Konferenzbeitrag (45)
41.
Konferenzbeitrag
CLSE: Closed-Loop Symbolic Execution. In: NASA Formal Methods: 4th International Symposium, NFM 2012, S. 356 - 370 (Hg. Goodloe; E., A.; Person; Suzette). NFM 2012, Norfolk, VA, USA, 03. April 2012 - 05. April 2012. Springer, New York, NY (2012)
42.
Konferenzbeitrag
Approximately Bisimilar Symbolic Models for Digital Control Systems. In: Computer Aided Verification: 24th International Conference, CAV 2012, S. 362 - 377 (Hg. Madhusudan, P.; Seshia, S. A.). CAV 2012, Berkeley, CA, USA, 07. Juli 2012 - 13. Juli 2012. Springer, New York, NY (2012)
43.
Konferenzbeitrag
Defending against large-scale crawls in online social networks. In: CoNEXT’12: proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies, S. 325 - 336. CoNEXT'12, Nice, France, 10. Dezember 2012 - 13. Dezember 2012. ACM, New York, NY (2012)
44.
Konferenzbeitrag
Trigger Memoization in Self-Triggered Control. In: EMSOFT’12: Proceedings of the Tenth ACM International Conference on Embedded Software 2012, S. 103 - 112. EMSOFT'12, Tampere, Finland, 07. Oktober 2012 - 12. Oktober 2012. ACM, New York, NY (2012)
45.
Konferenzbeitrag
Enhancing the OS against Security Threats in System Administration. In: Middleware 2012: ACM/IFIP/USENIX 13th International Middleware Conference, S. 415 - 435 (Hg. Narasimhan, P.; Triantafillou, P.). Middleware 2012, Monteal, QC, Canada, 03. Dezember 2012 - 07. Dezember 2012. Springer, New York, NY (2012)
46.
Konferenzbeitrag
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. In: Proceedings of the 21st USENIX Security Symposium, S. 175 - 188. 21st USENIX Security Symposium, Bellvue, WA, 08. August 2012 - 10. August 2012. USENIX Association, Berkeley, CA (2012)
47.
Konferenzbeitrag
Inferring Who-is-Who in the Twitter Social Network. In: WOSN’12: Proceedings of the ACM Workshop on Online Social Networks, S. 55 - 60. WOSN'12, Helsinki, Finland, 17. August 2012. ACM, New York, NY (2012)
48.
Konferenzbeitrag
Input-Output Robustness for Discrete Systems. In: EMSOFT’12: Proceedings of the Tenth ACM International Conference on Embedded Software 2012, S. 217 - 226. EMSOFT'12, Tampere, Finland, 07. Oktober 2012 - 12. Oktober 2012. ACM, New York, NY (2012)
49.
Konferenzbeitrag
Keeping Information Safe from Social Networking Apps. In: WOSN’12: Proceedings of the ACM Workshop on Online Social Networks, S. 49 - 54. WOSN'12, Helsinki, Finland, 17. August 2012. ACM, New York, NY (2012)
50.
Konferenzbeitrag
Exploring the design space of social network-based Sybil defenses. In: Fourth International Conference on Communication Systems and Networks (COMSNETS), S. 1 - 8. COMSNETS 2012, 03. Januar 2012 - 07. Januar 2012. IEEE, Piscataway, NJ (2012)
51.
Konferenzbeitrag
Canal: Scaling Social Network-Based Sybil Tolerance Schemes. In: EuroSys’12: Proceedings of the EuroSys 2012 Conference, S. 309 - 322. EuroSys'12, Bern, Switzerland, 10. April 2012 - 13. April 2012. ACM, New York, NY (2012)
52.
Konferenzbeitrag
Orchestrating the Deployment of Computations in the Cloud with Conductor. In: Proceedings of NSDI ’12: 9th USENIX Symposium on Networked Systems Design and Implementation, S. 1 - 15. NSDI'12, San Jose, CA, 25. April 2012 - 27. April 2012. USENIX, Berkeley, CA (2012)
Bericht (3)
53.
Bericht
Virtually Exclusive Resources. MPI for Software Systems, Saarbrücken (2012), 12 S.
54.
Bericht
The Transitive Composability of Relation Transition Systems. Max Planck Institute for Software Systems, Saarbrücken (2012), 64 S.
55.
Bericht
Functional Programs that Explain their Work. Max Planck Institute for Software Systems, Saarbrücken (2012), 16 S.