BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Australia
1 × Finland
1 × New Zealand
1 × The Netherlands
1 × Uruguay
2 × Canada
2 × Spain
2 × USA
2 × United Kingdom
4 × Germany
5 × Italy
Collaborated with:
G.Schellhorn K.Stenzel W.Stephan H.Grandy M.Heisel M.Balser D.Haneberg N.Moebius A.Hoffmann A.Thums A.Angerer C.Ehinger G.Reinhart B.Tofan G.Ernst A.Dunets B.Eberhardinger H.Seebach A.Knapp M.Borek A.Schierl R.Bertossi R.Hähnle M.Bischof J.Schmitt M.Marcos G.Strasser D.Hutter H.Mantel G.Rock A.Wolpers
Talks about:
system (10) verif (9) kiv (7) correct (4) verifi (4) formal (4) secur (4) prove (4) interact (3) specif (3)

Person: Wolfgang Reif

DBLP DBLP: Reif:Wolfgang

Contributed to:

ICTSS 20142014
IFM 20142014
SEFM 20132013
CASE 20112011
MoDELS 20112011
SEFM 20112011
CASE 20102010
FM 20092009
FM 20082008
TAP 20082008
IFM 20072007
SEFM 20072007
FM 20062006
SEFM 20052005
IJCAR 20012001
FASE 20002000
FM-Trends 19981998
CADE 19971997
CADE 19921992
SEKE 19921992
CADE 19901990
CADE 19881988
CSL 19871987
CADE 19861986
TAPSOFT CAAP/FASE 19971997

Wrote 27 papers:

ICTSS-2014-EberhardingerSKR #adaptation #self #testing #towards
Towards Testing Self-organizing, Adaptive Systems (BE, HS, AK, WR), pp. 180–185.
IFM-2014-TofanSR #composition #multi #proving
A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset (BT, GS, WR), pp. 357–372.
SEFM-2013-BorekMSR #approach #model checking #modelling
Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
CASE-2011-AngererEHRR #automation #design #process
Design of an automation system for preforming processes in aerospace industries (AA, CE, AH, WR, GR), pp. 557–562.
MoDELS-2011-StenzelMR #code generation #qvt #verification
Formal Verification of QVT Transformations for Code Generation (KS, NM, WR), pp. 533–547.
SEFM-2011-ErnstSR #analysis #empirical #interactive #proving #theorem proving #verification
Verification of B + Trees: An Experiment Combining Shape Analysis and Interactive Theorem Proving (GE, GS, WR), pp. 188–203.
CASE-2010-AngererEHRRS #automation
Automated cutting and handling of carbon fiber fabrics in aerospace industries (AA, CE, AH, WR, GR, GS), pp. 861–866.
FM-2009-SchierlSHR #file system #memory management #specification
Abstract Specification of the UBIFS File System for Flash Memory (AS, GS, DH, WR), pp. 190–206.
FM-2008-GrandyBSSR #protocol #security #verification
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
TAP-2008-DunetsSR #analysis #bound #data type #relational
Bounded Relational Analysis of Free Data Types (AD, GS, WR), pp. 99–115.
IFM-2007-HanebergGRS #approach #smarttech #verification
Verifying Smart Card Applications: An ASM Approach (DH, HG, WR, GS), pp. 313–332.
SEFM-2007-GrandyBSR #encoding #named #protocol #security
ASN1-light: A Verified Message Encoding for Security Protocols (HG, RB, KS, WR), pp. 195–204.
FM-2006-SchellhornGHR #challenge #proving
The Mondex Challenge: Machine Checked Proofs for an Electronic Purse (GS, HG, DH, WR), pp. 16–31.
FM-2006-SchmittHBRM #guidelines #interactive #verification
Interactive Verification of Medical Guidelines (JS, AH, MB, WR, MM), pp. 32–47.
SEFM-2005-GrandySR #java #kernel #object-oriented #verification
Object Oriented Verification Kernels for Secure Java Applications (HG, KS, WR), pp. 170–179.
IJCAR-2001-ReifST #detection #specification
Flaw Detection in Formal Specifications (WR, GS, AT), pp. 642–657.
FASE-2000-BalserRSST #development
Formal System Development with KIV (MB, WR, GS, KS, AT), pp. 363–366.
FM-1998-BalserRSS
KIV 3.0 for Provably Correct Systems (MB, WR, GS, KS), pp. 330–337.
FM-1998-HutterMRSWBRSS #complexity #formal method #named
VSE: Controlling the Complexity in Formal Software Developments (DH, HM, GR, WS, AW, MB, WR, GS, KS), pp. 351–358.
CADE-1997-ReifSS #correctness #proving
Proving System Correctness with KIV 3.0 (WR, GS, KS), pp. 69–72.
CADE-1992-Reif
The KIV System: Systematic Construction of Verified Software (WR), pp. 753–757.
SEKE-1992-Reif #correctness #first-order #specification
Correctness of Full First-Order Specifications (WR), pp. 276–283.
CADE-1990-HeiselRS #proving #theorem proving #verification
Tactical Theorem Proving in Program Verification (MH, WR, WS), pp. 117–131.
CADE-1988-HeiselRS #implementation #verification
Implementing Verification Strategies in the KIV-System (MH, WR, WS), pp. 131–140.
CSL-1987-HeiselRS #logic #using #verification
Program Verification Using Dynamic Logic (MH, WR, WS), pp. 102–117.
CADE-1986-HahnleHRS #interactive #logic #verification
An Interactive Verification System Based on Dynamic Logic (RH, MH, WR, WS), pp. 306–315.
TAPSOFT-1997-ReifSS #correctness #proving
Proving System Correctness with KIV (WR, GS, KS), pp. 859–862.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.