Author of the publication

Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques.

, , and . Softw. Test., Verif. Reliab., 7 (4): 201-227 (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dipl.-Ing. Karl Kübler

Approach for manufacturer independent automated machine tool control software test, , , , and . Progress in production engineering; selected, peer reviewed papers from the 2015 WGP Congress, September 7 - 8, 2015, Hamburg, Germany, 794, page 347-354. Pfaffikon, Trans Tech Publ., (2015)
 

Other publications of authors with the same name

CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms., , and . KBSE, page 151-160. IEEE Computer Society, (1991)How to Sanitize Data., , , and . WETICE, page 217-222. IEEE Computer Society, (2004)The Design and Implementation of a Data Level Database Inference Detection System., and . DBSec, volume 142 of IFIP Conference Proceedings, page 253-266. Kluwer, (1998)Discovery of Multi-Level Security Policies., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 173-184. Kluwer, (2000)A class of nonlinear error correcting codes based upon interleaved two-level sequences (Corresp.)., and . IEEE Trans. Information Theory, 13 (2): 335-336 (1967)Data Level Inference Detection in Database Systems., and . CSFW, page 179-189. IEEE Computer Society, (1998)Towards Applying the Composition Principle to Verify a Microkernel Operating System., , , , , and . TPHOLs, volume 1125 of Lecture Notes in Computer Science, page 235-250. Springer, (1996)Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL., , , , , , and . HUG, volume 780 of Lecture Notes in Computer Science, page 29-42. Springer, (1993)Intrusion detection inter-component adaptive negotiation., , , , , , , , and . Computer Networks, 34 (4): 605-621 (2000)Security Policy Specification Using a Graphical Approach, , and . CoRR, (1998)