Christian Schallhart
Christian Schallhart
Google
Verified email at schallhart.net - Homepage
TitleCited byYear
A brief account of runtime verification
M Leucker, C Schallhart
The Journal of Logic and Algebraic Programming 78 (5), 293-303, 2009
6622009
Runtime verification for LTL and TLTL
A Bauer, M Leucker, C Schallhart
ACM Transactions on Software Engineering and Methodology (TOSEM) 20 (4), 14, 2011
4732011
Comparing LTL semantics for runtime verification
A Bauer, M Leucker, C Schallhart
Journal of Logic and Computation 20 (3), 651-674, 2010
2072010
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
Detection of Intrusions and Malware, and Vulnerability Assessment, 174-187, 2005
1862005
Monitoring of real-time properties
A Bauer, M Leucker, C Schallhart
International Conference on Foundations of Software Technology and …, 2006
1752006
The good, the bad, and the ugly, but how ugly is ugly?
A Bauer, M Leucker, C Schallhart
International Workshop on Runtime Verification, 126-138, 2007
1162007
Secure extensible computing environment
J Thoma, S Murphy, C Schallhart
US Patent App. 10/041,772, 2002
962002
OXPath: A language for scalable data extraction, automation, and crawling on the deep web
T Furche, G Gottlob, G Grasso, C Schallhart, A Sellers
The VLDB Journal—The International Journal on Very Large Data Bases 22 (1 …, 2013
902013
14 tools for test case generation
A Belinfante, L Frantzen, C Schallhart
Model-Based Testing of Reactive Systems, 391-438, 2005
702005
DIADEM: thousands of websites to a single database
T Furche, G Gottlob, G Grasso, X Guo, G Orsi, C Schallhart, C Wang
Proceedings of the VLDB Endowment 7 (14), 1845-1856, 2014
692014
FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement
A Holzer, C Schallhart, M Tautschnig, H Veith
International Conference on Computer Aided Verification, 209-213, 2008
662008
Model-based runtime analysis of distributed reactive systems
A Bauer, M Leucker, C Schallhart
Australian Software Engineering Conference (ASWEC'06), 10 pp.-252, 2006
562006
Proactive detection of computer worms using model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
IEEE Transactions on Dependable and Secure Computing 7 (4), 424-438, 2008
552008
DIADEM: domain-centric, intelligent, automated data extraction methodology
T Furche, G Gottlob, G Grasso, O Gunes, X Guo, A Kravchenko, G Orsi, ...
Proceedings of the 21st International Conference on World Wide Web, 267-270, 2012
512012
Query-driven program testing
A Holzer, C Schallhart, M Tautschnig, H Veith
International Workshop on Verification, Model Checking, and Abstract …, 2009
462009
deqa: Deep Web Extraction for Question Answering
J Lehmann, T Furche, G Grasso, ACN Ngomo, C Schallhart, A Sellers, ...
International Semantic Web Conference, 131-147, 2012
442012
Oxpath: A language for scalable, memory-efficient data extraction from web applications
T Furche, G Gottlob, G Grasso, C Schallhart, A Sellers
Proceedings of the VLDB Endowment 4 (11), 1016-1027, 2011
402011
CBMC-GC: an ANSI C compiler for secure two-party computations
M Franz, A Holzer, S Katzenbeisser, C Schallhart, H Veith
International Conference on Compiler Construction, 244-249, 2014
362014
How did you specify your test suite
A Holzer, C Schallhart, M Tautschnig, H Veith
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
342010
COLA--The component language
S Kugele, M Tautschnig, A Bauer, C Schallhart, S Merenda, W Haberl, ...
332007
The system can't perform the operation now. Try again later.
Articles 1–20