OASIcs, Volume 3
TrustworthySW 2006, May 18-19, 2006, Saarbruecken, Germany
Editors: Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Proceedings{autexier_et_al:OASIcs.TrustworthySW.2006, title = {{OASIcs, Volume 3, Trustworthy SW'06, Complete Volume}}, booktitle = {Workshop on Trustworthy Software}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2012}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006}, URN = {urn:nbn:de:0030-drops-35659}, doi = {10.4230/OASIcs.TrustworthySW.2006}, annote = {Keywords: Software/Program Verification} }
Published in: OASIcs, Volume 15, 10th International Workshop on Worst-Case Execution Time Analysis (WCET 2010)
Stephan Wilhelm and Christoph Cullmann. Integrating Abstract Caches with Symbolic Pipeline Analysis. In 10th International Workshop on Worst-Case Execution Time Analysis (WCET 2010). Open Access Series in Informatics (OASIcs), Volume 15, pp. 36-43, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{wilhelm_et_al:OASIcs.WCET.2010.36, author = {Wilhelm, Stephan and Cullmann, Christoph}, title = {{Integrating Abstract Caches with Symbolic Pipeline Analysis}}, booktitle = {10th International Workshop on Worst-Case Execution Time Analysis (WCET 2010)}, pages = {36--43}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-21-7}, ISSN = {2190-6807}, year = {2010}, volume = {15}, editor = {Lisper, Bj\"{o}rn}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.WCET.2010.36}, URN = {urn:nbn:de:0030-drops-28235}, doi = {10.4230/OASIcs.WCET.2010.36}, annote = {Keywords: WCET analysis, cache analysis, pipeline analysis} }
Published in: OASIcs, Volume 6, 7th International Workshop on Worst-Case Execution Time Analysis (WCET'07) (2007)
Stephan Wilhelm and Björn Wachter. Towards Symbolic State Traversal for Efficient WCET Analysis of Abstract Pipeline and Cache Models. In 7th International Workshop on Worst-Case Execution Time Analysis (WCET'07). Open Access Series in Informatics (OASIcs), Volume 6, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{wilhelm_et_al:OASIcs.WCET.2007.1190, author = {Wilhelm, Stephan and Wachter, Bj\"{o}rn}, title = {{Towards Symbolic State Traversal for Efficient WCET Analysis of Abstract Pipeline and Cache Models}}, booktitle = {7th International Workshop on Worst-Case Execution Time Analysis (WCET'07)}, pages = {1--6}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-05-7}, ISSN = {2190-6807}, year = {2007}, volume = {6}, editor = {Rochange, Christine}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.WCET.2007.1190}, URN = {urn:nbn:de:0030-drops-11904}, doi = {10.4230/OASIcs.WCET.2007.1190}, annote = {Keywords: WCET, worst-case execution time, hard real-time, embedded systems, abstract interpretation, pipeline analysis, cache analysis, symbolic state traversal BDD} }
Published in: OASIcs, Volume 1, 5th International Workshop on Worst-Case Execution Time Analysis (WCET'05) (2007)
Stephan Wilhelm. Efficient Analysis of Pipeline Models for WCET Computation. In 5th International Workshop on Worst-Case Execution Time Analysis (WCET'05). Open Access Series in Informatics (OASIcs), Volume 1, pp. 37-40, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{wilhelm:OASIcs.WCET.2005.814, author = {Wilhelm, Stephan}, title = {{Efficient Analysis of Pipeline Models for WCET Computation}}, booktitle = {5th International Workshop on Worst-Case Execution Time Analysis (WCET'05)}, pages = {37--40}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-24-8}, ISSN = {2190-6807}, year = {2007}, volume = {1}, editor = {Wilhelm, Reinhard}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.WCET.2005.814}, URN = {urn:nbn:de:0030-drops-8149}, doi = {10.4230/OASIcs.WCET.2005.814}, annote = {Keywords: Worst-case execution time prediction, pipeline analysis, timing anomalies, binary decision diagrams} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Axel Legay, Luca de Alfaro, and Marco Faella. An Introduction to the Tool Ticc. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-32, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{legay_et_al:OASIcs.TrustworthySW.2006.766, author = {Legay, Axel and de Alfaro, Luca and Faella, Marco}, title = {{An Introduction to the Tool Ticc}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--32}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.766}, URN = {urn:nbn:de:0030-drops-7667}, doi = {10.4230/OASIcs.TrustworthySW.2006.766}, annote = {Keywords: Open system, game, interface automata} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper. Abstracts Collection -- Workshop Trustworthy Software 2006. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.758, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Abstracts Collection -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--7}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.758}, URN = {urn:nbn:de:0030-drops-7588}, doi = {10.4230/OASIcs.TrustworthySW.2006.758}, annote = {Keywords: Software evolution, Modularity, Automated debugging, Dependability assurance, Failure analysis, Static program analysis, Infinite and Finite-state verification, Runtime verification, Theorem proving, Access control, Security analysis, Security protocols, E-Voting} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. i-vi, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.693, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Preface -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {i--vi}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.693}, URN = {urn:nbn:de:0030-drops-6932}, doi = {10.4230/OASIcs.TrustworthySW.2006.693}, annote = {Keywords: Trustworthy software, preface} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Arnaud Lanoix, Dieu-Donné Okalas Ossami, and Jeanine Souquières. An Operator-based Approach to Incremental Development of Conform Protocol State Machines. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{lanoix_et_al:OASIcs.TrustworthySW.2006.695, author = {Lanoix, Arnaud and Okalas Ossami, Dieu-Donn\'{e} and Souqui\`{e}res, Jeanine}, title = {{An Operator-based Approach to Incremental Development of Conform Protocol State Machines}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--14}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.695}, URN = {urn:nbn:de:0030-drops-6953}, doi = {10.4230/OASIcs.TrustworthySW.2006.695}, annote = {Keywords: Protocol state machine, incremental development, development operator, exact conformance, plugin conformance, partial conformance} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Björn Wachter. Explaining Data Type Reduction in the Shape Analysis Framework. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{wachter:OASIcs.TrustworthySW.2006.701, author = {Wachter, Bj\"{o}rn}, title = {{Explaining Data Type Reduction in the Shape Analysis Framework}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--6}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.701}, URN = {urn:nbn:de:0030-drops-7016}, doi = {10.4230/OASIcs.TrustworthySW.2006.701}, annote = {Keywords: Canonical abstraction, data type reduction, model checking, parameterized system, infinite-state} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Claude Kirchner, Pierre-Etienne Moreau, and Antoine Reilles. Formal Validation of Pattern Matching code. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{kirchner_et_al:OASIcs.TrustworthySW.2006.697, author = {Kirchner, Claude and Moreau, Pierre-Etienne and Reilles, Antoine}, title = {{Formal Validation of Pattern Matching code}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--22}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.697}, URN = {urn:nbn:de:0030-drops-6978}, doi = {10.4230/OASIcs.TrustworthySW.2006.697}, annote = {Keywords: Correctness proofs, compilers, pattern matching, validation} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Julien Schmaltz and Dominique Borrione. Formalizing On Chip Communications in a Functional Style. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{schmaltz_et_al:OASIcs.TrustworthySW.2006.700, author = {Schmaltz, Julien and Borrione, Dominique}, title = {{Formalizing On Chip Communications in a Functional Style}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--25}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.700}, URN = {urn:nbn:de:0030-drops-7000}, doi = {10.4230/OASIcs.TrustworthySW.2006.700}, annote = {Keywords: SoC's, communication architectures, formal methods, automated theorem proving} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Stephan Neuhaus. Isolating Intrusions by Automatic Experiments. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{neuhaus:OASIcs.TrustworthySW.2006.696, author = {Neuhaus, Stephan}, title = {{Isolating Intrusions by Automatic Experiments}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--3}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.696}, URN = {urn:nbn:de:0030-drops-6960}, doi = {10.4230/OASIcs.TrustworthySW.2006.696}, annote = {Keywords: Intrusion Analysis, Malware, Experimentation} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Eugen Zalinescu, Véronique Cortier, and Michaël Rusinowitch. Relating two standard notions of secrecy. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{zalinescu_et_al:OASIcs.TrustworthySW.2006.691, author = {Zalinescu, Eugen and Cortier, V\'{e}ronique and Rusinowitch, Micha\"{e}l}, title = {{Relating two standard notions of secrecy}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--29}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.691}, URN = {urn:nbn:de:0030-drops-6911}, doi = {10.4230/OASIcs.TrustworthySW.2006.691}, annote = {Keywords: Verification, security protocols, secrecy, applied-pi calculus} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Michael Hilker and Christoph Schommer. SANA - Security Analysis in Internet Traffic through Artificial Immune Systems. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{hilker_et_al:OASIcs.TrustworthySW.2006.694, author = {Hilker, Michael and Schommer, Christoph}, title = {{SANA - Security Analysis in Internet Traffic through Artificial Immune Systems}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--9}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.694}, URN = {urn:nbn:de:0030-drops-6949}, doi = {10.4230/OASIcs.TrustworthySW.2006.694}, annote = {Keywords: Artificial Immune Systems, Network Security, Intrusion Detection, Artificial Cell Communication, Biological-Inspired Computing, Complex Adaptive Syste} }
Feedback for Dagstuhl Publishing