Search the dblp DataBase
Mads Dam :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mads Dam On the Decidability of Process Equivalences for the pi-calculus. [Citation Graph (0, 0)][DBLP ] AMAST, 1995, pp:169-183 [Conf ] Mads Dam CTL* and ECTL* as Fragments of the Modal µ-Calculus. [Citation Graph (0, 0)][DBLP ] CAAP, 1992, pp:145-164 [Conf ] Thomas Arts , Mads Dam , Lars-Åke Fredlund , Dilian Gurov System Description: Verification of Distributed Erlang Programs. [Citation Graph (0, 0)][DBLP ] CADE, 1998, pp:38-41 [Conf ] Mads Dam , Lars-Åke Fredlund , Dilian Gurov Toward Parametric Verification of Open Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPOS, 1997, pp:150-185 [Conf ] Mads Dam Model Checking Mobile Processes. [Citation Graph (0, 0)][DBLP ] CONCUR, 1993, pp:22-36 [Conf ] Mads Dam Compositional Proof Systems for Model Checking Infinite State Processes. [Citation Graph (0, 0)][DBLP ] CONCUR, 1995, pp:12-26 [Conf ] José-Luis Vivas , Mads Dam From Higher-Order pi-Calculus to pi-Calculus in the Presence of Static Operators. [Citation Graph (0, 0)][DBLP ] CONCUR, 1998, pp:115-130 [Conf ] Mads Dam , Pablo Giambiagi Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:233-244 [Conf ] Fetahi Wuhib , Mads Dam , Rolf Stadler , Alexander Clemm Decentralized Computation of Threshold Crossing Alerts. [Citation Graph (0, 0)][DBLP ] DSOM, 2005, pp:220-232 [Conf ] Mads Dam , Dilian Gurov Compositional Verification of CCS Processes. [Citation Graph (0, 0)][DBLP ] Ershov Memorial Conference, 1999, pp:247-256 [Conf ] Pablo Giambiagi , Mads Dam On the Secure Implementation of Security Protocols. [Citation Graph (0, 0)][DBLP ] ESOP, 2003, pp:144-158 [Conf ] Mads Dam , Frank Jensen Compiler Generation from Relational Semantics. [Citation Graph (0, 0)][DBLP ] ESOP, 1986, pp:1-29 [Conf ] Christoph Sprenger , Mads Dam A note on global induction in a mu-calculus with explicit approximations. [Citation Graph (0, 0)][DBLP ] FICS, 2002, pp:22-24 [Conf ] Thomas Arts , Mads Dam Verifying a Distributed Database Lookup Manager Written in Erlang. [Citation Graph (0, 0)][DBLP ] World Congress on Formal Methods, 1999, pp:682-700 [Conf ] Christoph Sprenger , Mads Dam On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the µ-Calculus. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2003, pp:425-440 [Conf ] Mads Dam Fixed Points of Büchi Automata. [Citation Graph (0, 0)][DBLP ] FSTTCS, 1992, pp:39-50 [Conf ] Roberto M. Amadio , Mads Dam Toward a Modal Theory of Types for the pi-Calculus. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1996, pp:347-365 [Conf ] Mads Dam Relevance Logic and Concurrent Composition [Citation Graph (0, 0)][DBLP ] LICS, 1988, pp:178-185 [Conf ] Flemming Nielson , Patrick Cousot , Mads Dam , Pierpaolo Degano , Pierre Jouvelot , Alan Mycroft , Bent Thomsen Logical and Operational Methods in the Analysis of Programs and Systems. [Citation Graph (0, 0)][DBLP ] LOMAPS, 1996, pp:1-21 [Conf ] Mads Dam Decidability and proof systems for language-based noninterference relations. [Citation Graph (0, 0)][DBLP ] POPL, 2006, pp:67-78 [Conf ] Mads Dam , Lars-Åke Fredlund On the verification of open distributed systems. [Citation Graph (0, 0)][DBLP ] SAC, 1998, pp:532-540 [Conf ] Olav L. Bandmann , Babak Sadighi Firozabadi , Mads Dam Constrained Delegation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:131-0 [Conf ] Mads Dam Regular SPKI. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:134-150 [Conf ] Mads Dam Regular SPKI (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:151-152 [Conf ] Roberto M. Amadio , Mads Dam Reasoning about Higher-Order Processes. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1995, pp:202-216 [Conf ] Mads Dam Modalities in Analysis and Verification. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:2, pp:346-348 [Journal ] Mads Dam , Lars-Åke Fredlund , Dillian Guruv Formal Methods Research at SICS and KTH: An Overview. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2003, v:80, n:, pp:- [Journal ] Mads Dam Model Checking Mobile Processes. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1996, v:129, n:1, pp:35-51 [Journal ] Mads Dam Proving Properties of Dynamic Process Networks. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1998, v:140, n:2, pp:95-114 [Journal ] Mads Dam R-Generability, and Definability in Branching Time Logics. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1992, v:41, n:5, pp:281-287 [Journal ] Christoph Sprenger , Mads Dam On global induction mechanisms in a µ-calculus with explicit approximations. [Citation Graph (0, 0)][DBLP ] ITA, 2003, v:37, n:4, pp:365-391 [Journal ] Mads Dam , Dilian Gurov µ-Calculus with Explicit Points and Approximations. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 2002, v:12, n:2, pp:255-269 [Journal ] Mads Dam Process-Algebraic Interpretations of Positive Linear and Relevant Logics. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1994, v:4, n:6, pp:939-973 [Journal ] Pablo Giambiagi , Mads Dam On the secure implementation of security protocols. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:50, n:1-3, pp:73-99 [Journal ] Lars-Åke Fredlund , Dilian Gurov , Thomas Noll , Mads Dam , Thomas Arts , Gennady Chugunov A verification tool for ERLANG. [Citation Graph (0, 0)][DBLP ] STTT, 2003, v:4, n:4, pp:405-420 [Journal ] Mads Dam CTL* and ECTL* as Fragments of the Modal mu-Calculus. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1994, v:126, n:1, pp:77-96 [Journal ] Mads Dam On the Decidability of Process Equivalences for the pi-Calculus. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1997, v:183, n:2, pp:215-228 [Journal ] Fetahi Wuhib , Mads Dam , Rolf Stadler , Alexander Clemm Robust Monitoring of Network-wide Aggregates through Gossiping. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2007, pp:226-235 [Conf ] Mika Cohen , Mads Dam A Complete Axiomatization of Knowledge and Cryptography. [Citation Graph (0, 0)][DBLP ] LICS, 2007, pp:77-88 [Conf ] Abstraction in model checking multi-agent systems. [Citation Graph (, )][DBLP ] A Data Symmetry Reduction Technique for Temporal-epistemic Logic. [Citation Graph (, )][DBLP ] Security Monitor Inlining for Multithreaded Java. [Citation Graph (, )][DBLP ] Provably Correct Runtime Monitoring. [Citation Graph (, )][DBLP ] A Symmetry Reduction Technique for Model Checking Temporal-Epistemic Logic. [Citation Graph (, )][DBLP ] Gossiping for threshold detection. [Citation Graph (, )][DBLP ] Brief announcement: the accuracy of tree-based counting in dynamic networks. [Citation Graph (, )][DBLP ] Decentralized detection of global threshold crossings using aggregation trees. [Citation Graph (, )][DBLP ] The Accuracy of Tree-based Counting in Dynamic Networks [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.156secs