich Ultes-Nitsche Do We Need Liveness? - Approximation of Liveness Properties by Safety Properties. [Citation Graph (0, 0)][DBLP ] SOFSEM, 2002, pp:279-288 [Conf ] Ulrich Ultes-Nitsche A Persistent-Set Approach to Abstract Stat-Space Construction in Verification. [Citation Graph (0, 0)][DBLP ] SOFSEM, 1999, pp:470-478 [Conf ] Dominik Jungo , David Buchmann , Ulrich Ultes-Nitsche A Unit Testing Framework for Network Configurations. [Citation Graph (0, 0)][DBLP ] MSVVEIS, 2005, pp:77-82 [Conf ] Dominik Jungo , David Buchmann , Ulrich Ultes-Nitsche Testing of Semantic Properties in XML Documents. [Citation Graph (0, 0)][DBLP ] MSVVEIS, 2006, pp:38-46 [Conf ] Thierry Nicola , Frank Nießner , Ulrich Ultes-Nitsche Model-checking Inherently Fair Linear-time Properties. [Citation Graph (0, 0)][DBLP ] MSVVEIS, 2005, pp:3-8 [Conf ] Ulrich Ultes-Nitsche , Pierre Wolper Checking Properties within Fairness and Behavior Abstractions [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Ulrich Ultes-Nitsche Towards the Construction of an Abstract State-Space from a Partial-Order Representation of the Concrete One. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1998, v:18, n:, pp:- [Journal ] Ulrich Ultes-Nitsche A power-set construction for reducing Büchi automata to non-determinism degree two. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2007, v:101, n:3, pp:107-111 [Journal ] Ulrich Ultes-Nitsche Application of formal verification and behaviour abstraction to the service interaction problem in intelligent networks. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:40, n:3, pp:227-248 [Journal ] Joseph Barjis , Juan Carlos Augusto , Ulrich Ultes-Nitsche Towards more adequate EIS. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2007, v:65, n:1, pp:1-3 [Journal ] Ulrich Ultes-Nitsche , Simon St. James Improved verification of linear-time properties within fairness: weakly continuation-closed behaviour abstractions computed from trace reductions. [Citation Graph (0, 0)][DBLP ] Softw. Test., Verif. Reliab., 2003, v:13, n:4, pp:241-255 [Journal ] Michael Leuschel , Andreas Podelski , C. R. Ramakrishnan , Ulrich Ultes-Nitsche Introduction to the Special Issue on Verification and Computational Logic. [Citation Graph (0, 0)][DBLP ] TPLP, 2004, v:4, n:5-6, pp:543-544 [Journal ] InSeon Yoo , Ulrich Ultes-Nitsche Non-signature based virus detection. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2006, v:2, n:3, pp:163-186 [Journal ] Java Nio Framework - Introducing a High-Performance I/O Framework for Java. [Citation Graph (, )][DBLP ] Towards a zero configuration authentication scheme for 802.11 based networks. [Citation Graph (, )][DBLP ] Weakly Continuation Closed Homomorphisms on Automata. [Citation Graph (, )][DBLP ] Checking Inherently Fair Linear-Time Properties in a Non-Naïve Way. [Citation Graph (, )][DBLP ] Immune System Based Intrusion Detection System. [Citation Graph (, )][DBLP ] A Proof-of-Concept Implementation of EAP-TLS with TPM Support. [Citation Graph (, )][DBLP ] Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project. [Citation Graph (, )][DBLP ] Run-Time Protocol Conformance Verification In Firewalls. [Citation Graph (, )][DBLP ] Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. [Citation Graph (, )][DBLP ] An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. [Citation Graph (, )][DBLP ] Environmental Acquisition in Mobile Network Simulation. [Citation Graph (, )][DBLP ] Search in 0.061secs, Finished in 0.063secs