Conference Paper (45)
41.
Conference Paper
CLSE: Closed-Loop Symbolic Execution. In: NASA Formal Methods: 4th International Symposium, NFM 2012, pp. 356 - 370 (Eds. Goodloe; E., A.; Person; Suzette). NFM 2012, Norfolk, VA, USA, April 03, 2012 - April 05, 2012. Springer, New York, NY (2012)
42.
Conference Paper
Approximately Bisimilar Symbolic Models for Digital Control Systems. In: Computer Aided Verification: 24th International Conference, CAV 2012, pp. 362 - 377 (Eds. Madhusudan, P.; Seshia, S. A.). CAV 2012, Berkeley, CA, USA, July 07, 2012 - July 13, 2012. Springer, New York, NY (2012)
43.
Conference Paper
Defending against large-scale crawls in online social networks. In: CoNEXT’12: proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies, pp. 325 - 336. CoNEXT'12, Nice, France, December 10, 2012 - December 13, 2012. ACM, New York, NY (2012)
44.
Conference Paper
Trigger Memoization in Self-Triggered Control. In: EMSOFT’12: Proceedings of the Tenth ACM International Conference on Embedded Software 2012, pp. 103 - 112. EMSOFT'12, Tampere, Finland, October 07, 2012 - October 12, 2012. ACM, New York, NY (2012)
45.
Conference Paper
Enhancing the OS against Security Threats in System Administration. In: Middleware 2012: ACM/IFIP/USENIX 13th International Middleware Conference, pp. 415 - 435 (Eds. Narasimhan, P.; Triantafillou, P.). Middleware 2012, Monteal, QC, Canada, December 03, 2012 - December 07, 2012. Springer, New York, NY (2012)
46.
Conference Paper
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. In: Proceedings of the 21st USENIX Security Symposium, pp. 175 - 188. 21st USENIX Security Symposium, Bellvue, WA, August 08, 2012 - August 10, 2012. USENIX Association, Berkeley, CA (2012)
47.
Conference Paper
Inferring Who-is-Who in the Twitter Social Network. In: WOSN’12: Proceedings of the ACM Workshop on Online Social Networks, pp. 55 - 60. WOSN'12, Helsinki, Finland, August 17, 2012. ACM, New York, NY (2012)
48.
Conference Paper
Input-Output Robustness for Discrete Systems. In: EMSOFT’12: Proceedings of the Tenth ACM International Conference on Embedded Software 2012, pp. 217 - 226. EMSOFT'12, Tampere, Finland, October 07, 2012 - October 12, 2012. ACM, New York, NY (2012)
49.
Conference Paper
Keeping Information Safe from Social Networking Apps. In: WOSN’12: Proceedings of the ACM Workshop on Online Social Networks, pp. 49 - 54. WOSN'12, Helsinki, Finland, August 17, 2012. ACM, New York, NY (2012)
50.
Conference Paper
Exploring the design space of social network-based Sybil defenses. In: Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1 - 8. COMSNETS 2012, January 03, 2012 - January 07, 2012. IEEE, Piscataway, NJ (2012)
51.
Conference Paper
Canal: Scaling Social Network-Based Sybil Tolerance Schemes. In: EuroSys’12: Proceedings of the EuroSys 2012 Conference, pp. 309 - 322. EuroSys'12, Bern, Switzerland, April 10, 2012 - April 13, 2012. ACM, New York, NY (2012)
52.
Conference Paper
Orchestrating the Deployment of Computations in the Cloud with Conductor. In: Proceedings of NSDI ’12: 9th USENIX Symposium on Networked Systems Design and Implementation, pp. 1 - 15. NSDI'12, San Jose, CA, April 25, 2012 - April 27, 2012. USENIX, Berkeley, CA (2012)
Report (3)
53.
Report
Virtually Exclusive Resources. MPI for Software Systems, Saarbrücken (2012), 12 pp.
54.
Report
The Transitive Composability of Relation Transition Systems. Max Planck Institute for Software Systems, Saarbrücken (2012), 64 pp.
55.
Report
Functional Programs that Explain their Work. Max Planck Institute for Software Systems, Saarbrücken (2012), 16 pp.