default search action
Harald Ruess
Person information
- affiliation: fortiss, Munich, Germany
- affiliation (former): SRI International, Menlo Park, California, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Harald Ruess:
A Decision Method for First-Order Stream Logic. IJCAR (2) 2024: 137-156 - [i27]Harald Ruess:
Causal Stream Inclusions. CoRR abs/2401.00164 (2024) - [i26]Harald Ruess:
A Decision Method for Elementary Stream Calculus. CoRR abs/2401.02239 (2024) - [i25]Chih-Hong Cheng, Changshun Wu, Harald Ruess, Xingyu Zhao, Saddek Bensalem:
Formal Specification, Assessment, and Enforcement of Fairness for Generative AIs. CoRR abs/2404.16663 (2024) - [i24]Xin Ye, Harald Ruess:
Efficient Reactive Synthesis. CoRR abs/2404.17834 (2024) - [i23]Harald Ruess:
Fairness Analysis with Shapley-Owen Effects. CoRR abs/2409.19318 (2024) - 2023
- [c58]Harald Ruess:
The Next Big Thing: From Embedded Systems to Embodied Actors. FM 2023: 10-25 - [c57]Chih-Hong Cheng, Harald Ruess, Konstantinos Theodorou:
Safety Performance of Neural Networks in the Presence of Covariate Shift. VSTTE 2023: 20-30 - [i22]Harald Ruess, Natarajan Shankar:
Evidential Transactions with Cyberlogic. CoRR abs/2304.00060 (2023) - [i21]Chih-Hong Cheng, Changshun Wu, Harald Ruess, Saddek Bensalem:
Towards Rigorous Design of OoD Detectors. CoRR abs/2306.08447 (2023) - [i20]Chih-Hong Cheng, Harald Ruess, Konstantinos Theodorou:
Safety Performance of Neural Networks in the Presence of Covariate Shift. CoRR abs/2307.12716 (2023) - 2022
- [i19]Harald Ruess:
Systems Challenges for Trustworthy Embodied Systems. CoRR abs/2201.03413 (2022) - [i18]Harald Rueß, Simon Burton:
Safe AI - How is this Possible? CoRR abs/2201.10436 (2022) - 2021
- [c56]Vivek Nigam, Giselle Reis, Samar Rahmouni, Harald Ruess:
Proof Search and Certificates for Evidential Transactions. CADE 2021: 234-251 - 2020
- [i17]Alexander Sagel, Amit Sahu, Stefan Matthes, Holger Pfeifer, Tianming Qiu, Harald Rueß, Hao Shen, Julian Wörmann:
Knowledge as Invariance - History and Perspectives of Knowledge-augmented Machine Learning. CoRR abs/2012.11406 (2020) - [i16]Yuri Gil Dantas, Vivek Nigam, Harald Ruess:
Security Engineering for ISO 21434. CoRR abs/2012.15080 (2020)
2010 – 2019
- 2019
- [c55]Antoaneta Kondeva, Vivek Nigam, Harald Ruess, Carmen Cârlan:
On Computer-Aided Techniques for Supporting Safety and Security Co-Engineering. ISSRE Workshops 2019: 346-353 - 2018
- [c54]Chih-Hong Cheng, Frederik Diehl, Gereon Hinz, Yassine Hamza, Georg Nührenberg, Markus Rickert, Harald Ruess, Michael Truong-Le:
Neural networks for safety-critical applications - Challenges, experiments and perspectives. DATE 2018: 1005-1006 - [c53]Tewodros A. Beyene, Harald Ruess:
Evidential and Continuous Integration of Software Verification Tools. FM 2018: 679-685 - [c52]Chih-Hong Cheng, Georg Nührenberg, Chung-Hao Huang, Harald Ruess, Hirotoshi Yasuoka:
Towards Dependability Metrics for Neural Networks. MEMOCODE 2018: 43-46 - [c51]Chih-Hong Cheng, Georg Nührenberg, Chung-Hao Huang, Harald Ruess:
Verification of Binarized Neural Networks via Inter-neuron Factoring - (Short Paper). VSTTE 2018: 279-290 - [i15]Chih-Hong Cheng, Georg Nührenberg, Chung-Hao Huang, Harald Ruess, Hirotoshi Yasuoka:
Towards Dependability Metrics for Neural Networks. CoRR abs/1806.02338 (2018) - [i14]Vivek Nigam, Alexander Pretschner, Harald Ruess:
Model-Based Safety and Security Engineering. CoRR abs/1810.04866 (2018) - 2017
- [c50]Chih-Hong Cheng, Yassine Hamza, Harald Ruess:
Automated Analysis of Multi-View Software Architectures. APSEC 2017: 725-730 - [c49]Chih-Hong Cheng, Georg Nührenberg, Harald Ruess:
Maximum Resilience of Artificial Neural Networks. ATVA 2017: 251-268 - [c48]Chih-Hong Cheng, Edward A. Lee, Harald Ruess:
autoCode4: Structural Controller Synthesis. TACAS (1) 2017: 398-404 - [i13]Chih-Hong Cheng, Yassine Hamza, Harald Ruess:
Automated Analysis of Multi-View Software Architectures. CoRR abs/1704.07097 (2017) - [i12]Chih-Hong Cheng, Georg Nührenberg, Harald Ruess:
Maximum Resilience of Artificial Neural Networks. CoRR abs/1705.01040 (2017) - [i11]Chih-Hong Cheng, Frederik Diehl, Yassine Hamza, Gereon Hinz, Georg Nührenberg, Markus Rickert, Harald Ruess, Michael Truong-Le:
Neural Networks for Safety-Critical Applications - Challenges, Experiments and Perspectives. CoRR abs/1709.00911 (2017) - [i10]Chih-Hong Cheng, Georg Nührenberg, Harald Ruess:
Verification of Binarized Neural Networks. CoRR abs/1710.03107 (2017) - 2016
- [c47]Chih-Hong Cheng, Yassine Hamza, Harald Ruess:
Structural Synthesis for GXW Specifications. CAV (1) 2016: 95-117 - [c46]Lacramioara Astefanoaei, Saddek Bensalem, Marius Bozga, Chih-Hong Cheng, Harald Ruess:
Compositional Parameter Synthesis. FM 2016: 60-68 - [c45]Carmen Cârlan, Tewodros A. Beyene, Harald Ruess:
Integrated Formal Methods for Constructing Assurance Cases. ISSRE Workshops 2016: 221-228 - [c44]Martin Hofmann, Christian Neukirchen, Harald Rueß:
Certification for μ-Calculus with Winning Strategies. SPIN 2016: 111-128 - [i9]Chih-Hong Cheng, Yassine Hamza, Harald Ruess:
Structural Synthesis for GXW Specifications. CoRR abs/1605.01153 (2016) - 2015
- [c43]Harald Rueß, Stefano Tonetta:
Distributed MILS (D-MILS) Specification, Analysis, Deployment, and Assurance of Distributed Critical Systems. MILS@HiPEAC 2015 - 2014
- [c42]Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann:
G4LTL-ST: Automatic Generation of PLC Programs. CAV 2014: 541-549 - [c41]Denis Bytschkow, Jean Quilbeuf, Georgeta Igna, Harald Ruess:
Distributed MILS Architectural Approach for Secure Smart Grids. SmartGridSec 2014: 16-29 - [i8]Martin Hofmann, Harald Ruess:
Certification for mu-calculus with winning strategies. CoRR abs/1401.1693 (2014) - [i7]Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann:
G4LTL-ST: Automatic Generation of PLC Programs. CoRR abs/1405.2409 (2014) - 2013
- [c40]Chih-Hong Cheng, Harald Ruess, Natarajan Shankar:
JBernstein: A Validity Checker for Generalized Polynomial Constraints. CAV 2013: 656-661 - [i6]Chih-Hong Cheng, Natarajan Shankar, Harald Ruess, Saddek Bensalem:
EFSMT: A Logical Framework for Cyber-Physical Systems. CoRR abs/1306.3456 (2013) - [i5]Jan Olaf Blech, Harald Rueß, Bernhard Schätz:
On Behavioral Types for OSGi: From Theory to Implementation. CoRR abs/1306.6115 (2013) - [i4]Jean Quilbeuf, Georgeta Igna, Denis Bytschkow, Harald Ruess:
Security policies for distributed systems. CoRR abs/1310.3723 (2013) - 2012
