Search the dblp DataBase
Wolfgang Reif :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dominik Haneberg , Wolfgang Reif , Kurt Stenzel A Method for Secure Smartcard Applications. [Citation Graph (0, 0)][DBLP ] AMAST, 2002, pp:319-333 [Conf ] Matthias Güdemann , Frank Ortmeier , Wolfgang Reif Formal Modeling and Verification of Systems with Self-x Properties. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:38-47 [Conf ] Reiner Hähnle , Maritta Heisel , Wolfgang Reif , Werner Stephan An Interactive Verification System Based on Dynamic Logic. [Citation Graph (0, 0)][DBLP ] CADE, 1986, pp:306-315 [Conf ] Maritta Heisel , Wolfgang Reif , Werner Stephan Implementing Verification Strategies in the KIV-System. [Citation Graph (0, 0)][DBLP ] CADE, 1988, pp:131-140 [Conf ] Maritta Heisel , Wolfgang Reif , Werner Stephan Tactical Theorem Proving in Program Verification. [Citation Graph (0, 0)][DBLP ] CADE, 1990, pp:117-131 [Conf ] Wolfgang Reif The KIV System: Systematic Construction of Verified Software. [Citation Graph (0, 0)][DBLP ] CADE, 1992, pp:753-757 [Conf ] Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel Proving System Correctness with KIV 3.0. [Citation Graph (0, 0)][DBLP ] CADE, 1997, pp:69-72 [Conf ] Wolfgang Reif , Gerhard Schellhorn , Andreas Thums Flaw Detection in Formal Specifications. [Citation Graph (0, 0)][DBLP ] IJCAR, 2001, pp:642-657 [Conf ] Maritta Heisel , Wolfgang Reif , Werner Stephan Program Verification Using Dynamic Logic. [Citation Graph (0, 0)][DBLP ] CSL, 1987, pp:102-117 [Conf ] Andreas Thums , Gerhard Schellhorn , Frank Ortmeier , Wolfgang Reif Interactive Verification of Statecharts. [Citation Graph (0, 0)][DBLP ] SoftSpez Final Report, 2004, pp:355-373 [Conf ] Frank Ortmeier , Wolfgang Reif , Gerhard Schellhorn Introduction to Subject Area "Verification". [Citation Graph (0, 0)][DBLP ] SoftSpez Final Report, 2004, pp:419-422 [Conf ] Frank Ortmeier , Andreas Thums , Gerhard Schellhorn , Wolfgang Reif Combining Formal Methods and Safety Analysis - The ForMoSA Approach. [Citation Graph (0, 0)][DBLP ] SoftSpez Final Report, 2004, pp:474-493 [Conf ] Frank Ortmeier , Wolfgang Reif Safety Optimization: A Combination of Fault Tree Analysis and Optimization Techniques. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:651-658 [Conf ] Frank Ortmeier , Wolfgang Reif , Gerhard Schellhorn Formal Safety Analysis of a Radio-Based Railroad Crossing Using Deductive Cause-Consequence Analysis (DCCA). [Citation Graph (0, 0)][DBLP ] EDCC, 2005, pp:210-224 [Conf ] Maritta Heisel , Wolfgang Reif , Werner Stephan A Dynamic Logic for Program Verification. [Citation Graph (0, 0)][DBLP ] Logic at Botik, 1989, pp:134-145 [Conf ] Wolfgang Reif An Approach to Parameterized First-Order Specifications: Semantics, Correctness, Parameter Passing. [Citation Graph (0, 0)][DBLP ] Formal Methods in Programming and Their Applications, 1993, pp:67-80 [Conf ] Gerhard Schellhorn , Wolfgang Reif , Axel Schairer , Paul A. Karger , Vernon Austel , David C. Toll Verification of a Formal Security Model for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:17-36 [Conf ] Holger Grandy , Dominik Haneberg , Wolfgang Reif , Kurt Stenzel Developing Provable Secure M-Commerce Applications. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:115-129 [Conf ] Michael Balser , Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel , Andreas Thums Formal System Development with KIV. [Citation Graph (0, 0)][DBLP ] FASE, 2000, pp:363-366 [Conf ] Michael Balser , Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel KIV 3.0 for Provably Correct Systems. [Citation Graph (0, 0)][DBLP ] FM-Trends, 1998, pp:330-337 [Conf ] Dieter Hutter , Heiko Mantel , Georg Rock , Werner Stephan , Andreas Wolpers , Michael Balser , Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel VSE: Controlling the Complexity in Formal Software Developments. [Citation Graph (0, 0)][DBLP ] FM-Trends, 1998, pp:351-358 [Conf ] Gerhard Schellhorn , Holger Grandy , Dominik Haneberg , Wolfgang Reif The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. [Citation Graph (0, 0)][DBLP ] FM, 2006, pp:16-31 [Conf ] Jonathan Schmitt , Alwin Hoffmann , Michael Balser , Wolfgang Reif , Mar Marcos Interactive Verification of Medical Guidelines. [Citation Graph (0, 0)][DBLP ] FM, 2006, pp:32-47 [Conf ] Wolfgang Reif , Jürgen Ruf , Gerhard Schellhorn , Tobias Vollmer Do You Trust Your Model Checker? [Citation Graph (0, 0)][DBLP ] FMCAD, 2000, pp:179-196 [Conf ] Dominik Haneberg , Wolfgang Reif , Kurt Stenzel A Construction Kit for Modeling the Security of M-commerce Applications. [Citation Graph (0, 0)][DBLP ] FORTE Workshops, 2004, pp:72-85 [Conf ] Wolfgang Reif Verification of Large Software Systems. [Citation Graph (0, 0)][DBLP ] FSTTCS, 1992, pp:241-252 [Conf ] Wolfgang Reif , Kurt Stenzel Reuse of Proofs in Software Verification. [Citation Graph (0, 0)][DBLP ] FSTTCS, 1993, pp:284-293 [Conf ] Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel Formal Specification and Verification Using KIV. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1994, pp:787-787 [Conf ] Dominik Haneberg , Alexander Kreibich , Wolfgang Reif , Kurt Stenzel Design for Trust: Security im M-Commerce. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (1), 2003, pp:91-94 [Conf ] Heinrich Hußmann , Jacques Loeckx , Wolfgang Reif KORSO: Das Verbundprojekt "Korrekte Software". [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1993, pp:266-271 [Conf ] Matthias Güdemann , Florian Nafz , Wolfgang Reif , Hella Seebach Towards Safe and Secure Organic Computing Applications. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (1), 2006, pp:153-160 [Conf ] Michael Balser , Simon Bäumler , Alexander Knapp , Wolfgang Reif , Andreas Thums Interactive Verification of UML State Machines. [Citation Graph (0, 0)][DBLP ] ICFEM, 2004, pp:434-448 [Conf ] Wolfgang Reif , Frank Ortmeier , Andreas Thums , Gerhard Schellhorn Integrated formal methods for safety analysis of train systems. [Citation Graph (0, 0)][DBLP ] IFIP Congress Topical Sessions, 2004, pp:637-642 [Conf ] Maritta Heisel , Wolfgang Reif , Werner Stephan Program Verification by Symbolic Execution and Induction. [Citation Graph (0, 0)][DBLP ] GWAI, 1987, pp:201-210 [Conf ] Maritta Heisel , Wolfgang Reif , Werner Stephan Machine-Assisted Program Construction and Modification. [Citation Graph (0, 0)][DBLP ] GWAI, 1989, pp:338-347 [Conf ] Thomas Fuchß , Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel Three Selected Case Studies in Verification. [Citation Graph (0, 0)][DBLP ] KORSO Book, 1995, pp:371-387 [Conf ] Wolfgang Reif The KIV-Approach to Software Verification. [Citation Graph (0, 0)][DBLP ] KORSO Book, 1995, pp:339-370 [Conf ] Wolfgang Reif Correctness of Generic Modules. [Citation Graph (0, 0)][DBLP ] LFCS, 1992, pp:406-417 [Conf ] Frank Ortmeier , Gerhard Schellhorn , Andreas Thums , Wolfgang Reif , Bernhard Hering , Helmut Trappschuh Safety Analysis of the Height Control System for the Elbtunnel. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2002, pp:296-308 [Conf ] Holger Grandy , Kurt Stenzel , Wolfgang Reif Object Oriented Verification Kernels for Secure Java Applications. [Citation Graph (0, 0)][DBLP ] SEFM, 2005, pp:170-179 [Conf ] Wolfgang Reif Correctness of Full First-Order Specifications. [Citation Graph (0, 0)][DBLP ] SEKE, 1992, pp:276-283 [Conf ] Simon Bäumler , Michael Balser , Andriy Dunets , Wolfgang Reif , Jonathan Schmitt Verification of Medical Guidelines by Model Checking - A Case Study. [Citation Graph (0, 0)][DBLP ] SPIN, 2006, pp:219-233 [Conf ] Rainer Drexler , Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel , Werner Stephan , Andreas Wolpers The KIV System: A Tool for Formal Program Development. [Citation Graph (0, 0)][DBLP ] STACS, 1993, pp:704-705 [Conf ] Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel Proving System Correctness with KIV. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1997, pp:859-862 [Conf ] Markus Ullmann , H. Hauff , D. Loevenich , P. Kejwal , R. Förster , P. Baur , Wolfgang Reif , Werner Stephan , Andreas Wolpers , Jürgen Cleve , Dieter Hutter , Claus Sengler , E. Canver VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. [Citation Graph (0, 0)][DBLP ] VIS, 1993, pp:175-190 [Conf ] Dominik Haneberg , Kurt Stenzel , Wolfgang Reif Electronic-Onboard-Ticketing: Software Challenges of an State-of-the-Art M-Commerce Application. [Citation Graph (0, 0)][DBLP ] Workshop Mobile Commerce, 2004, pp:103-113 [Conf ] Annette ten Teije , Mar Marcos , Michael Balser , Joyce van Croonenborg , Christoph Duelli , Frank van Harmelen , Peter J. F. Lucas , Silvia Miksch , Wolfgang Reif , Kitty Rosenbrand , Andreas Seyfang Improving medical protocols by formal methods. [Citation Graph (0, 0)][DBLP ] Artificial Intelligence in Medicine, 2006, v:36, n:3, pp:193-209 [Journal ] Wolfgang Reif , Gerhard Schellhorn , Kurt Stenzel Tactics in KIV. [Citation Graph (0, 0)][DBLP ] Elektronische Informationsverarbeitung und Kybernetik, 1994, v:30, n:5/6, pp:293-310 [Journal ] Wolfgang Reif Formale Methoden für sicherheitskritische Software - Der KIV-Ansatz. [Citation Graph (0, 0)][DBLP ] Inform., Forsch. Entwickl., 1999, v:14, n:4, pp:193-202 [Journal ] Gerhard Schellhorn , Wolfgang Reif , Axel Schairer , Paul A. Karger , Vernon Austel , David C. Toll Verified Formal Security Models for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:4, pp:339-368 [Journal ] Rudolf Berghammer , Dominik Haneberg , Wolfgang Reif , Gerhard Schellhorn Special Issue on Tools for System Design and Verification. [Citation Graph (0, 0)][DBLP ] J. UCS, 2003, v:9, n:2, pp:86-87 [Journal ] Reiner Hähnle , Wolfram Menzel , Peter H. Schmitt , Wolfgang Reif J.UCS Special Issue on Integration of Deduction Systems. [Citation Graph (0, 0)][DBLP ] J. UCS, 1999, v:5, n:3, pp:- [Journal ] Wolfgang Reif , Gerhard Schellhorn J.UCS Special Issue on Tools for System Design and Verification - Part 1. [Citation Graph (0, 0)][DBLP ] J. UCS, 2001, v:7, n:1, pp:1-2 [Journal ] Wolfgang Reif , Gerhard Schellhorn J.UCS Special Issue on Tools for System Design and Verification - Part 2. [Citation Graph (0, 0)][DBLP ] J. UCS, 2001, v:7, n:2, pp:105-106 [Journal ] Wolfgang Reif , Gerhard Schellhorn , Tobias Vollmer , Jürgen Ruf Correctness of Efficient Real-Time Model Checking. [Citation Graph (0, 0)][DBLP ] J. UCS, 2001, v:7, n:2, pp:194-209 [Journal ] Maritta Heisel , Wolfgang Reif Bericht über den Workshop ``Logik und Wissensrepräsentation''. [Citation Graph (0, 0)][DBLP ] KI, 1988, v:2, n:3, pp:15-17 [Journal ] Wolfgang Reif Interaktives Theorembeweisen und seine Anwendungen in der Softwaretechnik. [Citation Graph (0, 0)][DBLP ] KI, 1998, v:12, n:4, pp:42-48 [Journal ] Michael Balser , Christoph Duelli , Wolfgang Reif , Gerhard Schellhorn Verifying Concurrent Systems with Symbolic Execution. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 2002, v:12, n:4, pp:549-560 [Journal ] Dominik Haneberg , Holger Grandy , Wolfgang Reif , Gerhard Schellhorn Verifying Security Protocols: An ASM Approach. [Citation Graph (0, 0)][DBLP ] Abstract State Machines, 2005, pp:247-262 [Conf ] Holger Grandy , Kurt Stenzel , Wolfgang Reif A Refinement Method for Java Programs. [Citation Graph (0, 0)][DBLP ] FMOODS, 2007, pp:221-235 [Conf ] Dominik Haneberg , Holger Grandy , Wolfgang Reif , Gerhard Schellhorn Verifying Smart Card Applications: An ASM Approach. [Citation Graph (0, 0)][DBLP ] IFM, 2007, pp:313-332 [Conf ] Matthias Güdemann , Andreas Angerer , Frank Ortmeier , Wolfgang Reif Modeling of self-adaptive systems with SCADE. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:2922-2925 [Conf ] Matthias Güdemann , Frank Ortmeier , Wolfgang Reif Using Deductive Cause-Consequence Analysis (DCCA) with SCADE. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2007, pp:465-478 [Conf ] Frank Ortmeier , Wolfgang Reif , Giovanna Di Marzo Serugendo , Hartmut Schmeck WG2: Software engineering for organic computing applications (SE4OC). [Citation Graph (0, 0)][DBLP ] Software Engineering, 2007, pp:275-276 [Conf ] SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. [Citation Graph (, )][DBLP ] Pitfalls in Formal Reasoning about Security Protocols. [Citation Graph (, )][DBLP ] Verification of Java Programs with Generics. [Citation Graph (, )][DBLP ] On Deadlocks and Fairness in Self-organizing Resource-Flow Systems. [Citation Graph (, )][DBLP ] Model-Driven Code Generation for Secure Smart Card Applications. [Citation Graph (, )][DBLP ] A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems. [Citation Graph (, )][DBLP ] Automating Algebraic Specifications of Non-freely Generated Data Types. [Citation Graph (, )][DBLP ] A Systematic Verification Approach for Mondex Electronic Purses Using ASMs. [Citation Graph (, )][DBLP ] Compositional Proofs with Symbolic Execution. [Citation Graph (, )][DBLP ] Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code. [Citation Graph (, )][DBLP ] Abstract Specification of the UBIFS File System for Flash Memory. [Citation Graph (, )][DBLP ] A generic software framework for role-based Organic Computing systems. [Citation Graph (, )][DBLP ] Safety and Dependability Analysis of Self-Adaptive Systems. [Citation Graph (, )][DBLP ] Interactive Verification of Concurrent Systems using Symbolic Execution. [Citation Graph (, )][DBLP ] Temporal Logic Verification of Lock-Freedom. [Citation Graph (, )][DBLP ] ASN1-light: A Verified Message Encoding for Security Protocols. [Citation Graph (, )][DBLP ] A Modeling Framework for the Development of Provably Secure E-Commerce Applications. [Citation Graph (, )][DBLP ] A Specification and Construction Paradigm for Organic Computing Systems. [Citation Graph (, )][DBLP ] Design and construction of organic computing systems. [Citation Graph (, )][DBLP ] Bounded Relational Analysis of Free Data Types. [Citation Graph (, )][DBLP ] Organic Computing for Health Care Systems - Possible Benefits and Challenges. [Citation Graph (, )][DBLP ] Hiding real-time: A new approach for the software development of industrial robots. [Citation Graph (, )][DBLP ] Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. [Citation Graph (, )][DBLP ] Interactive verification of concurrent systems using symbolic execution. [Citation Graph (, )][DBLP ] An Abstract Specification Language for Static Program Analysis. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.460secs