default search action
Ernie Cohen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j6]Ernie Cohen, Norbert Schirmer:
A Reduction Theorem for Store Buffers. Arch. Formal Proofs 2019 (2019) - [c22]José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran:
A Machine-Checked Proof of Security for AWS Key Management Service. CCS 2019: 63-78 - [i7]José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran:
A Machine-Checked Proof of Security for AWS Key Management Service. IACR Cryptol. ePrint Arch. 2019: 1042 (2019) - 2018
- [c21]Ernie Cohen:
Object-Oriented Security Proofs. FM 2018: 671-674 - 2015
- [p2]Adrián Cristal, Burcu Kulahcioglu Ozkan, Ernie Cohen, Gokcen Kestor, Ismail Kuru, Osman S. Unsal, Serdar Tasiran, Suha Orhun Mutluergil, Tayfun Elmas:
Verification Tools for Transactional Programs. Transactional Memory 2015: 283-306 - 2014
- [c20]Geng Chen, Ernie Cohen, Mikhail Kovalev:
Store Buffer Reduction with MMUs. VSTTE 2014: 117-132 - [e1]Ernie Cohen, Andrey Rybalchenko:
Verified Software: Theories, Tools, Experiments - 5th International Conference, VSTTE 2013, Menlo Park, CA, USA, May 17-19, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8164, Springer 2014, ISBN 978-3-642-54107-0 [contents] - [i6]Ernie Cohen:
Modular Verification of Hybrid System Code with VCC. CoRR abs/1403.3611 (2014) - [i5]Ernie Cohen:
Hypothesis Elimination in Kleene Semirings. CoRR abs/1403.4074 (2014) - [i4]Ernie Cohen:
Coherent Causal Memory. CoRR abs/1404.2187 (2014) - 2013
- [c19]Ernie Cohen, Wolfgang J. Paul, Sabine Schmaltz:
Theory of Multi Core Hypervisor Verification. SOFSEM 2013: 1-27 - [p1]Ernie Cohen:
Data Abstraction in VCC. Engineering Dependable Software Systems 2013: 79-114 - 2012
- [c18]Eyad Alkassar, Ernie Cohen, Mikhail Kovalev, Wolfgang J. Paul:
Verification of TLB Virtualization Implemented in C. VSTTE 2012: 209-224 - 2011
- [c17]Vladimir Klebanov, Peter Müller, Natarajan Shankar, Gary T. Leavens, Valentin Wüstholz, Eyad Alkassar, Rob Arthan, Derek Bronish, Rod Chapman, Ernie Cohen, Mark A. Hillebrand, Bart Jacobs, K. Rustan M. Leino, Rosemary Monahan, Frank Piessens, Nadia Polikarpova, Tom Ridge, Jan Smans, Stephan Tobies, Thomas Tuerk, Mattias Ulbrich, Benjamin Weiß:
The 1st Verified Software Competition: Experience Report. FM 2011: 154-168 - 2010
- [c16]Ernie Cohen, Michal Moskal, Wolfram Schulte, Stephan Tobies:
Local Verification of Global Invariants in Concurrent Programs. CAV 2010: 480-494 - [c15]Eyad Alkassar, Ernie Cohen, Mark A. Hillebrand, Hristo Pentchev:
Modular specification and verification of interprocess communication. FMCAD 2010: 167-174 - [c14]Eyad Alkassar, Ernie Cohen, Mark A. Hillebrand, Mikhail Kovalev, Wolfgang J. Paul:
Verifying shadow page table algorithms. FMCAD 2010: 267-270 - [c13]Ernie Cohen, Bert Schirmer:
From Total Store Order to Sequential Consistency: A Practical Reduction Theorem. ITP 2010: 403-418
2000 – 2009
- 2009
- [c12]Ernie Cohen, Eyad Alkassar, Vladimir Boyarinov, Markus Dahlweid, Ulan Degenbaev, Mark A. Hillebrand, Bruno Langenstein, Dirk Leinenbach, Michal Moskal, Steven Obua, Wolfgang J. Paul, Hristo Pentchev, Elena Petrova, Thomas Santen, Norbert Schirmer, Sabine Schmaltz, Wolfram Schulte, Andrey Shadrin, Stephan Tobies, Alexandra Tsyban, Sergey Tverdyshev:
Invariants, Modularity, and Rights. Ershov Memorial Conference 2009: 43-55 - [c11]Ernie Cohen, Markus Dahlweid, Mark A. Hillebrand, Dirk Leinenbach, Michal Moskal, Thomas Santen, Wolfram Schulte, Stephan Tobies:
VCC: A Practical System for Verifying Concurrent C. TPHOLs 2009: 23-42 - [c10]Ernie Cohen, Michal Moskal, Stephan Tobies, Wolfram Schulte:
A Precise Yet Efficient Memory Model For C. SSV 2009: 85-103 - [i3]Ernie Cohen, Norbert Schirmer:
A Better Reduction Theorem for Store Buffers. CoRR abs/0909.4637 (2009) - [i2]Ernie Cohen:
Pessimistic Testing. CoRR abs/0910.0996 (2009) - [i1]Ernie Cohen:
Weak Kleene Algebra is Sound and (Possibly) Complete for Simulation. CoRR abs/0910.1028 (2009) - 2008
- [j5]A. K. McIver, Carlos Gonzalía, Ernie Cohen, Carroll C. Morgan:
Using probabilistic Kleene algebra pKA for protocol verification. J. Log. Algebraic Methods Program. 76(1): 90-111 (2008) - 2006
- [j4]Scott D. Stoller, Ernie Cohen:
Optimistic synchronization-based state-space reduction. Formal Methods Syst. Des. 28(3): 263-289 (2006) - [c9]Ernie Cohen:
Weak Kleene Algebra and Computation Trees. RelMiCS 2006: 1 - [c8]Annabelle McIver, Ernie Cohen, Carroll Morgan:
Using Probabilistic Kleene Algebra for Protocol Verification. RelMiCS 2006: 296-310 - [c7]Ernie Cohen:
Validating the Microsoft Hypervisor. FM 2006: 81-81 - 2003
- [j3]Ernie Cohen:
First-order Verification of Cryptographic Protocols. J. Comput. Secur. 11(2): 189-216 (2003) - [c6]Scott D. Stoller, Ernie Cohen:
Optimistic Synchronization-Based State-Space Reduction. TACAS 2003: 489-504 - 2002
- [c5]Ernie Cohen:
TAPS: The Last Few Slides. FASec 2002: 183-190 - 2000
- [j2]Ernie Cohen, Dexter Kozen:
A note on the complexity of propositional Hoare logic. ACM Trans. Comput. Log. 1(1): 171-174 (2000) - [c4]Ernie Cohen:
TAPS: A First-Order Verifier for Cryptographic Protocols. CAV 2000: 568-571 - [c3]Ernie Cohen:
TAPS: A First-Order Verifier for Cryptographic Protocols. CSFW 2000: 144-158 - [c2]Ernie Cohen:
Separation and Reduction. MPC 2000: 45-59
1990 – 1999
- 1998
- [c1]Ernie Cohen, Leslie Lamport:
Reduction in TLA. CONCUR 1998: 317-331 - 1994
- [j1]Ernie Cohen:
The Convergence Span of Greedy Load Balancing. Inf. Process. Lett. 52(4): 181-182 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-21 21:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint