Ulrich Ultes-Nitsche

Orcid: 0000-0002-5835-9572

Affiliations:
  • University of Fribourg, Switzerland
  • University of Southampton, UK


According to our database1, Ulrich Ultes-Nitsche authored at least 61 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Universality of Büchi Automata: Analysis With Graph Neural Networks.
IEEE Access, 2023

2022
Analyzing Büchi Automata with Graph Neural Networks.
CoRR, 2022

2018
A Simple and Optimal Complementation Algorithm for Büchi Automata.
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, 2018

2014
Structure Comparison of Binary and Weighted Niche-Overlap Graphs.
Proceedings of the Complex Networks V, 2014

2013
Structural Network Properties of Niche-Overlap Graphs.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

2012
<i>k</i>-counting automata.
RAIRO Theor. Informatics Appl., 2012

Identification of Chordless Cycles in Ecological Networks.
Proceedings of the Complex Sciences - Second International Conference, 2012

2011
k-Counting Automata.
Proceedings of the Third Workshop on Non-Classical Models for Automata and Applications - NCMA 2011, Milan, Italy, July 18, 2011

cPLC - A Cryptographic Programming Language and Compiler.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Web 3.0 - Wohin geht es mit dem World Wide Web? Grundlagen zum Social Semantic Web.
HMD Prax. Wirtsch., 2010

2009
A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme.
Proceedings of the Information Security South Africa Conference 2009, 2009

2008
Weakly Continuation Closed Homomorphisms on Automata.
Proceedings of the Modelling, 2008

Checking Inherently Fair Linear-Time Properties in a Non-Naïve Way.
Proceedings of the Modelling, 2008

Towards a zero configuration authentication scheme for 802.11 based networks.
Proceedings of the LCN 2008, 2008

A Proof-of-Concept Implementation of EAP-TLS with TPM Support.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Immune System Based Intrusion Detection System.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Java Nio Framework - Introducing a High-Performance I/O Framework for Java.
Proceedings of the ICSOFT 2008, 2008

2007
A complete characterization of deterministic regular liveness properties.
Theor. Comput. Sci., 2007

Towards more adequate EIS.
Sci. Comput. Program., 2007

A power-set construction for reducing Büchi automata to non-determinism degree two.
Inf. Process. Lett., 2007

Improving network reliability by avoiding misconfiguration.
Proceedings of the 6th International Workshop on Design and Reliable Communication Networks, 2007

Assessment of Code Quality through Classification of Unit Tests in VeriNeC.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Non-signature based virus detection.
J. Comput. Virol., 2006

Environmental Acquisition in Mobile Network Simulation.
Proceedings of the WINSYS 2006, 2006

Testing of Semantic Properties in XML Documents.
Proceedings of the Modelling, 2006

Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
Model-checking Inherently Fair Linear-time Properties.
Proceedings of the Modelling, 2005

A Unit Testing Framework for Network Configurations.
Proceedings of the Modelling, 2005

Automated configuration distribution in verinec.
Proceedings of the ICETE 2005, 2005

2004
Introduction to the Special Issue on Verification and Computational Logic.
Theory Pract. Log. Program., 2004

Run-Time Protocol Conformance Verification In Firewalls.
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June, 2004

How to predict e-mail viruses under uncertainty.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Towards Run-Time Protocol Anomaly Detection and Verification.
Proceedings of the ICETE 2004, 2004

2003
Improved verification of linear-time properties within fairness: weakly continuation-closed behaviour abstractions computed from trace reductions.
Softw. Test. Verification Reliab., 2003

An Optimised Partial-Order Approach to the Verification of System Components.
Proceedings of the New Technologies for Information Systems, 2003

2002
Do We Need Liveness? - Approximation of Liveness Properties by Safety Properties.
Proceedings of the SOFSEM 2002: Theory and Practice of Informatics, 2002

An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection.
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 2002

Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations.
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 2002

2001
Checking Properties within Fairness and Behavior Abstractions
CoRR, 2001

Computing property-preserving behaviour abstractions from trace reductions: abstraction-based verification of linear-time properties under fairness.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Testing Liveness Properties: Approximating Liveness Properties by Safety Properties.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001

2000
Satisfaction up to Liveness.
Proceedings of the Formal Techniques for Distributed System Development, 2000

Secure Access to Medical Data over the Internet.
Proceedings of the 8th European Conference on Information Systems, 2000

1999
A Persistent-Set Approach to Abstract Stat-Space Construction in Verification.
Proceedings of the SOFSEM '99, Theory and Practice of Informatics, 26th Conference on Current Trends in Theory and Practice of Informatics, Milovy, Czech Republic, November 27, 1999

Security aspects of a Java-servlet-based web-hosted e-mail system.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

1998
Verification of co-operating-systems and behaviour abstraction.
PhD thesis, 1998

Application of formal verification and behaviour abstraction to the service interaction problem in intelligent networks.
J. Syst. Softw., 1998

The SH-Verification Tool - Abstraction-Based Verification of Co-operating Systems.
Formal Aspects Comput., 1998

Towards the Construction of an Abstract State-Space from a Partial-Order Representation of the Concrete One.
Proceedings of the MFCS '98 Workshop on Concurrency, 1998

Privacy and Efficiency in Patient Focused Health Care Processes.
Proceedings of the MEDINFO '98, 1998

On the Border of Universality and Non-Universality in Restricted High-Level Petri Nets.
Proceedings of the International Colloquium Universal Machines and Computations, 1998

1997
Relative Liveness and Behavior Abstraction (Extended Abstract).
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997

Interpretation of the Full Computation Tree Logic CTL* on Sets of Infinite Sequences.
Proceedings of the Logical Foundations of Computer Science, 4th International Symposium, 1997

Deterministic omega-regular liveness properties.
Proceedings of the 3rd International Conference Developments in Language Theory, 1997

Security Concerns for Mobile Information Systems in Health Care.
Proceedings of the Eighth International Workshop on Database and Expert Systems Applications, 1997

1996
Verification and behavior abstraction towards a tractable verification technique for large distributed systems.
J. Syst. Softw., 1996

Approximaely Satisfied Properties of Systems and Simple Language Homomorphisms.
Inf. Process. Lett., 1996

Verification by Behaviour Abstraction - A Case Study of Service Interaction Detection in Intelligent Telephone Networks.
Proceedings of the Computer Aided Verification, 8th International Conference, 1996

1995
A Finitary-Language Semantics for Propositional Linear Temporal Logic.
Proceedings of the Developments in Language Theory II, 1995

1994
A Verification Method Based on Homomorphic Model Abstractions (Abstract).
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

Propositional Linear Temporal Logic and Language Homomorphisms.
Proceedings of the Logical Foundations of Computer Science, Third International Symposium, 1994


  Loading...