Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Flemming Nielson - MaRDI portal

Flemming Nielson

From MaRDI portal
Person:444502

Available identifiers

zbMath Open nielson.flemmingWikidataQ25927688 ScholiaQ25927688MaRDI QIDQ444502

List of research outcomes

PublicationDate of PublicationType
Lightweight information flow2024-02-23Paper
Multi-valued logic for static analysis and model checking2023-08-02Paper
Process-local static analysis of synchronous processes2023-05-26Paper
Factorization of behavioral integrity2022-08-19Paper
Static and dynamic processor allocation for higher-order concurrent languages2022-08-18Paper
Constraints for polymorphic behaviours of concurrent ML2022-08-16Paper
Benign interaction of security domains2022-07-13Paper
Static analysis for proactive security2022-02-16Paper
Semantics-directed program analysis: A tool-maker's perspective2022-02-16Paper
Formal Methods2021-11-16Paper
Disjunctive Information Flow for Communicating Processes2021-04-07Paper
https://portal.mardi4nfdi.de/entity/Q49658122021-03-10Paper
https://portal.mardi4nfdi.de/entity/Q49639122021-02-24Paper
Model Checking Exact Cost for Attack Scenarios2020-08-03Paper
Secure Guarded Commands2020-07-20Paper
Information Flow for Timed Automata2020-02-24Paper
Secure information release in timed automata2019-09-16Paper
A parametric abstract domain for lattice-valued regular expressions2018-08-27Paper
A monotone framework for CCS2018-05-16Paper
Systematic realisation of control flow analyses for CML2017-08-21Paper
https://portal.mardi4nfdi.de/entity/Q29809742017-05-08Paper
Discovering, quantifying, and displaying attacks2017-04-11Paper
Content dependent information flow control2017-02-22Paper
Enforcing Availability in Failure-Aware Communicating Systems2016-10-19Paper
Hoare Logic for Disjunctive Information Flow2016-01-08Paper
Modal abstractions of concurrent behavior2015-09-17Paper
Discretionary Information Flow Control for Interaction-Oriented Specifications2015-09-14Paper
A calculus of quality for robustness against unreliable communication2015-08-21Paper
Stochastic Model Checking of the Stochastic Quality Calculus2015-06-22Paper
Shape analysis for mobile ambients2015-03-17Paper
Flow Logic for Process Calculi2014-08-13Paper
Active Evaluation Contexts for Reaction Semantics2013-12-13Paper
Heuristics for Safety and Security Constraints2013-12-06Paper
https://portal.mardi4nfdi.de/entity/Q28498532013-09-20Paper
XACML 3.0 in Answer Set Programming2013-09-13Paper
Safety versus Security in the Quality Calculus2013-08-16Paper
Lazy Mobile Intruders2013-08-06Paper
REACHABILITY FOR FINITE-STATE PROCESS ALGEBRAS USING HORN CLAUSES2013-07-30Paper
Cryptographic Analysis in Cubic Time2013-07-24Paper
Bisimulations Meet PCTL Equivalences for Probabilistic Automata2013-06-24Paper
Efficient CSL Model Checking Using Stratification2012-08-15Paper
Static analysis of IMC2012-08-14Paper
\textsf{CaPiTo}: Protocol stacks for services2011-10-18Paper
Reachability for Finite-State Process Algebras Using Static Analysis2011-10-07Paper
Automata-Based CSL Model Checking2011-07-07Paper
From flow logic to static type systems for coordination languages2010-04-29Paper
Model Checking Is Static Analysis of Modal Logic2010-04-27Paper
What is a free name in a process algebra?2010-03-24Paper
Static analysis of topology-dependent broadcast networks2010-02-26Paper
Foundations of Security Analysis and Design II2009-05-14Paper
A Scalable Inclusion Constraint Solver Using Unification2009-01-22Paper
Pathway analysis for BioAmbients2008-11-06Paper
Topology-Dependent Abstractions of Broadcast Networks2008-09-18Paper
Relational Analysis of Correlation2008-08-28Paper
Modal Abstractions of Concurrent Behaviour2008-08-28Paper
Iterative Specialisation of Horn Clauses2008-04-11Paper
Tools and Algorithms for the Construction and Analysis of Systems2007-09-28Paper
Types from Control Flow Analysis2007-09-24Paper
Data Flow Analysis for CCS2007-09-24Paper
Semantics with applications: an appetizer.2007-06-07Paper
Static Analysis2005-08-24Paper
https://portal.mardi4nfdi.de/entity/Q46712192005-04-26Paper
https://portal.mardi4nfdi.de/entity/Q46547262005-03-08Paper
https://portal.mardi4nfdi.de/entity/Q47383602004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44378072003-12-15Paper
https://portal.mardi4nfdi.de/entity/Q44303112003-10-20Paper
Abstract interpretation of mobile ambients.2003-08-07Paper
https://portal.mardi4nfdi.de/entity/Q44147322003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44119482003-07-13Paper
https://portal.mardi4nfdi.de/entity/Q47904112003-06-02Paper
Static analysis for the \(\pi\)-calculus with applications to security2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q47790982002-11-24Paper
Validating firewalls using flow logics2002-07-15Paper
https://portal.mardi4nfdi.de/entity/Q27636772002-01-21Paper
https://portal.mardi4nfdi.de/entity/Q27290572001-11-06Paper
https://portal.mardi4nfdi.de/entity/Q27481552001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q45057012001-09-04Paper
https://portal.mardi4nfdi.de/entity/Q44943782000-08-10Paper
Using transformations in the implementation of higher-order functions2000-02-09Paper
Strictness and totality analysis2000-01-04Paper
https://portal.mardi4nfdi.de/entity/Q42555911999-08-18Paper
https://portal.mardi4nfdi.de/entity/Q42229381999-01-06Paper
Behavior analysis for validating communication patterns1998-01-01Paper
Type and behaviour reconstruction for higher-order concurrent programs1997-09-29Paper
From CML to its process algebra1997-02-27Paper
https://portal.mardi4nfdi.de/entity/Q48955441996-10-14Paper
The tensor product in Wadler's analysis of lists1994-07-21Paper
Bounded Fixed-Point Iteration1993-06-29Paper
https://portal.mardi4nfdi.de/entity/Q40386681993-05-18Paper
Two-Level Functional Languages1993-01-23Paper
https://portal.mardi4nfdi.de/entity/Q40238281993-01-23Paper
Functional completeness of the mixed \(\lambda\)-calculus and combinatory logic1990-01-01Paper
Two-level semantics and abstract interpretation1989-01-01Paper
Two-level semantics and code generation1988-01-01Paper
Strictness analysis and denotational abstract interpretation1988-01-01Paper
Automatic binding time analysis for a typed \(\lambda\)-calculus1988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37098541986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37098821986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37135601986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37135641986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37181281986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37181321986-01-01Paper
Program transformations in a denotational setting1985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33165591983-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36644061983-01-01Paper
A denotational framework for data flow analysis1982-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Flemming Nielson