20072022

Publikationer pr. år

Filter
Konferenceartikel i proceeding

Søgeresultater

  • Adaptable Value-Set Analysis for Low-Level Code

    Brauer, J., Hansen, R. R., Kowalewski, S., Larsen, K. G. & Olesen, M. C., jul. 2012, 6th International Workshop on Systems Software Verification (SSV 2011). Schloss Dagstuhl. Leibniz-Zentrum für Informatik, Bind 24. 12 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

  • Adaptive Security Policies

    Nielson, F., Hansen, R. R. & Nielson, H. R., 2020, Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Proceedings. Margaria, T. & Steffen, B. (red.). Springer, s. 280-294 15 s. (Lecture Notes in Computer Science, Bind 12477).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    Fil
    1 Citationer (Scopus)
    20 Downloads (Pure)
  • A Foundation for Flow-Based Program Matching Using Temporal Logic and Model Checking

    Brunel, J., Doligez, D., Hansen, R. R., Lawall, J. & Mulle, G., 2009, Proceedings of the ACM Symposium on Principles of Programming Languages (POPL'09). Association for Computing Machinery, s. 114-126 13 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    33 Citationer (Scopus)
  • A multi-threaded approach to encoding with random linear network coding

    Nielsen, L., Hansen, R. R. & Lucani, D. E., 1 jan. 2019, European Wireless 2019 Conference, EW 2019. VDE Verlag GMBH, s. 25-31 7 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

  • Analysing Access Control Specifications

    Probst, C. W. & Hansen, R. R., 2009, Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE-2009). IEEE Computer Society Press, Bind 4. s. 22-33

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    9 Citationer (Scopus)
  • A predictable Java profile: rationale and implementations

    Bøgholm, T., Hansen, R. R., Ravn, A. P., Thomsen, B. & Søndergaard, H., 2009, ACM International Conference Proceeding Series: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems. Association for Computing Machinery, s. 150-159

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    22 Citationer (Scopus)
  • A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems

    Wognsen, E. R., Haverkort, B., Jongerden, M., Hansen, R. R. & Larsen, K. G., 22 aug. 2015, Formal Modeling and Analysis of Timed Systems: 13th International Conference, FORMATS 2015, Madrid, Spain, September 2-4, 2015, Proceedings. Springer, s. 305-320 (Lecture Notes in Computer Science, Bind 9268).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    16 Citationer (Scopus)
  • Attack Tree Generation by Policy Invalidation

    Ivanova, M. G., Probst, C., Hansen, R. R. & Kammüller, F., 2015, Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings. Akram, R. N. & Jajodia, S. (red.). Springer, s. 249-259 (Lecture Notes in Computer Science; Nr. 9311).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    17 Citationer (Scopus)
  • Battery-Aware Scheduling of Mixed Criticality Systems

    Wognsen, E. R., Hansen, R. R. & Larsen, K. G., 2014, Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications: 6th International Symposium, ISoLA 2014, Imperial, Corfu, Greece, October 8-11, 2014, Proceedings, Part II. Margaria, T. & Steffen, B. (red.). Springer Publishing Company, Bind 8803. s. 208-222 (Lecture Notes in Computer Science).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    13 Citationer (Scopus)
  • Breeding Unicorns: Developing Trustworthy and Scalable Randomness Beacons

    Dharanikot, S., Jensen, M. T., Kristensen, S. R., Michno, M. S., Pignolet, Y. A., Hansen, R. R. & Schmid, S., 2019, 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, s. 99-106

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    1 Citationer (Scopus)
  • Can a TLS certificate be phishy?

    Hageman, K., Kidmose, E., Hansen, R. R. & Pedersen, J. M., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (red.). SCITEPRESS Digital Library, s. 38-49 12 s. (International Conference on Security and Cryptography - SECRYPT - Proceedings).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    Fil
    4 Citationer (Scopus)
    176 Downloads (Pure)
  • Certifiable Java for Embedded Systems

    Schoeberl, M., Dalsgaard, A. E., Hansen, R. R., Korsholm, S. E., Ravn, A. P., Rivas, J. R. R., Strøm, T. B. & Søndergaard, H., 2014, Proceedings of the 12th International Workshop on Java Technologies for Real-time and Embedded Systems. Association for Computing Machinery, s. 10-19 10 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    1 Citationer (Scopus)
  • Designing Through The Stack: The Case for a Participatory Digital Security By Design