- [c39]Chih-Hong Cheng, Rongjie Yan, Harald Ruess, Saddek Bensalem:
Distributed priority synthesis using knowledge. AGERE!@SPLASH 2012: 129-132 - [c38]Chih-Hong Cheng, Michael Geisinger, Harald Ruess, Christian Buckl, Alois C. Knoll:
MGSyn: Automatic Synthesis for Industrial Automation. CAV 2012: 658-664 - [c37]Chih-Hong Cheng, Michael Geisinger, Harald Ruess, Christian Buckl, Alois C. Knoll:
Game solving for industrial automation and control. ICRA 2012: 4367-4372 - [c36]Jan Olaf Blech, Yliès Falcone, Harald Rueß, Bernhard Schätz:
Behavioral Specification Based Runtime Monitors for OSGi Services. ISoLA (1) 2012: 405-419 - [c35]Chih-Hong Cheng, Rongjie Yan, Saddek Bensalem, Harald Ruess:
Distributed Priority Synthesis. SSV 2012: 57-72 - 2011
- [c34]Chih-Hong Cheng, Saddek Bensalem, Yu-Fang Chen, Rongjie Yan, Barbara Jobstmann, Harald Ruess, Christian Buckl, Alois C. Knoll:
Algorithms for Synthesizing Priorities in Component-Based Systems. ATVA 2011: 150-167 - [c33]Chih-Hong Cheng, Saddek Bensalem, Barbara Jobstmann, Rongjie Yan, Alois C. Knoll, Harald Ruess:
Model Construction and Priority Synthesis for Simple Interaction Systems. NASA Formal Methods 2011: 466-471 - [c32]Chih-Hong Cheng, Harald Rueß, Alois C. Knoll, Christian Buckl:
Synthesis of Fault-Tolerant Embedded Systems Using Games: From Theory to Practice. VMCAI 2011: 118-133 - [i3]Chih-Hong Cheng, Saddek Bensalem, Yu-Fang Chen, Rongjie Yan, Barbara Jobstmann, Harald Ruess, Christian Buckl, Alois C. Knoll:
Algorithms for Synthesizing Priorities in Component-based Systems. CoRR abs/1107.1383 (2011) - [i2]Chih-Hong Cheng, Saddek Bensalem, Rongjie Yan, Harald Ruess:
Distributed Priority Synthesis and its Applications. CoRR abs/1112.1783 (2011) - 2010
- [i1]Chih-Hong Cheng, Harald Ruess, Alois C. Knoll, Christian Buckl:
A Game-theoretic Approach for Synthesizing Fault-Tolerant Embedded Systems. CoRR abs/1011.0268 (2010)
2000 – 2009
- 2008
- [c31]Michael Paulitsch, Harald Rueß, Maria Sorea:
Non-functional Avionics Requirements. ISoLA 2008: 369-384 - 2004
- [c30]Leonardo Mendonça de Moura, Sam Owre, Harald Rueß, John M. Rushby, Natarajan Shankar:
The ICS Decision Procedures for Embedded Deduction. IJCAR 2004: 218-222 - [c29]Leonardo Mendonça de Moura, Harald Rueß:
An Experimental Evaluation of Ground Decision Procedures. CAV 2004: 162-174 - [c28]Leonardo Mendonça de Moura, Sam Owre, Harald Rueß, John M. Rushby, Natarajan Shankar, Maria Sorea, Ashish Tiwari:
SAL 2. CAV 2004: 496-500 - [c27]Vu Ha, Murali Rangarajan, Darren D. Cofer, Harald Rueß, Bruno Dutertre:
Feature-Based Decomposition of Inductive Proofs Applied to Real-Time Avionics Software: An Experience Report. ICSE 2004: 304-313 - [c26]Leonardo Mendonça de Moura, Harald Rueß, Natarajan Shankar:
Justifying Equality. D/PDPAR@IJCAR 2004: 69-85 - 2003
- [c25]Leonardo Mendonça de Moura, Harald Rueß, Maria Sorea:
Bounded Model Checking and Induction: From Refutation to Verification (Extended Abstract, Category A). CAV 2003: 14-26 - [c24]Felix Klaedtke, Harald Rueß:
Monadic Second-Order Logics with Cardinalities. ICALP 2003: 681-696 - [c23]Harald Rueß, Leonardo Mendonça de Moura:
Simulation and verification I: from simulation to verification (and back). WSC 2003: 888-896 - 2002
- [c22]Leonardo Mendonça de Moura, Harald Rueß, Maria Sorea:
Lazy Theorem Proving for Bounded Model Checking over Infinite Domains. CADE 2002: 438-455 - [c21]Natarajan Shankar, Harald Rueß:
Combining Shostak Theories. RTA 2002: 1-18 - [c20]M. Oliver Möller, Harald Rueß, Maria Sorea:
Predicate Abstraction for Dense Real-Time System. Theory and Practice of Timed Systems @ ETAPS 2002: 218-237 - 2001
- [c19]Jean-Christophe Filliâtre, Sam Owre, Harald Rueß, Natarajan Shankar:
ICS: Integrated Canonizer and Solver. CAV 2001: 246-249 - [c18]Véronique Cortier, Jonathan K. Millen, Harald Rueß:
Proving Secrecy is Easy Enough. CSFW 2001: 97-108 - [c17]Harald Rueß, Natarajan Shankar:
Deconstructing Shostak. LICS 2001: 19-28 - [c16]Ashish Tiwari, Harald Rueß, Hassen Saïdi, Natarajan Shankar:
A Technique for Invariant Generation. TACAS 2001: 113-127 - 2000
- [c15]Ashish Tiwari, Leo Bachmair, Harald Rueß:
Rigid E-Unification Revisited. CADE 2000: 220-234 - [c14]Sam Owre, Harald Rueß:
Integrating WS1S with PVS. CAV 2000: 548-551 - [c13]Jonathan K. Millen, Harald Rueß:
Protocol-Independent Secrecy. S&P 2000: 110-119
1990 – 1999
- 1999
- [j1]Harald Rueß, Natarajan Shankar, Mandayam K. Srivas:
Modular Verification of SRT Division. Formal Methods Syst. Des. 14(1): 45-73 (1999) - [c12]Holger Pfeifer, Harald Rueß:
Polytypic Proof Construction. TPHOLs 1999: 55-72 - 1998
- [c11]M. Oliver Möller, Harald Rueß:
Solving Bit-Vector Equations. FMCAD 1998: 36-48 - [c10]Friedrich W. von Henke, Stephan Pfab, Holger Pfeifer, Harald Rueß:
Case Studies in Meta-Level Theorem Proving. TPHOLs 1998: 461-478 - [c9]Stephan Pfab, Harald Rueß, Sam Owre, Friedrich W. von Henke:
Towards Light-Weight Verification and Heavy-Weight Testing. Tool Support for System Specification, Development and Verification 1998: 189-200 - 1997
- [c8]David Cyrluk, M. Oliver Möller, Harald Rueß:
An Efficient Decision Procedure for the Theory of Fixed-Sized Bit-Vectors. CAV 1997: 60-71 - [c7]Mandayam K. Srivas, Harald Rueß, David Cyrluk:
Hardware Verification Using PVS. Formal Hardware Verification 1997: 156-205 - [c6]Axel Dold, Friedrich W. von Henke, Holger Pfeifer, Harald Rueß:
Formal Verification of Transformations for Peephole Optimization. FME 1997: 459-472 - [c5]Harald Rueß:
Computational Reflection in the Calculus of Constructions and its Application to Theorem Proving. TLCA 1997: 319-335 - 1996
- [c4]Friedrich W. von Henke, Marko Luther, Holger Pfeifer, Harald Rueß, Detlef Schwier, Martin Strecker, Matthias Wagner:
The TYPELAB Specification and Verification Environment. AMAST 1996: 604-607 - [c3]Harald Rueß:
Reflection of Formal Tactics in a Deductive Reflection Framework. CADE 1996: 628-642 - [c2]Harald Rueß, Natarajan Shankar, Mandayam K. Srivas:
Modular Verification of SRT Division. CAV 1996: 123-134 - [c1]Harald Rueß:
Hierarchical Verification of Two-Dimensional High-Speed Multiplication in PVS: A Case Study. FMCAD 1996: 79-93 - 1995
- [b1]Harald Rueß:
Formal meta-programming in the calculus of constructions. University of Ulm, Germany, 1995, pp. 1-176 - [p1]Friedrich W. von Henke, Axel Dold, Harald Rueß, Detlef Schwier:
Construction and Deduction Methods for the Formal Development of Software. KORSO Book 1995: 239-254
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint