The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wolfgang Reif: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
    A Method for Secure Smartcard Applications. [Citation Graph (0, 0)][DBLP]
    AMAST, 2002, pp:319-333 [Conf]
  2. Matthias Güdemann, Frank Ortmeier, Wolfgang Reif
    Formal Modeling and Verification of Systems with Self-x Properties. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:38-47 [Conf]
  3. Reiner Hähnle, Maritta Heisel, Wolfgang Reif, Werner Stephan
    An Interactive Verification System Based on Dynamic Logic. [Citation Graph (0, 0)][DBLP]
    CADE, 1986, pp:306-315 [Conf]
  4. Maritta Heisel, Wolfgang Reif, Werner Stephan
    Implementing Verification Strategies in the KIV-System. [Citation Graph (0, 0)][DBLP]
    CADE, 1988, pp:131-140 [Conf]
  5. Maritta Heisel, Wolfgang Reif, Werner Stephan
    Tactical Theorem Proving in Program Verification. [Citation Graph (0, 0)][DBLP]
    CADE, 1990, pp:117-131 [Conf]
  6. Wolfgang Reif
    The KIV System: Systematic Construction of Verified Software. [Citation Graph (0, 0)][DBLP]
    CADE, 1992, pp:753-757 [Conf]
  7. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Proving System Correctness with KIV 3.0. [Citation Graph (0, 0)][DBLP]
    CADE, 1997, pp:69-72 [Conf]
  8. Wolfgang Reif, Gerhard Schellhorn, Andreas Thums
    Flaw Detection in Formal Specifications. [Citation Graph (0, 0)][DBLP]
    IJCAR, 2001, pp:642-657 [Conf]
  9. Maritta Heisel, Wolfgang Reif, Werner Stephan
    Program Verification Using Dynamic Logic. [Citation Graph (0, 0)][DBLP]
    CSL, 1987, pp:102-117 [Conf]
  10. Andreas Thums, Gerhard Schellhorn, Frank Ortmeier, Wolfgang Reif
    Interactive Verification of Statecharts. [Citation Graph (0, 0)][DBLP]
    SoftSpez Final Report, 2004, pp:355-373 [Conf]
  11. Frank Ortmeier, Wolfgang Reif, Gerhard Schellhorn
    Introduction to Subject Area "Verification". [Citation Graph (0, 0)][DBLP]
    SoftSpez Final Report, 2004, pp:419-422 [Conf]
  12. Frank Ortmeier, Andreas Thums, Gerhard Schellhorn, Wolfgang Reif
    Combining Formal Methods and Safety Analysis - The ForMoSA Approach. [Citation Graph (0, 0)][DBLP]
    SoftSpez Final Report, 2004, pp:474-493 [Conf]
  13. Frank Ortmeier, Wolfgang Reif
    Safety Optimization: A Combination of Fault Tree Analysis and Optimization Techniques. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:651-658 [Conf]
  14. Frank Ortmeier, Wolfgang Reif, Gerhard Schellhorn
    Formal Safety Analysis of a Radio-Based Railroad Crossing Using Deductive Cause-Consequence Analysis (DCCA). [Citation Graph (0, 0)][DBLP]
    EDCC, 2005, pp:210-224 [Conf]
  15. Maritta Heisel, Wolfgang Reif, Werner Stephan
    A Dynamic Logic for Program Verification. [Citation Graph (0, 0)][DBLP]
    Logic at Botik, 1989, pp:134-145 [Conf]
  16. Wolfgang Reif
    An Approach to Parameterized First-Order Specifications: Semantics, Correctness, Parameter Passing. [Citation Graph (0, 0)][DBLP]
    Formal Methods in Programming and Their Applications, 1993, pp:67-80 [Conf]
  17. Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll
    Verification of a Formal Security Model for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:17-36 [Conf]
  18. Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
    Developing Provable Secure M-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:115-129 [Conf]
  19. Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Andreas Thums
    Formal System Development with KIV. [Citation Graph (0, 0)][DBLP]
    FASE, 2000, pp:363-366 [Conf]
  20. Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    KIV 3.0 for Provably Correct Systems. [Citation Graph (0, 0)][DBLP]
    FM-Trends, 1998, pp:330-337 [Conf]
  21. Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    VSE: Controlling the Complexity in Formal Software Developments. [Citation Graph (0, 0)][DBLP]
    FM-Trends, 1998, pp:351-358 [Conf]
  22. Gerhard Schellhorn, Holger Grandy, Dominik Haneberg, Wolfgang Reif
    The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:16-31 [Conf]
  23. Jonathan Schmitt, Alwin Hoffmann, Michael Balser, Wolfgang Reif, Mar Marcos
    Interactive Verification of Medical Guidelines. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:32-47 [Conf]
  24. Wolfgang Reif, Jürgen Ruf, Gerhard Schellhorn, Tobias Vollmer
    Do You Trust Your Model Checker? [Citation Graph (0, 0)][DBLP]
    FMCAD, 2000, pp:179-196 [Conf]
  25. Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
    A Construction Kit for Modeling the Security of M-commerce Applications. [Citation Graph (0, 0)][DBLP]
    FORTE Workshops, 2004, pp:72-85 [Conf]
  26. Wolfgang Reif
    Verification of Large Software Systems. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1992, pp:241-252 [Conf]
  27. Wolfgang Reif, Kurt Stenzel
    Reuse of Proofs in Software Verification. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1993, pp:284-293 [Conf]
  28. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Formal Specification and Verification Using KIV. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1994, pp:787-787 [Conf]
  29. Dominik Haneberg, Alexander Kreibich, Wolfgang Reif, Kurt Stenzel
    Design for Trust: Security im M-Commerce. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2003, pp:91-94 [Conf]
  30. Heinrich Hußmann, Jacques Loeckx, Wolfgang Reif
    KORSO: Das Verbundprojekt "Korrekte Software". [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1993, pp:266-271 [Conf]
  31. Matthias Güdemann, Florian Nafz, Wolfgang Reif, Hella Seebach
    Towards Safe and Secure Organic Computing Applications. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2006, pp:153-160 [Conf]
  32. Michael Balser, Simon Bäumler, Alexander Knapp, Wolfgang Reif, Andreas Thums
    Interactive Verification of UML State Machines. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2004, pp:434-448 [Conf]
  33. Wolfgang Reif, Frank Ortmeier, Andreas Thums, Gerhard Schellhorn
    Integrated formal methods for safety analysis of train systems. [Citation Graph (0, 0)][DBLP]
    IFIP Congress Topical Sessions, 2004, pp:637-642 [Conf]
  34. Maritta Heisel, Wolfgang Reif, Werner Stephan
    Program Verification by Symbolic Execution and Induction. [Citation Graph (0, 0)][DBLP]
    GWAI, 1987, pp:201-210 [Conf]
  35. Maritta Heisel, Wolfgang Reif, Werner Stephan
    Machine-Assisted Program Construction and Modification. [Citation Graph (0, 0)][DBLP]
    GWAI, 1989, pp:338-347 [Conf]
  36. Thomas Fuchß, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Three Selected Case Studies in Verification. [Citation Graph (0, 0)][DBLP]
    KORSO Book, 1995, pp:371-387 [Conf]
  37. Wolfgang Reif
    The KIV-Approach to Software Verification. [Citation Graph (0, 0)][DBLP]
    KORSO Book, 1995, pp:339-370 [Conf]
  38. Wolfgang Reif
    Correctness of Generic Modules. [Citation Graph (0, 0)][DBLP]
    LFCS, 1992, pp:406-417 [Conf]
  39. Frank Ortmeier, Gerhard Schellhorn, Andreas Thums, Wolfgang Reif, Bernhard Hering, Helmut Trappschuh
    Safety Analysis of the Height Control System for the Elbtunnel. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2002, pp:296-308 [Conf]
  40. Holger Grandy, Kurt Stenzel, Wolfgang Reif
    Object Oriented Verification Kernels for Secure Java Applications. [Citation Graph (0, 0)][DBLP]
    SEFM, 2005, pp:170-179 [Conf]
  41. Wolfgang Reif
    Correctness of Full First-Order Specifications. [Citation Graph (0, 0)][DBLP]
    SEKE, 1992, pp:276-283 [Conf]
  42. Simon Bäumler, Michael Balser, Andriy Dunets, Wolfgang Reif, Jonathan Schmitt
    Verification of Medical Guidelines by Model Checking - A Case Study. [Citation Graph (0, 0)][DBLP]
    SPIN, 2006, pp:219-233 [Conf]
  43. Rainer Drexler, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Werner Stephan, Andreas Wolpers
    The KIV System: A Tool for Formal Program Development. [Citation Graph (0, 0)][DBLP]
    STACS, 1993, pp:704-705 [Conf]
  44. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Proving System Correctness with KIV. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1997, pp:859-862 [Conf]
  45. Markus Ullmann, H. Hauff, D. Loevenich, P. Kejwal, R. Förster, P. Baur, Wolfgang Reif, Werner Stephan, Andreas Wolpers, Jürgen Cleve, Dieter Hutter, Claus Sengler, E. Canver
    VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. [Citation Graph (0, 0)][DBLP]
    VIS, 1993, pp:175-190 [Conf]
  46. Dominik Haneberg, Kurt Stenzel, Wolfgang Reif
    Electronic-Onboard-Ticketing: Software Challenges of an State-of-the-Art M-Commerce Application. [Citation Graph (0, 0)][DBLP]
    Workshop Mobile Commerce, 2004, pp:103-113 [Conf]
  47. Annette ten Teije, Mar Marcos, Michael Balser, Joyce van Croonenborg, Christoph Duelli, Frank van Harmelen, Peter J. F. Lucas, Silvia Miksch, Wolfgang Reif, Kitty Rosenbrand, Andreas Seyfang
    Improving medical protocols by formal methods. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence in Medicine, 2006, v:36, n:3, pp:193-209 [Journal]
  48. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Tactics in KIV. [Citation Graph (0, 0)][DBLP]
    Elektronische Informationsverarbeitung und Kybernetik, 1994, v:30, n:5/6, pp:293-310 [Journal]
  49. Wolfgang Reif
    Formale Methoden für sicherheitskritische Software - Der KIV-Ansatz. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1999, v:14, n:4, pp:193-202 [Journal]
  50. Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll
    Verified Formal Security Models for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:4, pp:339-368 [Journal]
  51. Rudolf Berghammer, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn
    Special Issue on Tools for System Design and Verification. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2003, v:9, n:2, pp:86-87 [Journal]
  52. Reiner Hähnle, Wolfram Menzel, Peter H. Schmitt, Wolfgang Reif
    J.UCS Special Issue on Integration of Deduction Systems. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1999, v:5, n:3, pp:- [Journal]
  53. Wolfgang Reif, Gerhard Schellhorn
    J.UCS Special Issue on Tools for System Design and Verification - Part 1. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2001, v:7, n:1, pp:1-2 [Journal]
  54. Wolfgang Reif, Gerhard Schellhorn
    J.UCS Special Issue on Tools for System Design and Verification - Part 2. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2001, v:7, n:2, pp:105-106 [Journal]
  55. Wolfgang Reif, Gerhard Schellhorn, Tobias Vollmer, Jürgen Ruf
    Correctness of Efficient Real-Time Model Checking. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2001, v:7, n:2, pp:194-209 [Journal]
  56. Maritta Heisel, Wolfgang Reif
    Bericht über den Workshop ``Logik und Wissensrepräsentation''. [Citation Graph (0, 0)][DBLP]
    KI, 1988, v:2, n:3, pp:15-17 [Journal]
  57. Wolfgang Reif
    Interaktives Theorembeweisen und seine Anwendungen in der Softwaretechnik. [Citation Graph (0, 0)][DBLP]
    KI, 1998, v:12, n:4, pp:42-48 [Journal]
  58. Michael Balser, Christoph Duelli, Wolfgang Reif, Gerhard Schellhorn
    Verifying Concurrent Systems with Symbolic Execution. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2002, v:12, n:4, pp:549-560 [Journal]
  59. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn
    Verifying Security Protocols: An ASM Approach. [Citation Graph (0, 0)][DBLP]
    Abstract State Machines, 2005, pp:247-262 [Conf]
  60. Holger Grandy, Kurt Stenzel, Wolfgang Reif
    A Refinement Method for Java Programs. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2007, pp:221-235 [Conf]
  61. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn
    Verifying Smart Card Applications: An ASM Approach. [Citation Graph (0, 0)][DBLP]
    IFM, 2007, pp:313-332 [Conf]
  62. Matthias Güdemann, Andreas Angerer, Frank Ortmeier, Wolfgang Reif
    Modeling of self-adaptive systems with SCADE. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:2922-2925 [Conf]
  63. Matthias Güdemann, Frank Ortmeier, Wolfgang Reif
    Using Deductive Cause-Consequence Analysis (DCCA) with SCADE. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2007, pp:465-478 [Conf]
  64. Frank Ortmeier, Wolfgang Reif, Giovanna Di Marzo Serugendo, Hartmut Schmeck
    WG2: Software engineering for organic computing applications (SE4OC). [Citation Graph (0, 0)][DBLP]
    Software Engineering, 2007, pp:275-276 [Conf]

  65. SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. [Citation Graph (, )][DBLP]


  66. Pitfalls in Formal Reasoning about Security Protocols. [Citation Graph (, )][DBLP]


  67. Verification of Java Programs with Generics. [Citation Graph (, )][DBLP]


  68. On Deadlocks and Fairness in Self-organizing Resource-Flow Systems. [Citation Graph (, )][DBLP]


  69. Model-Driven Code Generation for Secure Smart Card Applications. [Citation Graph (, )][DBLP]


  70. A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems. [Citation Graph (, )][DBLP]


  71. Automating Algebraic Specifications of Non-freely Generated Data Types. [Citation Graph (, )][DBLP]


  72. A Systematic Verification Approach for Mondex Electronic Purses Using ASMs. [Citation Graph (, )][DBLP]


  73. Compositional Proofs with Symbolic Execution. [Citation Graph (, )][DBLP]


  74. Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code. [Citation Graph (, )][DBLP]


  75. Abstract Specification of the UBIFS File System for Flash Memory. [Citation Graph (, )][DBLP]


  76. A generic software framework for role-based Organic Computing systems. [Citation Graph (, )][DBLP]


  77. Safety and Dependability Analysis of Self-Adaptive Systems. [Citation Graph (, )][DBLP]


  78. Interactive Verification of Concurrent Systems using Symbolic Execution. [Citation Graph (, )][DBLP]


  79. Temporal Logic Verification of Lock-Freedom. [Citation Graph (, )][DBLP]


  80. ASN1-light: A Verified Message Encoding for Security Protocols. [Citation Graph (, )][DBLP]


  81. A Modeling Framework for the Development of Provably Secure E-Commerce Applications. [Citation Graph (, )][DBLP]


  82. A Specification and Construction Paradigm for Organic Computing Systems. [Citation Graph (, )][DBLP]


  83. Design and construction of organic computing systems. [Citation Graph (, )][DBLP]


  84. Bounded Relational Analysis of Free Data Types. [Citation Graph (, )][DBLP]


  85. Organic Computing for Health Care Systems - Possible Benefits and Challenges. [Citation Graph (, )][DBLP]


  86. Hiding real-time: A new approach for the software development of industrial robots. [Citation Graph (, )][DBLP]


  87. Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. [Citation Graph (, )][DBLP]


  88. Interactive verification of concurrent systems using symbolic execution. [Citation Graph (, )][DBLP]


  89. An Abstract Specification Language for Static Program Analysis. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.460secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002