default search action
Martin Hiller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [c19]Martin Hiller, Caetano Sauer, Theo Härder:
Observations on Fine-Grained Locking in XML DBMSs. ADBIS 2014: 337-351 - 2013
- [c18]Jessica Jung, Kai Höfig, Dominik Domis, Andreas Jedlitschka, Martin Hiller:
Experimental Comparison of Two Safety Analysis Methods and Its Replication. ESEM 2013: 223-232 - [c17]Jessica Jung, Andreas Jedlitschka, Kai Höfig, Dominik Domis, Martin Hiller:
A Controlled Experiment on Component Fault Trees. SAFECOMP 2013: 285-292 - 2012
- [p2]Ottmar Bender, Martin Hiller, Bastian Tenbergen, Thorsten Weyer:
Requirements from the Application Domains. Model-Based Engineering of Embedded Systems 2012: 15-28 - [p1]Ottmar Bender, Martin Hiller, Maurice Girod, Carsten Strobel, Martin Waßmuth, Laurent Dieudonné:
Application and Evaluation in the Avionics Domain. Model-Based Engineering of Embedded Systems 2012: 177-196 - 2011
- [c16]Martin Hiller:
Präfixkomprimierte Speicherung von DeweyID-adressierten XML-Daten. BTW Workshops 2011: 99-103 - 2010
- [j2]Neeraj Suri, Arshad Jhumka, Martin Hiller, András Pataricza, Shariful Islam, Constantin Sârbu:
A software integration approach for designing and assessing dependable embedded systems. J. Syst. Softw. 83(10): 1780-1800 (2010)
2000 – 2009
- 2007
- [c15]Xi Chen, Juejing Feng, Martin Hiller, Vera Lauer:
Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems. DSN 2007: 618-624 - 2005
- [c14]Arshad Jhumka, Martin Hiller:
Putting Detectors in Their Place. SEFM 2005: 33-43 - 2004
- [j1]Martin Hiller, Arshad Jhumka, Neeraj Suri:
EPIC: Profiling the Propagation and Effect of Data Errors in Software. IEEE Trans. Computers 53(5): 512-530 (2004) - [c13]Arshad Jhumka, Martin Hiller, Neeraj Suri:
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems. HASE 2004: 69-78 - 2003
- [c12]Arshad Jhumka, Neeraj Suri, Martin Hiller:
A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs. SCOPES 2003: 182-197 - 2002
- [c11]Martin Hiller, Arshad Jhumka, Neeraj Suri:
On the Placement of Software Mechanisms for Detection of Data Errors. DSN 2002: 135-144 - [c10]Arshad Jhumka, Martin Hiller, Neeraj Suri:
Component-Based Synthesis of Dependable Embedded Software. FTRTFT 2002: 111-128 - [c9]Arshad Jhumka, Martin Hiller, Neeraj Suri:
An Approach to Specify and Test Component-Based Dependable Software. HASE 2002: 211-220 - [c8]Martin Hiller, Arshad Jhumka, Neeraj Suri:
PROPANE: an environment for examining the propagation of errors in software. ISSTA 2002: 81-85 - [c7]Arshad Jhumka, Martin Hiller, Vilgot Claesson, Neeraj Suri:
On systematic design of globally consistent executable assertions in embedded software. LCTES-SCOPES 2002: 75-84 - [c6]Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri:
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems. PRDC 2002: 105-116 - 2001
- [c5]Martin Hiller, Arshad Jhumka, Neeraj Suri:
An Approach for Analysing the Propagation of Data Errors in Software. DSN 2001: 161-172 - [c4]Arshad Jhumka, Martin Hiller, Neeraj Suri:
Assessing Inter-Modular Error Propagation in Distributed Software. SRDS 2001: 152-161 - 2000
- [c3]Martin Hiller:
Executable Assertions for Detecting Data Errors in Embedded Control Systems. DSN 2000: 24-33
1990 – 1999
- 1999
- [c2]Martin Hiller:
Error Recovery using Forced Validity Assisted by Executable Assertions for Error Detection: An Experimental Evaluation. EUROMICRO 1999: 2105-2112 - 1998
- [c1]Jörgen Christmansson, Martin Hiller, Marcus Rimén:
An experimental comparison of fault and error injection. ISSRE 1998: 369-378
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint