-
1
-
-
0029724779
-
General decidability theorems for infinite-state systems
-
IEEE
-
Abdulla, P.A., Cerans, K., Jonsson, B., Tsay, Y.-K.: General decidability theorems for infinite-state systems. In: LICS 1996, pp. 313-321. IEEE (1996)
-
(1996)
LICS 1996
, pp. 313-321
-
-
Abdulla, P.A.1
Cerans, K.2
Jonsson, B.3
Tsay, Y.-K.4
-
2
-
-
35048898814
-
Privacy and utility in business processes
-
IEEE
-
Barth, A., Mitchell, J., Datta, A., Sundaram, S.: Privacy and utility in business processes. In: CSF, pp. 279-294. IEEE (2007)
-
(2007)
CSF
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.2
Datta, A.3
Sundaram, S.4
-
3
-
-
79960570447
-
Why and where: A characterization of data provenance
-
Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. Springer, Heidelberg
-
Buneman, P., Khanna, S., Tan, W.-C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316-330. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.-C.3
-
4
-
-
0036041250
-
Types as models: Model checking message-passing programs
-
ACM
-
Chaki, S., Rajamani, S., Rehof, J.: Types as models: model checking message-passing programs. In: POPL, pp. 45-57. ACM (2002)
-
(2002)
POPL
, pp. 45-57
-
-
Chaki, S.1
Rajamani, S.2
Rehof, J.3
-
5
-
-
80052683131
-
Provenance as dependency analysis
-
Cheney, J., Ahmed, A., Acar, U.: Provenance as dependency analysis. Math. Struct. in Computer Science 21, 1301-1337 (2011)
-
(2011)
Math. Struct. In Computer Science
, vol.21
, pp. 1301-1337
-
-
Cheney, J.1
Ahmed, A.2
Acar, U.3
-
6
-
-
0000278897
-
Tracing the lineage of view data in a warehousing environment
-
Cui, Y., Widom, J., Wiener, J.: Tracing the lineage of view data in a warehousing environment. ACM TODS 25, 179-227 (2000)
-
(2000)
ACM TODS
, vol.25
, pp. 179-227
-
-
Cui, Y.1
Widom, J.2
Wiener, J.3
-
7
-
-
84884495772
-
-
Durak, B.: JSure, https://github.com/berke/jsure
-
JSure
-
-
Durak, B.1
-
8
-
-
0034911369
-
Well-structured transition systems everywhere!
-
Finkel, A., Schnoebelen, P.: Well-structured transition systems everywhere! Theoretical Computer Science 256(1-2), 63-92 (2001)
-
(2001)
Theoretical Computer Science
, vol.256
, Issue.1-2
, pp. 63-92
-
-
Finkel, A.1
Schnoebelen, P.2
-
9
-
-
58149508172
-
From many places to few: Automatic abstraction refinement for Petri nets
-
Ganty, P., Raskin, J.-F., Begin, L.V.: From many places to few: Automatic abstraction refinement for Petri nets. Fund. Informaticae 88(3), 275-305 (2008)
-
(2008)
Fund. Informaticae
, vol.88
, Issue.3
, pp. 275-305
-
-
Ganty, P.1
Raskin, J.-F.2
Begin, L.V.3
-
10
-
-
35048840120
-
Expand, enlarge, and check: New algorithms for the coverability problem of WSTS
-
Geeraerts, G., Raskin, J.-F., Van Begin, L.: Expand, enlarge and check: new algorithms for the coverability problem of WSTS. In: Lodaya, K., Mahajan, M. (eds.) FSTTCS 2004. LNCS, vol. 3328, pp. 287-298. Springer, Heidelberg (2004) (Pubitemid 39740231)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3328
, pp. 287-298
-
-
Geeraerts, G.1
Raskin, J.-F.2
Van Begin, L.3
-
11
-
-
0003257889
-
Partial-Order Methods for the Verification of Concurrent Systems
-
Springer, Heidelberg
-
Godefroid, P. (ed.): Partial-Order Methods for the Verification of Concurrent Systems. LNCS, vol. 1032. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1032
-
-
Godefroid, P.1
-
12
-
-
35448944434
-
Provenance semirings
-
ACM
-
Green, T., Karvounarakis, G., Tannen, V.: Provenance semirings. In: PODS, pp. 31-40. ACM (2007)
-
(2007)
PODS
, pp. 31-40
-
-
Green, T.1
Karvounarakis, G.2
Tannen, V.3
-
13
-
-
84963086911
-
Ordering by divisibility in abstract algebras
-
Higman, G.: Ordering by divisibility in abstract algebras. Proc. London Math. Soc (3) 2, 326-336 (1952)
-
(1952)
Proc. London Math. Soc
, vol.2
, Issue.3
, pp. 326-336
-
-
Higman, G.1
-
15
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: WWW, pp. 40-52 (2004)
-
(2004)
WWW
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
16
-
-
84877894136
-
-
Diplomová práce, Masarykova univerzita, Fakulta informatiky
-
Janák, J.: Issue tracking systems. Diplomová práce, Masarykova univerzita, Fakulta informatiky (2009)
-
(2009)
Issue Tracking Systems
-
-
Janák, J.1
-
17
-
-
34548293706
-
Interprocedural analysis of asynchronous programs
-
ACM
-
Jhala, R., Majumdar, R.: Interprocedural analysis of asynchronous programs. In: POPL 2007, pp. 339-350. ACM (2007)
-
(2007)
POPL 2007
, pp. 339-350
-
-
Jhala, R.1
Majumdar, R.2
-
19
-
-
84923564816
-
Finding security errors in Java programs with static analysis
-
Livshits, B., Lam, M.: Finding security errors in Java programs with static analysis. In: Usenix Security Symposium, pp. 271-286 (2005)
-
(2005)
Usenix Security Symposium
, pp. 271-286
-
-
Livshits, B.1
Lam, M.2
-
20
-
-
84943272789
-
Some decidability results for nested Petri nets
-
Bjorner, D., Broy, M., Zamulin, A.V. (eds.) PSI 1999. Springer, Heidelberg
-
Lomazova, I.A., Schnoebelen, P.: Some decidability results for nested Petri nets. In: Bjorner, D., Broy, M., Zamulin, A.V. (eds.) PSI 1999. LNCS, vol. 1755, pp. 208-220. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1755
, pp. 208-220
-
-
Lomazova, I.A.1
Schnoebelen, P.2
-
21
-
-
77954975066
-
Petruchio: From dynamic networks to nets
-
Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. Springer, Heidelberg
-
Meyer, R., Strazny, T.: Petruchio: From dynamic networks to nets. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 175-179. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6174
, pp. 175-179
-
-
Meyer, R.1
Strazny, T.2
-
23
-
-
84937552463
-
Liveness with (0, 1, ∞)-counter abstraction
-
Brinksma, E., Larsen, K.G. (eds.) CAV 2002. Springer, Heidelberg
-
Pnueli, A., Xu, J., Zuck, L.D.: Liveness with (0, 1, ∞)-counter abstraction. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 107-122. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2404
, pp. 107-122
-
-
Pnueli, A.1
Xu, J.2
Zuck, L.D.3
-
24
-
-
0000660737
-
The covering and boundedness problems for vector addition systems
-
Rackoff, C.: The covering and boundedness problems for vector addition systems. Theoretical Computer Science 6(2), 223-231 (1978)
-
(1978)
Theoretical Computer Science
, vol.6
, Issue.2
, pp. 223-231
-
-
Rackoff, C.1
-
26
-
-
78349270835
-
Revisiting Ackermann-hardness for lossy counter machines and reset Petri nets
-
Hliněný, P., Kučera, A. (eds.) MFCS 2010. Springer, Heidelberg
-
Schnoebelen, P.: Revisiting Ackermann-hardness for lossy counter machines and reset Petri nets. In: Hliněný, P., Kučera, A. (eds.) MFCS 2010. LNCS, vol. 6281, pp. 616-628. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6281
, pp. 616-628
-
-
Schnoebelen, P.1
|