default search action
Helmut Veith
Person information
- affiliation: TU Wien, Vienna, Austria
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c98]Nadia Labai, Tomer Kotek, Magdalena Ortiz, Helmut Veith:
Pebble-Intervals Automata and FO2 with Two Orders. LATA 2020: 208-221
2010 – 2019
- 2019
- [i22]Nadia Labai, Tomer Kotek, Magdalena Ortiz, Helmut Veith:
Pebble-Intervals Automata and FO2 with Two Orders (Extended Version). CoRR abs/1912.00171 (2019) - 2018
- [b2]Edmund M. Clarke, Orna Grumberg, Daniel Kroening, Doron A. Peled, Helmut Veith:
Model checking, 2nd Edition. MIT Press 2018, ISBN 978-0-262-03883-6 - [j26]Benjamin Aminof, Tomer Kotek, Sasha Rubin, Francesco Spegni, Helmut Veith:
Parameterized model checking of rendezvous systems. Distributed Comput. 31(3): 187-222 (2018) - [p2]Edmund M. Clarke, Thomas A. Henzinger, Helmut Veith:
Introduction to Model Checking. Handbook of Model Checking 2018: 1-26 - [e7]Edmund M. Clarke, Thomas A. Henzinger, Helmut Veith, Roderick Bloem:
Handbook of Model Checking. Springer 2018, ISBN 978-3-319-10574-1 [contents] - 2017
- [j25]Yulia Demyanova, Thomas Pani, Helmut Veith, Florian Zuleger:
Empirical software metrics for benchmarking of verification tools. Formal Methods Syst. Des. 50(2-3): 289-316 (2017) - [j24]Igor Konnov, Marijana Lazic, Helmut Veith, Josef Widder:
Para2: parameterized path reduction, acceleration, and SMT for reachability in threshold-guarded distributed algorithms. Formal Methods Syst. Des. 51(2): 270-307 (2017) - [j23]Niklas Büscher, Martin Franz, Andreas Holzer, Helmut Veith, Stefan Katzenbeisser:
On compiling Boolean circuits optimized for secure multi-party computation. Formal Methods Syst. Des. 51(2): 308-331 (2017) - [j22]Igor V. Konnov, Helmut Veith, Josef Widder:
On the completeness of bounded model checking for threshold-based distributed algorithms: Reachability. Inf. Comput. 252: 95-109 (2017) - [j21]Moritz Sinn, Florian Zuleger, Helmut Veith:
Complexity and Resource Bound Analysis of Imperative Programs Using Difference Constraints. J. Autom. Reason. 59(1): 3-45 (2017) - [c97]Shachar Itzhaky, Tomer Kotek, Noam Rinetzky, Mooly Sagiv, Orr Tamir, Helmut Veith, Florian Zuleger:
On the Automated Verification of Web Applications with Embedded SQL. ICDT 2017: 16:1-16:18 - [c96]Igor V. Konnov, Marijana Lazic, Helmut Veith, Josef Widder:
A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms. POPL 2017: 719-734 - 2016
- [j20]Roderick Bloem, Swen Jacobs, Ayrat Khalimov, Igor Konnov, Sasha Rubin, Helmut Veith, Josef Widder:
Decidability in Parameterized Verification. SIGACT News 47(2): 53-64 (2016) - [c95]Andreas Haas, Thomas A. Henzinger, Andreas Holzer, Christoph M. Kirsch, Michael Lippautz, Hannes Payer, Ali Sezgin, Ana Sokolova, Helmut Veith:
Local Linearizability for Concurrent Container-Type Data Structures. CONCUR 2016: 6:1-6:15 - [c94]Igor V. Konnov, Tomer Kotek, Qiang Wang, Helmut Veith, Simon Bliudze, Joseph Sifakis:
Parameterized Systems in BIP: Design and Model Checking. CONCUR 2016: 30:1-30:16 - [c93]Tomer Kotek, Helmut Veith, Florian Zuleger:
Monadic Second Order Finite Satisfiability and Unbounded Tree-Width. CSL 2016: 13:1-13:20 - [c92]Yulia Demyanova, Thomas Pani, Helmut Veith, Florian Zuleger:
Empirical software metrics for benchmarking of verification tools. Software Engineering 2016: 67-68 - [c91]Moritz Sinn, Florian Zuleger, Helmut Veith:
A simple and scalable static analysis for bound analysis and amortized complexity analysis. Software Engineering 2016: 101-102 - [i21]Igor Konnov, Marijana Lazic, Helmut Veith, Josef Widder:
A Short Counterexample Property for Safety and Liveness Verification of Fault-tolerant Distributed Algorithms. CoRR abs/1608.05327 (2016) - [i20]Shachar Itzhaky, Tomer Kotek, Noam Rinetzky, Mooly Sagiv, Orr Tamir, Helmut Veith, Florian Zuleger:
On the automated verification of web applications with embedded SQL. CoRR abs/1610.02101 (2016) - 2015
- [b1]Roderick Bloem, Swen Jacobs, Ayrat Khalimov, Igor Konnov, Sasha Rubin, Helmut Veith, Josef Widder:
Decidability of Parameterized Verification. Synthesis Lectures on Distributed Computing Theory, Morgan & Claypool Publishers 2015, ISBN 978-3-031-00883-2 - [j19]Thomas Pani, Helmut Veith, Florian Zuleger:
Loop Patterns in C Programs. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 72 (2015) - [j18]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Closure properties and complexity of rational sets of regular languages. Theor. Comput. Sci. 605: 62-79 (2015) - [c90]Igor Konnov, Helmut Veith, Josef Widder:
SMT and POR Beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms. CAV (1) 2015: 85-102 - [c89]Yulia Demyanova, Thomas Pani, Helmut Veith, Florian Zuleger:
Empirical Software Metrics for Benchmarking of Verification Tools. CAV (1) 2015: 561-579 - [c88]Igor V. Konnov, Helmut Veith, Josef Widder:
What You Always Wanted to Know About Model Checking of Fault-Tolerant Distributed Algorithms. Ershov Memorial Conference 2015: 6-21 - [c87]Moritz Sinn, Florian Zuleger, Helmut Veith:
Difference Constraints: An adequate Abstraction for Complexity Analysis of Imperative Programs. FMCAD 2015: 144-151 - [c86]Azadeh Farzan, Andreas Holzer, Helmut Veith:
Perspectives on White-Box Testing: Coverage, Concurrency, and Concolic Execution. ICST 2015: 1-11 - [c85]Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Extending ALCQIO with Trees. LICS 2015: 511-522 - [c84]Martin Franz, Andreas Holzer, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Compilation for Secure Two-Party Computations. Software Engineering & Management 2015: 143-145 - [i19]Andreas Haas, Thomas A. Henzinger, Andreas Holzer, Christoph M. Kirsch, Michael Lippautz, Hannes Payer, Ali Sezgin, Ana Sokolova, Helmut Veith:
Local Linearizability. CoRR abs/1502.07118 (2015) - [i18]Tomer Kotek, Helmut Veith, Florian Zuleger:
Monadic second order finite satisfiability and unbounded tree-width. CoRR abs/1505.06622 (2015) - [i17]Moritz Sinn, Florian Zuleger, Helmut Veith:
Difference Constraints: An adequate Abstraction for Complexity Analysis of Imperative Programs. CoRR abs/1508.04958 (2015) - 2014
- [c83]Moritz Sinn, Florian Zuleger, Helmut Veith:
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis. CAV 2014: 745-761 - [c82]Martin Franz, Andreas Holzer, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations. CC 2014: 244-249 - [c81]Benjamin Aminof, Tomer Kotek, Sasha Rubin, Francesco Spegni, Helmut Veith:
Parameterized Model Checking of Rendezvous Systems. CONCUR 2014: 109-124 - [c80]Igor Konnov, Helmut Veith, Josef Widder:
On the Completeness of Bounded Model Checking for Threshold-Based Distributed Algorithms: Reachability. CONCUR 2014: 125-140 - [c79]Diego Calvanese, Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Shape and Content: Incorporating Domain Knowledge into Shape Analysis. Description Logics 2014: 124-127 - [c78]Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Towards a Description Logic for Program Analysis: Extending ALCQIO with Reachability. Description Logics 2014: 591-594 - [c77]Diego Calvanese, Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Shape and Content - A Database-Theoretic Perspective on the Analysis of Data Structures. IFM 2014: 3-17 - [c76]Matthias Baaz, Thomas Eiter, Helmut Veith:
Vienna Summer of Logic. KR 2014 - [c75]Gergely Kovásznai, Helmut Veith, Andreas Fröhlich, Armin Biere:
On the Complexity of Symbolic Verification and Decision Problems in Bit-Vector Logic. MFCS (2) 2014: 481-492 - [c74]Andreas Fröhlich, Gergely Kovásznai, Armin Biere, Helmut Veith:
iDQ: Instantiation-Based DQBF Solving. POS@SAT 2014: 103-116 - [c73]Dirk Beyer, Andreas Holzer, Michael Tautschnig, Helmut Veith:
Reusing Information in Multi-Goal Reachability Analyses. Software Engineering 2014: 97-98 - [c72]Azadeh Farzan, Andreas Holzer, Niloofar Razavi, Helmut Veith:
Concolic Testing of Concurrent Programs. Software Engineering 2014: 101-102 - [c71]Annu Gmeiner, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Tutorial on Parameterized Model Checking of Fault-Tolerant Distributed Algorithms. SFM 2014: 122-171 - [c70]Cezara Dragoi, Thomas A. Henzinger, Helmut Veith, Josef Widder, Damien Zufferey:
A Logic-Based Framework for Verifying Consensus Algorithms. VMCAI 2014: 161-181 - [i16]Moritz Sinn, Florian Zuleger, Helmut Veith:
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis. CoRR abs/1401.5842 (2014) - [i15]Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Extending ALCQIO with reachability. CoRR abs/1402.6804 (2014) - 2013
- [j17]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification across Intellectual Property Boundaries. ACM Trans. Softw. Eng. Methodol. 22(2): 15:1-15:12 (2013) - [c69]Andreas Holzer, Nikolaos P. Karvelas, Stefan Katzenbeisser, Helmut Veith, Martin Franz:
Challenges in compiler construction for secure two-party computation. PETShop@CCS 2013: 3-6 - [c68]Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith:
The first workshop on language support for privacy-enhancing technologies (PETShop'13). CCS 2013: 1485-1486 - [c67]Dirk Beyer, Andreas Holzer, Michael Tautschnig, Helmut Veith:
Information Reuse for Multi-goal Reachability Analyses. ESOP 2013: 472-491 - [c66]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Parameterized model checking of fault-tolerant distributed algorithms by abstraction. FMCAD 2013: 201-209 - [c65]Yulia Demyanova, Helmut Veith, Florian Zuleger:
On the concept of variable roles and its use in software analysis. FMCAD 2013: 226-230 - [c64]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
On the Structure and Complexity of Rational Sets of Regular Languages. FSTTCS 2013: 377-388 - [c63]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Brief announcement: parameterized model checking of fault-tolerant distributed algorithms by abstraction. PODC 2013: 119-121 - [c62]Azadeh Farzan, Andreas Holzer, Niloofar Razavi, Helmut Veith:
Con2colic testing. ESEC/SIGSOFT FSE 2013: 37-47 - [c61]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Towards Modeling and Model Checking Fault-Tolerant Distributed Algorithms. SPIN 2013: 209-226 - [e6]Natasha Sharygina, Helmut Veith:
Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. Lecture Notes in Computer Science 8044, Springer 2013, ISBN 978-3-642-39798-1 [contents] - [e5]Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith:
PETShop'13, Proceedings of the 2013 ACM Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with CCS 2013, November 4, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2489-2 [contents] - [i14]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
On the Structure and Complexity of Rational Sets of Regular Languages. CoRR abs/1305.6074 (2013) - [i13]Yulia Demyanova, Helmut Veith, Florian Zuleger:
On the Concept of Variable Roles and its Use in Software Analysis. CoRR abs/1305.6745 (2013) - [i12]Diego Calvanese, Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Shape and Content: Incorporating Domain Knowledge into Shape Analysis. CoRR abs/1312.6624 (2013) - 2012
- [j16]Helmut Veith:
Special Issue: Games in Verification. J. Comput. Syst. Sci. 78(2): 393 (2012) - [c60]Andreas Holzer, Martin Franz, Stefan Katzenbeisser, Helmut Veith:
Secure two-party computations in ANSI C. CCS 2012: 772-783 - [c59]Andreas Holzer, Daniel Kroening, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Proving Reachability Using FShell - (Competition Contribution). TACAS 2012: 538-541 - [i11]Florian Zuleger, Sumit Gulwani, Moritz Sinn, Helmut Veith:
Bound Analysis of Imperative Programs with the Size-change Abstraction (extended version). CoRR abs/1203.5303 (2012) - [i10]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Starting a Dialog between Model Checking and Fault-tolerant Distributed Algorithms. CoRR abs/1210.3839 (2012) - [i9]Annu John, Igor Konnov, Ulrich Schmid, Helmut Veith, Josef Widder:
Counter Attack on Byzantine Generals: Parameterized Model Checking of Fault-tolerant Distributed Algorithms. CoRR abs/1210.3846 (2012) - 2011
- [c58]Andreas Holzer, Visar Januzaj, Stefan Kugele, Boris Langer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Seamless Testing for Models and Code. FASE 2011: 278-293 - [c57]Florian Zuleger, Sumit Gulwani, Moritz Sinn, Helmut Veith:
Bound Analysis of Imperative Programs with the Size-Change Abstraction. SAS 2011: 280-297 - [r1]Stefan Katzenbeisser, Johannes Kinder, Helmut Veith:
Malware Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 752-755 - [i8]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
Decision Procedures in Soft, Hard and Bio-ware - Follow Up (Dagstuhl Seminar 11272). Dagstuhl Reports 1(7): 23-35 (2011) - 2010
- [j15]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Proactive Detection of Computer Worms Using Model Checking. IEEE Trans. Dependable Secur. Comput. 7(4): 424-438 (2010) - [j14]Marko Samer, Helmut Veith:
On the distributivity of LTL specifications. ACM Trans. Comput. Log. 11(3): 20:1-20:26 (2010) - [j13]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Semantic integrity in large-scale online simulations. ACM Trans. Internet Techn. 10(1): 2:1-2:24 (2010) - [c56]Edmund M. Clarke, Robert P. Kurshan, Helmut Veith:
The Localization Reduction and Counterexample-Guided Abstraction Refinement. Essays in Memory of Amir Pnueli 2010: 61-71 - [c55]Johannes Kinder, Helmut Veith:
Precise static analysis of untrusted driver binaries. FMCAD 2010: 43-50 - [c54]Andreas Holzer, Michael Tautschnig, Christian Schallhart, Helmut Veith:
An Introduction to Test Specification in FQL. Haifa Verification Conference 2010: 9-22 - [c53]Visar Januzaj, Stefan Kugele, Boris Langer, Christian Schallhart, Helmut Veith:
New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective. ISoLA (1) 2010: 1-2 - [c52]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
How did you specify your test suite. ASE 2010: 407-416 - [e4]Anuj Dawar, Helmut Veith:
Computer Science Logic, 24th International Workshop, CSL 2010, 19th Annual Conference of the EACSL, Brno, Czech Republic, August 23-27, 2010. Proceedings. Lecture Notes in Computer Science 6247, Springer 2010, ISBN 978-3-642-15204-7 [contents] - [e3]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
Decision Procedures in Software, Hardware and Bioware, 18.04. - 23.04.2010. Dagstuhl Seminar Proceedings 10161, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i7]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
10161 Abstracts Collection - Decision Procedures in Software, Hardware and Bioware. Decision Procedures in Software, Hardware and Bioware 2010 - [i6]Nikolaj S. Bjørner, Robert Nieuwenhuis, Helmut Veith, Andrei Voronkov:
10161 Executive Summary - Decision Procedures in Software, Hardware and Bioware. Decision Procedures in Software, Hardware and Bioware 2010
2000 – 2009
- 2009
- [c51]Péter Bokor, Marco Serafini, Neeraj Suri, Helmut Veith:
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support. ICFEM 2009: 147-166 - [c50]Marko Samer, Helmut Veith:
Encoding Treewidth into SAT. SAT 2009: 45-50 - [c49]Helmut Veith:
Embedding Formal Methods into Systems Engineering. SYNASC 2009: 11 - [c48]Helmut Veith:
Automated Software Analysis. SYNASC 2009: 18 - [c47]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
Query-Driven Program Testing. VMCAI 2009: 151-166 - [c46]Johannes Kinder, Florian Zuleger, Helmut Veith:
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. VMCAI 2009: 214-228 - [c45]Péter Bokor, Marco Serafini, Neeraj Suri, Helmut Veith:
Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction. DISC 2009: 289-290 - 2008
- [c44]Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement. CAV 2008: 209-213 - [c43]Johannes Kinder, Helmut Veith:
Jakstab: A Static Analysis Platform for Binaries. CAV 2008: 423-427 - [c42]Edmund M. Clarke, Muralidhar Talupur, Helmut Veith:
Proving Ptolemy Right: The Environment Abstraction Framework for Model Checking Concurrent Systems. TACAS 2008: 33-47 - [e2]Iliano Cervesato, Helmut Veith, Andrei Voronkov:
Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, LPAR 2008, Doha, Qatar, November 22-27, 2008. Proceedings. Lecture Notes in Computer Science 5330, Springer 2008, ISBN 978-3-540-89438-4 [contents] - [e1]Orna Grumberg, Helmut Veith:
25 Years of Model Checking - History, Achievements, Perspectives. Lecture Notes in Computer Science 5000, Springer 2008, ISBN 978-3-540-69849-4 [contents] - 2007
- [j12]Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith:
Software transformations to improve malware detection. J. Comput. Virol. 3(4): 253-265 (2007) - [c41]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification Across Intellectual Property Boundaries. CAV 2007: 82-94 - [c40]Andreas Holzer, Johannes Kinder, Helmut Veith:
Using Verification Technology to Specify and Detect Malware. EUROCAST 2007: 497-504 - [c39]Marko Samer, Helmut Veith:
On the Notion of Vacuous Truth. LPAR 2007: 2-14 - [c38]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. S&P 2007: 179-186 - [i5]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification Across Intellectual Property Boundaries. CoRR abs/cs/0701187 (2007) - [i4]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IACR Cryptol. ePrint Arch. 2007: 56 (2007) - 2006
- [j11]Oleg Pikhurko, Helmut Veith, Oleg Verbitsky:
The first order definability of graphs: Upper bounds for quantifier depth. Discret. Appl. Math. 154(17): 2511-2529 (2006) - [c37]Edmund M. Clarke, Muralidhar Talupur, Helmut Veith:
Environment Abstraction for Parameterized Verification. VMCAI 2006: 126-141 - 2005
- [j10]Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith:
An Iterative Framework for Simulation Conformance. J. Log. Comput. 15(4): 465-488 (2005) - [c36]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Detecting Malicious Code by Model Checking. DIMVA 2005: 174-187 - [c35]Sagar Chaki, Edmund M. Clarke, Orna Grumberg, Joël Ouaknine, Natasha Sharygina, Tayssir Touili, Helmut Veith:
State/Event Software Verification for Branching-Time Specifications. IFM 2005: 53-69 - [c34]Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508 - [c33]Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Malware Engineering. Sicherheit 2005: 139-148 - [c32]Marko Samer, Helmut Veith:
Deterministic CTL Query Solving. TIME 2005: 156-165 - [c31]Marko Samer, Helmut Veith:
From Temporal Logic Queries to Vacuity Detection. VISSAS 2005: 149-167 - [c30]Edmund M. Clarke, Anubhav Gupta, Himanshu Jain, Helmut Veith:
Model Checking: Back and Forth between Hardware and Software. VSTTE 2005: 251-255 - [p1]Edmund M. Clarke, Ansgar Fehnker, Sumit Kumar Jha, Helmut Veith:
Temporal Logic Model Checking. Handbook of Networked and Embedded Control Systems 2005: 539-558 - [i3]Uwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. CoRR abs/cs/0503080 (2005) - 2004
- [j9]Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith:
Modular Verification of Software Components in C. IEEE Trans. Software Eng. 30(6): 388-402 (2004) - [c29]Edmund M. Clarke, Muralidhar Talupur, Tayssir Touili, Helmut Veith:
Verification by Network Decomposition. CONCUR 2004: 276-291 - [c28]Marko Samer, Helmut Veith:
Parameterized Vacuity. FMCAD 2004: 322-336 - [c27]Marko Samer, Helmut Veith:
A Syntactic Characterization of Distributive LTL Queries. ICALP 2004: 1099-1110 - [i2]Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Provably Secure Authentication of Digital Media Through Invertible Watermarks. IACR Cryptol. ePrint Arch. 2004: 293 (2004) - 2003
- [j8]Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith:
Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5): 752-794 (2003) - [c26]Edmund M. Clarke, Helmut Veith:
Counterexamples Revisited: Principles, Algorithms, Applications. Verification: Theory and Practice 2003: 208-224 - [c25]Marko Samer, Helmut Veith:
Validity of CTL Queries Revisited. CSL 2003: 470-483 - [c24]Helmut Veith:
Friends or Foes? Communities in Software Verification (Invited Lecture). CSL 2003: 528-529 - [c23]André Adelsbach, Stefan Katzenbeisser, Helmut Veith:
Watermarking schemes provably secure against copy and ambiguity attacks. Digital Rights Management Workshop 2003: 111-119 - [c22]Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith:
Modular Verification of Software Components in C. ICSE 2003: 385-395 - [c21]Edmund M. Clarke, Muralidhar Talupur, Helmut Veith, Dong Wang:
SAT Based Predicate Abstraction for Hardware Verification. SAT 2003: 78-92 - [c20]Sagar Chaki, Pascal Fenkam, Harald C. Gall, Somesh Jha, Engin Kirda, Helmut Veith:
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. SEKE 2003: 510-517 - 2002
- [j7]Thomas Eiter, Helmut Veith:
On the complexity of data disjunctions. Theor. Comput. Sci. 288(1): 101-128 (2002) - [j6]Georg Gottlob, Erich Grädel, Helmut Veith:
Datalog LITE: a deductive query language with linear time model checking. ACM Trans. Comput. Log. 3(1): 42-79 (2002) - [c19]Pankaj Chauhan, Edmund M. Clarke, James H. Kukula, Samir Sapra, Helmut Veith, Dong Wang:
Automated Abstraction Refinement for Model Checking Large State Spaces Using SAT Based Conflict Analysis. FMCAD 2002: 33-51 - [c18]Edmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith:
Tree-Like Counterexamples in Model Checking. LICS 2002: 19-29 - [c17]Stefan Katzenbeisser, Helmut Veith:
Securing symmetric watermarking schemes against protocol attacks. Security and Watermarking of Multimedia Contents 2002: 260-268 - 2001
- [j5]Matthias Baaz, Petr Hájek, Franco Montagna, Helmut Veith:
Complexity of t-tautologies. Ann. Pure Appl. Log. 113(1-3): 3-11 (2001) - [c16]Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang:
Using Combinatorial Optimization Methods for Quantification Scheduling. CHARME 2001: 293-309 - [c15]Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith:
Progress on the State Explosion Problem in Model Checking. Informatics 2001: 176-194 - [c14]Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang:
Non-linear Quantification Scheduling in Image Computation. ICCAD 2001: 293- - [c13]Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith:
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. ICSE 2001: 443-452 - 2000
- [c12]Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith:
Counterexample-Guided Abstraction Refinement. CAV 2000: 154-169 - [c11]Edmund M. Clarke, Steven M. German, Yuan Lu, Helmut Veith, Dong Wang:
Executable Protocol Specification in ESL. FMCAD 2000: 197-216 - [c10]Matthias Baaz, Christian G. Fermüller, Helmut Veith:
An Analytic Calculus for Quantified Propositional Gödel Logic. TABLEAUX 2000: 112-126
1990 – 1999
- 1999
- [j4]Matthias Baaz, Helmut Veith:
Interpolation in fuzzy logic. Arch. Math. Log. 38(7): 461-489 (1999) - [j3]Georg Gottlob, Nicola Leone, Helmut Veith:
Succinctness as a Source of Complexity in Logical Formalisms. Ann. Pure Appl. Log. 97(1-3): 231-260 (1999) - [c9]Matthias Baaz, Agata Ciabattoni, Christian G. Fermüller, Helmut Veith:
On the Undecidability of some Sub-Classical First-Order Logics. FSTTCS 1999: 258-268 - 1998
- [j2]Helmut Veith:
Succinct Representation, Leaf Languages, and Projection Reductions. Inf. Comput. 142(2): 207-236 (1998) - [c8]Helmut Veith:
How to Encode a Logical Structure by an OBDD. CCC 1998: 122-131 - [c7]Matthias Baaz, Helmut Veith:
Quantifier Elimination in Fuzzy Logic. CSL 1998: 399-414 - [c6]Helmut Veith:
A General Method to Determine the Expression Complexity of Database Query Languages. Grundlagen von Datenbanken 1998: 134-137 - [c5]Matthias Baaz, Agata Ciabattoni, Christian G. Fermüller, Helmut Veith:
Proof Theory of Fuzzy Logics: Urquhart's C and Related Logics. MFCS 1998: 203-212 - 1997
- [j1]Helmut Veith:
Languages Represented by Boolean Formulas. Inf. Process. Lett. 63(5): 251-256 (1997) - [c4]Thomas Eiter, Georg Gottlob, Helmut Veith:
Generalized Quantifiers in Logic Programs. ESSLLI 1997: 72-98 - [c3]Thomas Eiter, Georg Gottlob, Helmut Veith:
Modular Logic Programming and Generalized Quantifiers. LPNMR 1997: 290-309 - 1996
- [c2]Helmut Veith:
Succinct Representation, Leaf Languages, and Projection Reductions. CCC 1996: 118-126 - 1995
- [c1]Georg Gottlob, Nicola Leone, Helmut Veith:
Second Order Logic and the Weak Exponential Hierarchies. MFCS 1995: 66-81 - [i1]Helmut Veith:
Succinct Representation and Leaf Languages. Electron. Colloquium Comput. Complex. TR95 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint