The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Helen Treharne: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Helen Treharne, J. Draper, Steve Schneider
    Test Case Preparation Using a Prototype. [Citation Graph (0, 0)][DBLP]
    B, 1998, pp:293-311 [Conf]
  2. Wilson Ifill, Steve A. Schneider, Helen Treharne
    Augmenting B with Control Annotations. [Citation Graph (0, 0)][DBLP]
    B, 2007, pp:34-48 [Conf]
  3. Helen Treharne
    Supplementing a UML Development Process with B. [Citation Graph (0, 0)][DBLP]
    FME, 2002, pp:568-586 [Conf]
  4. Steve Schneider, Helen Treharne
    Verifying Controlled Components. [Citation Graph (0, 0)][DBLP]
    IFM, 2004, pp:87-107 [Conf]
  5. Steve A. Schneider, Helen Treharne, Neil Evans
    Chunks: Component Verification in CSP||B. [Citation Graph (0, 0)][DBLP]
    IFM, 2005, pp:89-108 [Conf]
  6. Helen Treharne, Steve Schneider
    Using a Process Algebra to Control B Operations. [Citation Graph (0, 0)][DBLP]
    IFM, 1999, pp:437-456 [Conf]
  7. C. Culnane, H. Treharne, Anthony T. S. Ho
    A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:96-110 [Conf]
  8. Neil Evans, Helen Treharne, Régine Laleau, Marc Frappier
    How to Verify Dynamic Properties of Information Systems. [Citation Graph (0, 0)][DBLP]
    SEFM, 2004, pp:416-425 [Conf]
  9. Steve Schneider, Helen Treharne
    Communicating B Machines. [Citation Graph (0, 0)][DBLP]
    ZB, 2002, pp:416-435 [Conf]
  10. Helen Treharne, Steve Schneider
    How to Drive a B Machine. [Citation Graph (0, 0)][DBLP]
    ZB, 2000, pp:188-208 [Conf]
  11. Helen Treharne, Steve Schneider, Marchia Bramble
    Composing Specifications Using Communication. [Citation Graph (0, 0)][DBLP]
    ZB, 2003, pp:58-78 [Conf]
  12. Neil Evans, Helen Treharne
    Linking Semantic Models to Support CSP || B Consistency Checking. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:145, n:, pp:201-217 [Journal]
  13. Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
    Tank Monitoring: A pAMN Case Study. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:183-204 [Journal]
  14. Steve Schneider, Helen Treharne
    CSP theorems for communicating B machines. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2005, v:17, n:4, pp:390-422 [Journal]
  15. Steve Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
    Tank monitoring: a pAMN case study. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2006, v:18, n:3, pp:308-328 [Journal]
  16. Neil Evans, Helen Treharne
    Investigating a file transfer protocol using CSP and B. [Citation Graph (0, 0)][DBLP]
    Software and System Modeling, 2005, v:4, n:3, pp:258-276 [Journal]
  17. Steve Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock
    A Layered Behavioural Model of Platelets. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2006, pp:98-106 [Conf]
  18. Damien Karkinsky, Steve A. Schneider, Helen Treharne
    Combining Mobility with State. [Citation Graph (0, 0)][DBLP]
    IFM, 2007, pp:373-392 [Conf]
  19. Neil Evans, Helen Treharne
    Interactive tool support for CSP || B consistency checking. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2007, v:19, n:3, pp:277-302 [Journal]

  20. Object Modelling in the SystemB Industrial Project. [Citation Graph (, )][DBLP]


  21. A Step towards Merging xUML and CSP || {\| \ }B. [Citation Graph (, )][DBLP]


  22. Automatic Generation of CSP || B Skeletons from xUML Models. [Citation Graph (, )][DBLP]


  23. Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. [Citation Graph (, )][DBLP]


  24. Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model. [Citation Graph (, )][DBLP]


  25. Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. [Citation Graph (, )][DBLP]


  26. Formal Analysis of Two Buyer-Seller Watermarking Protocols. [Citation Graph (, )][DBLP]


  27. A Novel Multi-size Block Benford's Law Scheme for Printer Identification. [Citation Graph (, )][DBLP]


  28. Automatic Generation of Integrated Formal Models Corresponding to UML System Models. [Citation Graph (, )][DBLP]


  29. Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. [Citation Graph (, )][DBLP]


  30. Experiments in Translating CSP || B to Handel-C. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002