The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Helmut Veith: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Georg Gottlob, Nicola Leone, Helmut Veith
    Second Order Logic and the Weak Exponential Hierarchies. [Citation Graph (1, 0)][DBLP]
    MFCS, 1995, pp:66-81 [Conf]
  2. Edmund M. Clarke, Helmut Veith
    Counterexamples Revisited: Principles, Algorithms, Applications. [Citation Graph (0, 0)][DBLP]
    Verification: Theory and Practice, 2003, pp:208-224 [Conf]
  3. Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
    Counterexample-Guided Abstraction Refinement. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:154-169 [Conf]
  4. Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang
    Using Combinatorial Optimization Methods for Quantification Scheduling. [Citation Graph (0, 0)][DBLP]
    CHARME, 2001, pp:293-309 [Conf]
  5. Helmut Veith
    Succinct Representation, Leaf Languages, and Projection Reductions. [Citation Graph (0, 0)][DBLP]
    IEEE Conference on Computational Complexity, 1996, pp:118-126 [Conf]
  6. Helmut Veith
    How to Encode a Logical Structure by an OBDD. [Citation Graph (0, 0)][DBLP]
    IEEE Conference on Computational Complexity, 1998, pp:122-131 [Conf]
  7. Edmund M. Clarke, Muralidhar Talupur, Tayssir Touili, Helmut Veith
    Verification by Network Decomposition. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2004, pp:276-291 [Conf]
  8. Matthias Baaz, Helmut Veith
    Quantifier Elimination in Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    CSL, 1998, pp:399-414 [Conf]
  9. Marko Samer, Helmut Veith
    Validity of CTL Queries Revisited. [Citation Graph (0, 0)][DBLP]
    CSL, 2003, pp:470-483 [Conf]
  10. Helmut Veith
    Friends or Foes? Communities in Software Verification (Invited Lecture). [Citation Graph (0, 0)][DBLP]
    CSL, 2003, pp:528-529 [Conf]
  11. Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
    Progress on the State Explosion Problem in Model Checking. [Citation Graph (0, 0)][DBLP]
    Informatics, 2001, pp:176-194 [Conf]
  12. Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Detecting Malicious Code by Model Checking. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:174-187 [Conf]
  13. André Adelsbach, Stefan Katzenbeisser, Helmut Veith
    Watermarking schemes provably secure against copy and ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:111-119 [Conf]
  14. Thomas Eiter, Georg Gottlob, Helmut Veith
    Generalized Quantifiers in Logic Programs. [Citation Graph (0, 0)][DBLP]
    ESSLLI, 1997, pp:72-98 [Conf]
  15. Pankaj Chauhan, Edmund M. Clarke, James H. Kukula, Samir Sapra, Helmut Veith, Dong Wang
    Automated Abstraction Refinement for Model Checking Large State Spaces Using SAT Based Conflict Analysis. [Citation Graph (0, 0)][DBLP]
    FMCAD, 2002, pp:33-51 [Conf]
  16. Edmund M. Clarke, Steven M. German, Yuan Lu, Helmut Veith, Dong Wang
    Executable Protocol Specification in ESL. [Citation Graph (0, 0)][DBLP]
    FMCAD, 2000, pp:197-216 [Conf]
  17. Marko Samer, Helmut Veith
    Parameterized Vacuity. [Citation Graph (0, 0)][DBLP]
    FMCAD, 2004, pp:322-336 [Conf]
  18. Matthias Baaz, Agata Ciabattoni, Christian G. Fermüller, Helmut Veith
    On the Undecidability of some Sub-Classical First-Order Logics. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1999, pp:258-268 [Conf]
  19. Helmut Veith
    A General Method to Determine the Expression Complexity of Database Query Languages. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1998, pp:134-137 [Conf]
  20. Marko Samer, Helmut Veith
    A Syntactic Characterization of Distributive LTL Queries. [Citation Graph (0, 0)][DBLP]
    ICALP, 2004, pp:1099-1110 [Conf]
  21. Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang
    Non-linear Quantification Scheduling in Image Computation. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2001, pp:293-0 [Conf]
  22. Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith
    Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. [Citation Graph (0, 0)][DBLP]
    ICSE, 2001, pp:443-452 [Conf]
  23. Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith
    Modular Verification of Software Components in C. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:385-395 [Conf]
  24. Sagar Chaki, Edmund M. Clarke, Orna Grumberg, Joël Ouaknine, Natasha Sharygina, Tayssir Touili, Helmut Veith
    State/Event Software Verification for Branching-Time Specifications. [Citation Graph (0, 0)][DBLP]
    IFM, 2005, pp:53-69 [Conf]
  25. Edmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith
    Tree-Like Counterexamples in Model Checking. [Citation Graph (0, 0)][DBLP]
    LICS, 2002, pp:19-29 [Conf]
  26. Thomas Eiter, Georg Gottlob, Helmut Veith
    Modular Logic Programming and Generalized Quantifiers. [Citation Graph (0, 0)][DBLP]
    LPNMR, 1997, pp:290-309 [Conf]
  27. Matthias Baaz, Agata Ciabattoni, Christian G. Fermüller, Helmut Veith
    Proof Theory of Fuzzy Logics: Urquhart's C and Related Logics. [Citation Graph (0, 0)][DBLP]
    MFCS, 1998, pp:203-212 [Conf]
  28. Edmund M. Clarke, Muralidhar Talupur, Helmut Veith, Dong Wang
    SAT Based Predicate Abstraction for Hardware Verification. [Citation Graph (0, 0)][DBLP]
    SAT, 2003, pp:78-92 [Conf]
  29. Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Ensuring Media Integrity on Third-Party Infrastructures. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:493-508 [Conf]
  30. Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith
    Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. [Citation Graph (0, 0)][DBLP]
    SEKE, 2003, pp:510-517 [Conf]
  31. Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Malware Engineering. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:139-148 [Conf]
  32. Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
    Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:179-186 [Conf]
  33. Matthias Baaz, Christian G. Fermüller, Helmut Veith
    An Analytic Calculus for Quantified Propositional Gödel Logic. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 2000, pp:112-126 [Conf]
  34. Marko Samer, Helmut Veith
    Deterministic CTL Query Solving. [Citation Graph (0, 0)][DBLP]
    TIME, 2005, pp:156-165 [Conf]
  35. Marko Samer, Helmut Veith
    From Temporal Logic Queries to Vacuity Detection. [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:149-167 [Conf]
  36. Edmund M. Clarke, Muralidhar Talupur, Helmut Veith
    Environment Abstraction for Parameterized Verification. [Citation Graph (0, 0)][DBLP]
    VMCAI, 2006, pp:126-141 [Conf]
  37. Matthias Baaz, Petr Hájek, Franco Montagna, Helmut Veith
    Complexity of t-tautologies. [Citation Graph (0, 0)][DBLP]
    Ann. Pure Appl. Logic, 2001, v:113, n:1-3, pp:3-11 [Journal]
  38. Georg Gottlob, Nicola Leone, Helmut Veith
    Succinctness as a Source of Complexity in Logical Formalisms. [Citation Graph (0, 0)][DBLP]
    Ann. Pure Appl. Logic, 1999, v:97, n:1-3, pp:231-260 [Journal]
  39. Oleg Pikhurko, Helmut Veith, Oleg Verbitsky
    The first order definability of graphs: Upper bounds for quantifier depth. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:17, pp:2511-2529 [Journal]
  40. Helmut Veith
    Succinct Representation and Leaf Languages [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1995, v:2, n:48, pp:- [Journal]
  41. Helmut Veith
    Succinct Representation, Leaf Languages, and Projection Reductions. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1998, v:142, n:2, pp:207-236 [Journal]
  42. Helmut Veith
    Languages Represented by Boolean Formulas. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:63, n:5, pp:251-256 [Journal]
  43. Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
    Counterexample-guided abstraction refinement for symbolic model checking. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2003, v:50, n:5, pp:752-794 [Journal]
  44. Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith
    An Iterative Framework for Simulation Conformance. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2005, v:15, n:4, pp:465-488 [Journal]
  45. Thomas Eiter, Helmut Veith
    On the complexity of data disjunctions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:288, n:1, pp:101-128 [Journal]
  46. Georg Gottlob, Erich Grädel, Helmut Veith
    Datalog LITE: a deductive query language with linear time model checking. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2002, v:3, n:1, pp:42-79 [Journal]
  47. Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith
    Modular Verification of Software Components in C. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:6, pp:388-402 [Journal]
  48. Sagar Chaki, Christian Schallhart, Helmut Veith
    Verification Across Intellectual Property Boundaries. [Citation Graph (0, 0)][DBLP]
    CAV, 2007, pp:82-94 [Conf]
  49. Andreas Holzer, Johannes Kinder, Helmut Veith
    Using Verification Technology to Specify and Detect Malware. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2007, pp:497-504 [Conf]
  50. Marko Samer, Helmut Veith
    On the Notion of Vacuous Truth. [Citation Graph (0, 0)][DBLP]
    LPAR, 2007, pp:2-14 [Conf]
  51. Sagar Chaki, Christian Schallhart, Helmut Veith
    Verification Across Intellectual Property Boundaries [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  52. Uwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  53. The Localization Reduction and Counterexample-Guided Abstraction Refinement. [Citation Graph (, )][DBLP]


  54. FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement. [Citation Graph (, )][DBLP]


  55. Jakstab: A Static Analysis Platform for Binaries. [Citation Graph (, )][DBLP]


  56. Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support. [Citation Graph (, )][DBLP]


  57. How did you specify your test suite. [Citation Graph (, )][DBLP]


  58. Encoding Treewidth into SAT. [Citation Graph (, )][DBLP]


  59. Proving Ptolemy Right: The Environment Abstraction Framework for Model Checking Concurrent Systems. [Citation Graph (, )][DBLP]


  60. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. [Citation Graph (, )][DBLP]


  61. Query-Driven Program Testing. [Citation Graph (, )][DBLP]


  62. Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction. [Citation Graph (, )][DBLP]


  63. Model Checking: Back and Forth between Hardware and Software. [Citation Graph (, )][DBLP]


  64. Interpolation in fuzzy logic. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.456secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002