Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Andreas Bauer 0002
aka: Andreas Klaus Bauer
Universität Augsburg, Germany
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2016
- Andreas Bauer, Yliès Falcone:
Decentralised LTL monitoring. Formal Methods Syst. Des. 48(1-2): 46-93 (2016) - 2015
- Andreas Bauer, Jan-Christoph Küster, Gil Vegliach:
The ins and outs of first-order runtime verification. Formal Methods Syst. Des. 46(3): 286-316 (2015) - Jan-Christoph Küster, Andreas Bauer:
Monitoring Real Android Malware. RV 2015: 136-152 - 2014
- Jan-Christoph Küster, Andreas Bauer:
Platform-Centric Android Monitoring - Modular and Efficient. CoRR abs/1406.2041 (2014) - 2013
- Andreas Bauer, Jan-Christoph Küster, Gil Vegliach:
From Propositional to First-Order Monitoring. RV 2013: 59-75 - Andreas Bauer, Peter Baumgartner, Martin Diller, Michael Norrish:
Tableaux for Verification of Data-Centric Processes. TABLEAUX 2013: 28-43 - Andreas Bauer, Jan-Christoph Küster, Gil Vegliach:
From propositional to first-order monitoring. CoRR abs/1303.3645 (2013) - 2012
- Andreas Klaus Bauer, Yliès Falcone:
Decentralised LTL Monitoring. FM 2012: 85-100 - Andreas Bauer, Jan-Christoph Küster, Gil Vegliach:
Runtime Verification Meets Android Security. NASA Formal Methods 2012: 174-180 - Andreas Klaus Bauer, Peter Baumgartner, Michael Norrish:
Reasoning with Data-Centric Business Processes. CoRR abs/1207.2461 (2012) - 2011
- Andreas Bauer, Jan Jürjens, Yijun Yu:
Run-Time Security Traceability for Evolving Systems. Comput. J. 54(1): 58-87 (2011) - Andreas Bauer, Martin Leucker, Christian Schallhart:
Runtime Verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4): 14:1-14:64 (2011) - Andreas Bauer, Martin Leucker:
The Theory and Practice of SALT. NASA Formal Methods 2011: 13-40 - Andreas Bauer, Yliès Falcone:
Decentralised LTL Monitoring. CoRR abs/1111.5133 (2011) - 2010
- Andreas Bauer, Jan Jürjens:
Runtime verification of cryptographic protocols. Comput. Secur. 29(3): 315-330 (2010) - Andreas Bauer, Martin Leucker, Christian Schallhart:
Comparing LTL Semantics for Runtime Verification. J. Log. Comput. 20(3): 651-674 (2010) - Andreas Bauer, Martin Leucker, Christian Schallhart, Michael Tautschnig:
Don't care in SMT: building flexible yet efficient abstraction/refinement solvers. Int. J. Softw. Tools Technol. Transf. 12(1): 23-37 (2010) - Andreas Bauer, Viorica Botea, Mark Brown, Matt Gray, Daniel Harabor, John K. Slaney:
An Integrated Modelling, Debugging, and Visualisation Environment for G12. CP 2010: 522-536 - Andreas Bauer, Patrik Haslum:
LTL Goal Specifications Revisited. ECAI 2010: 881-886 - Andreas Bauer:
Monitorability of omega-regular languages. CoRR abs/1006.3638 (2010) - 2009
- Andreas Bauer, Sophie Pinchinat:
Prognosis of omega-Languages for the Diagnosis of *-Languages: A Topological Perspective. Discret. Event Dyn. Syst. 19(4): 451-470 (2009) - Franz Baader, Andreas Bauer, Marcel Lippmann:
Runtime Verification Using a Temporal Description Logic. FroCoS 2009: 149-164 - Andreas Bauer, Rajeev Goré, Alwen Tiu:
A First-Order Policy Language for History-Based Transaction Monitoring. ICTAC 2009: 96-111 - Franz Baader, Andreas Bauer, Alwen Tiu:
Matching Trace Patterns with Regular Policies. LATA 2009: 105-116 - Franz Baader, Andreas Bauer, Peter Baumgartner, Anne Cregan, Alfredo Gabaldon, Krystian Ji, Kevin Lee, David Rajaratnam, Rolf Schwitter:
A Novel Architecture for Situation Awareness Systems. TABLEAUX 2009: 77-92 - Andreas Bauer, Rajeev Goré, Alwen Tiu:
A decidable policy language for history-based transaction monitoring. CoRR abs/0903.2904 (2009) - 2008
- Andreas Bauer:
The Theory and Practice of Runtime Reflection - A Model-based Framework for Dynamic Analysis of Distributed Reactive Systems. Technical University Munich, Germany, VDM 2008, ISBN 978-3-8364-7441-2, pp. I-X, 1-204 - Jan Jürjens, Yijun Yu, Andreas Bauer:
Tools for Traceable Security Verification. BCS Int. Acad. Conf. 2008: 367-390 - Andreas Bauer, Jan Jürjens:
Security protocols, properties, and their monitoring. SESS 2008: 33-40 - Franz Baader, Andreas Bauer, Alwen Tiu:
Matching linear and non-linear trace patterns with regular policies. UNIF 2008: 16-24
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 04:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint