Search the dblp DataBase
Harald Vogt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Frank Siegemund , Christian Floerkemeier , Harald Vogt The Value of Handhelds in Smart Environments. [Citation Graph (0, 0)][DBLP ] ARCS, 2004, pp:291-308 [Conf ] Andrew Slater , Rajeev Goré , Joachim Posegga , Harald Vogt cardTA P: Automated Deduction on a Smart Card. [Citation Graph (0, 0)][DBLP ] Australian Joint Conference on Artificial Intelligence, 1998, pp:239-247 [Conf ] Rajeev Goré , Joachim Posegga , Andrew Slater , Harald Vogt System Description: card T A P : The First Theorem Prover on a Smart Card. [Citation Graph (0, 0)][DBLP ] CADE, 1998, pp:47-50 [Conf ] David A. Basin , Stefan Friedrich , Joachim Posegga , Harald Vogt Java Bytecode Verification by Model Checking. [Citation Graph (0, 0)][DBLP ] CAV, 1999, pp:491-494 [Conf ] Roger Kehr , Joachim Posegga , Harald Vogt PCA: Jini-based Personal Card Assistant. [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:64-75 [Conf ] Roger Kehr , Michael Rohs , Harald Vogt Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware. [Citation Graph (0, 0)][DBLP ] DOA, 2000, pp:119-0 [Conf ] Harald Vogt Exploring Message Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2004, pp:19-30 [Conf ] Joachim Posegga , Harald Vogt Byte Code Verification for Java Smart Card Based on Model Checking. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:175-190 [Conf ] Harald Vogt , Matthias Ringwald , Mario Strasser Intrusion Detection and Failure Recovery in Sensor Nodes. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (2), 2005, pp:161-163 [Conf ] Harald Vogt Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:179-184 [Conf ] Roger Kehr , Michael Rohs , Harald Vogt Issues in Smartcard Middleware. [Citation Graph (0, 0)][DBLP ] Java Card Workshop, 2000, pp:90-97 [Conf ] Harald Vogt Efficient Object Identification with Passive RFID Tags. [Citation Graph (0, 0)][DBLP ] Pervasive, 2002, pp:98-113 [Conf ] Harald Vogt , S. Doaitse Swierstra , Matthijs F. Kuiper Higher-Order Attribute Grammars. [Citation Graph (0, 0)][DBLP ] PLDI, 1989, pp:131-145 [Conf ] Maarten Pennings , S. Doaitse Swierstra , Harald Vogt Using Cached Functions and Constructors for Incremental Attribute Evaluation. [Citation Graph (0, 0)][DBLP ] PLILP, 1992, pp:130-144 [Conf ] Harald Vogt , S. Doaitse Swierstra , Matthijs F. Kuiper Efficient Incremental Evaluation of Higher order Attribute Grammars. [Citation Graph (0, 0)][DBLP ] PLILP, 1991, pp:231-242 [Conf ] S. Doaitse Swierstra , Harald Vogt Higher Order Attribute Grammars. [Citation Graph (0, 0)][DBLP ] Attribute Grammars, Applications and Systems, 1991, pp:256-296 [Conf ] Mario Strasser , Harald Vogt Autonomous and distributed node recovery in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:113-122 [Conf ] Jürgen Bohn , Felix C. Gärtner , Harald Vogt Dependability Issues of Pervasive Computing in a Healthcare Environment. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:53-70 [Conf ] Harald Vogt , Aswin van den Berg , Arend Freije Rapid Development of a Program Transformation System with Attribute Grammars and Dynamic Transformations. [Citation Graph (0, 0)][DBLP ] WAGA, 1990, pp:101-115 [Conf ] Harald Vogt Small Worlds and the Security of Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2005, pp:593-597 [Conf ] A client architecture for market-based grid integration of smart environments. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs