Helmut Veith
#54,512
Most Influential Person Now
Austrian computer scientist
Helmut Veith's AcademicInfluence.com Rankings
Helmut Veithcomputer-science Degrees
Computer Science
#2282
World Rank
#2378
Historical Rank
Database
#6205
World Rank
#6434
Historical Rank
Download Badge
Computer Science
Why Is Helmut Veith Influential?
(Suggest an Edit or Addition)According to Wikipedia, Helmut Veith was an Austrian computer scientist who worked on the areas of computer-aided verification, software engineering, computer security, and logic in computer science. He was a Professor of Informatics at the Vienna University of Technology , Austria.
Helmut Veith's Published Works
Published Works
- Counterexample-guided abstraction refinement for symbolic model checking (2003) (1006)
- Modular verification of software components in C (2004) (388)
- Handbook of Model Checking (2018) (280)
- Progress on the State Explosion Problem in Model Checking (2001) (238)
- 25 Years of Model Checking - History, Achievements, Perspectives (2008) (193)
- Modular verification of software components in C (2003) (183)
- Detecting Malicious Code by Model Checking (2005) (183)
- Efficient filtering in publish-subscribe systems using binary decision diagrams (2001) (181)
- Automated Abstraction Refinement for Model Checking Large State Spaces Using SAT Based Conflict Analysis (2002) (160)
- Tree-like counterexamples in model checking (2002) (155)
- Jakstab: A Static Analysis Platform for Binaries (2008) (154)
- Secure two-party computations in ANSI C (2012) (141)
- Decidability of Parameterized Verification (2015) (133)
- Environment Abstraction for Parameterized Verification (2006) (121)
- An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries (2008) (120)
- Bound Analysis of Imperative Programs with the Size-Change Abstraction (2011) (105)
- A simple and scalable static analysis for bound analysis and amortized complexity analysis (2014) (103)
- Verification by Network Decomposition (2004) (84)
- Datalog LITE: a deductive query language with linear time model checking (2002) (83)
- Malware Normalization (2005) (76)
- Counterexamples Revisited: Principles, Algorithms, Applications (2003) (73)
- Parameterized model checking of fault-tolerant distributed algorithms by abstraction (2013) (72)
- Modular Logic Programming and Generalized Quantifiers (1997) (71)
- On the completeness of bounded model checking for threshold-based distributed algorithms: Reachability (2014) (70)
- Con2colic testing (2013) (66)
- A Logic-Based Framework for Verifying Consensus Algorithms (2014) (65)
- Parameterized model checking of rendezvous systems (2014) (63)
- Complexity of t-tautologies (2001) (62)
- A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms (2016) (62)
- Watermarking schemes provably secure against copy and ambiguity attacks (2003) (61)
- FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement (2008) (61)
- Proving Ptolemy Right: The Environment Abstraction Framework for Model Checking Concurrent Systems (2008) (61)
- Interpolation in fuzzy logic (1999) (58)
- SAT Based Predicate Abstraction for Hardware Verification (2003) (55)
- Proactive Detection of Computer Worms Using Model Checking (2010) (52)
- CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations (2014) (50)
- SMT and POR Beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms (2015) (48)
- Complexity and Resource Bound Analysis of Imperative Programs Using Difference Constraints (2017) (47)
- Succinct representation, leaf languages, and projection reductions (1996) (46)
- Encoding Treewidth into SAT (2009) (44)
- How did you specify your test suite (2010) (43)
- Towards Modeling and Model Checking Fault-Tolerant Distributed Algorithms (2013) (42)
- Query-Driven Program Testing (2008) (41)
- iDQ: Instantiation-Based DQBF Solving (2014) (39)
- Succinctness as a Source of Complexity in Logical Formalisms (1999) (38)
- Software transformations to improve malware detection (2007) (38)
- Empirical software metrics for benchmarking of verification tools (2015) (35)
- Second Order Logic and the Weak Exponential Hierarchies (1995) (33)
- Precise static analysis of untrusted driver binaries (2010) (32)
- State/Event Software Verification for Branching-Time Specifications (2005) (31)
- Nonlinear quantification scheduling in image computation (2001) (30)
- Securing symmetric watermarking schemes against protocol attacks (2002) (30)
- Information Reuse for Multi-goal Reachability Analyses (2013) (29)
- Parameterized Systems in BIP: Design and Model Checking (2016) (29)
- Using Verification Technology to Specify and Detect Malware (2007) (28)
- An axiomatization of quantified proposition Gödel logic using the Takeuti-Titani rule (2000) (25)
- Using Combinatorial Optimization Methods for Quantification Scheduling (2001) (24)
- Languages Represented by Boolean Formulas (1997) (22)
- What You Always Wanted to Know About Model Checking of Fault-Tolerant Distributed Algorithms (2015) (21)
- Difference constraints: an adequate abstraction for complexity analysis of imperative programs (2015) (21)
- On the Notion of Vacuous Truth (2007) (21)
- Executable Protocol Specification in ESL (2000) (21)
- On the automated verification of web applications with embedded SQL (2016) (21)
- Decidability in Parameterized Verification (2016) (20)
- Tutorial on Parameterized Model Checking of Fault-Tolerant Distributed Algorithms (2014) (20)
- Local Linearizability for Concurrent Container-Type Data Structures (2016) (20)
- How to encode a logical structure by an OBDD (1998) (19)
- Model Checking: Back and Forth between Hardware and Software (2005) (18)
- The Localization Reduction and Counterexample-Guided Abstraction Refinement (2010) (16)
- Quantifier Elimination in Fuzzy Logic (1998) (16)
- The first order definability of graphs: Upper bounds for quantifier depth (2006) (16)
- Proof Theory of Fuzzy Logics: Urquhart's C and Related Logics (1998) (15)
- Parameterized Vacuity (2004) (15)
- On the concept of variable roles and its use in software analysis (2013) (15)
- Proceedings of the 13th international conference on Logic for Programming, Artificial Intelligence, and Reasoning (2010) (14)
- Who is afraid of Model Checking Distributed Algorithms (2012) (14)
- Validity of CTL Queries Revisited (2003) (14)
- Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments (2005) (14)
- Para$$^2$$2: parameterized path reduction, acceleration, and SMT for reachability in threshold-guarded distributed algorithms (2017) (13)
- Provably Secure Authentication of Digital Media Through Invertible Watermarks (2004) (13)
- Counter Attack on Byzantine Generals: Parameterized Model Checking of Fault-tolerant Distributed Algorithms (2012) (12)
- On compiling Boolean circuits optimized for secure multi-party computation (2017) (12)
- Temporal Logic Model Checking (2005) (12)
- Linear time datalog and branching time logic (2000) (11)
- The First Order Definability of Graphs: Upper Bounds for Quantifier Rank (2003) (10)
- Generalized Quantifiers in Logic Programs (1997) (10)
- Counterexample-Guide dAbstractio nRefinemen t ? (2000) (10)
- Introduction to Model Checking (2018) (10)
- An Introduction to Test Specification in FQL (2010) (10)
- Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support (2009) (9)
- A Syntactic Characterization of Distributive LTL Queries (2004) (8)
- Shape and Content - A Database-Theoretic Perspective on the Analysis of Data Structures (2014) (8)
- Seamless Testing for Models and Code (2011) (8)
- New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective (2010) (8)
- Datalog LITE: Temporal versus deductive reasoning in verification (1998) (7)
- On the Complexity of Symbolic Verification and Decision Problems in Bit-Vector Logic (2014) (7)
- Verification across Intellectual Property Boundaries (2007) (6)
- Model checking, 2nd Edition (2018) (6)
- Local Linearizability (2015) (5)
- Extending ALCQIO with Trees (2015) (5)
- Perspectives on White-Box Testing: Coverage, Concurrency, and Concolic Execution (2015) (5)
- Succinct Representation and Leaf Languages (1995) (4)
- Proving Reachability Using FShell - (Competition Contribution) (2012) (4)
- On the complexity of data disjunctions (2002) (4)
- A Guide to Quantified Propositional Gödel Logic (2001) (4)
- Towards a Description Logic for Program Analysis: Extending ALCQIO with Reachability (2014) (4)
- On the Undecidability of some Sub-Classical First-Order Logics (1999) (4)
- Ensuring Media Integrity on Third-Party Infrastructures (2005) (4)
- Deterministic CTL query solving (2005) (4)
- An Analytic Calculus for Quantified Propositional Gödel Logic (2000) (3)
- Linear Time Datalog for Branching Time Logic (3)
- Model Checking Malicious Code (2007) (3)
- Semantic integrity in large-scale online simulations (2010) (3)
- Shape and Content: Incorporating Domain Knowledge into Shape Analysis (2013) (3)
- Para\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$^2$$\end{document}2: parameterized path reduction, acceleration, a (2017) (3)
- Starting a Dialog between Model Checking and Fault-tolerant Distributed Algorithms (2012) (3)
- Monadic Second Order Finite Satisfiability and Unbounded Tree-Width (2015) (2)
- On the Structure and Complexity of Rational Sets of Regular Languages (2013) (2)
- Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction (2009) (2)
- Computer Aided Verification (2013) (2)
- Integrating Publish/Subscribe into a Mobile Teamwork Support Platform (2003) (2)
- Logic for Programming, Artificial Intelligence, and Reasoning: 15th International Conference, LPAR 2008, Doha, Qatar, November 22-27, 2008, Proceedings ... / Lecture Notes in Artificial Intelligence) (2008) (2)
- An Iterative Framework for Simulation Conformance (2005) (2)
- Parameterized model checking of rendezvous systems (2017) (2)
- Empirical software metrics for benchmarking of verification tools (2017) (2)
- A Precise Specification Framework for White Box Program Testing (2009) (2)
- Proceedings of the 24th international conference/19th annual conference on Computer science logic (2010) (2)
- Generalized Quanti ers in Logic Programs ? (1997) (2)
- Extending ALCQIO with reachability (2014) (1)
- Loop Patterns in C Programs (2015) (1)
- Proceedings of the 25th international conference on Computer Aided Verification (2013) (1)
- Decision Procedures in Soft, Hard and Bio-ware - Follow Up (Dagstuhl Seminar 11272) (2011) (1)
- Concolic Testing of Concurrent Programs (2014) (1)
- A Survey of Abstract BDDs ∗ (2008) (1)
- Slope Testing for Activity Diagrams and Safety Critical Software (2009) (1)
- Friends or Foes? Communities in Software Verification (Invited Lecture) (2003) (1)
- Vienna Summer of Logic (2014) (1)
- Embedding Formal Methods into Systems Engineering (2009) (1)
- Dependency Coverage Criteria with FQL (2009) (1)
- A Novel SAT Procedure for Linear Real Arithmetic (2005) (1)
- Jakstab: A Static Analysis Platform for Binaries Tool Paper (2008) (1)
- Pebble-Intervals Automata and FO2 with Two Orders (Extended Version) (2019) (0)
- On the Complexity of Data Disjun tions ? (1999) (0)
- Belegradek, OV, Stolhoushkin, AP and Taitslin, MA (1999) (0)
- EPSL: Executable Protocol Specification Language (2000) (0)
- PETShop '13: Proceedings of the First ACM Workshop on Language Support for Privacy-enhancing Technologies (2013) (0)
- Pebble-Intervals Automata and FO with Two Orders (2020) (0)
- EPSL : E xecutable P rotocol S pecification L anguage (2000) (0)
- Invited Articles Foreword (2015) (0)
- Compilation for Secure Two-Party Computations (2015) (0)
- Challenges in compiler construction for secure two-party computation (2013) (0)
- Complexity and Resource Bound Analysis of Imperative Programs Using Difference Constraints (2017) (0)
- Adaptive Optimization Framework for Verification and Control of Cyber-Physical Systems (2019) (0)
- Computer Science Logic, 24th International Workshop, CSL 2010, 19th Annual Conference of the EACSL, Brno, Czech Republic, August 23-27, 2010. Proceedings (2010) (0)
- From Temporal Logic Queries to Vacuity Detection (2005) (0)
- The ATOM Middleware for Massively Parallel Multi-Player Online Games (2003) (0)
- Special Issue: Games in Verification (2012) (0)
- A General Method to Determine the Expression Complexity of Database Query Languages (1998) (0)
- The first workshop on language support for privacy-enhancing technologies (PETShop'13) (2013) (0)
- On the distributivity of LTL specifications (2010) (0)
- D ec 2 01 9 Pebble-Intervals Automata and FO 2 with Two Orders ∗ ( Extended Version ) (2019) (0)
- Domain Pattern Abstraction + Ptolemaic Abstract Domains = Environment Abstraction for Concurrent Systems (2008) (0)
- On compiling Boolean circuits optimized for secure multi-party computation (2017) (0)
- Automated Software Analysis (2009) (0)
- 10161 Abstracts Collection - Decision Procedures in Software, Hardware and Bioware (2010) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- Closure properties and complexity of rational sets of regular languages (2015) (0)
- Reusing Information in Multi-Goal Reachability Analyses (2014) (0)
- ExecutableProtocolSpecificationin ESL (2000) (0)
- Multiprocessor Scheduling using the DÉJÀ VU Scheduling Class Library (1999) (0)
- Towards a Systematic Design of Fault-Tolerant Asynchronous Circuits (2007) (0)
- Malware Detection (2011) (0)
- Malware Engineering (2005) (0)
- Challenges in Model Checking of Fault-tolerant Designs in TLA+ (2015) (0)
- Executable Protocol Specific ation in ESL (2000) (0)
- 10161 Executive Summary - Decision Procedures in Software, Hardware and Bioware (2010) (0)
- Electronic Communications of the EASST Volume 72 ( 2015 ) Proceedings of the 15 th International Workshop on Automated Verification of Critical Systems ( AVoCS 2015 ) Loop Patterns in C Programs (2015) (0)
This paper list is powered by the following services:
Other Resources About Helmut Veith
What Schools Are Affiliated With Helmut Veith?
Helmut Veith is affiliated with the following schools: