default search action
Ulrich Ultes-Nitsche
Person information
- affiliation: University of Fribourg, Switzerland
- affiliation: University of Southampton, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Christophe Stammet, Ulrich Ultes-Nitsche, Andreas Fischer:
Universality of Büchi Automata: Analysis With Graph Neural Networks. IEEE Access 11: 140993-141007 (2023) - 2022
- [i2]Christophe Stammet, Prisca Dotti, Ulrich Ultes-Nitsche, Andreas Fischer:
Analyzing Büchi Automata with Graph Neural Networks. CoRR abs/2206.09619 (2022)
2010 – 2019
- 2018
- [c46]Joël D. Allred, Ulrich Ultes-Nitsche:
A Simple and Optimal Complementation Algorithm for Büchi Automata. LICS 2018: 46-55 - 2014
- [c45]Nayla Sokhn, Richard Baltensperger, Louis-Félix Bersier, Ulrich Ultes-Nitsche, Jean Hennebert:
Structure Comparison of Binary and Weighted Niche-Overlap Graphs. CompleNet 2014: 119-127 - 2013
- [c44]Nayla Sokhn, Richard Baltensperger, Louis-Félix Bersier, Ulrich Ultes-Nitsche, Jean Hennebert:
Structural Network Properties of Niche-Overlap Graphs. SITIS 2013: 478-482 - 2012
- [j12]Joël Allred, Ulrich Ultes-Nitsche:
k-counting automata. RAIRO Theor. Informatics Appl. 46(4): 461-478 (2012) - [c43]Nayla Sokhn, Richard Baltensperger, Louis-Félix Bersier, Jean Hennebert, Ulrich Ultes-Nitsche:
Identification of Chordless Cycles in Ecological Networks. Complex 2012: 316-324 - [e8]Rudolf Freund, Markus Holzer, Bianca Truthe, Ulrich Ultes-Nitsche:
Fourth Workshop on Non-Classical Models for Automata and Applications - NCMA 2012, Fribourg, Switzerland, August 23-24, 2012. Proceedings. books@ocg.at 290, Österreichische Computer Gesellschaft 2012, ISBN 978-3-85403-290-8 [contents] - 2011
- [c42]Endre Bangerter, Stephan Krenn, Matrial Seifriz, Ulrich Ultes-Nitsche:
cPLC - A Cryptographic Programming Language and Compiler. ISSA 2011 - [c41]Ulrich Ultes-Nitsche, Joël Allred:
k-Counting Automata. NCMA 2011: 37-50 - 2010
- [j11]Ulrich Ultes-Nitsche:
Web 3.0 - Wohin geht es mit dem World Wide Web? Grundlagen zum Social Semantic Web. HMD Prax. Wirtsch. 271: 6-12 (2010)
2000 – 2009
- 2009
- [c40]Carolin Latze, Andreas Ruppen, Ulrich Ultes-Nitsche:
A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme. ISSA 2009: 379-392 - [e7]Daniel Moldt, Juan Carlos Augusto, Ulrich Ultes-Nitsche:
Modelling, Simulation, Verification and Validation of Enterprise Information Systems, Proceedings of the 7th International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS-2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009. INSTICC PRESS 2009, ISBN 978-989-8111-90-6 [contents] - 2008
- [c39]Ronny Standtke, Ulrich Ultes-Nitsche:
Java Nio Framework - Introducing a High-Performance I/O Framework for Java. ICSOFT (PL/DPS/KE) 2008: 206-211 - [c38]Christoph Ehret, Ulrich Ultes-Nitsche:
Immune System Based Intrusion Detection System. ISSA 2008: 1-12 - [c37]Carolin Latze, Ulrich Ultes-Nitsche:
A Proof-of-Concept Implementation of EAP-TLS with TPM Support. ISSA 2008: 1-12 - [c36]Carolin Latze, Ulrich Ultes-Nitsche, Florian Baumgartner:
Towards a zero configuration authentication scheme for 802.11 based networks. LCN 2008: 367-373 - [c35]Thierry Nicola, Ulrich Ultes-Nitsche:
Weakly Continuation Closed Homomorphisms on Automata. MSVVEIS 2008: 39-48 - [c34]Thierry Nicola, Frank Nießner, Ulrich Ultes-Nitsche:
Checking Inherently Fair Linear-Time Properties in a Non-Naïve Way. MSVVEIS 2008: 49-58 - [e6]Ulrich Ultes-Nitsche, Daniel Moldt, Juan Carlos Augusto:
Modelling, Simulation, Verification and Validation of Enterprise Information Systems, Proceedings of the 6th International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS-2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008. INSTICC PRESS 2008, ISBN 978-989-8111-43-2 [contents] - 2007
- [j10]Ulrich Ultes-Nitsche:
A power-set construction for reducing Büchi automata to non-determinism degree two. Inf. Process. Lett. 101(3): 107-111 (2007) - [j9]Joseph Barjis, Juan Carlos Augusto, Ulrich Ultes-Nitsche:
Towards more adequate EIS. Sci. Comput. Program. 65(1): 1-3 (2007) - [j8]Frank Nießner, Ulrich Ultes-Nitsche:
A complete characterization of deterministic regular liveness properties. Theor. Comput. Sci. 387(2): 187-195 (2007) - [c33]Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche:
Assessment of Code Quality through Classification of Unit Tests in VeriNeC. AINA Workshops (1) 2007: 177-182 - [c32]David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche:
Improving network reliability by avoiding misconfiguration. DRCN 2007: 1-8 - [e5]Juan Carlos Augusto, Joseph Barjis, Ulrich Ultes-Nitsche:
Modelling, Simulation, Verification and Validation of Enterprise Information Systems, Proceedings of the 5th International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS-2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007. INSTICC PRESS 2007, ISBN 978-972-8865-95-5 [contents] - 2006
- [j7]InSeon Yoo, Ulrich Ultes-Nitsche:
Non-signature based virus detection. J. Comput. Virol. 2(3): 163-186 (2006) - [c31]Frank Nießner, Ulrich Ultes-Nitsche:
A Complete Characterization of Deterministic Regular Liveness Properties. DCFS 2006: 211-222 - [c30]Torsten Braun, Christoph Graf, Ulrich Ultes-Nitsche, Aurelius Baier, Thomas Bernoulli:
Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project. ISSA 2006: 1-10 - [c29]Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche:
Testing of Semantic Properties in XML Documents. MSVVEIS 2006: 38-46 - [c28]David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche:
Environmental Acquisition in Mobile Network Simulation. WINSYS 2006: 108-113 - [e4]Joseph Barjis, Ulrich Ultes-Nitsche, Juan Carlos Augusto:
Modelling, Simulation, Verification and Validation of Enterprise Information Systems, Proceedings of the 4th International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006. INSTICC Press 2006, ISBN 978-972-8865-49-8 [contents] - 2005
- [c27]David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche:
Automated configuration distribution in verinec. ICETE 2005: 304-309 - [c26]Thierry Nicola, Frank Nießner, Ulrich Ultes-Nitsche:
Model-checking Inherently Fair Linear-time Properties. MSVVEIS 2005: 3-8 - [c25]Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche:
A Unit Testing Framework for Network Configurations. MSVVEIS 2005: 77-82 - [e3]Ulrich Ultes-Nitsche, Juan Carlos Augusto, Joseph Barjis:
Modelling, Simulation, Verification and Validation of Enterprise Information Systems, Proceedings of the 3rd International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS 2005, In conjunction with ICEIS 2005, Miami, FL, USA, May 2005. INSTICC Press 2005, ISBN 972-8865-22-8 [contents] - 2004
- [j6]Michael Leuschel, Andreas Podelski, C. R. Ramakrishnan, Ulrich Ultes-Nitsche:
Introduction to the Special Issue on Verification and Computational Logic. Theory Pract. Log. Program. 4(5-6): 543-544 (2004) - [c24]InSeon Yoo, Ulrich Ultes-Nitsche:
Towards Run-Time Protocol Anomaly Detection and Verification. ICETE (2) 2004: 299-304 - [c23]InSeon Yoo, Ulrich Ultes-Nitsche:
How to predict e-mail viruses under uncertainty. IPCCC 2004: 675-679 - [c22]Ulrich Ultes-Nitsche:
Run-Time Protocol Conformance Verification In Firewalls. ISSA 2004: 1-11 - [e2]Juan Carlos Augusto, Ulrich Ultes-Nitsche:
Verification and Validation of Enterprise Information Systems, Proceedings of the 2nd International Workshop on Verification and Validation of Enterprise Information Systems, VVEIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004. INSTICC Press 2004, ISBN 972-8865-03-1 [contents] - 2003
- [j5]Ulrich Ultes-Nitsche, Simon St. James:
Improved verification of linear-time properties within fairness: weakly continuation-closed behaviour abstractions computed from trace reductions. Softw. Test. Verification Reliab. 13(4): 241-255 (2003) - [c21]Simon St. James, Ulrich Ultes-Nitsche:
An Optimised Partial-Order Approach to the Verification of System Components. NDDL/VVEIS 2003: 69-81 - [e1]Pedro T. Isaías, Florence Sèdes, Juan Carlos Augusto, Ulrich Ultes-Nitsche:
New Technologies for Information Systems, Proceedings of the 3rd International Workshop on New Developments in Digital Libraries, NDDL 2003, and the 1st International Workshop on Validation and Verification of Software for Enterprise Information Systems, VVEIS 2003, In conjunction with ICEIS 2003, Angers, France, April 2003. ICEIS Press 2003, ISBN 972-98816-2-6 [contents] - 2002
- [c20]Simon R. Chudley, Ulrich Ultes-Nitsche:
Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. ISSA 2002: 1-11 - [c19]Ulrich Ultes-Nitsche, InSeon Yoo:
An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. ISSA 2002: 1-12 - [c18]Ulrich Ultes-Nitsche:
Do We Need Liveness? - Approximation of Liveness Properties by Safety Properties. SOFSEM 2002: 279-288 - 2001
- [c17]Ulrich Ultes-Nitsche, Simon St. James:
Testing Liveness Properties: Approximating Liveness Properties by Safety Properties. FORTE 2001: 369-376 - [c16]Simon St. James, Ulrich Ultes-Nitsche:
Computing property-preserving behaviour abstractions from trace reductions: abstraction-based verification of linear-time properties under fairness. PODC 2001: 238-245 - [i1]Ulrich Ultes-Nitsche, Pierre Wolper:
Checking Properties within Fairness and Behavior Abstractions. CoRR cs.LO/0101017 (2001) - 2000
- [c15]Ulrich Ultes-Nitsche, Stephanie Teufel:
Secure Access to Medical Data over the Internet. ECIS 2000: 1331-1340 - [c14]Ulrich Ultes-Nitsche:
Satisfaction up to Liveness. FORTE 2000: 237-248
1990 – 1999
- 1999
- [c13]Eleanor Hepworth, Ulrich Ultes-Nitsche:
Security aspects of a Java-servlet-based web-hosted e-mail system. Conference on Information Security Management & Small Systems Security 1999: 117-130 - [c12]Ulrich Ultes-Nitsche:
A Persistent-Set Approach to Abstract Stat-Space Construction in Verification. SOFSEM 1999: 470-478 - 1998
- [b1]Ulrich Nitsche:
Verification of co-operating-systems and behaviour abstraction. Goethe University Frankfurt, Frankfurt am Main, Germany, 1998, ISBN 978-3-88457-331-0, pp. 1-106 - [j4]Peter Ochsenschläger, Jürgen Repp, Roland Rieke, Ulrich Nitsche:
The SH-Verification Tool - Abstraction-Based Verification of Co-operating Systems. Formal Aspects Comput. 10(4): 381-404 (1998) - [j3]Ulrich Ultes-Nitsche:
Application of formal verification and behaviour abstraction to the service interaction problem in intelligent networks. J. Syst. Softw. 40(3): 227-248 (1998) - [c11]Ulrich Nitsche:
On the Border of Universality and Non-Universality in Restricted High-Level Petri Nets. MCU (2) 1998: 169-181 - [c10]Othmar Morger, Ulrich Nitsche, Stephanie Teufel:
Privacy and Efficiency in Patient Focused Health Care Processes. MedInfo 1998: 1143-1147 - [c9]Ulrich Ultes-Nitsche:
Towards the Construction of an Abstract State-Space from a Partial-Order Representation of the Concrete One. MFCS Workshop on Concurrency 1998: 223-239 - 1997
- [c8]Othmar Morger, Ulrich Nitsche, Stephanie Teufel:
Security Concerns for Mobile Information Systems in Health Care. DEXA Workshop 1997: 312-317 - [c7]Frank Nießner, Ulrich Nitsche, Peter Ochsenschläger:
Deterministic omega-regular liveness properties. Developments in Language Theory 1997: 237-248 - [c6]Ulrich Nitsche:
Interpretation of the Full Computation Tree Logic CTL* on Sets of Infinite Sequences. LFCS 1997: 276-282 - [c5]Ulrich Nitsche, Pierre Wolper:
Relative Liveness and Behavior Abstraction (Extended Abstract). PODC 1997: 45-52 - 1996
- [j2]Ulrich Nitsche, Peter Ochsenschläger:
Approximaely Satisfied Properties of Systems and Simple Language Homomorphisms. Inf. Process. Lett. 60(4): 201-206 (1996) - [j1]Ulrich Nitsche:
Verification and behavior abstraction towards a tractable verification technique for large distributed systems. J. Syst. Softw. 33(3): 273-285 (1996) - [c4]Carla Capellmann, Ralph Demant, Farhad Fatahi-Vanani, Rafael Galvez-Estrada, Ulrich Nitsche, Peter Ochsenschläger:
Verification by Behaviour Abstraction - A Case Study of Service Interaction Detection in Intelligent Telephone Networks. CAV 1996: 466-469 - 1995
- [c3]Ulrich Nitsche:
A Finitary-Language Semantics for Propositional Linear Temporal Logic. Developments in Language Theory 1995: 482-489 - 1994
- [c2]Ulrich Nitsche:
Propositional Linear Temporal Logic and Language Homomorphisms. LFCS 1994: 265-277 - [c1]Ulrich Nitsche:
A Verification Method Based on Homomorphic Model Abstractions (Abstract). PODC 1994: 393
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint