default search action
Werner Stephan 0001
Person information
- affiliation: German Research Center for Artificial Intelligence (DFKI), Saarbrücken
Other persons with the same name
- Werner Stephan — disambiguation page
- Werner Stephan 0002 — University of Stuttgart, University Library, Stuttgart, Germany
Other persons with a similar name
- Stephan Werner 0001 — University of Konstanz, Department of Computer and Information Science
- Stephan Werner 0002 — Karlsruhe Institute of Technology, Institute for Information Processing Technologies
- Stephan Werner 0003 — TU Ilmenau, Institute for Media Technology
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c39]Freek Verbeek, Oto Havle, Julien Schmaltz, Sergey Tverdyshev, Holger Blasum, Bruno Langenstein, Werner Stephan, Burkhart Wolff, Yakoub Nemouchi:
Formal API Specification of the PikeOS Separation Kernel. NFM 2015: 375-389 - 2014
- [j3]Freek Verbeek, Sergey Tverdyshev, Oto Havle, Holger Blasum, Bruno Langenstein, Werner Stephan, Yakoub Nemouchi, Abderrahmane Feliachi, Burkhart Wolff, Julien Schmaltz:
Formal Specification of a Generic Separation Kernel. Arch. Formal Proofs 2014 (2014) - 2012
- [c38]Lassaad Cheikhrouhou, Werner Stephan, Özgür Dagdelen, Marc Fischlin, Markus Ullmann:
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE. Sicherheit 2012: 83-94
2000 – 2009
- 2008
- [c37]Lassaad Cheikhrouhou, Andreas Nonnengart, Werner Stephan, Frank Koob, Georg Rock:
Automating Interactive Protocol Verification. KI 2008: 30-37 - 2007
- [c36]Bruno Langenstein, Andreas Nonnengart, Georg Rock, Werner Stephan:
A History-based Verification of Distributed Applications. VERIFY 2007 - [c35]Bruno Langenstein, Andreas Nonnengart, Georg Rock, Werner Stephan:
Verification of Distributed Applications. SAFECOMP 2007: 315-328 - 2006
- [c34]Werner Stephan:
Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline. FM 2006: 587-591 - [c33]Lassaad Cheikhrouhou, Georg Rock, Werner Stephan, Matthias Schwan, Gunter Lassmann:
Verifying a Chipcard-Based Biometric Identification Protocol in VSE. SAFECOMP 2006: 42-56 - 2005
- [c32]Dieter Hutter, Werner Stephan:
A Portrait of a Scientist: Logic, AI and Politics. Mechanizing Mathematical Reasoning 2005: 1-13 - [c31]Werner Stephan, Bruno Langenstein, Andreas Nonnengart, Georg Rock:
Verification Support Environment. Mechanizing Mathematical Reasoning 2005: 476-493 - [e3]Dieter Hutter, Werner Stephan:
Mechanizing Mathematical Reasoning, Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 2605, Springer 2005, ISBN 3-540-25051-4 [contents] - 2004
- [e2]Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann:
Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Lecture Notes in Computer Science 2802, Springer 2004, ISBN 3-540-20887-9 [contents] - 2003
- [c30]Dieter Hutter, Werner Stephan, Markus Ullmann:
Security and Privacy in Pervasive Computing State of the Art and Future Directions. SPC 2003: 285-289 - 2002
- [c29]Andreas Nonnengart, Georg Rock, Werner Stephan:
Formal Requirements Engineering Using Observer Models. FASE 2002: 264-278 - 2001
- [c28]Andreas Nonnengart, Georg Rock, Werner Stephan:
Using Hybrid Automata to Express Realtime Properties in VSE-II. FLAIRS 2001: 640-644 - [c27]Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan:
Towards Secure Mobile Multiagent Based Electronic Marketplace Systems. SEMAS 2001: 59-76 - 2000
- [j2]Dieter Hutter, Bruno Langenstein, Georg Rock, Jörg H. Siekmann, Werner Stephan, Roland Vogt:
Formal software development in the Verification Support Environment (VSE). J. Exp. Theor. Artif. Intell. 12(4): 383-406 (2000) - [j1]Serge Autexier, Dieter Hutter, Bruno Langenstein, Heiko Mantel, Georg Rock, Axel Schairer, Werner Stephan, Roland Vogt, Andreas Wolpers:
VSE: formal methods meet industrial needs. Int. J. Softw. Tools Technol. Transf. 3(1): 66-77 (2000) - [c26]Werner Stephan, Georg Rock, Michael Brodski:
Modeling Specification and Verification of an Emergency Closing System. FLAIRS 2000: 356-360 - [c25]Dieter Hutter, Georg Rock, Jörg H. Siekmann, Werner Stephan, Roland Vogt:
Formal Software Development in the Verification Support Environment (VSE). FLAIRS 2000: 367-376
1990 – 1999
- 1999
- [c24]Georg Rock, Werner Stephan, Andreas Wolpers:
Modeling Dynamic Processes in TLA. FBT 1999: 185-192 - [e1]Dieter Hutter, Werner Stephan, Paolo Traverso, Markus Ullmann:
Applied Formal Methods - FM-Trends 98, International Workshop on Current Trends in Applied Formal Method, Boppard, Germany, October 7-9, 1998, Proceedings. Lecture Notes in Computer Science 1641, Springer 1999, ISBN 3-540-66462-9 [contents] - 1998
- [c23]Georg Rock, Werner Stephan, Andreas Wolpers:
Assumption-Commitment Specifications and Safety-Critical Systems. FBT 1998: 125-135 - [c22]Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel:
VSE: Controlling the Complexity in Formal Software Developments. FM-Trends 1998: 351-358 - [c21]Serge Autexier, Heiko Mantel, Werner Stephan:
Simultaneous Quantifier Elimination. KI 1998: 141-152 - [c20]Georg Rock, Werner Stephan, Andreas Wolpers:
Modular reasoning about structured TLA specifications. Tool Support for System Specification, Development and Verification 1998: 217-229 - 1997
- [c19]Georg Rock, Werner Stephan, Andreas Wolpers:
Tool Support for the Compositional Development of Distributed Systems. FBT 1997: 89-98 - [c18]Susanne Biundo, Werner Stephan:
System Assistance in Structured Domain Model Development. IJCAI 1997: 1240-1245 - 1996
- [c17]Werner Stephan, Susanne Biundo:
Deduction-Based Refinement Planning. AIPS 1996: 213-220 - [c16]Susanne Biundo, Werner Stephan:
Modeling Planning Domains Systematically. ECAI 1996: 599-603 - [c15]Dieter Hutter, Bruno Langenstein, Claus Sengler, Jörg H. Siekmann, Werner Stephan, Andreas Wolpers:
Deduction in the Verification Support Environment (VSE). FME 1996: 268-286 - 1995
- [c14]Werner Stephan, Susanne Biundo:
Multilevel Refinement Planning in an Interval-Based Temporal Logic. EPIA 1995: 483-487 - 1993
- [c13]Werner Stephan, Susanne Biundo:
A New Logical framework for Deductive Planning. IJCAI 1993: 32-38 - [c12]Werner Stephan, Andreas Wolpers:
A Calculus for Higher Order Procedures with Global Variables. MFCS 1993: 714-723 - [c11]Werner Stephan, Susanne Biundo:
A New Logical Framework for deductive Planning. PuK 1993: 27-38 - [c10]Rainer Drexler, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Werner Stephan, Andreas Wolpers:
The KIV System: A Tool for Formal Program Development. STACS 1993: 704-705 - [c9]Markus Ullmann, H. Hauff, D. Loevenich, P. Kejwal, R. Förster, P. Baur, Wolfgang Reif, Werner Stephan, Andreas Wolpers, Jürgen Cleve, Dieter Hutter, Claus Sengler, E. Canver:
VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. VIS 1993: 175-190 - 1990
- [c8]Maritta Heisel, Wolfgang Reif, Werner Stephan:
Tactical Theorem Proving in Program Verification. CADE 1990: 117-131
1980 – 1989
- 1989
- [c7]Maritta Heisel, Wolfgang Reif, Werner Stephan:
A Dynamic Logic for Program Verification. Logic at Botik 1989: 134-145 - [c6]Maritta Heisel, Wolfgang Reif, Werner Stephan:
Machine-Assisted Program Construction and Modification. GWAI 1989: 338-347 - 1988
- [c5]Maritta Heisel, Wolfgang Reif, Werner Stephan:
Implementing Verification Strategies in the KIV-System. CADE 1988: 131-140 - 1987
- [c4]Maritta Heisel, Wolfgang Reif, Werner Stephan:
Program Verification Using Dynamic Logic. CSL 1987: 102-117 - [c3]Maritta Heisel, Wolfgang Reif, Werner Stephan:
Program Verification by Symbolic Execution and Induction. GWAI 1987: 201-210 - 1986
- [c2]Reiner Hähnle, Maritta Heisel, Wolfgang Reif, Werner Stephan:
An Interactive Verification System Based on Dynamic Logic. CADE 1986: 306-315 - 1982
- [b1]Werner Stephan:
Ein allgemeiner Ansatz zum Nachweis der Äquivalenz von denotationaler und operationaler Semantik bei Programmiersprachen. Karlsruhe Institute of Technology, Germany, 1982, pp. 1-162
1970 – 1979
- 1978
- [c1]Werner Stephan, Jörg H. Siekmann:
Completeness and Soundness of the Connection Graph Proof. AISB/GI (ECAI) 1978: 340-344
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint