The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ulrich Ultes-Nitsche: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche
    Assessment of Code Quality through Classification of Unit Tests in VeriNeC. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:177-182 [Conf]
  2. Ulrich Ultes-Nitsche, Stephanie Teufel
    Secure Access to Medical Data over the Internet. [Citation Graph (0, 0)][DBLP]
    ECIS, 2000, pp:- [Conf]
  3. Ulrich Ultes-Nitsche
    Satisfaction up to Liveness. [Citation Graph (0, 0)][DBLP]
    FORTE, 2000, pp:237-248 [Conf]
  4. Ulrich Ultes-Nitsche, Simon St. James
    Testing Liveness Properties: Approximating Liveness Properties by Safety Properties. [Citation Graph (0, 0)][DBLP]
    FORTE, 2001, pp:369-376 [Conf]
  5. David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche
    Automated configuration distribution in verinec. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:304-309 [Conf]
  6. InSeon Yoo, Ulrich Ultes-Nitsche
    Towards Run-Time Protocol Anomaly Detection and Verification. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:299-304 [Conf]
  7. Eleanor Hepworth, Ulrich Ultes-Nitsche
    Security aspects of a Java-servlet-based web-hosted e-mail system. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:117-130 [Conf]
  8. Simon St. James, Ulrich Ultes-Nitsche
    An Optimised Partial-Order Approach to the Verification of System Components. [Citation Graph (0, 0)][DBLP]
    NDDL/VVEIS, 2003, pp:69-81 [Conf]
  9. Simon St. James, Ulrich Ultes-Nitsche
    Computing property-preserving behaviour abstractions from trace reductions: abstraction-based verification of linear-time properties under fairness. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:238-245 [Conf]
  10. Ulrich Ultes-Nitsche
    Do We Need Liveness? - Approximation of Liveness Properties by Safety Properties. [Citation Graph (0, 0)][DBLP]
    SOFSEM, 2002, pp:279-288 [Conf]
  11. Ulrich Ultes-Nitsche
    A Persistent-Set Approach to Abstract Stat-Space Construction in Verification. [Citation Graph (0, 0)][DBLP]
    SOFSEM, 1999, pp:470-478 [Conf]
  12. Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche
    A Unit Testing Framework for Network Configurations. [Citation Graph (0, 0)][DBLP]
    MSVVEIS, 2005, pp:77-82 [Conf]
  13. Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche
    Testing of Semantic Properties in XML Documents. [Citation Graph (0, 0)][DBLP]
    MSVVEIS, 2006, pp:38-46 [Conf]
  14. Thierry Nicola, Frank Nießner, Ulrich Ultes-Nitsche
    Model-checking Inherently Fair Linear-time Properties. [Citation Graph (0, 0)][DBLP]
    MSVVEIS, 2005, pp:3-8 [Conf]
  15. Ulrich Ultes-Nitsche, Pierre Wolper
    Checking Properties within Fairness and Behavior Abstractions [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  16. Ulrich Ultes-Nitsche
    Towards the Construction of an Abstract State-Space from a Partial-Order Representation of the Concrete One. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1998, v:18, n:, pp:- [Journal]
  17. Ulrich Ultes-Nitsche
    A power-set construction for reducing Büchi automata to non-determinism degree two. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2007, v:101, n:3, pp:107-111 [Journal]
  18. Ulrich Ultes-Nitsche
    Application of formal verification and behaviour abstraction to the service interaction problem in intelligent networks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:40, n:3, pp:227-248 [Journal]
  19. Joseph Barjis, Juan Carlos Augusto, Ulrich Ultes-Nitsche
    Towards more adequate EIS. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:65, n:1, pp:1-3 [Journal]
  20. Ulrich Ultes-Nitsche, Simon St. James
    Improved verification of linear-time properties within fairness: weakly continuation-closed behaviour abstractions computed from trace reductions. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2003, v:13, n:4, pp:241-255 [Journal]
  21. Michael Leuschel, Andreas Podelski, C. R. Ramakrishnan, Ulrich Ultes-Nitsche
    Introduction to the Special Issue on Verification and Computational Logic. [Citation Graph (0, 0)][DBLP]
    TPLP, 2004, v:4, n:5-6, pp:543-544 [Journal]
  22. InSeon Yoo, Ulrich Ultes-Nitsche
    Non-signature based virus detection. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2006, v:2, n:3, pp:163-186 [Journal]

  23. Java Nio Framework - Introducing a High-Performance I/O Framework for Java. [Citation Graph (, )][DBLP]


  24. Towards a zero configuration authentication scheme for 802.11 based networks. [Citation Graph (, )][DBLP]


  25. Weakly Continuation Closed Homomorphisms on Automata. [Citation Graph (, )][DBLP]


  26. Checking Inherently Fair Linear-Time Properties in a Non-Naïve Way. [Citation Graph (, )][DBLP]


  27. Immune System Based Intrusion Detection System. [Citation Graph (, )][DBLP]


  28. A Proof-of-Concept Implementation of EAP-TLS with TPM Support. [Citation Graph (, )][DBLP]


  29. Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project. [Citation Graph (, )][DBLP]


  30. Run-Time Protocol Conformance Verification In Firewalls. [Citation Graph (, )][DBLP]


  31. Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. [Citation Graph (, )][DBLP]


  32. An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. [Citation Graph (, )][DBLP]


  33. Environmental Acquisition in Mobile Network Simulation. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002