    Slesinger, I., Coles-Kemp, L., Panteli, N. & Hansen, R. R., 24 okt. 2022, Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022. Association for Computing Machinery, s. 45-59 15 s. (ACM International Conference Proceeding Series).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

  • Documenting and Automating Collateral Evolutions in Linux Device Drivers

    Padioleau, Y., Lawall, J. L., Hansen, R. R. & Muller, G., 2008, Proceedings of the European Conference on Computer Systems 2008 (EuroSys 2008). Association for Computing Machinery, s. 247-260

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    92 Citationer (Scopus)
  • Energy-Aware Scheduling of FIR Filter Structures using a Timed Automata Model

    Wognsen, E. R., Hansen, R. R., Larsen, K. G. & Koch, P., 20 apr. 2016, 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS). IEEE, s. 163-168 6 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Fil
    2 Citationer (Scopus)
    436 Downloads (Pure)
  • Finding Error Handling Bugs in OpenSSL using Coccinelle

    Lawall, J., Laurie, B., Hansen, R. R., Palix, N. & Muller, G., 2010, Proceedings of The 8th European Dependable Computing Conference (EDCC-2010). IEEE Computer Society Press, s. 191-196

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    36 Citationer (Scopus)
  • Fluid Information Systems

    Probst, C. W. & Hansen, R. R., 2009, Proceedings of the New Security Paradigms Workshop (NSPW'09). Association for Computing Machinery, 8 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    4 Citationer (Scopus)
  • Formal Methods for Modelling and Analysis of Single-Event Upsets

    Hansen, R. R., Larsen, K. G., Olesen, M. C. & Wognsen, E. R., 2015, IEEE International Conference on Information Reuse and Integration (IRI 2015). IEEE, s. 287-294

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    3 Citationer (Scopus)
  • From Flow Logic to Static Type Systems for Coordination Languages

    De Nicola, R., Gorla, D., Hansen, R. R., Nielson, F., Nielson, H. R., Probst, C. W. & Pugliese, R., 2008, Proceedings of the 10th International Conference on Coordination Models and Languages (Coordination'08). Springer, s. 100-116 (Lecture Notes in Computer Science; Nr. 5052).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    5 Citationer (Scopus)
  • Gollector: Measuring Domain Name Dark Matter from Different Vantage Points

    Hageman, K., Hansen, R. R. & Pedersen, J. M., 2021, Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings. Tuveri, N., Michalas, A. & Brumley, B. B. (red.). Springer, s. 133-152 20 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bind 13115 LNCS).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    1 Citationer (Scopus)
  • Haaukins: A Highly Accessible and Automated Virtualization Platform for Security Education

    Panum, T. K., Hageman, K. D., Pedersen, J. M. & Hansen, R. R., 2 sep. 2019, 2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT). Chang, M., Sampson, D. G., Huang, R., Gomes, A. S., Chen, N-S., Bittencourt, I. I., Kinshuk, K., Dermeval, D. & Bittencourt, I. M. (red.). IEEE, s. 236-238 3 s. 8820918. (International Conference on Advanced Learning Technologies (ICALT)).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    9 Citationer (Scopus)
  • Kraaler: A User-Perspective Web Crawler

    Panum, T. K., Hansen, R. R. & Pedersen, J. M., 5 aug. 2019, 2019 Network Traffic Measurement and Analysis Conference (TMA). Secci, S., Chrisment, I., Fiore, M., Tabourier, L. & Lim, K-W. (red.). IEEE, s. 153-160 8 s. 8784660

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    4 Citationer (Scopus)
  • Latency performance of encoding with random linear network coding

    Nielsen, L., Hansen, R. R. & Lucani, D. E., 1 jan. 2018, European Wireless 2018 : 24th European Wireless Conference . VDE Verlag GMBH, s. 120-124 5 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    1 Citationer (Scopus)
  • METAMOC; Modular Execution Time Analysis using Model Checking

    Dalsgaard, A. E., Olesen, M. C., Toft, M., Hansen, R. R. & Larsen, K. G., 2010, Proceedings of the 10th International Workshop on Worst-Case Execution-Time Analysis (WCET2010).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    48 Citationer (Scopus)
  • Model checking of finite-state machine-based scenario-aware dataflow using timed automata

    Skelin, M., Wognsen, E. R., Olesen, M. C., Hansen, R. R. & Larsen, K. G., 10 aug. 2015, 2015 10th IEEE International Symposium on Industrial Embedded Systems, SIES 2015 - Proceedings. IEEE, s. 235-244 10 s. 7185065

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    11 Citationer (Scopus)
  • Modelling and Analysing Overlay Networks by Ambients with Wormholes

    Hansen, R. R. & Probst, C. W., 2018, 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018. IEEE Signal Processing Society, 8653596. (2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    3 Citationer (Scopus)
  • Modelling Attack-defense Trees Using Timed Automata

    Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Poulsen, D. B., 2016, Formal Modeling and Analysis of Timed Systems. Springer, s. 35-50 (Lecture Notes in Computer Science, Bind 9884).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    42 Citationer (Scopus)
  • Modelling Socio-Technical Attacks with Timed Automata

    David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Probst, C., 2015, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, s. 21-28 7 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    14 Citationer (Scopus)
  • P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplanes

    Agape, A. A., Danceanu, M. C., Hansen, R. R. & Schmid, S., 5 jan. 2021, ICDCN 2021 - Proceedings of the 2021 International Conference on Distributed Computing and Networking. Association for Computing Machinery, s. 16-25 10 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    4 Citationer (Scopus)
  • Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code

    Møller, B. H., Søndergaard, J. G., Jensen, K. S., Pedersen, M. W., Bøgedal, T. W., Christensen, A., Poulsen, D. B., Larsen, K. G., Hansen, R. R., Rosted Jensen, T., Juvoll Madsen, H. & Uhrenfeldt, H., 10 dec. 2021, Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings. Tuveri, N., Michalas, A. & Brumley, B. B. (red.). Springer, s. 192-211 20 s. (Lecture Notes in Computer Science, Bind LNCS 13115).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    1 Citationer (Scopus)
  • Private memory allocation analysis for safety-critical java

    Dalsgaard, A. E., Hansen, R. R. & Schoeberl, M., 2012, JTRES '12 Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems. Association for Computing Machinery, s. 9-17 9 s. (Proceedings of the International Workshop of Java Technologies for Real-Time and Embedded Systems).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    7 Citationer (Scopus)
  • Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata

    Hansen, R. R., Jensen, P. G., Larsen, K. G., Legay, A. & Poulsen, D. B., 2017, Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Springer, s. 75-90 (Lecture Notes in Computer Science).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    7 Citationer (Scopus)
  • Refactoring Real-Time Java Profiles

    Søndergaard, H., Thomsen, B., Ravn, A. P., Hansen, R. R. & Bøgholm, T., 28 mar. 2011, Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2011 14th IEEE International Symposium on. IEEE, s. 109 - 116 16 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    4 Citationer (Scopus)
  • Schedulability Analysis for Java Finalizers

    Bøgholm, T., Hansen, R. R., Søndergaard, H., Ravn, A. P. & Thomsen, B., 2010, Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems: ACM International Conference Proceeding Series. Association for Computing Machinery, 7 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    2 Citationer (Scopus)
  • Static validation of licence conformance policies

    Hansen, R. R., Nielson, F., Nielson, H. R. & Probst, C. W., 2008, ARES 2008: Proceedings of the Third International Conference on Availability, Security and Reliability. IEEE Computer Society Press, s. 1104-1111

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    9 Citationer (Scopus)
  • Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals

    Arora, S., Hansen, R. R., Larsen, K. G., Legay, A. & Poulsen, D. B., 23 aug. 2022, Model Checking Software, SPIN 2022: 28th International Symposium, SPIN 2022, Proceedings. Legunsen, O. & Rosu, G. (red.). Springer, s. 61-78 18 s. (Lecture Notes in Computer Science, Bind 13255).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

  • THAPS: Automated Vulnerability Scanning of PHP Applications

    Jensen, T., Pedersen, H., Olesen, M. C. & Hansen, R. R., 2012, Proceedings of the 17th Nordic Conference on Secure IT-Systems (NordSec 2012). Springer, Bind 7617. s. 31-46 (Lecture Notes in Computer Science, Bind 7617).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    15 Citationer (Scopus)
  • The Semantics of "Semantic Patches" in Coccinelle: Program Transformation for the Working Programmer

    Jones, N. D. & Hansen, R. R., 2007, Programming Languages and Systems: 5th Asian Symposium, APLAS 2007. Shao, Z. (red.). Springer, s. 303-318 (Lecture Notes in Computer Science; Nr. 4807).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    2 Citationer (Scopus)
  • The Timed Decentralised Label Model

    Pedersen, M. L., Sørensen, M. H., Lux, D., Nyman, U. M. & Hansen, R. R., 2015, Secure IT Systems: 20th Nordic Conference on Secure IT-Systems (NordSec 2015). Buchegger, S. & Dam, M. (red.). Springer, s. 27-43 (Lecture Notes in Computer Science; Nr. 9417).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    Fil
    2 Citationer (Scopus)
    458 Downloads (Pure)
  • Towards Adversarial Phishing Detection

    Panum, T. K., Hageman, K., Hansen, R. R. & Pedersen, J. M., aug. 2020, 13th USENIX Workshop on Cyber Security Experimentation and Test. USENIX - The Advanced Computing Systems Association, 10 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    Fil
    6 Citationer (Scopus)
    51 Downloads (Pure)
  • Transforming graphical system models to graphical attack models

    Ivanova, M. G., Probst, C. W., Hansen, R. R. & Kammüller, F., 2016, Graphical Models for Security: GraMSec 2015. Springer, s. 82-96 15 s. (Lecture Notes in Computer Science, Bind 9390).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    23 Citationer (Scopus)
  • Type inference for correspondence types

    Hüttel, H., Gordon, A. & Hansen, R. R., 2009, Proceedings of the 6th Workshop on Security Issues in Concurrency (SecCo'08). Elsevier, s. 21-36 15 s. (Electronic Notes in Theoretical Computer Science; Nr. 242, Bind 3).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    1 Citationer (Scopus)
  • Understanding the Challenges of Blocking Unnamed Network Traffic.

    Hageman, K., Kidmose, E., Hansen, R. R. & Pedersen, J. M., 2022, NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium: Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022. Varga, P., Granville, L. Z., Galis, A., Godor, I., Limam, N., Chemouil, P., Francois, J. & Pahl, M-O. (red.). IEEE, s. 1-5 9789854. (IEEE/IFIP Network Operations and Management Symposium).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    Fil
    8 Downloads (Pure)
  • Walking the line: The everyday security ties that bind

    Coles-Kemp, L. & Hansen, R. R., 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Springer, Bind 10292 LNCS. s. 464-480 17 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bind 10292 LNCS).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    13 Citationer (Scopus)
  • What is a Timing Anomaly?

    Cassez, F., Hansen, R. R. & Olesen, M. C., 2012, Proceedings of the 12th International Workshop on Worst-Case Execution-Time Analysis. Vardanega, T. (red.). Dagstuhl, Germany: Schloss Dagstuhl. Leibniz-Zentrum für Informatik, Bind 23. s. 1-12 12 s. (OpenAccess Series in Informatics).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    Åben adgang
    Fil
    10 Citationer (Scopus)
    169 Downloads (Pure)
  • Where can an insider attack?

    Probst, C. W., Hansen, R. R. & Nielson, F., 2007, Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Revised Selected Papers. Springer, s. 127-142 16 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bind 4691 LNCS).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    34 Citationer (Scopus)
  • Worst-Case Memory Consumption Analysis for SCJ

    Andersen, J. L., Todberg, M., Dalsgaard, A. E. & Hansen, R. R., 2013, Proceedings of the 11th International Workshop on Java Technologies for Real-time and Embedded Systems . Association for Computing Machinery, s. 2-10 9 s. (Proceedings of the International Workshop of Java Technologies for Real-Time and Embedded Systems).

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

    7 Citationer (Scopus)
  • WYSIWYB: A Declarative Approach to Finding API Protocols and Bugs in Linux Code

    Lawall, J., Lawall, J., Palix, N., Hansen, R. R. & Muller, G., 2009, Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09). IEEE Computer Society Press, s. 43-52 10 s.

    Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review