No abstract available.
Cited By
- Lewis M, Soudjani S and Zuliani P (2023). Formal Verification of Quantum Programs: Theory, Tools, and Challenges, ACM Transactions on Quantum Computing, 5:1, (1-35), Online publication date: 31-Mar-2024.
- Baharloo N, Bentahar J, Alwhishi G, Drawel N and Pedrycz W (2024). Verifying trust over IoT-ad hoc network-based applications under uncertainty, Ad Hoc Networks, 154:C, Online publication date: 1-Mar-2024.
- Rausch Fernandes H, Gomes G, Pinheiro de Oliveira A and Campos S (2024). Stochastic formal model of PI3K/mTOR pathway in Alzheimer's disease for drug repurposing, Science of Computer Programming, 232:C, Online publication date: 1-Jan-2024.
- Huang W, Krafczyk N and Peleska J (2024). Exhaustive property oriented model-based testing with symbolic finite state machines, Science of Computer Programming, 231:C, Online publication date: 1-Jan-2024.
- Alrahman Y, Azzopardi S, Di Stefano L and Piterman N (2023). Language support for verifying reconfigurable interacting systems, International Journal on Software Tools for Technology Transfer (STTT), 25:5-6, (765-784), Online publication date: 1-Dec-2023.
- Van Houdt G, Martin N and Depaire B (2024). AITIA-PM, Engineering Applications of Artificial Intelligence, 126:PD, Online publication date: 1-Nov-2023.
- Li Y, Liu W, Wang J, Yu X and Li C (2023). Model Checking of Possibilistic Linear-Time Properties Based on Generalized Possibilistic Decision Processes, IEEE Transactions on Fuzzy Systems, 31:10, (3495-3506), Online publication date: 1-Oct-2023.
- Brüning F, Gleirscher M, Huang W, Krafczyk N, Peleska J and Sachtleben R Complete Property-Oriented Module Testing Testing Software and Systems, (183-201)
- Hasanbeig H, Kroening D and Abate A (2023). Certified reinforcement learning with logic guidance, Artificial Intelligence, 322:C, Online publication date: 1-Sep-2023.
- Kouvaros P Towards formal verification of neuro-symbolic multi-agent systems Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, (7014-7019)
- Mehdipour N, Althoff M, Tebbens R and Belta C (2023). Formal methods to comply with rules of the road in autonomous driving, Automatica (Journal of IFAC), 152:C, Online publication date: 1-Jun-2023.
- Serna J, Day N and Esmaeilsabzali S (2023). Dash: declarative behavioural modelling in Alloy with control state hierarchy, Software and Systems Modeling (SoSyM), 22:2, (733-749), Online publication date: 1-Apr-2023.
- Conradie W, Della Monica D, Muñoz-Velasco E, Sciavicco G and Stan I (2023). Fuzzy Halpern and Shoham's interval temporal logics, Fuzzy Sets and Systems, 456:C, (107-124), Online publication date: 30-Mar-2023.
- Ordoni E, Mülle J and Böhm K (2023). Reduction of data-value-aware process models, Information Systems, 114:C, Online publication date: 1-Mar-2023.
- Gutierrez J, Kowara S, Kraus S, Steeples T and Wooldridge M (2023). Cooperative concurrent games, Artificial Intelligence, 314:C, Online publication date: 1-Jan-2023.
- Banks C, Slovak K, Coogan S and Egerstedt M Specification-Based Maneuvering of Quadcopters Through Hoops 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (5191-5197)
- Saeedloei N and Kluźniak F An Efficient Customized Clock Allocation Algorithm for a Class of Timed Automata Formal Methods: Foundations and Applications, (3-21)
- Gnatenko A and Zakharov V (2022). Satisfiability and Model Checking for One Parameterized Extension of Linear Temporal Logic, Automatic Control and Computer Sciences, 56:7, (649-660), Online publication date: 1-Dec-2022.
- Guerra P and Wassermann R (2022). Revising System Specifications in Temporal Logic, Journal of Logic, Language and Information, 31:4, (591-618), Online publication date: 1-Dec-2022.
- Hansen S, Thule C, Gomes C, van de Pol J, Palmieri M, Inci E, Madsen F, Alfonso J, Castellanos J and Rodriguez J (2022). Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps, International Journal on Software Tools for Technology Transfer (STTT), 24:6, (999-1024), Online publication date: 1-Dec-2022.
- Feng R, Acar E, Wang Y, Liu W, Schlobach S and Ding W (2022). Computing Sufficient and Necessary Conditions in CTL, Information Sciences: an International Journal, 616:C, (474-504), Online publication date: 1-Nov-2022.
- Berndt S, Liśkiewicz M, Lutter M and Reischuk R (2022). Learning residual alternating automata, Information and Computation, 289:PA, Online publication date: 1-Nov-2022.
- Casagrande A, Dang T, Dorigo L, Dreossi T, Piazza C and Pippia E (2022). Parameter synthesis of polynomial dynamical systems, Information and Computation, 289:PA, Online publication date: 1-Nov-2022.
- Xu M, Fu J, Mei J and Deng Y (2022). An algebraic method to fidelity-based model checking over quantum Markov chains, Theoretical Computer Science, 935:C, (61-81), Online publication date: 31-Oct-2022.
- Abd Alrahman Y, Azzopardi S and Piterman N Model Checking Reconfigurable Interacting Systems Leveraging Applications of Formal Methods, Verification and Validation. Adaptation and Learning, (373-389)
- Körner P and Leuschel M Towards Practical Partial Order Reduction for High-Level Formalisms Verified Software. Theories, Tools and Experiments., (72-91)
- Wayama K, Yokogawa T, Amasaki S, Aman H and Arimoto K Verifying Game Logic in Unreal Engine 5 Blueprint Visual Scripting System Using Model Checking Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, (1-8)
- Mancini T, Melatti I and Tronci E (2022). Any-Horizon Uniform Random Sampling and Enumeration of Constrained Scenarios for Simulation-Based Formal Verification, IEEE Transactions on Software Engineering, 48:10, (4002-4013), Online publication date: 1-Oct-2022.
- Drawel N, Laarej A, Bentahar J and El Menshawy M (2022). Transformation-based model checking temporal trust in multi-agent systems, Journal of Systems and Software, 192:C, Online publication date: 1-Oct-2022.
- Shu X and Yang Z A Bounded Model Checking Method for Concurrent Systems in xUML4MC Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition, (236-242)
- de Oliveira D, Faria-Campos A and Campos S BDDBlast—A Memory Efficient Architecture for Pairwise Alignments Advances in Bioinformatics and Computational Biology, (1-13)
- Rybakov M and Shkatov D (2022). Complexity of finite-variable fragments of propositional temporal and modal logics of computation, Theoretical Computer Science, 925:C, (45-60), Online publication date: 10-Aug-2022.
- Gutsfeld J, Meier A, Ohrem C and Virtema J Temporal Team Semantics Revisited Proceedings of the 37th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
- Bittner B, Bozzano M, Cimatti A, Gario M, Tonetta S and Vozarova V (2022). Diagnosability of fair transition systems, Artificial Intelligence, 309:C, Online publication date: 1-Aug-2022.
- Song J, Kang J, Hyun S, Jee E and Bae D (2022). Continuous verification of system of systems with collaborative MAPE-K pattern and probability model slicing, Information and Software Technology, 147:C, Online publication date: 1-Jul-2022.
- Fumagalli M, Sales T, Baião F and Guizzardi G (2022). Conceptual model visual simulation and the inductive learning of missing domain constraints, Data & Knowledge Engineering, 140:C, Online publication date: 1-Jul-2022.
- Aminof B, Murano A, Rubin S and Zuleger F (2022). Verification of agent navigation in partially-known environments, Artificial Intelligence, 308:C, Online publication date: 1-Jul-2022.
- Bruni R, Giacobazzi R, Gori R and Ranzato F Abstract interpretation repair Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (426-441)
- Saeedloei N and Kluźniak F Untangling the Graphs of Timed Automata to Decrease the Number of Clocks Integrated Formal Methods, (168-187)
- Havelund K and Peled D (2022). On monitoring linear temporal properties, Formal Methods in System Design, 60:3, (405-425), Online publication date: 1-Jun-2022.
- Amendola A, Barruffo L, Bozzano M, Cimatti A, De Simone S, Fedeli E, Gabbasov A, Garrubba D, Girardi M, Serra D, Tiella R and Zampedri G Formal Design and Validation of an Automatic Train Operation Control System Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, (169-178)
- Fang A and Kress-Gazit H Automated Task Updates of Temporal Logic Specifications for Heterogeneous Robots 2022 International Conference on Robotics and Automation (ICRA), (4363-4369)
- Bajczi L, Ádám Z and Molnár V C for yourself Proceedings of the IEEE/ACM 10th International Conference on Formal Methods in Software Engineering, (1-11)
- Bentahar J, Drawel N and Sadiki A Quantitative Group Trust: A Two-Stage Verification Approach Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, (100-108)
- Camilli M, Janes A and Russo B (2022). Automated test-based learning and verification of performance models for microservices systems, Journal of Systems and Software, 187:C, Online publication date: 1-May-2022.
- Kaleeswaran A, Nordmann A, Vogel T and Grunske L (2022). A systematic literature review on counterexample explanation, Information and Software Technology, 145:C, Online publication date: 1-May-2022.
- Lyu Z, Xu X and Hong Y (2022). Small-gain theorem for safety verification of interconnected systems, Automatica (Journal of IFAC), 139:C, Online publication date: 1-May-2022.
- Brunese L, Mercaldo F, Reginelli A and Santone A (2022). A novel methodology for head and neck carcinoma treatment stage detection by means of model checking, Artificial Intelligence in Medicine, 127:C, Online publication date: 1-May-2022.
- Rubio R, Martí-Oliet N, Pita I and Verdejo A (2021). Model checking strategy-controlled systems in rewriting logic, Automated Software Engineering, 29:1, Online publication date: 1-May-2022.
- Anevlavis T, Philippe M, Neider D and Tabuada P (2022). Being Correct Is Not Enough: Efficient Verification Using Robust Linear Temporal Logic, ACM Transactions on Computational Logic, 23:2, (1-39), Online publication date: 30-Apr-2022.
- Lee E, Lee S and Seo Y Deep learning based self-adaptive framework for environmental interoperability in internet of things Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (32-35)
- Xu M, Fu J, Mei J and Deng Y (2022). Model checking QCTL plus on quantum Markov chains, Theoretical Computer Science, 913:C, (43-72), Online publication date: 20-Apr-2022.
- Masselot M, Patil S, Zhabelova G and Vyatkin V Towards a formal model of protection functions for power distribution networks IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, (5302-5309)
- Malkis A (2022). Reachability in parallel programs is polynomial in the number of threads, Journal of Parallel and Distributed Computing, 162:C, (1-16), Online publication date: 1-Apr-2022.
- Drawel N, Bentahar J, Laarej A and Rjoub G (2022). Formal verification of group and propagated trust in multi-agent systems, Autonomous Agents and Multi-Agent Systems, 36:1, Online publication date: 1-Apr-2022.
- Akintunde M, Botoeva E, Kouvaros P and Lomuscio A (2021). Formal verification of neural agents in non-deterministic environments, Autonomous Agents and Multi-Agent Systems, 36:1, Online publication date: 1-Apr-2022.
- Cai C, Sun J and Dobbie G (2022). B model quality assessments on automated reachability repair with ISO/IEC 25010, Science of Computer Programming, 214:C, Online publication date: 1-Feb-2022.
- Witharana H, Lyu Y, Charles S and Mishra P (2022). A Survey on Assertion-based Hardware Verification, ACM Computing Surveys, 54:11s, (1-33), Online publication date: 31-Jan-2022.
- Horak T, Coenen N, Metzger N, Hahn C, Flemisch T, Méndez J, Dimov D, Finkbeiner B and Dachselt R (2022). Visual Analysis of Hyperproperties for Understanding Model Checking Results, IEEE Transactions on Visualization and Computer Graphics, 28:1, (357-367), Online publication date: 1-Jan-2022.
- De Giacomo G, Felli P, Logan B, Patrizi F and Sardiña S (2022). Situation calculus for controller synthesis in manufacturing systems with first-order state representation, Artificial Intelligence, 302:C, Online publication date: 1-Jan-2022.
- Krafczyk N and Peleska J Exhaustive Property Oriented Model-Based Testing with Symbolic Finite State Machines Software Engineering and Formal Methods, (84-102)
- Dubslaff C, Wienhöft P and Fehnker A Be Lazy and Don’t Care: Faster CTL Model Checking for Recursive State Machines Software Engineering and Formal Methods, (332-350)
- van Dongen B, De Smedt J, Di Ciccio C and Mendling J (2021). Conformance checking of mixed-paradigm process models, Information Systems, 102:C, Online publication date: 1-Dec-2021.
- Visconti E, Tsigkanos C, Hu Z and Ghezzi C (2021). Model-driven engineering city spaces via bidirectional model transformations, Software and Systems Modeling (SoSyM), 20:6, (2003-2022), Online publication date: 1-Dec-2021.
- Howar F, Jasper M, Mues M, Schmidt D and Steffen B (2021). The RERS challenge: towards controllable and scalable benchmark synthesis, International Journal on Software Tools for Technology Transfer (STTT), 23:6, (917-930), Online publication date: 1-Dec-2021.
- Xu M, Huang C and Feng Y (2021). Measuring the constrained reachability in quantum Markov chains, Acta Informatica, 58:6, (653-674), Online publication date: 1-Dec-2021.
- Gutierrez J, Murano A, Perelli G, Rubin S, Steeples T and Wooldridge M (2021). Equilibria for games with combined qualitative and quantitative objectives, Acta Informatica, 58:6, (585-610), Online publication date: 1-Dec-2021.
- Peleska J, Krafczyk N, Haxthausen A and Pinger R (2021). Efficient data validation for geographical interlocking systems, Formal Aspects of Computing, 33:6, (925-955), Online publication date: 1-Dec-2021.
- Ahishakiye F, Requeno Jarabo J, Kristensen L and Stolz V MC/DC Test Cases Generation Based on BDDs Dependable Software Engineering. Theories, Tools, and Applications, (178-197)
- Bergenthal M, Krafczyk N, Peleska J and Sachtleben R libfsmtest An Open Source Library for FSM-Based Testing Testing Software and Systems, (3-19)
- Zeng Y, Huang B, Zhang H, Gupta A and Malik S Generating Architecture-Level Abstractions from RTL Designs for Processors and Accelerators Part I: Determining Architectural State Variables 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), (1-9)
- Shea-Blymyer C and Abbas H (2021). Algorithmic Ethics: Formalization and Verification of Autonomous Vehicle Obligations, ACM Transactions on Cyber-Physical Systems, 5:4, (1-25), Online publication date: 31-Oct-2021.
- Zhang Z, de Amorim A, Jia L and Păsăreanu C Learning Assumptions for Verifying Cryptographic Protocols Compositionally Formal Aspects of Component Software, (3-23)
- He P, Westbrook E, Carmer B, Phifer C, Robert V, Smeltzer K, Ştefănescu A, Tomb A, Wick A, Yacavone M and Zdancewic S (2021). A type system for extracting functional specifications from memory-safe imperative programs, Proceedings of the ACM on Programming Languages, 5:OOPSLA, (1-29), Online publication date: 20-Oct-2021.
- Kopetzki D, Lybecait M, Naujokat S and Steffen B (2021). Towards language-to-language transformation, International Journal on Software Tools for Technology Transfer (STTT), 23:5, (655-677), Online publication date: 1-Oct-2021.
- Voit N and Bochkov S Formal Method to Analyze Design Workflows in Software Development Computational Science and Its Applications – ICCSA 2021, (182-194)
- Sievers S and Helmert M (2021). Merge-and-Shrink, Journal of Artificial Intelligence Research, 71, (781-883), Online publication date: 10-Sep-2021.
- Ballarini P and Horváth A Formal analysis of production line systems by probabilistic model checking tools 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), (01-08)
- Hustiu I, Mahulea C and Kloetzer M Optimal task allocation for distributed co-safe LTL specifications 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), (1-4)
- Bozzano M, Cimatti A and Roveri M (2021). A Comprehensive Approach to On-board Autonomy Verification and Validation, ACM Transactions on Intelligent Systems and Technology, 12:4, (1-29), Online publication date: 31-Aug-2021.
- Liu J Closing the Gap Between Discrete Abstractions and Continuous Control: Completeness via Robustness and Controllability Formal Modeling and Analysis of Timed Systems, (67-83)
- Frohme M and Steffen B (2021). Compositional learning of mutually recursive procedural systems, International Journal on Software Tools for Technology Transfer (STTT), 23:4, (521-543), Online publication date: 1-Aug-2021.
- Havelund K and Peled D (2021). An extension of first-order LTL with rules with application to runtime verification, International Journal on Software Tools for Technology Transfer (STTT), 23:4, (547-563), Online publication date: 1-Aug-2021.
- Akhtar S and Zahoor E (2021). Formal Specification and Verification of MQTT Protocol in PlusCal-2, Wireless Personal Communications: An International Journal, 119:2, (1589-1606), Online publication date: 1-Jul-2021.
- Coti C, Petrucci L, Rodríguez C and Sousa M (2021). Quasi-optimal partial order reduction, Formal Methods in System Design, 57:1, (3-33), Online publication date: 1-Jul-2021.
- Chivilikhin D Temporal Specification Mining for IEC 61499 Function Blocks Using Evolutionary Algorithms and Model Checking 2021 IEEE Congress on Evolutionary Computation (CEC), (2419-2426)
- Amat N, Berthomieu B and Dal Zilio S On the Combination of Polyhedral Abstraction and SMT-Based Model Checking for Petri Nets Application and Theory of Petri Nets and Concurrency, (164-185)
- Attard D, Aceto L, Achilleos A, Francalanza A, Ingólfsdóttir A and Lehtinen K Better Late Than Never or: Verifying Asynchronous Components at Runtime Formal Techniques for Distributed Objects, Components, and Systems, (207-225)
- Istrate G Models We Can Trust: Toward a Systematic Discipline of (Agent-Based) Model Interpretation and Validation Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (6-11)
- Mohajeri Parizi M, Sileno G and van Engers T Seamless Integration and Testing for MAS Engineering Engineering Multi-Agent Systems, (254-272)
- Witharana H, Lyu Y and Mishra P (2021). Directed Test Generation for Activation of Security Assertions in RTL Models, ACM Transactions on Design Automation of Electronic Systems, 26:4, (1-28), Online publication date: 1-Apr-2021.
- Fisher M, Mascardi V, Rozier K, Schlingloff B, Winikoff M and Yorke-Smith N (2020). Towards a framework for certification of reliable autonomous systems, Autonomous Agents and Multi-Agent Systems, 35:1, Online publication date: 1-Apr-2021.
- Aceto L, Achilleos A, Francalanza A, Ingólfsdóttir A and Lehtinen K (2021). An operational guide to monitorability with applications to regular properties, Software and Systems Modeling (SoSyM), 20:2, (335-361), Online publication date: 1-Apr-2021.
- Bouyer P, Henry L, Jaziri S, Jéron T and Markey N (2021). Diagnosing timed automata using timed markings, International Journal on Software Tools for Technology Transfer (STTT), 23:2, (229-253), Online publication date: 1-Apr-2021.
- Pola G, Manes C and Di Benedetto M On external behavior equivalence of continuous-time stochastic linear control systems 2016 IEEE 55th Conference on Decision and Control (CDC), (6583-6588)
- Pola G, Manes C, van der Schaft A and Di Benedetto M Model reduction of continuous-time stochastic linear control systems via bisimulation equivalence 2016 IEEE 55th Conference on Decision and Control (CDC), (6577-6582)
- Prabhakar P and Liu J Bisimulations for input-output stability of hybrid systems 2016 IEEE 55th Conference on Decision and Control (CDC), (5515-5520)
- Tolmach P, Li Y, Lin S and Liu Y Formal Analysis of Composable DeFi Protocols Financial Cryptography and Data Security. FC 2021 International Workshops, (149-161)
- Kwon Y and Kim E A Design of GPU-Based Quantitative Model Checking Verification, Model Checking, and Abstract Interpretation, (441-463)
- Zhang H, Gupta A and Malik S Syntax-Guided Synthesis for Lemma Generation in Hardware Model Checking Verification, Model Checking, and Abstract Interpretation, (325-349)
- Zhou Z, Zhi Q and Morisaki S (2021). A Composite Safety Assurance Method for Developing System Architecture Using Model Checking, International Journal of Systems and Software Security and Protection, 12:1, (78-93), Online publication date: 1-Jan-2021.
- Rehman A, Akhtar N, Alhazmi O and Margalef T (2021). Formal Modeling, Proving, and Model Checking of a Flood Warning, Monitoring, and Rescue System-of-Systems, Scientific Programming, 2021, Online publication date: 1-Jan-2021.
- Khan W, Khan F, Derhab A, Alhudhaif A and Chen H (2021). CoCEC, Complexity, 2021, Online publication date: 1-Jan-2021.
- Meng Y, Huang Z, Shen G and Ke C (2021). A security policy model transformation and verification approach for software defined networking, Computers and Security, 100:C, Online publication date: 1-Jan-2021.
- Usman M, Wang W and Khurshid S TestMC Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, (709-721)
- Ceresa M, Gorostiaga F and Sánchez C Declarative Stream Runtime Verification (hLola) Programming Languages and Systems, (25-43)
- Riesco A and Ogata K CiMPG+F: A Proof Generator and Fixer-Upper for CafeOBJ Specifications Theoretical Aspects of Computing – ICTAC 2020, (64-82)
- Fernandes H, Gomes G, de Oliveira A and Campos S Statistical Model Checking in Drug Repurposing for Alzheimer’s Disease Formal Methods: Foundations and Applications, (64-80)
- Yu H, Chen Z, Huang C and Wang J Symbolic Verification of MPI Programs with Non-deterministic Synchronizations Dependable Software Engineering. Theories, Tools, and Applications, (160-176)
- Saeedloei N and Kluźniak F Synthesizing Clock-Efficient Timed Automata Integrated Formal Methods, (276-294)
- Holtzen S, Van den Broeck G and Millstein T (2020). Scaling exact inference for discrete probabilistic programs, Proceedings of the ACM on Programming Languages, 4:OOPSLA, (1-31), Online publication date: 13-Nov-2020.
- Feng J, Miao W, Zheng H, Huang Y, Li J, Wang Z, Su T, Gu B, Pu G, Yang M and He J FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1376-1386)
- Yacoub A, Hamri M and Frydman C (2021). DEv-PROMELA, Simulation, 96:11, (881-910), Online publication date: 1-Nov-2020.
- Cabanillas C, Ackermann L, Schönig S, Sturm C and Mendling J (2020). The RALph miner for automated discovery and verification of resource-aware process models, Software and Systems Modeling (SoSyM), 19:6, (1415-1441), Online publication date: 1-Nov-2020.
- Munteanu A, Pasqua M and Merro M Impact Analysis of Cyber-Physical Attacks on a Water Tank System via Statistical Model Checking Proceedings of the 8th International Conference on Formal Methods in Software Engineering, (34-43)
- Cavezza D, Alrajeh D and György A Minimal Assumptions Refinement for Realizable Specifications Proceedings of the 8th International Conference on Formal Methods in Software Engineering, (66-76)
- Nejati S Search-Based Software Testing for Formal Software Verification – and Vice Versa Search-Based Software Engineering, (3-6)
- Šmijáková E, Pastva S, Šafránek D and Brim L Parallel Parameter Synthesis for Multi-affine Hybrid Systems from Hybrid CTL Specifications Computational Methods in Systems Biology, (280-297)
- Gadelha R, Vieira L, Monteiro D, Vidal F and Maia P (2020). Scen@rist: an approach for verifying self-adaptive systems using runtime scenarios, Software Quality Journal, 28:3, (1303-1345), Online publication date: 1-Sep-2020.
- Bukhari S, Khalid F, Hasan O, Shafique M and Henkel J (2020). Toward Model Checking-Driven Fair Comparison of Dynamic Thermal Management Techniques Under Multithreaded Workloads, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39:8, (1725-1738), Online publication date: 1-Aug-2020.
- Hajdu Á and Micskei Z (2019). Efficient Strategies for CEGAR-Based Model Checking, Journal of Automated Reasoning, 64:6, (1051-1091), Online publication date: 1-Aug-2020.
- Ahlgren J, Berezin M, Bojarczuk K, Dulskyte E, Dvortsova I, George J, Gucevska N, Harman M, Lämmel R, Meijer E, Sapora S and Spahr-Summers J WES Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, (276-284)
- Chen Z, Yu H, Fu X and Wang J MPI-SV Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion Proceedings, (93-96)
- Yu H, Chen Z, Fu X, Wang J, Su Z, Sun J, Huang C and Dong W Symbolic verification of message passing interface programs Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (1248-1260)
- Ferrari A, Mazzanti F, Basile D, Beek M and Fantechi A Comparing formal tools for system design Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (62-74)
- Cai Y, Meng R and Palsberg J Low-overhead deadlock prediction Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (1298-1309)
- Silva E, Batista T and Oquendo F (2020). On the verification of mission-related properties in software-intensive systems-of-systems architectural design, Science of Computer Programming, 192:C, Online publication date: 15-Jun-2020.
- Kantaros Y and Zavlanos M (2020). STyLuS*, International Journal of Robotics Research, 39:7, (812-836), Online publication date: 1-Jun-2020.
- Drawel N, Qu H, Bentahar J and Shakshuki E (2020). Specification and automatic verification of trust-based multi-agent systems, Future Generation Computer Systems, 107:C, (1047-1060), Online publication date: 1-Jun-2020.
- Tsigkanos C, Garriga M, Baresi L and Ghezzi C (2020). Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems, ACM Transactions on Internet Technology, 20:2, (1-23), Online publication date: 31-May-2020.
- Cardoso R, Farrell M, Luckcuck M, Ferrando A and Fisher M Heterogeneous Verification of an Autonomous Curiosity Rover NASA Formal Methods, (353-360)
- Farheen S, Day N, Vakili A and Abbassi A (2020). Transitive-closure-based model checking (TCMC) in Alloy, Software and Systems Modeling (SoSyM), 19:3, (721-740), Online publication date: 1-May-2020.
- Rubio R, Martí-Oliet N, Pita I and Verdejo A Strategies, Model Checking and Branching-Time Properties in Maude Rewriting Logic and Its Applications, (156-175)
- Han H, Maghenem M and Sanfelice R Sufficient conditions for satisfaction of formulas with until operators in hybrid systems Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, (1-10)
- Ghasemi K, Sadraddini S and Belta C Compositional synthesis via a convex parameterization of assume-guarantee contracts Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, (1-10)
- Shea-Blymyer C and Abbas H A deontic logic analysis of autonomous systems' safety Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, (1-11)
- Dennis L and Slavkovik M Model-Checking Information Diffusion in Social Networks with PRISM Multi-Agent Systems and Agreement Technologies, (475-492)
- Ring M, Bornebusch F, Lüth C, Wille R and Drechsler R Verification runtime analysis Proceedings of the 23rd Conference on Design, Automation and Test in Europe, (873-878)
- Guo C, Fu Z, Zhang Z, Ren S and Sha L (2021). A framework for supporting the development of verifiably safe medical best practice guideline systems, Journal of Systems Architecture: the EUROMICRO Journal, 104:C, Online publication date: 1-Mar-2020.
- Cimino M, De Francesco N, Mercaldo F, Santone A and Vaglini G (2020). Model checking for malicious family detection and phylogenetic analysis in mobile environment, Computers and Security, 90:C, Online publication date: 1-Mar-2020.
- Yousefi F, Abhashkumar A, Subramanian K, Hans K, Ghorbani S and Akella A Liveness verification of stateful network functions Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (257-272)
- Yuan Y, Moon S, Uppal S, Jia L and Sekar V NetSMC Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (181-200)
- Wang M, Tian C, Zhang N, Duan Z and Yao C (2020). Translating Xd-C programs to MSVL programs, Theoretical Computer Science, 809:C, (430-465), Online publication date: 24-Feb-2020.
- Murano A, Parente M, Rubin S and Sorrentino L (2020). Model-checking graded computation-tree logic with finite path semantics, Theoretical Computer Science, 806:C, (577-586), Online publication date: 2-Feb-2020.
- Groefsema H, van Beest N and Armas-Cervantes A (2022). Efficient conditional compliance checking of business process models, Computers in Industry, 115:C, Online publication date: 1-Feb-2020.
- Baresi L, Bersani M, Marconi F, Quattrocchi G and Rossi M (2020). Using formal verification to evaluate the execution time of Spark applications, Formal Aspects of Computing, 32:1, (33-70), Online publication date: 1-Feb-2020.
- Kafali Ö, Ajmeri N and Singh M (2019). DESEN, ACM Transactions on Software Engineering and Methodology, 29:1, (1-50), Online publication date: 31-Jan-2020.
- Porncharoenwase S, Bornholt J and Torlak E Fixing Code that Explodes Under Symbolic Evaluation Verification, Model Checking, and Abstract Interpretation, (44-67)
- Suenaga K and Ishizawa T Generalized Property-Directed Reachability for Hybrid Systems Verification, Model Checking, and Abstract Interpretation, (293-313)
- Webster M, Western D, Araiza-Illan D, Dixon C, Eder K, Fisher M and Pipe A (2020). A corroborative approach to verification and validation of human–robot teams, International Journal of Robotics Research, 39:1, (73-99), Online publication date: 1-Jan-2020.
- Khan W, Kamran M, Naqvi S, Khan F, Alghamdi A, Alsolami E and Al-Turjman F (2020). Formal Verification of Hardware Components in Critical Systems, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
- Tran H, Nguyen Q and Hung P On Implementation of the Improved Assume-Guarantee Verification Method for Timed Systems Proceedings of the 10th International Symposium on Information and Communication Technology, (457-464)
- Berglund L and Artho C (2019). Method summaries for JPF, ACM SIGSOFT Software Engineering Notes, 44:4, (16-16), Online publication date: 2-Dec-2019.
- Almaawi A, Converse H, Gligoric M, Misailovic S and Khurshid S (2019). Quantifying the Exploration of the Korat Solver for Imperative Constraints, ACM SIGSOFT Software Engineering Notes, 44:4, (15-15), Online publication date: 2-Dec-2019.
- Souri A, Rahmani A, Navimipour N and Rezaei R (2019). A symbolic model checking approach in formal verification of distributed systems, Human-centric Computing and Information Sciences, 9:1, (1-27), Online publication date: 1-Dec-2019.
- Khazeev M, Aslam H, de Carvalho D, Mazzara M, Bruel J and Brown J Reflections on Teaching Formal Methods for Software Development in Higher Education Frontiers in Software Engineering Education, (28-41)
- Godio A, Bengolea V, Ponzio P, Aguirre N and Frias M Efficient test generation guided by field coverage criteria Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, (91-101)
- Ali S, Sun H and Zhao Y Combining Model Learning and Model Checking to Analyze Java Libraries Structured Object-Oriented Formal Language and Method, (259-278)
- Hasegawa I and Yokogawa T Automatic Verification for Node-Based Visual Script Notation Using Model Checking Formal Methods and Software Engineering, (52-68)
- Ramesh Y, Anand N and Panduranga Rao M DyNeMoC: Statistical Model Checking for Agent Based Systems on Graphs PRIMA 2019: Principles and Practice of Multi-Agent Systems, (627-634)
- Cañizares P, Núñez A and de Lara J (2019). An expert system for checking the correctness of memory systems using simulation and metamorphic testing, Expert Systems with Applications: An International Journal, 132:C, (44-62), Online publication date: 15-Oct-2019.
- Chatterjee K, Pavlogiannis A and Toman V (2019). Value-centric dynamic partial order reduction, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-29), Online publication date: 10-Oct-2019.
- Duan Z, Tian C, Zhang N, Ma Q and Du H (2019). Index set expressions can represent temporal logic formulas, Theoretical Computer Science, 788:C, (21-38), Online publication date: 8-Oct-2019.
- Aceto L, Cassar I, Francalanza A and Ingólfsdóttir A Comparing Controlled System Synthesis and Suppression Enforcement Runtime Verification, (148-164)
- Harrison M Examples of the Application of Formal Methods to Interactive Systems Formal Methods. FM 2019 International Workshops, (409-423)
- Becker M, Metta R, Venkatesh R and Chakraborty S (2019). Scalable and precise estimation and debugging of the worst-case execution time for analysis-friendly processors: a comeback of model checking, International Journal on Software Tools for Technology Transfer (STTT), 21:5, (515-543), Online publication date: 1-Oct-2019.
- Khan Y, Konios A and Guelfi N (2018). A Survey of Petri Nets Slicing, ACM Computing Surveys, 51:5, (1-32), Online publication date: 30-Sep-2019.
- Bentriou M, Ballarini P and Cournède P Reachability Design Through Approximate Bayesian Computation Computational Methods in Systems Biology, (207-223)
- Shukla N, Pandey M and Srivastava S (2019). Formal modeling and verification of software‐defined networks, International Journal of Network Management, 29:5, Online publication date: 12-Sep-2019.
- Huang X, Kwiatkowska M and Olejnik M (2019). Reasoning about Cognitive Trust in Stochastic Multiagent Systems, ACM Transactions on Computational Logic, 20:4, (1-64), Online publication date: 7-Sep-2019.
- Matinnejad R, Nejati S, Briand L and Bruckmann T (2019). Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior, IEEE Transactions on Software Engineering, 45:9, (919-944), Online publication date: 1-Sep-2019.
- Angius N (2019). Qualitative Models in Computational Simulative Sciences: Representation, Confirmation, Experimentation, Minds and Machines, 29:3, (397-416), Online publication date: 1-Sep-2019.
- Pi X, Shi J, Huang Y and Wei H Automated Mining and Checking of Formal Properties in Natural Language Requirements Knowledge Science, Engineering and Management, (75-87)
- Antonino P, Gibson-Robinson T and Roscoe A (2019). Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving, ACM Transactions on Software Engineering and Methodology, 28:3, (1-43), Online publication date: 17-Aug-2019.
- Nejati S, Gaaloul K, Menghi C, Briand L, Foster S and Wolfe D Evaluating model testing and model checking for finding requirements violations in Simulink models Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1015-1025)
- Cai Y, Zhu B, Meng R, Yun H, He L, Su P and Liang B Detecting concurrency memory corruption vulnerabilities Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (706-717)
- Egger B, Song E, Lee H and Shin D (2019). Random test program generation for verification and validation of the Samsung Reconfigurable Processor, Journal of Systems Architecture: the EUROMICRO Journal, 97:C, (219-238), Online publication date: 1-Aug-2019.
- El-Kassabi H, Adel Serhani M, Dssouli R and Navaz A (2019). Trust enforcement through self-adapting cloud workflow orchestration, Future Generation Computer Systems, 97:C, (462-481), Online publication date: 1-Aug-2019.
- Akbari A, Lagriffoul F and Rosell J (2019). Combined heuristic task and motion planning for bi-manual robots, Autonomous Robots, 43:6, (1575-1590), Online publication date: 1-Aug-2019.
- Zhao L, Wang X, Shu X and Zhang N A Proof System for a Unified Temporal Logic Computing and Combinatorics, (663-676)
- Aceto L, Della Monica D, Fábregas I and Ingólfsdóttir A (2022). When are prime formulae characteristic?, Theoretical Computer Science, 777:C, (3-31), Online publication date: 19-Jul-2019.
- Somenzi F and Trivedi A Reinforcement Learning and Formal Requirements Numerical Software Verification, (26-41)
- Ferrère T, Maler O, Ničković D and Pnueli A (2019). From Real-time Logic to Timed Automata, Journal of the ACM, 66:3, (1-31), Online publication date: 30-Jun-2019.
- Wiśniewski R, Karatkevich A, Stefanowicz Ł and Wojnakowski M (2019). Decomposition of distributed edge systems based on the Petri nets and linear algebra technique, Journal of Systems Architecture: the EUROMICRO Journal, 96:C, (20-31), Online publication date: 1-Jun-2019.
- Li Y, Lei L and Li S (2019). Computation tree logic model checking based on multi-valued possibility measures, Information Sciences: an International Journal, 485:C, (87-113), Online publication date: 1-Jun-2019.
- Aceituna D and Do H (2019). Addressing the state explosion problem when visualizing off-nominal behaviors in a set of reactive requirements, Requirements Engineering, 24:2, (161-180), Online publication date: 1-Jun-2019.
- Kember M, Tran L, Gao G and Day N Extracting counterexamples from transitive-closure-based model checking Proceedings of the 11th International Workshop on Modelling in Software Engineerings, (47-54)
- Lazreg S, Cordy M, Collet P, Heymans P and Mosser S Multifaceted automated analyses for variability-intensive embedded systems Proceedings of the 41st International Conference on Software Engineering, (854-865)
- Wang M, Tian C, Zhang N, Duan Z and Du H (2019). Verifying a scheduling protocol of safety-critical systems, Journal of Combinatorial Optimization, 37:4, (1191-1215), Online publication date: 1-May-2019.
- Yan J, Wang Y, Goto Y and Cheng J An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness Codes, Cryptology and Information Security, (399-408)
- Anevlavis T, Neider D, Phillipe M and Tabuada P Evrostos Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, (218-223)
- Harrison M, Freitas L, Drinnan M, Campos J, Masci P, di Maria C and Whitaker M (2019). Formal techniques in the safety analysis of software components of a new dialysis machine, Science of Computer Programming, 175:C, (17-34), Online publication date: 15-Apr-2019.
- Braga C π Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (1562-1569)
- Ouchani S Towards a fractionation-based verification Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (2032-2039)
- UL Muram F, Tran H and Zdun U (2019). Supporting automated containment checking of software behavioural models using model transformations and model checking, Science of Computer Programming, 174:C, (38-71), Online publication date: 1-Apr-2019.
- Peixoto R, da Silva L and Perkusich A (2019). Model-based testing of software for automation systems using heuristics and coverage criterion, Software and Systems Modeling (SoSyM), 18:2, (797-823), Online publication date: 1-Apr-2019.
- Sobrinho A, da Silva L, Perkusich A, Cunha P, Cordeiro T and Lima A (2019). Formal modeling of biomedical signal acquisition systems: source of evidence for certification, Software and Systems Modeling (SoSyM), 18:2, (1467-1485), Online publication date: 1-Apr-2019.
- Zaraket F, Jaber M, Noureddine M and Falcone Y (2019). From high-level modeling toward efficient and trustworthy circuits, International Journal on Software Tools for Technology Transfer (STTT), 21:2, (143-163), Online publication date: 1-Apr-2019.
- Mülle J, Tex C and Böhm K (2019). A practical data-flow verification scheme for business processes, Information Systems, 81:C, (136-151), Online publication date: 1-Mar-2019.
- Abbasi R, Ghassemi F and Khosravi R (2019). Verification of asynchronous systems with an unspecified component, Acta Informatica, 56:2, (161-203), Online publication date: 1-Mar-2019.
- Ogata K (2019). A divide & conquer approach to liveness model checking under fairness & anti-fairness assumptions, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:1, (51-72), Online publication date: 1-Feb-2019.
- Hübner F, Huang W and Peleska J (2019). Experimental evaluation of a novel equivalence class partition testing strategy, Software and Systems Modeling (SoSyM), 18:1, (423-443), Online publication date: 1-Feb-2019.
- Gabmeyer S, Kaufmann P, Seidl M, Gogolla M and Kappel G (2019). A feature-based classification of formal verification techniques for software models, Software and Systems Modeling (SoSyM), 18:1, (473-498), Online publication date: 1-Feb-2019.
- Khan A, Mallet F and Rashid M (2019). A framework to specify system requirements using natural interpretation of UML/MARTE diagrams, Software and Systems Modeling (SoSyM), 18:1, (11-37), Online publication date: 1-Feb-2019.
- Huang B, Zhang H, Subramanyan P, Vizel Y, Gupta A and Malik S (2018). Instruction-Level Abstraction (ILA), ACM Transactions on Design Automation of Electronic Systems, 24:1, (1-24), Online publication date: 11-Jan-2019.
- Aceto L, Achilleos A, Francalanza A, Ingólfsdóttir A and Lehtinen K (2019). Adventures in monitorability: from branching to linear time and back again, Proceedings of the ACM on Programming Languages, 3:POPL, (1-29), Online publication date: 2-Jan-2019.
- Bae K and Lee J (2019). Bounded model checking of signal temporal logic properties using syntactic separation, Proceedings of the ACM on Programming Languages, 3:POPL, (1-30), Online publication date: 2-Jan-2019.
- Bernardeschi C, Mercaldo F, Nardone V and Santone A (2020). Exploiting Model Checking for Mobile Botnet Detection, Procedia Computer Science, 159:C, (963-972), Online publication date: 1-Jan-2019.
- Anevlavis T, Philippe M, Neider D and Tabuada P Verifying rLTL formulas: now faster than ever before! 2018 IEEE Conference on Decision and Control (CDC), (1556-1561)
- Bahrami A, De Maria E and Felty A Modelling and Verifying Dynamic Properties of Biological Neural Networks in Coq Proceedings of the 9th International Conference on Computational Systems-Biology and Bioinformatics, (1-11)
- Egger B, Song E, Lee H and Shin D (2018). Verification of coarse-grained reconfigurable arrays through random test programs, ACM SIGPLAN Notices, 53:6, (76-88), Online publication date: 7-Dec-2018.
- Van T, Fredivianus N, Tran H, Geihs K and Huynh T Formal Verification of ALICA Multi-agent Plans Using Model Checking Proceedings of the 9th International Symposium on Information and Communication Technology, (351-358)
- Ghosh K Computation of Kullback-Leibler Divergence Between Labeled Stochastic Systems with Non-identical State Spaces Algorithmic Aspects in Information and Management, (233-243)
- Khan W, Ullah H, Ahmad A, Sultan K, Alzahrani A, Khan S, Alhumaid M and Abdulaziz S (2018). CrashSafe, Human-centric Computing and Information Sciences, 8:1, (1-24), Online publication date: 1-Dec-2018.
- Kantaros Y, Johnson B, Chowdhury S, Cappelleri D and Zavlanos M (2018). Control of Magnetic Microrobot Teams for Temporal Micromanipulation Tasks, IEEE Transactions on Robotics, 34:6, (1472-1489), Online publication date: 1-Dec-2018.
- Ali S (2018). Formal verification of SysML diagram using case studies of real-time system, Innovations in Systems and Software Engineering, 14:4, (245-262), Online publication date: 1-Dec-2018.
- Peleska J, Brauer J and Huang W Model-Based Testing for Avionic Systems Proven Benefits and Further Challenges Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, (82-103)
- Bu L, Peled D, Shen D and Tzirulnikov Y Chasing Errors Using Biasing Automata Leveraging Applications of Formal Methods, Verification and Validation. Verification, (271-286)
- Given-Wilson T and Legay A X-by-C: Non-functional Security Challenges Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (486-501)
- Lybecait M, Kopetzki D and Steffen B Design for ‘X’ Through Model Transformation Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (381-398)
- Voelter M Fusing Modeling and Programming into Language-Oriented Programming Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (309-339)
- Wang J, Sun J, Yuan Q and Pang J (2018). Learning probabilistic models for model checking, International Journal on Software Tools for Technology Transfer (STTT), 20:6, (689-704), Online publication date: 1-Nov-2018.
- Rhein A, Liebig J, Janker A, Kästner C and Apel S (2018). Variability-Aware Static Analysis at Scale, ACM Transactions on Software Engineering and Methodology, 27:4, (1-33), Online publication date: 31-Oct-2018.
- Li Y, Duan K, Jansen D, Pang J, Zhang L, Lv Y and Cai S (2018). An Automatic Proving Approach to Parameterized Verification, ACM Transactions on Computational Logic, 19:4, (1-25), Online publication date: 31-Oct-2018.
- Tzoref-Brill R and Maoz S Modify, enhance, select: co-evolution of combinatorial models and test plans Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (235-245)
- Eljadiri L, Assayad I and Zakari A Generic Verification of Safety Properties For SystemC Programs Using Incomplete Interactions Proceedings of the 2nd International Conference on Smart Digital Environment, (166-171)
- Roop P, Pearce H and Monadjem K Synchronous neural networks for cyber-physical systems Proceedings of the 16th ACM-IEEE International Conference on Formal Methods and Models for System Design, (33-42)
- Shin S, Chaouch K, Nejati S, Sabetzadeh M, Briand L and Zimmer F HITECS Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, (357-367)
- Lazreg S, Collet P and Mosser S (2018). Functional feasibility analysis of variability-intensive data flow-oriented applications over highly-configurable platforms, ACM SIGAPP Applied Computing Review, 18:3, (32-48), Online publication date: 11-Oct-2018.
- Bhagwan R, Kumar R, Maddila C and Philip A Orca Proceedings of the 13th USENIX conference on Operating Systems Design and Implementation, (493-509)
- Pek C and Althoff M Efficient Computation of Invariably Safe States for Motion Planning of Self-Driving Vehicles 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3523-3530)
- Valmari A and Vogler W (2018). Fair testing and stubborn sets, International Journal on Software Tools for Technology Transfer (STTT), 20:5, (589-610), Online publication date: 1-Oct-2018.
- Khamespanah E, Sirjani M, Mechitov K and Agha G (2018). Modeling and analyzing real-time wireless sensor and actuator networks using actors and model checking, International Journal on Software Tools for Technology Transfer (STTT), 20:5, (547-561), Online publication date: 1-Oct-2018.
- Danilov K, Rezin R, Afanasyev I and Kolotov A Towards Blockchain-Based Robonomics: Autonomous Agents Behavior Validation 2018 International Conference on Intelligent Systems (IS), (222-227)
- Wang X, Hovakimyan N and Sha L (2018). RSimplex, ACM Transactions on Cyber-Physical Systems, 2:4, (1-26), Online publication date: 18-Sep-2018.
- Chivilikhin D, Buzhinskv I, Ulvantsev V, Stankevich A, Shalyto A and Vyatkin V Counterexample-guided inference of controller logic from execution traces and temporal formulas 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), (91-98)
- Khosrowjerdi H and Meinke K Learning-based testing for autonomous systems using spatial and temporal requirements Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, (6-15)
- Abdessalem R, Panichella A, Nejati S, Briand L and Stifter T Testing autonomous cars for feature interaction failures using many-objective search Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (143-154)
- Liu Y Logic programming applications Declarative Logic Programming, (519-548)
- Martinelli F, Mercaldo F, Nardone V, Santone A, Sangaiah A and Cimitile A (2022). Evaluating model checking for cyber threats code obfuscation identification, Journal of Parallel and Distributed Computing, 119:C, (203-218), Online publication date: 1-Sep-2018.
- Abd Elkader K, Grumberg O, Păsăreanu C and Shoham S (2018). Automated circular assume-guarantee reasoning, Formal Aspects of Computing, 30:5, (571-595), Online publication date: 1-Sep-2018.
- Mayr F and Yovine S Regular Inference on Artificial Neural Networks Machine Learning and Knowledge Extraction, (350-369)
- Stoenescu R, Dumitrescu D, Popovici M, Negreanu L and Raiciu C Debugging P4 programs with vera Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, (518-532)
- Bianchi F, Margara A and Pezze M (2018). A Survey of Recent Trends in Testing Concurrent Software Systems, IEEE Transactions on Software Engineering, 44:8, (747-783), Online publication date: 1-Aug-2018.
- Wong K, Ehlers R and Kress-Gazit H (2018). Resilient, Provably-Correct, and High-Level Robot Behaviors, IEEE Transactions on Robotics, 34:4, (936-952), Online publication date: 1-Aug-2018.
- Picinin D, Farines J, Santos C and Koliver C (2018). A design-oriented method to build correct hypermedia documents, Multimedia Tools and Applications, 77:16, (21003-21032), Online publication date: 1-Aug-2018.
- Huang W and Peleska J (2018). Model-based testing strategies and their (in)dependence on syntactic model representations, International Journal on Software Tools for Technology Transfer (STTT), 20:4, (441-465), Online publication date: 1-Aug-2018.
- Matos Pedro A, Pinto J, Pereira D and Pinho L (2018). Runtime verification of autopilot systems using a fragment of MTL-$${\int }$$?, International Journal on Software Tools for Technology Transfer (STTT), 20:4, (379-395), Online publication date: 1-Aug-2018.
- Jing Y and Miner A (2018). Computation tree measurement language (CTML), Formal Aspects of Computing, 30:3-4, (443-462), Online publication date: 1-Aug-2018.
- Kouvaros P, Lomuscio A and Pirovano E Symbolic synthesis of fault-tolerance ratios in parameterised multi-agent systems Proceedings of the 27th International Joint Conference on Artificial Intelligence, (324-330)
- Khurshid S, Păsăreanu C and Visser W Test input generation with Java PathFinder: then and now (invited talk abstract) Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (1-2)
- Le T and Lo D Deep specification mining Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (106-117)
- Papapanagiotou P, Davoust A, Murray-Rust D, Manataki A, Van Kleek M, Shadbolt N and Robertson D Social Machines for All Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (1208-1212)
- Chen J, Moarref S and Kress-Gazit H Verifiable Control of Robotic Swarm from High-level Specifications Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (568-576)
- Jamroga W, Penczek W, Dembiński P and Mazurkiewicz A Towards Partial Order Reductions for Strategic Ability Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (156-165)
- Egger B, Song E, Lee H and Shin D Verification of coarse-grained reconfigurable arrays through random test programs Proceedings of the 19th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems, (76-88)
- Mili S, Nguyen N and Chelouah R Attack Modeling and Verification for Connected System Security 2018 13th Annual Conference on System of Systems Engineering (SoSE), (157-162)
- Mazzanti F, Ferrari A and Spagnolo G (2018). Towards formal methods diversity in railways, International Journal on Software Tools for Technology Transfer (STTT), 20:3, (263-288), Online publication date: 1-Jun-2018.
- Tsigkanos C, Li N, Jin Z, Hu Z and Ghezzi C On early statistical requirements validation of cyber-physical space systems Proceedings of the 4th International Workshop on Software Engineering for Smart Cyber-Physical Systems, (13-18)
- Yu H Combining symbolic execution and model checking to verify MPI programs Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, (527-530)
- Yu H, Chen Z, Wang J, Su Z and Dong W Symbolic verification of regular properties Proceedings of the 40th International Conference on Software Engineering, (871-881)
- Ghosh S, Berkenkamp F, Ranade G, Qadeer S and Kapoor A Verifying Controllers Against Adversarial Examples with Bayesian Optimization 2018 IEEE International Conference on Robotics and Automation (ICRA), (7306-7313)
- Seipp J and Helmert M (2019). Counterexample-guided Cartesian abstraction refinement for classical planning, Journal of Artificial Intelligence Research, 62:1, (535-577), Online publication date: 1-May-2018.
- Bakar N and Selamat A (2018). Agent systems verification, Applied Intelligence, 48:5, (1251-1274), Online publication date: 1-May-2018.
- Li Y and Liu J ROCS Proceedings of the 21st International Conference on Hybrid Systems: Computation and Control (part of CPS Week), (130-135)
- Dutreix M and Coogan S Efficient verification for stochastic mixed monotone systems Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, (150-161)
- Lazreg S, Collet P and Mosser S Assessing the functional feasibility of variability-intensive data flow-oriented systems Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (2066-2075)
- He F, Gao Y and Yin L (2018). Efficient software product-line model checking using induction and a SAT solver, Frontiers of Computer Science: Selected Publications from Chinese Universities, 12:2, (264-279), Online publication date: 1-Apr-2018.
- Dokhanchi A, Hoxha B and Fainekos G (2017). Formal Requirement Debugging for Testing and Verification of Cyber-Physical Systems, ACM Transactions on Embedded Computing Systems, 17:2, (1-26), Online publication date: 31-Mar-2018.
- Muram F, Tran H and Zdun U (2017). Systematic Review of Software Behavioral Model Consistency Checking, ACM Computing Surveys, 50:2, (1-39), Online publication date: 31-Mar-2018.
- Neto S, Zrate L and Song M (2018). Handling high dimensionality contexts in formal concept analysis via binary decision diagrams, Information Sciences: an International Journal, 429:C, (361-376), Online publication date: 1-Mar-2018.
- Li J, Zhang L, Zhu S, Pu G, Vardi M and He J (2018). An explicit transition system construction approach to LTL satisfiability checking, Formal Aspects of Computing, 30:2, (193-217), Online publication date: 1-Mar-2018.
- Lanna A, Castro T, Alves V, Rodrigues G, Schobbens P and Apel S (2018). Feature-family-based reliability analysis of software product lines, Information and Software Technology, 94:C, (59-81), Online publication date: 1-Feb-2018.
- Ulyantsev V, Buzhinsky I and Shalyto A (2018). Exact finite-state machine identification from scenarios and temporal properties, International Journal on Software Tools for Technology Transfer (STTT), 20:1, (35-55), Online publication date: 1-Feb-2018.
- Su T, Wu K, Miao W, Pu G, He J, Chen Y and Su Z (2017). A Survey on Data-Flow Testing, ACM Computing Surveys, 50:1, (1-35), Online publication date: 31-Jan-2018.
- Lin B and Xie F SCbench Proceedings of the 23rd Asia and South Pacific Design Automation Conference, (440-445)
- Wang K, Khurshid S and Gligoric M (2018). JPR, ACM SIGSOFT Software Engineering Notes, 42:4, (1-5), Online publication date: 11-Jan-2018.
- Chalupa M, Chatterjee K, Pavlogiannis A, Sinha N and Vaidya K (2017). Data-centric dynamic partial order reduction, Proceedings of the ACM on Programming Languages, 2:POPL, (1-30), Online publication date: 1-Jan-2018.
- Holík L, Janků P, Lin A, Rümmer P and Vojnar T (2017). String constraints with concatenation and transducers solved efficiently, Proceedings of the ACM on Programming Languages, 2:POPL, (1-32), Online publication date: 1-Jan-2018.
- Sardar M, Afaq N, Hasan O and Hoque K (2018). Towards Probabilistic Formal Analysis of SATS-Simultaneously Moving Aircraft (SATS-SMA), Journal of Automated Reasoning, 60:1, (85-105), Online publication date: 1-Jan-2018.
- Afanasov M, Mottola L and Ghezzi C (2018). Software Adaptation in Wireless Sensor Networks, ACM Transactions on Autonomous and Adaptive Systems, 12:4, (1-29), Online publication date: 31-Dec-2018.
- De Maria E, Di Giusto C and Ciatto G Formal Validation of Neural Networks as Timed Automata Proceedings of the 8th International Conference on Computational Systems-Biology and Bioinformatics, (15-22)
- Doud K and Yilmaz L A framework for formal automated analysis of simulation experiments using probabilistic model checking Proceedings of the 2017 Winter Simulation Conference, (1-12)
- Sirjani M, Khamespanah E, Mechitov K and Agha G (2017). A compositional approach for modeling and timing analysis of wireless sensor and actuator networks, ACM SIGBED Review, 14:3, (49-56), Online publication date: 22-Nov-2017.
- Chumakova N, Olenev V and Lavrovskaya I Conformance Testing of the STP-ISS Protocol Implementation by Means of Temporal Logic Proceedings of the 21st Conference of Open Innovations Association FRUCT, (71-78)
- Makowsky J and Zamansky A (2017). Keeping logic in the trivium of computer science, Formal Methods in System Design, 51:2, (419-430), Online publication date: 1-Nov-2017.
- Demasi R, Castro P, Maibaum T and Aguirre N (2017). Simulation relations for fault-tolerance, Formal Aspects of Computing, 29:6, (1013-1050), Online publication date: 1-Nov-2017.
- Lin S, Sun J, Xiao H, Liu Y, Sanán D and Hansen H FiB: squeezing loop invariants by interpolation between Forward/Backward predicate transformers Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (793-803)
- Tata S, Klai K and Jain R Formal Model and Method to Decompose Process-Aware IoT Applications On the Move to Meaningful Internet Systems. OTM 2017 Conferences, (663-680)
- Ghazel M (2017). A Control Scheme for Automatic Level Crossings Under the ERTMS/ETCS Level 2/3 Operation, IEEE Transactions on Intelligent Transportation Systems, 18:10, (2667-2680), Online publication date: 1-Oct-2017.
- Luo Z, Zheng M and Siegel S Verification of MPI programs using CIVL Proceedings of the 24th European MPI Users' Group Meeting, (1-11)
- Ovsiannikova P, Chivilikhin D, Ulyantsev V and Shalyto A Closed-loop verification of a compensating group drive model using synthesized formal plant model 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (1-4)
- Buzhinsky I and Vyatkin V Testing automation systems by means of model checking 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (1-7)
- Buzhinsky I and Vyatkin V Modular plant model synthesis from behavior traces and temporal properties 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (1-7)
- Kozachok A (2017). Formal logical language to set requirements for secure code execution, Programming and Computing Software, 43:5, (314-319), Online publication date: 1-Sep-2017.
- Kamide N and Yano R (2017). Logics and translations for hierarchical model checking, Procedia Computer Science, 112:C, (31-40), Online publication date: 1-Sep-2017.
- Abushark Y, Thangarajah J, Harland J and Miller T (2017). A framework for automatically ensuring the conformance of agent designs, Journal of Systems and Software, 131:C, (266-310), Online publication date: 1-Sep-2017.
- Yu H Practical symbolic verification of regular properties Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (1053-1055)
- Tsigkanos C, Kehrer T and Ghezzi C Modeling and verification of evolving cyber-physical spaces Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (38-48)
- Huang X and Ruan J ATL strategic reasoning meets correlated equilibrium Proceedings of the 26th International Joint Conference on Artificial Intelligence, (1102-1108)
- Belardinelli F and Herzig A Dynamic logic for data-aware systems Proceedings of the 26th International Joint Conference on Artificial Intelligence, (821-827)
- Belardinelli F, Kouvaros P and Lomuscio A Parameterised verification of data-aware multi-agent systems Proceedings of the 26th International Joint Conference on Artificial Intelligence, (98-104)
- Avni G, Guha S and Kupferman O An abstraction-refinement methodology for reasoning about network games Proceedings of the 26th International Joint Conference on Artificial Intelligence, (70-76)
- Francalanza A, Aceto L and Ingolfsdottir A (2017). Monitorability for the Hennessy---Milner logic with recursion, Formal Methods in System Design, 51:1, (87-116), Online publication date: 1-Aug-2017.
- Husien I, Berthier N and Schewe S A hot method for synthesising cool controllers Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, (122-131)
- Dini N, Yelen C and Khurshid S Optimizing parallel Korat using invalid ranges Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, (182-191)
- Kiefer S, Mayr R, Shirmohammadi M and Wojtczak D Parity objectives in countable MDPs Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (1-11)
- Quaas K, Shirmohammadi M and Worrell J Revisiting reachability in timed automata Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (1-12)
- Wu M, Zeng H, Wang C and Yu H Safety Guard Proceedings of the 54th Annual Design Automation Conference 2017, (1-6)
- Mancini T, Mari F, Massini A, Melatti I, Salvo I and Tronci E (2017). On minimising the maximum expected verification time, Information Processing Letters, 122:C, (8-16), Online publication date: 1-Jun-2017.
- Al Zamil M, Samarah S, Rawashdeh M and Hossain M (2017). An ODT-based abstraction for mining closed sequential temporal patterns in IoT-cloud smart homes, Cluster Computing, 20:2, (1815-1829), Online publication date: 1-Jun-2017.
- Asteasuain F and Braberman V (2017). Declaratively building behavior by means of scenario clauses, Requirements Engineering, 22:2, (239-274), Online publication date: 1-Jun-2017.
- Cailliau A and van Lamsweerde A Runtime monitoring and resolution of probabilistic obstacles to system goals Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (1-11)
- Barbosa D, de Moura Lima R, Maia P and Junior E Lotus@Runtime Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (24-30)
- Tzoref-Brill R and Maoz S Syntactic and semantic differencing for combinatorial models of test designs Proceedings of the 39th International Conference on Software Engineering, (621-631)
- Anthonysamy P, Rashid A and Chitchyan R Privacy requirements Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track, (13-22)
- Tan T, Xue Y, Chen M, Liu S, Yu Y and Sun J JSFox Proceedings of the 39th International Conference on Software Engineering Companion, (256-258)
- Bataineh A, Bentahar J, El Menshawy M and Dssouli R (2017). Specifying and verifying contract-driven service compositions using commitments and model checking, Expert Systems with Applications: An International Journal, 74:C, (151-184), Online publication date: 15-May-2017.
- Konnov I, Lazić M, Veith H and Widder J (2017). A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms, ACM SIGPLAN Notices, 52:1, (719-734), Online publication date: 11-May-2017.
- Kobayashi N, Lozes É and Bruse F (2017). On the relationship between higher-order recursion schemes and higher-order fixpoint logic, ACM SIGPLAN Notices, 52:1, (246-259), Online publication date: 11-May-2017.
- D'Antoni L and Veanes M (2017). Monadic second-order logic on finite sequences, ACM SIGPLAN Notices, 52:1, (232-245), Online publication date: 11-May-2017.
- Belardinelli F, Lomuscio A, Murano A and Rubin S Verification of Multi-agent Systems with Imperfect Information and Public Actions Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (1268-1276)
- Wang C and Schaumont P (2017). Security by compilation, ACM SIGLOG News, 4:2, (76-89), Online publication date: 3-May-2017.
- Zurowska K and Dingel J (2017). Language-specific model checking of UML-RT models, Software and Systems Modeling (SoSyM), 16:2, (393-415), Online publication date: 1-May-2017.
- Duarte L, Kramer J and Uchitel S (2017). Using contexts to extract models from code, Software and Systems Modeling (SoSyM), 16:2, (523-557), Online publication date: 1-May-2017.
- Seki H (2017). On dual programs in co-logic programming and the Horn -calculus, Formal Aspects of Computing, 29:3, (401-421), Online publication date: 1-May-2017.
- Greitschus M, Dietsch D, Heizmann M, Nutz A, Schätzle C, Schilling C, Schüssele F and Podelski A Ultimate Taipan Proceedings, Part II, of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10206, (399-403)
- Sankur O and Talpin J An Abstraction Technique for Parameterized Model Checking of Leader Election Protocols Proceedings, Part I, of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10205, (23-40)
- Beek M, Vink E and Willemse T Family-Based Model Checking with mCRL2 Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (387-405)
- Wang J, Sun J, Yuan Q and Pang J Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (3-21)
- Siirtola A, Tripakis S and Heljanko K (2017). When Do We Not Need Complex Assume-Guarantee Rules?, ACM Transactions on Embedded Computing Systems, 16:2, (1-25), Online publication date: 14-Apr-2017.
- Basile D, Di Giandomenico F and Gnesi S Statistical model checking of an energy-saving cyber-physical system in the railway domain Proceedings of the Symposium on Applied Computing, (1356-1363)
- Hu J, Khan K, Zhang Y, Bai Y and Li R (2017). Role updating in information systems using model checking, Knowledge and Information Systems, 51:1, (187-234), Online publication date: 1-Apr-2017.
- Arcaini P, Gargantini A and Riccobene E (2017). Rigorous development process of a safety-critical system, International Journal on Software Tools for Technology Transfer (STTT), 19:2, (247-269), Online publication date: 1-Apr-2017.
- Sankaranarayanan S, Kumar S, Cameron F, Bequette B, Fainekos G and Maahs D (2017). Model-based falsification of an artificial pancreas control system, ACM SIGBED Review, 14:2, (24-33), Online publication date: 31-Mar-2017.
- Jäschke C, Herter U, Wolkober C, Schmitt C and Zoellin C Static netlist verification for IBM high-frequency processors using a tree-grammar Proceedings of the Conference on Design, Automation & Test in Europe, (1556-1561)
- Bukhari S, Lodhi F, Hasan O, Shafique M and Henkel J CAnDy-TM Proceedings of the Conference on Design, Automation & Test in Europe, (1289-1292)
- Alur R and Tripakis S (2017). Automatic Synthesis of Distributed Protocols, ACM SIGACT News, 48:1, (55-90), Online publication date: 10-Mar-2017.
- Xie D, Xiong W, Bu L and Li X (2017). Deriving Unbounded Reachability Proof of Linear Hybrid Automata during Bounded Checking Procedure, IEEE Transactions on Computers, 66:3, (416-430), Online publication date: 1-Mar-2017.
- Bolton M, Zheng X, Molinaro K, Houser A and Li M (2017). Improving the scalability of formal human---automation interaction verification analyses that use task-analytic models, Innovations in Systems and Software Engineering, 13:1, (1-17), Online publication date: 1-Mar-2017.
- Huang W and Peleska J (2017). Complete model-based equivalence class testing for nondeterministic systems, Formal Aspects of Computing, 29:2, (335-364), Online publication date: 1-Mar-2017.
- Kouvaros P and Lomuscio A Parameterised verification of infinite state multi-agent systems via predicate abstraction Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (3013-3020)
- (2017). An improved genetic algorithm for task scheduling in the cloud environments using the priority queues, Journal of Systems and Software, 124:C, (1-21), Online publication date: 1-Feb-2017.
- Lochau M, Bürdek J, Hölzle S and Schürr A (2017). Specification and automated validation of staged reconfiguration processes for dynamic software product lines, Software and Systems Modeling (SoSyM), 16:1, (125-152), Online publication date: 1-Feb-2017.
- Ye K and Woodcock J (2017). Model checking of state-rich formalism [InlineEquation not available, International Journal on Software Tools for Technology Transfer (STTT), 19:1, (73-96), Online publication date: 1-Feb-2017.
- Lomuscio A, Qu H and Raimondi F (2017). MCMAS, International Journal on Software Tools for Technology Transfer (STTT), 19:1, (9-30), Online publication date: 1-Feb-2017.
- Ahmed W, Hasan O, Pervez U and Qadir J (2017). Reliability modeling and analysis of communication networks, Journal of Network and Computer Applications, 78:C, (191-215), Online publication date: 15-Jan-2017.
- Konnov I, Lazić M, Veith H and Widder J A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (719-734)
- Kobayashi N, Lozes É and Bruse F On the relationship between higher-order recursion schemes and higher-order fixpoint logic Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (246-259)
- D'Antoni L and Veanes M Monadic second-order logic on finite sequences Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (232-245)
- Huang S and Huang J (2016). Maximal causality reduction for TSO and PSO, ACM SIGPLAN Notices, 51:10, (447-461), Online publication date: 5-Dec-2016.
- Shan L and Qin Z (2016). A fast transition of linear temporal logic formulae to transition-based Büchi automata, International Journal of Computer Applications in Technology, 53:1, (62-70), Online publication date: 1-Dec-2016.
- Vanden Broucke S, Caron F, Lismont J, Vanthienen J and Baesens B (2016). On the gap between reality and registration, Information Technology and Management, 17:4, (393-410), Online publication date: 1-Dec-2016.
- John A and Chakraborty S (2016). A layered algorithm for quantifier elimination from linear modular constraints, Formal Methods in System Design, 49:3, (272-323), Online publication date: 1-Dec-2016.
- Khalili A, Narizzano M and Tacchella A Learning for Verification in Embedded Systems: A Case Study AI*IA 2016 Advances in Artificial Intelligence, (525-538)
- Vázquez de Parga M, García P and López D (2016). A sufficient condition to polynomially compute a minimum separating DFA, Information Sciences: an International Journal, 370:C, (204-220), Online publication date: 20-Nov-2016.
- Rehman W, Ayub M and Siddiqui J (2016). Verification of MPI Java programs using software model checking, ACM SIGPLAN Notices, 51:8, (1-2), Online publication date: 9-Nov-2016.
- Bloemen V, Laarman A and van de Pol J (2016). Multi-core on-the-fly SCC decomposition, ACM SIGPLAN Notices, 51:8, (1-12), Online publication date: 9-Nov-2016.
- Barreto F, Batista D, dos Santos J and Muchaluat-Saade D NCL-Tester Proceedings of the 22nd Brazilian Symposium on Multimedia and the Web, (91-94)
- Bernardini A, Ecker W and Schlichtmann U Where formal verification can help in functional safety analysis 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-8)
- Hao J, Kang E, Sun J and Jackson D Designing minimal effective normative systems with the help of lightweight formal methods Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, (50-60)
- Lamprecht A, Steffen B and Margaria T (2016). Scientific workflows with the jABC framework, International Journal on Software Tools for Technology Transfer (STTT), 18:6, (629-651), Online publication date: 1-Nov-2016.
- Kirwan R, Miller A and Porr B (2016). Model checking learning agent systems using Promela with embedded C code and abstraction, Formal Aspects of Computing, 28:6, (1027-1056), Online publication date: 1-Nov-2016.
- Mehrpouyan H, Giannakopoulou D, Brat G, Tumer I and Hoyle C (2016). Complex Engineered Systems Design Verification Based on Assume-Guarantee Reasoning, Systems Engineering, 19:6, (461-476), Online publication date: 1-Nov-2016.
- Huang S and Huang J Maximal causality reduction for TSO and PSO Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (447-461)
- Kuroiwa T, Aoyama Y and Kushiro N (2016). Testing Environment for CPS by Cooperating Model Checking with Execution Testing, Procedia Computer Science, 96:C, (1341-1350), Online publication date: 1-Oct-2016.
- (2016). Writing and verifying interoperability requirements, Computers in Industry, 82:C, (1-18), Online publication date: 1-Oct-2016.
- Wan W, Bentahar J, Yahyaoui H and Ben Hamza A (2016). Verifying concurrent probabilistic systems using probabilistic-epistemic logic specifications, Applied Intelligence, 45:3, (747-776), Online publication date: 1-Oct-2016.
- Tsigkanos C, Kehrer T and Ghezzi C (2016). Architecting dynamic cyber-physical spaces, Computing, 98:10, (1011-1040), Online publication date: 1-Oct-2016.
- Santos I, Rocha L, Neto P and Andrade R Model Verification of Dynamic Software Product Lines Proceedings of the XXX Brazilian Symposium on Software Engineering, (113-122)
- Situ L, Wang Y, Gao F, Wang L, Bu L, Zhao J and Li X ACSPChecker Proceedings of the 8th Asia-Pacific Symposium on Internetware, (99-102)
- Sampaio G, Borba P and Teixeira L Partially safe evolution of software product lines Proceedings of the 20th International Systems and Software Product Line Conference, (124-133)
- Almagor S, Boker U and Kupferman O (2016). Formally Reasoning About Quality, Journal of the ACM, 63:3, (1-56), Online publication date: 1-Sep-2016.
- Qu H and Veres S (2016). Verification of logical consistency in robotic reasoning, Robotics and Autonomous Systems, 83:C, (44-56), Online publication date: 1-Sep-2016.
- Murthy K, Paul S, Meel K, Cogumbreiro T and Mellor-Crummey J Design and Verification of Distributed Phasers Proceedings of the 22nd International Conference on Euro-Par 2016: Parallel Processing - Volume 9833, (405-418)
- Bellettini C, Camilli M, Capra L and Monga M (2016). Distributed CTL model checking using MapReduce, Concurrency and Computation: Practice & Experience, 28:11, (3025-3041), Online publication date: 10-Aug-2016.
- Metta R, Becker M, Bokil P, Chakraborty S and Venkatesh R (2016). TIC: a scalable model checking based approach to WCET estimation, ACM SIGPLAN Notices, 51:5, (72-81), Online publication date: 1-Aug-2016.
- Magid Y, Tzoref-Brill R and Zalmanovici M Coverage-based metrics for cloud adaptation Proceedings of the 2nd International Workshop on Quality-Aware DevOps, (1-6)
- D'Silva V and Urban C Büchi, Lindenbaum, Tarski Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (4150-4154)
- Huang X, Ruan J, Chen Q and Su K Normative multiagent systems Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (1123-1129)
- Bertello M, Gigante N, Montanari A and Reynolds M Leviathan Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (950-956)
- Huang X, Chen Q, Meng J and Su K Reconfigurability in reactive multiagent systems Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (315-321)
- Shilov N, Shilova S and Bernshtein A (2016). Program schemata technique for propositional program logics, Programming and Computing Software, 42:4, (239-256), Online publication date: 1-Jul-2016.
- Metta R, Becker M, Bokil P, Chakraborty S and Venkatesh R TIC: a scalable model checking based approach to WCET estimation Proceedings of the 17th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, Tools, and Theory for Embedded Systems, (72-81)
- Sardar M, Afaq N, Hoque K, Johnson T and Hasan O Probabilistic Formal Verification of the SATS Concept of Operation Proceedings of the 8th International Symposium on NASA Formal Methods - Volume 9690, (191-205)
- Kahl T (2016). Topological abstraction of higher-dimensional automata, Theoretical Computer Science, 631:C, (97-117), Online publication date: 6-Jun-2016.
- Hajdu Á, Tóth T, Vörös A and Majzik I A Configurable CEGAR Framework with Interpolation-Based Refinements 36th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems - Volume 9688, (158-174)
- Bloem R, Jacobs S, Khalimov A, Konnov I, Rubin S, Veith H and Widder J (2016). Decidability in Parameterized Verification, ACM SIGACT News, 47:2, (53-64), Online publication date: 3-Jun-2016.
- Darvas D, Vörös A and Bartha T (2016). Improving Saturation-based Bounded Model Checking, Acta Cybernetica, 22:3, (573-589), Online publication date: 1-Jun-2016.
- Huang W and Peleska J (2016). Complete model-based equivalence class testing, International Journal on Software Tools for Technology Transfer (STTT), 18:3, (265-283), Online publication date: 1-Jun-2016.
- Bauch P, Havel V and Barnat J (2016). Control Explicit--Data Symbolic Model Checking, ACM Transactions on Software Engineering and Methodology, 25:2, (1-48), Online publication date: 16-May-2016.
- Tsigkanos C, Kehrer T, Ghezzi C, Pasquale L and Nuseibeh B Adding static and dynamic semantics to building information models Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, (1-7)
- Matinnejad R, Nejati S, Briand L and Bruckmann T Automated test suite generation for time-continuous simulink models Proceedings of the 38th International Conference on Software Engineering, (595-606)
- Kouvaros P and Lomuscio A Formal Verification of Opinion Formation in Swarms Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (1200-1208)
- Chilana P, Singh R and Guo P Understanding Conversational Programmers Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (1462-1472)
- Song S, Zhang J, Liu Y, Auguston M, Sun J, Dong J and Chen T (2016). Formalizing and verifying stochastic system architectures using Monterey Phoenix, Software and Systems Modeling (SoSyM), 15:2, (453-471), Online publication date: 1-May-2016.
- Bensalem S, Bozga M, Legay A, Nguyen T, Sifakis J and Yan R (2016). Component-based verification using incremental design and invariants, Software and Systems Modeling (SoSyM), 15:2, (427-451), Online publication date: 1-May-2016.
- Molnár V, Vörös A, Darvas D, Bartha T and Majzik I (2016). Component-wise incremental LTL model checking, Formal Aspects of Computing, 28:3, (345-379), Online publication date: 1-May-2016.
- Kafalı Ö, Singh M and Williams L Toward a normative approach for forensicability Proceedings of the Symposium and Bootcamp on the Science of Security, (65-67)
- Alur R, Moarref S and Topcu U Compositional Synthesis with Parametric Reactive Controllers Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control, (215-224)
- Majumdar R Robots at the Edge of the Cloud Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 9636, (3-13)
- Zeng W, Koutny M, Watson P and Germanos V (2016). Formal verification of secure information flow in cloud computing, Journal of Information Security and Applications, 27:C, (103-116), Online publication date: 1-Apr-2016.
- Fayaz S, Yu T, Tobioka Y, Chaki S and Sekar V BUZZ Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (275-289)
- Hassan M and Patel H MCXplore Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1357-1362)
- Adler J, Maksimovic D and Veneris A Root-cause analysis for memory-locked errors Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1054-1059)
- Ramanathan A, Pullum L, Hussain F, Chakrabarty D and Jha S Integrating symbolic and statistical methods for testing intelligent systems applications to machine learning and computer vision Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (786-791)
- Chivilikhin D, Ulyantsev V and Shalyto A (2016). Modified ant colony algorithm for constructing finite state machines from execution scenarios and temporal formulas, Automation and Remote Control, 77:3, (473-484), Online publication date: 1-Mar-2016.
- Rehman W, Ayub M and Siddiqui J Verification of MPI Java programs using software model checking Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (1-2)
- Bloemen V, Laarman A and van de Pol J Multi-core on-the-fly SCC decomposition Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (1-12)
- Huang X, Chen Q and Su K Strengthening agents strategic ability with communication Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, (2509-2515)
- Berry A, Butler K, Harrington C, Braxton M, Walker A, Pete N, Johnson T, Oberle M, Haselkorn J, Paul Nichol W and Haselkorn M (2016). Using conceptual work products of health care to design health IT, Journal of Biomedical Informatics, 59:C, (15-30), Online publication date: 1-Feb-2016.
- Quesel J, Mitsch S, Loos S, Aréchiga N and Platzer A (2016). How to model and prove hybrid systems with KeYmaera: a tutorial on safety, International Journal on Software Tools for Technology Transfer (STTT), 18:1, (67-91), Online publication date: 1-Feb-2016.
- Shi H and Li Y (2016). Temporal normal form for Linear Temporal Logic formulae , Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 30:3, (1657-1662), Online publication date: 1-Jan-2016.
- Feng Y, Wang X, Dillig I and Lin C (2015). EXPLORER : query- and demand-driven exploration of interprocedural control flow properties, ACM SIGPLAN Notices, 50:10, (520-534), Online publication date: 18-Dec-2015.
- Wang H, Duan Z and Tian C Symbolic Model Checking for Alternating Projection Temporal Logic Proceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 9486, (481-495)
- Le T, Le X, Lo D and Beschastnikh I Synergizing specification miners through model fissions and fusions Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (115-125)
- Groce A, Ahmed I, Jensen C and McKenney P How verified is my code? Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (737-748)
- Gerasimou S, Tamburrelli G and Calinescu R Search-based synthesis of probabilistic models for quality-of-service software engineering Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (319-330)
- Moszkowski B and Guelev D An Application of Temporal Projection toźInterleaving Concurrency Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - Volume 9409, (153-167)
- Golnari A, Vizel Y and Malik S Error-Tolerant Processors Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, (286-293)
- Kamkin A (2015). Projecting transition systems, Programming and Computing Software, 41:6, (311-324), Online publication date: 1-Nov-2015.
- Aarts F, Fiterau-Brostean P, Kuppens H and Vaandrager F Learning Register Automata with Fresh Value Generation Proceedings of the 12th International Colloquium on Theoretical Aspects of Computing - ICTAC 2015 - Volume 9399, (165-183)
- Feng Y, Wang X, Dillig I and Lin C EXPLORER : query- and demand-driven exploration of interprocedural control flow properties Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (520-534)
- Štill V, RoăźKai P and Barnat J Weak Memory Models as LLVM-to-LLVM Transformations Revised Selected Papers of the 10th International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science - Volume 9548, (144-155)
- Gesbert N, Genevès P and Layaïda N (2015). A Logical Approach to Deciding Semantic Subtyping, ACM Transactions on Programming Languages and Systems, 38:1, (1-31), Online publication date: 16-Oct-2015.
- Meller Y, Grumberg O and Yorav K Learning-Based Compositional Model Checking of Behavioral UML Systems Revised Selected Papers of the 12th International Conference on Formal Aspects of Component Software - Volume 9539, (275-293)
- Nghiem T and Mangharam R Scalable scheduling of energy control systems Proceedings of the 12th International Conference on Embedded Software, (137-146)
- Raman V, Falt M, Wongpiromsarn T and Murray R Online horizon selection in receding horizon temporal logic planning 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3493-3499)
- Agarwal C, Hylander P, Mahajan Y, Michelson J and Singhal V Compositional reasoning gotchas in practice Proceedings of the 15th Conference on Formal Methods in Computer-Aided Design, (17-24)
- Benenson Z, Lenzini G, Oliveira D, Parkin S and Uebelacker S Maybe Poor Johnny Really Cannot Encrypt Proceedings of the 2015 New Security Paradigms Workshop, (85-99)
- Tóth T, Vörös A and Majzik I A Decomposition Method for the Verification of a Real-Time Safety-Critical Protocol Proceedings of the 7th International Workshop on Software Engineering for Resilient Systems - Volume 9274, (31-45)
- Wang J, Ding X, Lahijanian M, Paschalidis I and Belta C (2015). Temporal logic motion control using actor–critic methods, International Journal of Robotics Research, 34:10, (1329-1344), Online publication date: 1-Sep-2015.
- Metric interval temporal logic specification elicitation and debugging Proceedings of the 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign, (70-79)
- Amato F, De Paola F, Diomaiuta C, Giugni M, Mazzocca N and Moscato F (2015). A Model Driven Approach to Water Resource Analysis based on Formal Methods and Model Transformation, Procedia Computer Science, 51:C, (562-571), Online publication date: 1-Sep-2015.
- Arcaini P, Gargantini A and Riccobene E Improving model-based test generation by model decomposition Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (119-130)
- Matinnejad R, Nejati S, Briand L and Bruckmann T Effective test suites for mixed discrete-continuous stateflow controllers Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (84-95)
- Sun J, Xiao H, Liu Y, Lin S and Qin S TLV: abstraction through testing, learning, and validation Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (698-709)
- Sinha N and Karim R Responsive designs in a snap Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (544-554)
- Longfield S, Nkounkou B, Manohar R and Tate R (2015). Preventing glitches and short circuits in high-level self-timed chip specifications, ACM SIGPLAN Notices, 50:6, (270-279), Online publication date: 7-Aug-2015.
- Zhang N, Kusano M and Wang C (2015). Dynamic partial order reduction for relaxed memory models, ACM SIGPLAN Notices, 50:6, (250-259), Online publication date: 7-Aug-2015.
- Glinz M and Fricker S (2015). On shared understanding in software engineering, Computer Science - Research and Development, 30:3-4, (363-376), Online publication date: 1-Aug-2015.
- Gutiérrez-Basulto V, Jung J and Schneider T Lightweight temporal description logics with rigid roles and restricted TBoxes Proceedings of the 24th International Conference on Artificial Intelligence, (3015-3021)
- Kouvaros P and Lomuscio A Verifying emergent properties of swarms Proceedings of the 24th International Conference on Artificial Intelligence, (1083-1089)
- Huang X, Chen Q and Su K The complexity of model checking succinct multiagent systems Proceedings of the 24th International Conference on Artificial Intelligence, (1076-1082)
- Steffen B, Lamprecht A and Margaria T User-level synthesis Proceedings of the 19th International Conference on Software Product Line, (427-431)
- ter Beek M, Fantechi A, Gnesi S and Mazzanti F Using FMC for family-based analysis of software product lines Proceedings of the 19th International Conference on Software Product Line, (432-439)
- Sato Y, Hozumi S and Chiba S Calculation coverage testing in scientific applications Proceedings of the 2015 International Symposium on Software Testing and Analysis, (350-360)
- Gui L, Sun J, Liu Y and Dong J Reliability assessment for distributed systems via communication abstraction and refinement Proceedings of the 2015 International Symposium on Software Testing and Analysis, (293-304)
- Seki H On Dual Programs in Co-Logic Programming Revised Selected Papers of the 25th International Symposium on Logic-Based Program Synthesis and Transformation - Volume 9527, (21-35)
- Albrecht S and Ramamoorthy S Are you doing what i think you are doing? criticising uncertain agent models Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, (52-61)
- Poulding S and Feldt R Heuristic Model Checking using a Monte-Carlo Tree Search Algorithm Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1359-1366)
- Kobayashi N and Li X Automata-Based Abstraction Refinement for µHORS Model Checking Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (713-724)
- Autili M, Grunske L, Lumpe M, Pelliccione P and Tang A (2015). Aligning Qualitative, Real-Time, and Probabilistic Property Specification Patterns Using a Structured English Grammar, IEEE Transactions on Software Engineering, 41:7, (620-638), Online publication date: 1-Jul-2015.
- Rosner N, Geldenhuys J, Aguirre N, Visser W and Frias M (2015). BLISS: Improved Symbolic Execution by Bounded Lazy Initialization with SAT Support, IEEE Transactions on Software Engineering, 41:7, (639-660), Online publication date: 1-Jul-2015.
- Seshia S, Sadigh D and Sastry S Formal methods for semi-autonomous driving Proceedings of the 52nd Annual Design Automation Conference, (1-5)
- Longfield S, Nkounkou B, Manohar R and Tate R Preventing glitches and short circuits in high-level self-timed chip specifications Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (270-279)
- Zhang N, Kusano M and Wang C Dynamic partial order reduction for relaxed memory models Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (250-259)
- Kumar Thakur R and Srikant Y Efficient Compilation of Stream Programs for Heterogeneous Architectures Proceedings of the 18th International Workshop on Software and Compilers for Embedded Systems, (38-47)
- Crampton J, Morisset C and Zannone N On Missing Attributes in Access Control Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, (99-109)
- Hao Zheng , Zhen Zhang , Myers C, Rodriguez E and Yingying Zhang (2015). Compositional Model Checking of Concurrent Systems, IEEE Transactions on Computers, 64:6, (1607-1621), Online publication date: 1-Jun-2015.
- Milazzo P, Pardini G, Sestini D and Bove P Case studies of application of probabilistic and statistical model checking in game design Proceedings of the Fourth International Workshop on Games and Software Engineering, (29-35)
- Anthonysamy P and Rashid A Software engineering for privacy in-the-large Proceedings of the 37th International Conference on Software Engineering - Volume 2, (947-948)
- Tsigkanos C, Pasquale L, Ghezzi C and Nuseibeh B Ariadne Proceedings of the 37th International Conference on Software Engineering - Volume 2, (729-732)
- Regis G, Degiovanni R, D'Ippolito N and Aguirre N Specifying event-based systems with a counting fluent temporal logic Proceedings of the 37th International Conference on Software Engineering - Volume 1, (733-743)
- Yi J, Qi D, Tan S and Roychoudhury A (2015). Software Change Contracts, ACM Transactions on Software Engineering and Methodology, 24:3, (1-43), Online publication date: 13-May-2015.
- Herd B, Miles S, Mcburney P and Luck M Quantitative Analysis of Multiagent Systems Through Statistical Model Checking Revised, Selected, and Invited Papers of the Third International Workshop on Engineering Multi-Agent Systems - Volume 9318, (109-130)
- Kim H, Reich J, Gupta A, Shahbaz M, Feamster N and Clark R Kinetic Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (59-72)
- Alechina N, Bulling N, Dastani M and Logan B Practical Run-Time Norm Enforcement with Bounded Lookahead Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (443-451)
- Rubin S Parameterised Verification of Autonomous Mobile-Agents in Static but Unknown Environments Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (199-208)
- Lomuscio A and Michaliszyn J Verifying Multi-Agent Systems by Model Checking Three-valued Abstractions Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (189-198)
- Huang X (2015). Bounded model checking of strategy ability with perfect recall, Artificial Intelligence, 222:C, (182-200), Online publication date: 1-May-2015.
- Fiedor J, Hrubá V, Křena B, Letko Z, Ur S and Vojnar T (2015). Advances in noise-based testing of concurrent software, Software Testing, Verification & Reliability, 25:3, (272-309), Online publication date: 1-May-2015.
- Svoreňová M, Chmelík M, Leahy K, Eniser H, Chatterjee K, Černá I and Belta C Temporal logic motion planning using POMDPs with parity objectives Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, (233-238)
- Svoreňová M, Křetínský J, Chmelík M, Chatterjee K, Černá I and Belta C Temporal logic control for stochastic linear systems using abstraction refinement of probabilistic games Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, (259-268)
- Coogan S and Arcak M Efficient finite abstraction of mixed monotone systems Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, (58-67)
- Gregorio-Rodríguez C, Llana L and Martínez-Torres R Extending mCRL2 with ready simulation and iocos input-output conformance simulation Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1781-1788)
- Kai J, Miao H, Zhao K, Zhou J and Gao H (2015). A Platform for Analyzing Behaviors of Service-Oriented Application Based on the Probabilistic Model Checking, International Journal of Software Innovation, 3:2, (24-38), Online publication date: 1-Apr-2015.
- Rönkkö M, Heikkinen J, Kotovirta V and Chandrasekar V (2015). Automated preprocessing of environmental data, Future Generation Computer Systems, 45:C, (13-24), Online publication date: 1-Apr-2015.
- Nouri A, Bensalem S, Bozga M, Delahaye B, Jegourel C and Legay A (2015). Statistical model checking QoS properties of systems with SBIP, International Journal on Software Tools for Technology Transfer (STTT), 17:2, (171-185), Online publication date: 1-Apr-2015.
- de Matos Pedro A, Pereira D, Pinho L and Pinto J (2015). Logic-based schedulability analysis for compositional hard real-time embedded systems, ACM SIGBED Review, 12:1, (56-64), Online publication date: 27-Mar-2015.
- Genevès P, Layaïda N, Schmitt A and Gesbert N (2015). Efficiently Deciding μ-Calculus with Converse over Finite Trees, ACM Transactions on Computational Logic, 16:2, (1-41), Online publication date: 21-Mar-2015.
- Hoque K, Mohamed O and Savaria Y Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (1635-1640)
- Mezzanzanica M, Boselli R, Cesarini M and Mercorio F (2015). A Model-Based Approach for Developing Data Cleansing Solutions, Journal of Data and Information Quality, 5:4, (1-28), Online publication date: 3-Mar-2015.
- Sotudeh G and Movaghar A (2015). Abstraction and approximation in fuzzy temporal logics and models, Formal Aspects of Computing, 27:2, (309-334), Online publication date: 1-Mar-2015.
- He J, Nguyen D, Arpaci-Dusseau A and Arpaci-Dusseau R Reducing file system tail latencies with Chopper Proceedings of the 13th USENIX Conference on File and Storage Technologies, (119-133)
- Alur R, Henzinger T and Vardi M (2015). Theory in practice for system design and verification, ACM SIGLOG News, 2:1, (46-51), Online publication date: 28-Jan-2015.
- Benduhn F, Thüm T, Lochau M, Leich T and Saake G A Survey on Modeling Techniques for Formal Behavioral Verification of Software Product Lines Proceedings of the 9th International Workshop on Variability Modelling of Software-Intensive Systems, (80-87)
- Saha R, Esparza J, Jha S, Mukund M and Thiagarajan P Distributed Markov Chains Proceedings of the 16th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 8931, (117-134)
- Schubert K, Ludden J, Ayub S, Behrend J, Brock B, Copty F, German S, Hershkovitz O, Horbach H, Jackson J, Keuerleber K, Koesters J, Leitner L, Meil G, Meissner C, Morad R, Nahir A, Paruthi V, Peterson R, Pratt R, Rimon M and Schumann J (2015). Solutions to IBM POWER8 verification challenges, IBM Journal of Research and Development, 59:1, (11:1-11:17), Online publication date: 1-Jan-2015.
- Qadir J and Hasan O (2015). Applying Formal Methods to Networking: Theory, Techniques, and Applications, IEEE Communications Surveys & Tutorials, 17:1, (256-291), Online publication date: 1-Jan-2015.
- Mrasek R, Mülle J and Böhm K (2015). A new verification technique for large processes based on identification of relevant tasks, Information Systems, 47:C, (82-97), Online publication date: 1-Jan-2015.
- Elleuch M, Hasan O, Tahar S and Abid M (2015). Formal probabilistic analysis of detection properties in wireless sensor networks, Formal Aspects of Computing, 27:1, (79-102), Online publication date: 1-Jan-2015.
- Eldib H, Wang C and Schaumont P (2014). Formal Verification of Software Countermeasures against Side-Channel Attacks, ACM Transactions on Software Engineering and Methodology, 24:2, (1-24), Online publication date: 23-Dec-2014.
- Kholy W, Bentahar J, Menshawy M, Qu H and Dssouli R (2014). Conditional Commitments, ACM Transactions on Software Engineering and Methodology, 24:2, (1-49), Online publication date: 23-Dec-2014.
- Kikuchi S Performance Estimation for Business Workflows on Public Cloud Offerings Using Probabilistic Model Checker Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (317-326)
- Deutsch A, Hull R and Vianu V (2014). Automatic Verification of Database-Centric Systems, ACM SIGMOD Record, 43:3, (5-17), Online publication date: 4-Dec-2014.
- Daskalopoulos I, Ahmed M, Hailes S, Roussos G, Delamothe T, Kwon J and Brown L Policy-enabled internet of things deployable platforms for vaccine cold chains Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (295-302)
- Aslam B, Ahmad J, Ali A, Zafar Paracha R, Tareen S, Niazi U and Saeed T (2014). On the modelling and analysis of the regulatory network of dengue virus pathogenesis and clearance, Computational Biology and Chemistry, 53:PB, (277-291), Online publication date: 1-Dec-2014.
- Rathje W and Richards B (2014). A framework for model checking UDP network programs with Java pathfinder, ACM SIGAda Ada Letters, 34:3, (81-86), Online publication date: 26-Nov-2014.
- Shi Y, Wei O and Zhou Y Model checking partial software product line designs Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, (21-29)
- Cordy M, Heymans P, Legay A, Schobbens P, Dawagne B and Leucker M Counterexample guided abstraction refinement of product-line behavioural models Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (190-201)
- Vakili A and Day N Verifying CTL-live properties of infinite state models using an SMT solver Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (213-223)
- Longfield S and Manohar R Removing concurrency for rapid functional verification Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, (332-339)
- Vakili A and Day N Reducing CTL-live Model Checking to First-Order Logic Validity Checking Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design, (215-218)
- Rathje W and Richards B A framework for model checking UDP network programs with Java pathfinder Proceedings of the 2014 ACM SIGAda annual conference on High integrity language technology, (81-86)
- Jörges S and Steffen B Back-To-Back Testing of Model-Based Code Generators Part I of the Proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - Volume 8802, (425-444)
- Aarts F, Howar F, Kuppens H and Vaandrager F Algorithms for Inferring Register Automata Part I of the Proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - Volume 8802, (202-219)
- Woźna-Szcześniak B and Zbrzezny A (2014). Checking MTL Properties of Discrete Timed Automata via Bounded Model Checking, Fundamenta Informaticae, 135:4, (553-568), Online publication date: 1-Oct-2014.
- From visual to logical formalisms for SoC validation Proceedings of the Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign, (165-174)
- Bonet B, Haslum P, Khomenko V, Thiébaux S and Vogler W (2014). Recent advances in unfolding technique, Theoretical Computer Science, 551:C, (84-101), Online publication date: 25-Sep-2014.
- Calvanese D, Ceylan İ, Montali M and Santoso A Verification of Context-Sensitive Knowledge and Action Bases Proceedings of the 14th European Conference on Logics in Artificial Intelligence - Volume 8761, (514-528)
- Yessad A, Mounier I, Labat J, Kordon F and Carron T Have You Found the Error? A Formal Framework for Learning Game Verification Proceedings of the 9th European Conference on Open Learning and Teaching in Educational Communities - Volume 8719, (476-481)
- Thüm T, Meinicke J, Benduhn F, Hentschel M, von Rhein A and Saake G Potential synergies of theorem proving and model checking for software product lines Proceedings of the 18th International Software Product Line Conference - Volume 1, (177-186)
- Cordy M, Willemart M, Dawagne B, Heymans P and Schobbens P An extensible platform for product-line behavioural analysis Proceedings of the 18th International Software Product Line Conference: Companion Volume for Workshops, Demonstrations and Tools - Volume 2, (102-109)
- Meinicke J, Thüm T, Schröter R, Benduhn F and Saake G An overview on analysis tools for software product lines Proceedings of the 18th International Software Product Line Conference: Companion Volume for Workshops, Demonstrations and Tools - Volume 2, (94-101)
- Basu S and Bultan T Automatic verification of interactions in asynchronous systems with unbounded buffers Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, (743-754)
- Kusano M and Wang C Assertion guided abstraction Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, (175-186)
- Yamagata Y, Kong W, Fukuda A, Van Tang N, Ohsaki H and Taguchi K (2014). A formal semantics of extended hierarchical state transition matrices using CSP#, Formal Aspects of Computing, 26:5, (943-962), Online publication date: 1-Sep-2014.
- Armando A, Costa G, Merlo A and Verderame L Enabling BYOD through secure meta-market Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, (219-230)
- Blahoudek F, Duret-Lutz A, Křetínský M and Strejček J Is there a best büchi automaton for explicit model checking? Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, (68-76)
- Sullivan A, Zaeem R, Khurshid S and Marinov D Towards a test automation framework for alloy Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, (113-116)
- Nejati S and Briand L Identifying optimal trade-offs between CPU time usage and temporal constraints using search Proceedings of the 2014 International Symposium on Software Testing and Analysis, (351-361)
- Pastore F, Mariani L, Hyvärinen A, Fedyukovich G, Sharygina N, Sehestedt S and Muhammad A Verification-aided regression testing Proceedings of the 2014 International Symposium on Software Testing and Analysis, (37-48)
- Lomuscio A and Michaliszyn J Model checking unbounded artifact-centric systems Proceedings of the Fourteenth International Conference on Principles of Knowledge Representation and Reasoning, (488-497)
- Gutiérrez-Basulto V, Jung J and Schneider T Lightweight description logics and branching time Proceedings of the Fourteenth International Conference on Principles of Knowledge Representation and Reasoning, (278-287)
- Chatterjee K, Chmelík M and Daca P CEGAR for Qualitative Analysis of Probabilistic Systems Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, (473-490)
- Baier C, Klein J, Klüppelholz S and Wunderlich S Weight monitoring with linear temporal logic Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
- Barceló P and Muñoz P Graph logics with rational relations Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
- Baier C, Dubslaff C and Klüppelholz S Trade-off analysis meets probabilistic model checking Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
- Buzhinsky I, Chivilikhin D, Ulyantsev V and Tsarev F Improving the quality of supervised finite-state machine construction using real-valued variables Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1037-1040)
- Chivilikhin D and Ulyantsev V Inferring automata-based programs from specification with mutation-based ant colony optimization Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (67-68)
- Pan H, Zhang M, Wu H and Chen Y (2014). Quantitative Analysis of Lattice-valued Kripke Structures, Fundamenta Informaticae, 135:3, (269-293), Online publication date: 1-Jul-2014.
- Thüm T, Apel S, Kästner C, Schaefer I and Saake G (2014). A Classification and Survey of Analysis Strategies for Software Product Lines, ACM Computing Surveys, 47:1, (1-45), Online publication date: 1-Jul-2014.
- Ferreira A, Huynen J, Koenig V and Lenzini G A Conceptual Framework to Study Socio-Technical Security Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533, (318-329)
- Cauchi A, Oladimeji P, Niezen G and Thimbleby H Triangulating empirical and analytic techniques for improving number entry user interfaces Proceedings of the 2014 ACM SIGCHI symposium on Engineering interactive computing systems, (243-252)
- Gmeiner A, Konnov I, Schmid U, Veith H and Widder J Tutorial on Parameterized Model Checking of Fault-Tolerant Distributed Algorithms Advanced Lectures of the 14th International School on Formal Methods for Executable Software Models - Volume 8483, (122-171)
- Sayar I and Bhiri M From an abstract specification in event-b toward an UML/OCL model Proceedings of the 2nd FME Workshop on Formal Methods in Software Engineering, (17-23)
- Murugesan A, Feng L, Heimdahl M, Rayadurgam S, Whalen M and Lee I Exploring the twin peaks using probabilistic verification techniques Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture, (18-23)
- Rungta N, Tkachuk O, Person S, Biatek J, Whalen M, Castle J and Gundy-Burlet K Helping system engineers bridge the peaks Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture, (9-13)
- Eldib H, Wang C, Taha M and Schaumont P QMS Proceedings of the 51st Annual Design Automation Conference, (1-6)
- Youn S, Gu C and Kim J Probabilistic Bug Localization via Statistical Inference based on Partially Observed Data Proceedings of the 51st Annual Design Automation Conference, (1-6)
- Carrillo M and Rosenblueth D (2014). CTL update of Kripke models through protections, Artificial Intelligence, 211:1, (51-74), Online publication date: 1-Jun-2014.
- Aceituna D, Do H and Srinivasan S A systematic approach to transforming system requirements into model checking specifications Companion Proceedings of the 36th International Conference on Software Engineering, (165-174)
- Menghi C Verifying incomplete and evolving specifications Companion Proceedings of the 36th International Conference on Software Engineering, (670-673)
- Camilli M Formal verification problems in a big data world: towards a mighty synergy Companion Proceedings of the 36th International Conference on Software Engineering, (638-641)
- Chen M, Tan T, Sun J, Liu Y and Dong J VeriWS: a tool for verification of combined functional and non-functional requirements of web service composition Companion Proceedings of the 36th International Conference on Software Engineering, (564-567)
- Nguyen H, Kästner C and Nguyen T Exploring variability-aware execution for testing plugin-based web applications Proceedings of the 36th International Conference on Software Engineering, (907-918)
- He F, Wang B, Yin L and Zhu L Symbolic assume-guarantee reasoning through BDD learning Proceedings of the 36th International Conference on Software Engineering, (1071-1082)
- Maoz S, Ringert J and Rumpe B Verifying component and connector models against crosscutting structural views Proceedings of the 36th International Conference on Software Engineering, (95-105)
- Peng D, Ewald R and Uhrmacher A Towards semantic model composition via experiments Proceedings of the 2nd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (151-162)
- Vasanta Lakshmi K, Acharya A and Komondoor R Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis Proceedings of the 19th International Symposium on FM 2014: Formal Methods - Volume 8442, (335-350)
- Gasparini L, Norman T, Kollingbaum M and Chen L Severity-Sensitive Robustness Analysis in Normative Systems Revised Selected Papers of the International Workshops on Coordination, Organizations, Institutions, and Norms in Agent Systems X - Volume 9372, (72-88)
- Belardinelli F Verification of non-uniform and unbounded artifact-centric systems Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (717-724)
- Montali M, Calvanese D and De Giacomo G Verification of data-aware commitment-based multiagent system Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (157-164)
- Primiero G, Raimondi F and Rungta N Model checking degrees of belief in a system of agents Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (133-140)
- Dixit M, Ramesh S and Dasgupta P (2014). Time-budgeting: a component based development methodology for real-time embedded systems, Formal Aspects of Computing, 26:3, (591-621), Online publication date: 1-May-2014.
- Coogan S and Arcak M Freeway traffic control from linear temporal logic specifications ICCPS '14: ACM/IEEE 5th International Conference on Cyber-Physical Systems (with CPS Week 2014), (36-47)
- Mazzone S, Pagnozzi M, Fattori A, Reina A, Lanzi A and Bruschi D Improving Mac OS X security through gray box fuzzing technique Proceedings of the Seventh European Workshop on System Security, (1-6)
- Ranjan A, Raha A, Venkataramani S, Roy K and Raghunathan A ASLAN Proceedings of the conference on Design, Automation & Test in Europe, (1-6)
- Siegmund N, von Rhein A and Apel S (2013). Family-based performance measurement, ACM SIGPLAN Notices, 49:3, (95-104), Online publication date: 5-Mar-2014.
- Moscato M, Pombo C and Frias M (2014). Dynamite, ACM Transactions on Software Engineering and Methodology, 23:2, (1-37), Online publication date: 1-Mar-2014.
- Yang J, Cui H, Wu J, Tang Y and Hu G (2014). Making parallel programs reliable with stable multithreading, Communications of the ACM, 57:3, (58-69), Online publication date: 1-Mar-2014.
- Eshra A and El-Sayed A (2014). An odd parity checker prototype using DNAzyme finite state machine, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 11:2, (316-324), Online publication date: 1-Mar-2014.
- Pan H, Cao Y, Zhang M and Chen Y (2014). Simulation for lattice-valued doubly labeled transition systems, International Journal of Approximate Reasoning, 55:3, (797-811), Online publication date: 1-Mar-2014.
- Fages F Cells as Machines Proceedings of the 10th International Conference on Distributed Computing and Internet Technology - Volume 8337, (50-67)
- Natarajan A, Mittal N and Garg V Online Algorithms to Generate Slices for Regular Temporal Logic Predicates Proceedings of the 15th International Conference on Distributed Computing and Networking - Volume 8314, (165-180)
- Evangelista S and Kristensen L (2014). A Sweep-Line Method for Büchi Automata-based Model Checking, Fundamenta Informaticae, 131:1, (27-53), Online publication date: 1-Jan-2014.
- Niu J, Reith M and Winsborough W (2014). Formal verification of security properties in trust management policy, Journal of Computer Security, 22:1, (69-153), Online publication date: 1-Jan-2014.
- Fontana P and Cleaveland R (2014). A menagerie of timed automata, ACM Computing Surveys, 46:3, (1-56), Online publication date: 1-Jan-2014.
- Furia C, Meyer B and Velder S (2014). Loop invariants, ACM Computing Surveys, 46:3, (1-51), Online publication date: 1-Jan-2014.
- Kryvyi S and Maksymets O (2014). Program Verification, Cybernetics and Systems Analysis, 50:1, (8-16), Online publication date: 1-Jan-2014.
- Bagheri Hariri B, Calvanese D, Montali M, Santoso A and Solomakhin D Verification of Semantically-Enhanced Artifact Systems Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (600-607)
- Masellis R and Su J Runtime Enforcement of First-Order LTL Properties on Data-Aware Business Processes Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (54-68)
- Solomakhin D, Montali M, Tessaris S and Masellis R Verification of Artifact-Centric Systems Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (252-266)
- Schwarz C, Zöbel D and Wagner M (2013). Formal verification of service-oriented adaptive driver assistance systems, ACM SIGBED Review, 10:4, (49-52), Online publication date: 1-Dec-2013.
- Qian Z, Huang H and Song F VTOS: Research on Methodology of “Light-Weight” Formal Design and Verification for Microkernel OS Information and Communications Security, (17-32)
- Sakai Y Analyzing Convergence and Reachability of Asynchronous Iterations 15th International Symposium on Stabilization, Safety, and Security of Distributed Systems - Volume 8255, (360-362)
- Nejati S, Adedjouma M, Briand L, Hellebaut J, Begey J and Clement Y Minimizing CPU time shortage risks in integrated embedded software Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (529-539)
- Artho C, Hagiya M, Potter R, Tanabe Y, Weitl F and Yamamoto M Software model checking for distributed systems with selector-based, non-blocking communication Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (169-179)
- Maezawa Y, Washizaki H, Tanabe Y and Honiden S Automated verification of pattern-based interaction invariants in Ajax applications Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (158-168)
- Zhang S, Sun J, Suny C, Liuz Y, Ma J and Dong J Constraint-based automatic symmetry detection Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (15-25)
- dos Santos J, Braga C and Muchaluat-Saade D Automating the analysis of NCL documents with a model-driven approach Proceedings of the 19th Brazilian symposium on Multimedia and the web, (193-200)
- Gammie P (2013). Synchronous digital circuits as functional programs, ACM Computing Surveys, 46:2, (1-27), Online publication date: 1-Nov-2013.
- Wang X, Duan Z and Zhao L Formalizing and Implementing Types in MSVL Structured Object-Oriented Formal Language and Method, (62-75)
- Siegmund N, von Rhein A and Apel S Family-based performance measurement Proceedings of the 12th international conference on Generative programming: concepts & experiences, (95-104)
- Carrillo O, Chouali S and Mountassir H Incremental Modeling of System Architecture Satisfying SysML Functional Requirements Formal Aspects of Component Software, (79-99)
- Al-Shaer E, Duan Q, Al-Haj S and Youssef M SensorChecker Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, (51-56)
- Symbolic software model validation Proceedings of the Eleventh ACM/IEEE International Conference on Formal Methods and Models for Codesign, (97-108)
- Fioravanti F, Pettorossi A, Proietti M and Senni V (2013). Controlling Polyvariance for Specialization-based Verification, Fundamenta Informaticae, 124:4, (483-502), Online publication date: 1-Oct-2013.
- D'Agostino G and Lenzi G (2013). On Modal μ-Calculus in S5 and Applications, Fundamenta Informaticae, 124:4, (465-482), Online publication date: 1-Oct-2013.
- Woźna-Szcześniak B and Zbrzezny A (2013). A Translation of the Existential Model Checking Problem from MITL to HLTL, Fundamenta Informaticae, 122:4, (401-420), Online publication date: 1-Oct-2013.
- Lustig Y and Vardi M (2013). Synthesis from component libraries, International Journal on Software Tools for Technology Transfer (STTT), 15:5-6, (603-618), Online publication date: 1-Oct-2013.
- Zurowska K and Dingel J Model Checking of UML-RT Models Using Lazy Composition Proceedings of the 16th International Conference on Model-Driven Engineering Languages and Systems - Volume 8107, (304-319)
- Prabhakar P, Liu J and Murray R Pre-orders for reasoning about stability properties with respect to input of hybrid systems Proceedings of the Eleventh ACM International Conference on Embedded Software, (1-10)
- Martinez-Alvarez M, Bonzanini M and Roelleke T Mathematical Specification and Logic Modelling in the context of IR Proceedings of the 2013 Conference on the Theory of Information Retrieval, (131-132)
- Greenyer J and Kindler E Compositional Synthesis of Controllers from Scenario-Based Assume-Guarantee Specifications Proceedings of the 16th International Conference on Model-Driven Engineering Languages and Systems - Volume 8107, (774-789)
- Bonacchi A, Fantechi A, Bacherini S, Tempestini M and Cipriani L Validation of Railway Interlocking Systems by Formal Verification, A Case Study Revised Selected Papers of the SEFM 2013 Collocated Workshops on Software Engineering and Formal Methods - Volume 8368, (237-252)
- Haxthausen A, Peleska J and Pinger R Applied Bounded Model Checking for Interlocking System Designs Revised Selected Papers of the SEFM 2013 Collocated Workshops on Software Engineering and Formal Methods - Volume 8368, (205-220)
- Fantechi A Twenty-Five Years of Formal Methods and Railways Revised Selected Papers of the SEFM 2013 Collocated Workshops on Software Engineering and Formal Methods - Volume 8368, (167-183)
- Bakar N and Selamat A Assessing Agents Interaction Quality via Multi-agent Runtime Verification Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083, (175-184)
- Fisher M, Dennis L and Webster M (2013). Verifying autonomous systems, Communications of the ACM, 56:9, (84-93), Online publication date: 1-Sep-2013.
- Abdulla P, Clemente L, Mayr R and Sandberg S Stochastic parity games on lossy channel systems Proceedings of the 10th international conference on Quantitative Evaluation of Systems, (338-354)
- Varshosaz M and Khosravi R Discrete time Markov chain families Proceedings of the 17th International Software Product Line Conference co-located workshops, (34-41)
- Liebig J, von Rhein A, Kästner C, Apel S, Dörre J and Lengauer C Scalable analysis of variable software Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, (81-91)
- Androutsopoulos K, Clark D, Harman M, Krinke J and Tratt L (2013). State-based model slicing, ACM Computing Surveys, 45:4, (1-36), Online publication date: 1-Aug-2013.
- van der Hoek W, Witteveen C and Wooldridge M (2013). Program equilibrium—a program reasoning approach, International Journal of Game Theory, 42:3, (639-671), Online publication date: 1-Aug-2013.
- Calvanese D, De Giacomo G, Montali M and Patrizi F Verification and synthesis in description logic based dynamic systems Proceedings of the 7th international conference on Web Reasoning and Rule Systems, (50-64)
- Gui L, Sun J, Liu Y, Si Y, Dong J and Wang X Combining model checking and testing with an application to reliability prediction and distribution Proceedings of the 2013 International Symposium on Software Testing and Analysis, (101-111)
- Jegourel C, Legay A and Sedwards S Importance Splitting for Statistical Model Checking Rare Properties Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (576-591)
- Donzé A, Ferrère T and Maler O Efficient Robust Monitoring for STL Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (264-279)
- Bingham B, Bingham J, Erickson J and Greenstreet M Distributed Explicit State Model Checking of Deadlock Freedom Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (235-241)
- Colange M, Baarir S, Kordon F and Thierry-Mieg Y Towards Distributed Software Model-Checking Using Decision Diagrams Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (830-845)
- Aleb N and Kechid S An interpolation based crossover operator for genetic programming Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (1107-1112)
- Desnoyers M (2013). Proving the correctness of nonblocking data structures, Communications of the ACM, 56:7, (62-69), Online publication date: 1-Jul-2013.
- Bagheri Hariri B, Calvanese D, De Giacomo G, Deutsch A and Montali M Verification of relational data-centric dynamic systems with external services Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGAI symposium on Principles of database systems, (163-174)
- Windmüller S, Neubauer J, Steffen B, Howar F and Bauer O Active continuous quality control Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, (111-120)
- Johnson K, Calinescu R and Kikuchi S An incremental verification framework for component-based software systems Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, (33-42)
- Barnat J, Beneš N, Černá I and Petruchová Z DCCL Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, (43-52)
- Williams R and Konev B Propositional temporal proving with reductions to a SAT problem Proceedings of the 24th international conference on Automated Deduction, (421-435)
- Kobayashi N (2013). Model Checking Higher-Order Programs, Journal of the ACM, 60:3, (1-62), Online publication date: 1-Jun-2013.
- Lohmann N (2013). Compliance by design for artifact-centric business processes, Information Systems, 38:4, (606-618), Online publication date: 1-Jun-2013.
- Bensalem S, Legay A and Bozga M (2013). Rigorous embedded design, International Journal on Software Tools for Technology Transfer (STTT), 15:3, (149-154), Online publication date: 1-Jun-2013.
- de Oliveira D, Rakamarić Z, Gopalakrishnan G, Humphrey A, Meng Q and Berzins M Practical formal correctness checking of million-core problem solving environments for HPC Proceedings of the 5th International Workshop on Software Engineering for Computational Science and Engineering, (75-83)
- Dong J, Sun J and Liu Y Build your own model checker in one month Proceedings of the 2013 International Conference on Software Engineering, (1481-1483)
- Heinzemann C, Sudmann O, Schäfer W and Tichy M A discipline-spanning development process for self-adaptive mechatronic systems Proceedings of the 2013 International Conference on Software and System Process, (36-45)
- Gerard S and Singh M Evolving protocols and agents in multiagent systems Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (997-1004)
- Kouvaros P and Lomuscio A Automatic verification of parameterised multi-agent systems Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (861-868)
- Huang X and Luo C A logic of probabilistic knowledge and strategy Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (845-852)
- Desnoyers M (2013). Proving the Correctness of Nonblocking Data Structures, Queue, 11:5, (30-43), Online publication date: 1-May-2013.
- Perna J and George C (2013). Model checking RAISE applicative specifications, Formal Aspects of Computing, 25:3, (365-388), Online publication date: 1-May-2013.
- Han Z, Mosterman P, Zander J and Zhang F Systematic management of simulation state for multi-branch simulations in simulink Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium, (1-8)
- Kang E and Schobbens P Enabling formal analysis of energy-aware automotive embedded systems in East-adl Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium, (1-8)
- Jayaraman K, Tripunitara M, Ganesh V, Rinard M and Chapin S (2013). Mohawk, ACM Transactions on Information and System Security, 15:4, (1-28), Online publication date: 1-Apr-2013.
- Armando A, Castiglione A, Costa G, Fiore U, Merlo A, Verderame L and You I Trustworthy opportunistic access to the internet of services Proceedings of the 2013 international conference on Information and Communication Technology, (469-478)
- She Y, Li H and Zhu H UVHM Proceedings of the 2013 international conference on Information and Communication Technology, (300-305)
- Loiacono C, Palena M, Pasini P, Patti D, Quer S, Ricossa S, Vendraminetto D and Baumgartner J Fast cone-of-influence computation and estimation in problems with multiple properties Proceedings of the Conference on Design, Automation and Test in Europe, (803-806)
- Hellings J, Kuijpers B, Van den Bussche J and Zhang X Walk logic as a framework for path query languages on graph databases Proceedings of the 16th International Conference on Database Theory, (117-128)
- Grumberg O SAT-based model checking Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (xvii-xviii)
- Wijs A and Engelen L Efficient property preservation checking of model refinements Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (565-579)
- Vizel Y, Grumberg O and Shoham S Intertwined forward-backward reachability analysis using interpolants Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (308-323)
- Godefroid P and Yannakakis M Analysis of boolean programs Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (214-229)
- Backasch R, Hochberger C, Weiss A, Leucker M and Lasslop R (2013). Runtime verification for multicore SoC with high-quality trace data, ACM Transactions on Design Automation of Electronic Systems, 18:2, (1-26), Online publication date: 1-Mar-2013.
- Walkinshaw N and Bogdanov K (2013). Automated Comparison of State-Based Software Models in Terms of Their Language and Structure, ACM Transactions on Software Engineering and Methodology, 22:2, (1-37), Online publication date: 1-Mar-2013.
- De Giacomo G, Patrizi F and SardiñA S (2013). Automatic behavior composition synthesis, Artificial Intelligence, 196, (106-142), Online publication date: 1-Mar-2013.
- Rastogi V, Chen Y and Enck W AppsPlayground Proceedings of the third ACM conference on Data and application security and privacy, (209-220)
- Ranzato F Complete Abstractions Everywhere Proceedings of the 14th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 7737, (15-26)
- Santhanam G, Oster Z and Basu S Identifying a preferred countermeasure strategy for attack graphs Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, (1-4)
- Fioravanti F, Pettorossi A, Proietti M and Senni V (2013). Proving Theorems by Program Transformation, Fundamenta Informaticae, 127:1-4, (115-134), Online publication date: 1-Jan-2013.
- Radojicic C, Grimm C, Schupfer F and Rathmair M (2013). Verification of mixed-signal systems with affine arithmetic assertions, VLSI Design, 2013, (5-5), Online publication date: 1-Jan-2013.
- Mosbahi O (2013). Combining Formal Methods for the Development of Reactive Systems, ACM Transactions on Embedded Computing Systems, 12:1, (1-29), Online publication date: 1-Jan-2013.
- Méry D and Singh N (2013). Formal Specification of Medical Systems by Proof-Based Refinement, ACM Transactions on Embedded Computing Systems, 12:1, (1-25), Online publication date: 1-Jan-2013.
- Maccagnola D, Messina E, Gao Q and Gilbert D A machine learning approach for generating temporal logic classifications of complex model behaviours Proceedings of the Winter Simulation Conference, (1-12)
- Masi M, Pugliese R and Tiezzi F (2012). Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios, Journal of Medical Systems, 36:6, (3695-3711), Online publication date: 1-Dec-2012.
- Ware S and Malik R (2012). Conflict-preserving abstraction of discrete event systems using annotated automata, Discrete Event Dynamic Systems, 22:4, (451-477), Online publication date: 1-Dec-2012.
- Lin S, Liu Y, Hsiung P, Sun J and Dong J Automatic generation of provably correct embedded systems Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering, (214-229)
- Paul J, Guralnik E, Koyfman A, Nahir A and Panda S Leveraging accelerated simulation for floating-point regression Proceedings of the 8th international conference on Hardware and Software: verification and testing, (118-131)
- Steinhorst S and Hedrich L Trajectory-directed discrete state space modeling for formal verification of nonlinear analog circuits Proceedings of the International Conference on Computer-Aided Design, (202-209)
- Cimatti A, Roveri M, Susi A and Tonetta S (2013). Validation of requirements for hybrid systems, ACM Transactions on Software Engineering and Methodology, 21:4, (1-34), Online publication date: 1-Nov-2012.
- Chen C, Sun J, Liu Y, Dong J and Zheng M (2012). Formal modeling and validation of Stateflow diagrams, International Journal on Software Tools for Technology Transfer (STTT), 14:6, (653-671), Online publication date: 1-Nov-2012.
- Castro-Manzano J A defeasible logic of intention Proceedings of the 11th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (321-333)
- Budde C, D'Argenio P, Sánchez Terraf P and Wolovick N A Theory for the Semantics of Stochastic and Non-deterministic Continuous Systems Advanced Lectures of the International Autumn School on Stochastic Model Checking. Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems - Volume 8453, (67-86)
- Sadigh D, Seshia S and Gupta M Automating exercise generation Proceedings of the Workshop on Embedded and Cyber-Physical Systems Education, (1-8)
- Li A and Chen M Efficient self-learning techniques for SAT-based test generation Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (197-206)
- Grumberg O, Kupferman O and Sheinvald S Model checking systems and specifications with parameterized atomic propositions Proceedings of the 10th international conference on Automated Technology for Verification and Analysis, (122-136)
- Huang S, Hua J, Will H and Wu J (2012). Metamodeling to Control and Audit E-Commerce Web Applications, International Journal of Electronic Commerce, 17:1, (83-118), Online publication date: 1-Oct-2012.
- Wijs A and Engelen L Incremental formal verification for model refining Proceedings of the Workshop on Model-Driven Engineering, Verification and Validation, (29-34)
- Jörges S, Lamprecht A, Margaria T, Schaefer I and Steffen B (2012). A constraint-based variability modeling framework, International Journal on Software Tools for Technology Transfer (STTT), 14:5, (511-530), Online publication date: 1-Oct-2012.
- Ouchani S, Ait Mohamed O and Debbabi M Efficient probabilistic abstraction for SysML activity diagrams Proceedings of the 10th international conference on Software Engineering and Formal Methods, (263-277)
- Nejati S, Di Alesio S, Sabetzadeh M and Briand L Modeling and analysis of CPU usage in safety-critical embedded systems to support stress testing Proceedings of the 15th international conference on Model Driven Engineering Languages and Systems, (759-775)
- Saffidine A Minimal proof search for modal logic k model checking Proceedings of the 13th European conference on Logics in Artificial Intelligence, (346-358)
- Armbrust C, Kiekbusch L, Ropertz T and Berns K Verification of behaviour networks using finite-state automata Proceedings of the 35th Annual German conference on Advances in Artificial Intelligence, (1-12)
- Dimovski A Parameterized verification of open procedural programs Proceedings of the Fifth Balkan Conference in Informatics, (180-185)
- Cauchi A, Gimblett A, Thimbleby H, Curzon P and Masci P Safer "5-key" number entry user interfaces using differential formal analysis Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, (29-38)
- Calvanese D, De Giacomo G, Lembo D, Montali M and Santoso A Ontology-based governance of data-aware processes Proceedings of the 6th international conference on Web Reasoning and Rule Systems, (25-41)
- van der Hoek W and Wooldridge M (2012). Logics for Multiagent Systems, AI Magazine, 33:3, (92-105), Online publication date: 1-Sep-2012.
- Zhang X, Shrestha B, Yoon S, Kambhampati S, DiBona P, Guo J, McFarlane D, Hofmann M, Whitebread K, Appling D, Whitaker E, Trewhitt E, Ding L, Michaelis J, McGuinness D, Hendler J, Doppa J, Parker C, Dietterich T, Tadepalli P, Wong W, Green D, Rebguns A, Spears D, Kuter U, Levine G, DeJong G, MacTavish R, Ontañón S, Radhakrishnan J, Ram A, Mostafa H, Zafar H, Zhang C, Corkill D, Lesser V and Song Z (2012). An Ensemble Architecture for Learning Complex Problem-Solving Techniques from Demonstration, ACM Transactions on Intelligent Systems and Technology, 3:4, (1-38), Online publication date: 1-Sep-2012.
- Monzón A, Fernández J and de la Puente J (2012). Application of Deadlock Risk Evaluation of Architectural Models, Software—Practice & Experience, 42:9, (1137-1163), Online publication date: 1-Sep-2012.
- Méry D and Singh N Critical systems development methodology using formal techniques Proceedings of the 3rd Symposium on Information and Communication Technology, (3-12)
- Šubelj L and Bajec M Software systems through complex networks science Proceedings of the First International Workshop on Software Mining, (9-16)
- Nagarakatte S, Burckhardt S, Martin M and Musuvathi M (2012). Multicore acceleration of priority-based schedulers for concurrency bug detection, ACM SIGPLAN Notices, 47:6, (543-554), Online publication date: 6-Aug-2012.
- Venu B and Singh A Formal verification methodology considerations for network on chips Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (220-225)
- Penczek W, Woźna-Szcześniak B and Zbrzezny A (2012). Towards SAT-based BMC for LTLK over Interleaved Interpreted Systems, Fundamenta Informaticae, 119:3-4, (373-392), Online publication date: 1-Aug-2012.
- Fioravanti F, Pettorossi A, Proietti M and Senni V (2012). Improving Reachability Analysis of Infinite State Systems by Specialization, Fundamenta Informaticae, 119:3-4, (281-300), Online publication date: 1-Aug-2012.
- Ditter A, Češka M and Lüttgen G On parallel software verification using boolean equation systems Proceedings of the 19th international conference on Model Checking Software, (80-97)
- Aleb N and Kechid S A new framework for scalable genetic programming Proceedings of the 14th annual conference companion on Genetic and evolutionary computation, (487-492)
- Lal A, Qadeer S and Lahiri S A solver for reachability modulo theories Proceedings of the 24th international conference on Computer Aided Verification, (427-443)
- Drábik P, Maggiolo-Schettini A and Milazzo P (2012). On Conditions for Modular Verification in Systems of Synchronising Components, Fundamenta Informaticae, 120:3-4, (259-274), Online publication date: 1-Jul-2012.
- De Angelis E, Pettorossi A and Proietti M (2012). Synthesizing Concurrent Programs Using Answer Set Programming, Fundamenta Informaticae, 120:3-4, (205-229), Online publication date: 1-Jul-2012.
- Emmer M, Khasidashvili Z, Korovin K, Sticksel C and Voronkov A EPR-based bounded model checking at word level Proceedings of the 6th international joint conference on Automated Reasoning, (210-224)
- Platzer A Logics of Dynamical Systems Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (13-24)
- Męski A, Penczek W, Szreter M, Woźna-Szcześniak B and Zbrzezny A Two approaches to bounded model checking for linear time logic with knowledge Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications, (514-523)
- Woźna-Szcześniak B and Zbrzezny A SAT-Based bounded model checking for deontic interleaved interpreted systems Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications, (494-503)
- Zhang F, Nielson F and Nielson H Model checking as static analysis Proceedings of the 9th international conference on Integrated Formal Methods, (99-112)
- Blackmore T, Halliwell D, Barker P, Eder K and Ramaram N Analysing and closing simulation coverage by automatic generation and verification of formal properties from coverage reports Proceedings of the 9th international conference on Integrated Formal Methods, (84-98)
- Kindermann R, Junttila T and Niemelä I Beyond lassos Proceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems, (84-100)
- Johnson T and Mitra S A small model theorem for rectangular hybrid automata networks Proceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems, (18-34)
- Kuperstein M, Vechev M and Yahav E (2012). Automatic inference of memory fences, ACM SIGACT News, 43:2, (108-123), Online publication date: 11-Jun-2012.
- Nagarakatte S, Burckhardt S, Martin M and Musuvathi M Multicore acceleration of priority-based schedulers for concurrency bug detection Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, (543-554)
- Faria J, Martins J and Pinto J An approach to model checking ada programs Proceedings of the 17th Ada-Europe international conference on Reliable Software Technologies, (105-118)
- Belardinelli F, Lomuscio A and Patrizi F An abstraction technique for the verification of artifact-centric systems Proceedings of the Thirteenth International Conference on Principles of Knowledge Representation and Reasoning, (319-328)
- Rocha L and Andrade R Towards a formal model to reason about context-aware exception handling Proceedings of the 5th International Workshop on Exception Handling, (27-33)
- Meski A, Penczek W, Szreter M, Woźna-Szcześniak B and Zbrzezny A Bounded model checking for knowledge and linear time Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, (1447-1448)
- Jones A, Knapik M, Penczek W and Lomuscio A Group synthesis for parametric temporal-epistemic logic Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (1107-1114)
- Knobbout M and Dastani M Reasoning under compliance assumptions in normative multiagent systems Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (331-340)
- Chockler H and Ruah S Verification of software changes with ExpliSAT Proceedings of the 4th International Workshop on Hot Topics in Software Upgrades, (31-35)
- Keng B and Veneris A Path directed abstraction and refinement in SAT-based design debugging Proceedings of the 49th Annual Design Automation Conference, (947-954)
- Seshia S Sciduction Proceedings of the 49th Annual Design Automation Conference, (356-365)
- Chou C, Ho Y, Hsieh C and Huang C Symbolic model checking on SystemC designs Proceedings of the 49th Annual Design Automation Conference, (327-333)
- Vakili A and Day N Avestan Proceedings of the 4th International Workshop on Modeling in Software Engineering, (36-42)
- Cordy M, Classen A, Perrouin G, Schobbens P, Heymans P and Legay A Simulation-based abstractions for software product-line model checking Proceedings of the 34th International Conference on Software Engineering, (672-682)
- He X, Kumar R, Mu L, Gjøsæter T and Li F (2012). Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol, Computer Standards & Interfaces, 34:4, (343-354), Online publication date: 1-Jun-2012.
- Fantechi A, Gnesi S, Lapadula A, Mazzanti F, Pugliese R and Tiezzi F (2012). A logical verification methodology for service-oriented computing, ACM Transactions on Software Engineering and Methodology, 21:3, (1-46), Online publication date: 1-Jun-2012.
- Hatcliff J, Leavens G, Leino K, Müller P and Parkinson M (2012). Behavioral interface specification languages, ACM Computing Surveys, 44:3, (1-58), Online publication date: 1-Jun-2012.
- Rodrigues Vieira E, Vieira D and Gallois J (2012). Challenges of a Validation Process Based on Models: An Industrial Case Study, Bell Labs Technical Journal, 17:1, (229-246), Online publication date: 1-Jun-2012.
- Mostafazadeh N, Bakhshandeh Babarsad O and Ghassem-Sani G Formal verification of temporal questions in the context of query-answering text summarization Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence, (350-355)
- Pralet C and Verfaillie G Combining static and dynamic models for boosting forward planning Proceedings of the 9th international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (322-338)
- Kazemian P, Varghese G and McKeown N Header space analysis Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (9-9)
- Borri A, Pola G and Di Benedetto M A symbolic approach to the design of nonlinear networked control systems Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (255-264)
- Aydin Gol E, Lazar M and Belta C Language-guided controller synthesis for discrete-time linear systems Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (95-104)
- Topcu U, Ozay N, Liu J and Murray R On synthesizing robust discrete controllers under modeling uncertainty Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (85-94)
- Johnson T and Mitra S Parametrized Verification of Distributed Cyber-Physical Systems Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, (161-170)
- Dey P, Amin M, Romney G, Sinha B, Gonzales R, Farahani A and Badkoobehi H (2012). Relating automata to other fields, Journal of Computing Sciences in Colleges, 27:4, (168-173), Online publication date: 1-Apr-2012.
- Bakhouya M, Campbell R, Coronato A, Pietro G and Ranganathan A (2012). Introduction to special section on formal methods in pervasive computing, ACM Transactions on Autonomous and Adaptive Systems, 7:1, (1-9), Online publication date: 1-Apr-2012.
- Hwang M Qualitative verification of finite and real-time DEVS networks Proceedings of the 2012 Symposium on Theory of Modeling and Simulation - DEVS Integrative M&S Symposium, (1-8)
- Keshishzadeh S, Izadi M and Movaghar A A Büchi automata based model checking framework for reo connectors Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1536-1543)
- Fajstrup L, Goubault É, Haucourt E, Mimram S and Raussen M Trace spaces Proceedings of the 21st European conference on Programming Languages and Systems, (274-294)
- Yang J, Balakrishnan G, Maeda N, Ivančić F, Gupta A, Sinha N, Sankaranarayanan S and Sharma N Object model construction for inheritance in c++ and its applications to program analysis Proceedings of the 21st international conference on Compiler Construction, (144-164)
- Milushev D and Clarke D Towards incrementalization of holistic hyperproperties Proceedings of the First international conference on Principles of Security and Trust, (329-348)
- Lyons D, Jiang S, Arkin R, Nirmal P, Fox S and Zafar M Characterizing performance guarantees for multiagent, real-time systems operating in noisy and uncertain environments Proceedings of the Workshop on Performance Metrics for Intelligent Systems, (114-120)
- Dräger K and Kwiatkowska M Towards communication-based steering of complex distributed systems Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management, (353-368)
- Colange M, Hillah L, Kordon F and Parutto P Extreme symmetries in complex distributed systems Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management, (330-352)
- Calinescu R, Kikuchi S and Johnson K Compositional reverification of probabilistic safety properties for large-scale complex IT systems Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management, (303-329)
- Soeken M, Wille R and Drechsler R Eliminating invariants in UML/OCL models Proceedings of the Conference on Design, Automation and Test in Europe, (1142-1145)
- Haedicke F, Große D and Drechsler R A guiding coverage metric for formal verification Proceedings of the Conference on Design, Automation and Test in Europe, (617-622)
- Yordanov B, Appleton E, Ganguly R, Gol E, Carr S, Bhatia S, Haddock T, Belta C and Densmore D Experimentally driven verification of synthetic biological circuits Proceedings of the Conference on Design, Automation and Test in Europe, (236-241)
- Rajeev A, Mohalik S and Ramesh S Verifying timing synchronization constraints in distributed embedded architectures Proceedings of the Conference on Design, Automation and Test in Europe, (200-205)
- Bulychev P, David A, Guldstrand Larsen K, Legay A, Li G, Bøgsted Poulsen D and Stainer A Monitor-Based statistical model checking for weighted metric temporal logic Proceedings of the 18th international conference on Logic for Programming, Artificial Intelligence, and Reasoning, (168-182)
- Benedikt M, Bourhis P and Ley C (2012). Querying schemas with access restrictions, Proceedings of the VLDB Endowment, 5:7, (634-645), Online publication date: 1-Mar-2012.
- Fischbein D, D’Ippolito N, Brunet G, Chechik M and Uchitel S (2012). Weak Alphabet Merging of Partial Behavior Models, ACM Transactions on Software Engineering and Methodology, 21:2, (1-47), Online publication date: 1-Mar-2012.
- Lindsay P, Yatapanage N and Winter K (2012). Cut Set Analysis using Behavior Trees and model checking, Formal Aspects of Computing, 24:2, (249-266), Online publication date: 1-Mar-2012.
- Banerjee A, Ray S, Dasgupta P, Chakrabarti P, Ramesh S, Vignesh P and Ganesan V (2012). A dynamic assertion-based verification platform for validation of UML designs, ACM SIGSOFT Software Engineering Notes, 37:1, (1-14), Online publication date: 27-Jan-2012.
- Cordy M, Classen A, Schobbens P, Heymans P and Legay A Managing evolution in software product lines Proceedings of the 6th International Workshop on Variability Modeling of Software-Intensive Systems, (183-191)
- Cousot P and Cousot R An abstract interpretation framework for termination Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (245-258)
- Basu S, Bultan T and Ouederni M Deciding choreography realizability Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (191-202)
- Albarghouthi A, Gurfinkel A and Chechik M Whale Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (39-55)
- Klein U, Piterman N and Pnueli A Effective synthesis of asynchronous systems from GR(1) specifications Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (283-298)
- Howar F, Steffen B, Jonsson B and Cassel S Inferring canonical register automata Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (251-266)
- Kupferman O Recent challenges and ideas in temporal synthesis Proceedings of the 38th international conference on Current Trends in Theory and Practice of Computer Science, (88-98)
- Cousot P and Cousot R (2012). An abstract interpretation framework for termination, ACM SIGPLAN Notices, 47:1, (245-258), Online publication date: 18-Jan-2012.
- Basu S, Bultan T and Ouederni M (2012). Deciding choreography realizability, ACM SIGPLAN Notices, 47:1, (191-202), Online publication date: 18-Jan-2012.
- Braverman M, Grigo A and Rojas C Noise vs computational intractability in dynamics Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (128-141)
- Lomuscio A and Penczek W Symbolic model checking for temporal-epistemic logic Logic Programs, Norms and Action, (172-195)
- Ortmeier F (2012). Dependability in Pervasive Computing, Journal of Information Technology Research, 5:1, (1-17), Online publication date: 1-Jan-2012.
- Dhaussy P, Boniol F, Roger J and Leroux L (2012). Improving model checking with context modelling, Advances in Software Engineering, 2012, (9-9), Online publication date: 1-Jan-2012.
- Abeywickrama D and Ramakrishnan S (2012). Context-aware services engineering, ACM Transactions on Internet Technology, 11:3, (1-28), Online publication date: 1-Jan-2012.
- Gurfinkel A and Chechik M (2012). Robust Vacuity for Branching Temporal Logic, ACM Transactions on Computational Logic, 13:1, (1-32), Online publication date: 1-Jan-2012.
- Chupilko M (2012). Developing test systems for multi-modules hardware designs, Programming and Computing Software, 38:1, (34-42), Online publication date: 1-Jan-2012.
- Kamide N Reasoning about time-dependent multi-agents Transactions on Compuational Collective Intelligence VI, (181-201)
- Poroor J and Jayaraman B Formal specification and verification of vehicular handoff using π-calculus Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, (165-168)
- Blair G, Bennaceur A, Georgantas N, Grace P, Issarny V, Nundloll V and Paolucci M The role of ontologies in emergent middleware Proceedings of the 12th International Middleware Conference, (400-419)
- Blair G, Bennaceur A, Georgantas N, Grace P, Issarny V, Nundloll V and Paolucci M The role of ontologies in emergent middleware Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware, (410-430)
- Khasidashvili Z and Nadel A Implicative simultaneous satisfiability and applications Proceedings of the 7th international Haifa Verification conference on Hardware and Software: verification and testing, (66-79)
- Dolev S, Goldfeld J and Puzis R On-Line detection and prediction of temporal patterns Proceedings of the 7th international Haifa Verification conference on Hardware and Software: verification and testing, (254-256)
- Bosse T, Hoogendoorn M, Klein M and Treur J (2011). An ambient agent model for monitoring and analysing dynamics of complex human behaviour, Journal of Ambient Intelligence and Smart Environments, 3:4, (283-303), Online publication date: 1-Dec-2011.
- Bosse T, Hoogendoom M, Klein M and Treur J (2011). An ambient agent model for monitoring and analysing dynamics of complex human behaviour, Journal of Ambient Intelligence and Smart Environments, 3:4, (283-303), Online publication date: 1-Dec-2011.
- Talamo M, Galinium M, Schunck C and Arcieri F Interleaving command sequences Proceedings of the 10th WSEAS international conference on Computational Intelligence, Man-Machine Systems and Cybernetics, and proceedings of the 10th WSEAS international conference on Information Security and Privacy, (102-107)
- Castro P, Kilmurray C, Acosta A and Aguirre N dCTL Proceedings of the 9th international conference on Software engineering and formal methods, (106-121)
- Vassev E and Hinchey M Developing model-checking mechanisms for ASSL Proceedings of the 9th international conference on Software engineering and formal methods, (19-34)
- Park C, Sen K, Hargrove P and Iancu C Efficient data race detection for distributed memory parallel programs Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, (1-12)
- Althoff M, Rajhans A, Krogh B, Yaldiz S, Li X and Pileggi L Formal verification of phase-locked loops using reachability analysis and continuization Proceedings of the International Conference on Computer-Aided Design, (659-666)
- Vakili A Analyzing temporal properties of abstract models Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (656-659)
- Vakili A and Day N Using model checking to analyze static properties of declarative models Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (428-431)
- Leungwattanakit W, Artho C, Hagiya M, Tanabe Y and Yamamoto M Model checking distributed systems by combining caching and process checkpointing Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (103-112)
- Alur R, Chaudhuri S and Madhusudan P (2011). Software model checking using languages of nested trees, ACM Transactions on Programming Languages and Systems, 33:5, (1-45), Online publication date: 1-Nov-2011.
- Bingham B, Greenstreet M and Bingham J Parameterized verification of deadlock freedom in symmetric cache coherence protocols Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (186-195)
- Siddique U and Hasan O Formal analysis of fractional order systems in HOL Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (163-170)
- Chockler H, Ivrii A, Matsliah A, Moran S and Nevo Z Incremental formal verification of hardware Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (135-143)
- Mezzanzanica M, Boselli R, Cesarini M and Mercorio F Data quality through model checking techniques Proceedings of the 10th international conference on Advances in intelligent data analysis X, (270-281)
- Xing Z, Sun J, Liu Y and Dong J Differencing labeled transition systems Proceedings of the 13th international conference on Formal methods and software engineering, (537-552)
- Jayaraman K, Ganesh V, Tripunitara M, Rinard M and Chapin S Automatic error finding in access-control policies Proceedings of the 18th ACM conference on Computer and communications security, (163-174)
- Carrillo M and Rosenblueth D Nondeterministic update of CTL models by preserving satisfaction through protections Proceedings of the 9th international conference on Automated technology for verification and analysis, (60-74)
- Wozna-Szczesniak B, Zbrzezny A and Zbrzezny A The BMC method for the existential part of RTCTLK and interleaved interpreted systems Proceedings of the 15th Portugese conference on Progress in artificial intelligence, (551-565)
- Löwe B, Pacuit E and Witzel A DEL planning and some tractable cases Proceedings of the Third international conference on Logic, rationality, and interaction, (179-192)
- Fournier L, Ziv A, Kutsy E and Strichman O (2011). A probabilistic analysis of coverage methods, ACM Transactions on Design Automation of Electronic Systems, 16:4, (1-20), Online publication date: 1-Oct-2011.
- Fisher J, Harel D and Henzinger T (2011). Biology as reactivity, Communications of the ACM, 54:10, (72-82), Online publication date: 1-Oct-2011.
- Kaneiwa K and Kamide N (2011). Paraconsistent Computation Tree Logic, New Generation Computing, 29:4, (391-408), Online publication date: 1-Oct-2011.
- Aleb N, Tamen Z and Kamel N An evolutionary approach for program model checking Proceedings of the First international conference on Model and data engineering, (186-199)
- Fioravanti F, Pettorossi A, Proietti M and Senni V Improving reachability analysis of infinite state systems by specialization Proceedings of the 5th international conference on Reachability problems, (165-179)
- Leucker M Teaching runtime verification Proceedings of the Second international conference on Runtime verification, (34-48)
- Wang S, Ayoub A, Sokolsky O and Lee I Runtime verification of traces under recording uncertainty Proceedings of the Second international conference on Runtime verification, (442-456)
- Křena B, Letko Z and Vojnar T Coverage metrics for saturation-based and search-based testing of concurrent software Proceedings of the Second international conference on Runtime verification, (177-192)
- Dinculescu M, Hundt C, Panangaden P, Pineau J and Precup D The duality of state and observation in probabilistic transition systems Proceedings of the 9th international conference on Logic, Language, and Computation, (206-230)
- Zhang G, Di H, Rong M and Shi H Specification and verification of data and time in web service composition Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II, (436-443)
- Zhang G, Shi H, Rong M and Di H Model checking for asynchronous web service composition based on XYZ/ADL Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II, (428-435)
- Fantechi A and Gnesi S On the adoption of model checking in safety-related software industry Proceedings of the 30th international conference on Computer safety, reliability, and security, (383-396)
- Webster M, Fisher M, Cameron N and Jump M Formal methods for the certification of autonomous unmanned aircraft systems Proceedings of the 30th international conference on Computer safety, reliability, and security, (228-242)
- Bonichon R, Canet G, Correnson L, Goubault E, Haucourt E, Hirschowitz M, Labbé S and Mimram S Rigorous evidence of freedom from concurrency faults in industrial control software Proceedings of the 30th international conference on Computer safety, reliability, and security, (85-98)
- Yeung W (2011). A formal and visual modeling approach to choreography based web services composition and conformance verification, Expert Systems with Applications: An International Journal, 38:10, (12772-12785), Online publication date: 15-Sep-2011.
- Fisher J, Henzinger T, Nickovic D, Piterman N, Singh A and Vardi M Dynamic reactive modules Proceedings of the 22nd international conference on Concurrency theory, (404-418)
- Bauer A, Leucker M and Schallhart C (2011). Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, 20:4, (1-64), Online publication date: 1-Sep-2011.
- Grigore E, Eder K, Lenz A, Skachek S, Pipe A and Melhuish C Towards safe human-robot interaction Proceedings of the 12th Annual conference on Towards autonomous robotic systems, (323-335)
- Maggi F, Montali M, Westergaard M and Van Der Aalst W Monitoring business constraints with linear temporal logic Proceedings of the 9th international conference on Business process management, (132-147)
- Lohmann N Compliance by design for artifact-centric business processes Proceedings of the 9th international conference on Business process management, (99-115)
- Rocha C and Meseguer J Proving safety properties of rewrite theories Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (314-328)
- Hasuo I The microcosm principle and compositionality of GSOS-based component calculi Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (222-236)
- Gupta G, Saeedloei N, DeVries B, Min R, Marple K and Kluźniak F Infinite computation, co-induction and computational logic Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (40-54)
- Daskaya I, Huhn M and Milius S Formal safety analysis in industrial practice Proceedings of the 16th international conference on Formal methods for industrial critical systems, (68-84)
- Méry D and Singh N Formalization of heart models based on the conduction of electrical impulses and cellular automata Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems, (140-159)
- Méry D and Singh N Medical protocol diagnosis using formal methods Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems, (1-20)
- Ipate F, Lefticaru R, Pérez-Hurtado I, Pérez-Jiménez M and Tudose C Formal verification of p systems with active membranes through model checking Proceedings of the 12th international conference on Membrane Computing, (215-225)
- Hostettler S, Marechal A, Linard A, Risoldi M and Buchs D (2011). High-Level Petri Net Model Checking with AlPiNA, Fundamenta Informaticae, 113:3-4, (229-264), Online publication date: 1-Aug-2011.
- Carbone R (2011). LTL model-checking for security protocols, AI Communications, 24:3, (281-283), Online publication date: 1-Aug-2011.
- Ataullah A and Tompa F (2020). Business policy modeling and enforcement in databases, Proceedings of the VLDB Endowment, 4:11, (921-931), Online publication date: 1-Aug-2011.
- Alrajeh D, Russo A, Uchitel S and Kramer J Integrating model checking and inductive logic programming Proceedings of the 21st international conference on Inductive Logic Programming, (45-60)
- Uchio S, Ubayashi N and Kamei Y CJAdviser Proceedings of the 3rd ACM International Workshop on Context-Oriented Programming, (1-6)
- Krepska E, Kielmann T, Fokkink W and Bal H (2011). HipG, ACM SIGOPS Operating Systems Review, 45:2, (3-13), Online publication date: 18-Jul-2011.
- Fioravanti F, Pettorossi A, Proietti M and Senni V Using real relaxations during program specialization Proceedings of the 21st international conference on Logic-Based Program Synthesis and Transformation, (106-122)
- Seki H Proving properties of co-logic programs by unfold/fold transformations Proceedings of the 21st international conference on Logic-Based Program Synthesis and Transformation, (205-220)
- Segall I, Tzoref-Brill R and Farchi E Using binary decision diagrams for combinatorial test design Proceedings of the 2011 International Symposium on Software Testing and Analysis, (254-264)
- Babić D, Martignoni L, McCamant S and Song D Statically-directed dynamic automated test generation Proceedings of the 2011 International Symposium on Software Testing and Analysis, (12-22)
- Mateescu R and Wijs A Property-dependent reductions for the modal Mu-calculus Proceedings of the 18th international SPIN conference on Model checking software, (2-19)
- Raman V and Kress-Gazit H Analyzing unsynthesizable specifications for high-level robot behavior using LTLMoP Proceedings of the 23rd international conference on Computer aided verification, (663-668)
- Cook B, Koskinen E and Vardi M Temporal property verification as a program analysis task Proceedings of the 23rd international conference on Computer aided verification, (333-348)
- Huang X, Luo C and van der Meyden R Symbolic model checking of probabilistic knowledge Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge, (177-186)
- Ball T, Levin V and Rajamani S (2011). A decade of software model checking with SLAM, Communications of the ACM, 54:7, (68-76), Online publication date: 1-Jul-2011.
- Yang L, Dang Z and Fischer T (2011). Information gain of black-box testing, Formal Aspects of Computing, 23:4, (513-539), Online publication date: 1-Jul-2011.
- Tan L State coverage metrics for specification-based testing with Büchi automata Proceedings of the 5th international conference on Tests and proofs, (171-186)
- Meinke K and Sindhu M Incremental learning-based testing for reactive systems Proceedings of the 5th international conference on Tests and proofs, (134-151)
- Wan W, Bentahar J and Hamza A Model checking epistemic and probabilistic properties of multi-agent systems Proceedings of the 24th international conference on Industrial engineering and other applications of applied intelligent systems conference on Modern approaches in applied intelligence - Volume Part II, (68-78)
- El-Menshawy M, Bentahar J and Dssouli R Model checking commitment protocols Proceedings of the 24th international conference on Industrial engineering and other applications of applied intelligent systems conference on Modern approaches in applied intelligence - Volume Part II, (37-47)
- Garanina N Exponential acceleration of model checking for perfect recall systems Proceedings of the 8th international conference on Perspectives of System Informatics, (111-124)
- Awad A, Goré R, Thomson J and Weidlich M An iterative approach for business process template synthesis from compliance rules Proceedings of the 23rd international conference on Advanced information systems engineering, (406-421)
- Haxthausen A, Kjær A and Bliguet M Formal development of a tool for automated modelling and verification of relay interlocking systems Proceedings of the 17th international conference on Formal methods, (118-132)
- Heinzemann C and Henkler S Reusing dynamic communication protocols in self-adaptive embedded component architectures Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, (109-118)
- Naldurg P and K.R. R SEAL Proceedings of the 16th ACM symposium on Access control models and technologies, (83-92)
- Thimbleby H, Gimblett A and Cauchi A Buffer automata Proceedings of the 3rd ACM SIGCHI symposium on Engineering interactive computing systems, (73-78)
- Asirelli P, Beek M, Fantechi A and Gnesi S A model-checking tool for families of services Proceedings of the joint 13th IFIP WG 6.1 and 30th IFIP WG 6.1 international conference on Formal techniques for distributed systems, (44-58)
- Rahim L and Whittle J Identifying state space reduction techniques from behavioural design patterns Proceedings of the Third Workshop on Behavioural Modelling, (49-55)
- Holcomb D, Brady B and Seshia S Abstraction-based performance verification of NoCs Proceedings of the 48th Design Automation Conference, (492-497)
- He N, Rümmer P and Kroening D Test-case generation for embedded simulink via formal concept analysis Proceedings of the 48th Design Automation Conference, (224-229)
- Ramesh S and Gadkari A Rigorous model-based design & verification flow for in-vehicle software Proceedings of the 48th Design Automation Conference, (13-16)
- Bu L, Wang Q, Chen X, Wang L, Zhang T, Zhao J and Li X (2011). Toward online hybrid systems model checking of cyber-physical systems' time-bounded short-run behavior, ACM SIGBED Review, 8:2, (7-10), Online publication date: 1-Jun-2011.
- Zhang S Scalable automatic linearizability checking Proceedings of the 33rd International Conference on Software Engineering, (1185-1187)
- Filieri A, Ghezzi C and Tamburrelli G Run-time efficient probabilistic model checking Proceedings of the 33rd International Conference on Software Engineering, (341-350)
- Taktak S and Kristensen L Formal modelling and initial validation of the chelonia distributed storage system Proceedings of the 6th international conference on Advances in grid and pervasive computing, (127-137)
- Köster M and Lohmann P Abstraction for model checking modular interpreted systems over ATL Proceedings of the 9th international conference on Programming Multi-Agent Systems, (95-113)
- El Menshawy M, Bentahar J, Qu H and Dssouli R On the verification of social commitments and time The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (483-490)
- Napp N and Klavins E (2011). A compositional framework for programming stochastically interacting robots, International Journal of Robotics Research, 30:6, (713-729), Online publication date: 1-May-2011.
- Nielson F, Nanz S and Nielson H (2011). Modal abstractions of concurrent behavior, ACM Transactions on Computational Logic, 12:3, (1-40), Online publication date: 1-May-2011.
- Rozier K (2011). Survey, Computer Science Review, 5:2, (163-203), Online publication date: 1-May-2011.
- Turner R (2011). Specification, Minds and Machines, 21:2, (135-152), Online publication date: 1-May-2011.
- Angius N and Tamburrini G (2011). Scientific Theories of Computational Systems in Model Checking, Minds and Machines, 21:2, (323-336), Online publication date: 1-May-2011.
- Katoen J Model checking Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering, (1-14)
- Meulen J and Pecheur C Combining partial-order reduction and symbolic model checking to verify LTL properties Proceedings of the Third international conference on NASA Formal methods, (406-421)
- Kumazawa T and Tamai T Counter example-based error localization of behavior models Proceedings of the Third international conference on NASA Formal methods, (222-236)
- Geilen M, Tripakis S and Wiggers M The earlier the better Proceedings of the 14th international conference on Hybrid systems: computation and control, (23-32)
- Napoli M and Parente M Graded CTL model checking for test generation Proceedings of the 2011 Symposium on Theory of Modeling & Simulation: DEVS Integrative M&S Symposium, (59-66)
- Cesta A, Fratini S, Orlandini A, Finzi A and Tronci E (2011). Flexible Plan Verification: Feasibility Results, Fundamenta Informaticae, 107:2-3, (111-137), Online publication date: 1-Apr-2011.
- Doberkat E and Schubert C (2011). Coalgebraic logic over general measurable spaces ??? a survey, Mathematical Structures in Computer Science, 21:2, (175-234), Online publication date: 1-Apr-2011.
- Basu S and Bultan T Choreography conformance via synchronizability Proceedings of the 20th international conference on World wide web, (795-804)
- Li J, Xie F, Ball T and Levin V Model checking büchi pushdown systems Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software, (141-155)
- Cimatti A, Narasamdya I and Roveri M Boosting lazy abstraction for systemc with partial order reduction Proceedings of the 17th international conference on Tools and algorithms for the construction and analysis of systems: part of the joint European conferences on theory and practice of software, (341-356)
- Disenfeld C and Katz S Compositional verification of events and observers Proceedings of the 10th international workshop on Foundations of aspect-oriented languages, (1-5)
- Cook B and Koskinen E Making prophecies with decision predicates Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (399-410)
- Cook B and Koskinen E (2011). Making prophecies with decision predicates, ACM SIGPLAN Notices, 46:1, (399-410), Online publication date: 26-Jan-2011.
- Howar F, Steffen B and Merten M Automata learning with automated alphabet abstraction refinement Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation, (263-277)
- Frohardt R, Chang B and Sankaranarayanan S Access nets Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation, (184-198)
- Ober I and Dragomir I Unambiguous UML composite structures Proceedings of the 37th international conference on Current trends in theory and practice of computer science, (418-430)
- McCabe-Dansted J On the succinctness of RoCTL Proceedings of the Seventeenth Computing on The Australasian Theory Symposium - Volume 119, (85-94)
- Ware S and Malik R A process-algebraic semantics for generalised nonblocking Proceedings of the Seventeenth Computing on The Australasian Theory Symposium - Volume 119, (75-84)
- McCabe-Dansted J On the succinctness of RoCTL Proceedings of the Seventeenth Computing: The Australasian Theory Symposium - Volume 119, (85-94)
- Ware S and Malik R A process-algebraic semantics for generalised nonblocking Proceedings of the Seventeenth Computing: The Australasian Theory Symposium - Volume 119, (75-84)
- Cui C, Dang Z and Fischer T (2011). Typical Paths of a Graph, Fundamenta Informaticae, 110:1-4, (95-109), Online publication date: 1-Jan-2011.
- Crafa S, Ranzato F and Tapparo F (2011). Saving Space in a Time Efficient Simulation Algorithm, Fundamenta Informaticae, 108:1-2, (23-42), Online publication date: 1-Jan-2011.
- Belardinelli F, Jones A and Lomuscio A (2011). Model Checking Temporal-Epistemic Logic Using Alternating Tree Automata, Fundamenta Informaticae, 112:1, (19-37), Online publication date: 1-Jan-2011.
- Bosse T and Treur J Patterns in world dynamics indicating agency Transactions on computational collective intelligence III, (128-151)
- Ceterchi R and Tomescu A Computing the maximum bisimulation with spiking neural P systems Computation, cooperation, and life, (151-157)
- Carbone R, Minea M, Mödersheim S, Ponta S, Turuani M and Viganò L Towards formal validation of trust and security in the internet of services The future internet, (193-207)
- Salamah S, Gates A, Roach S and Engskow M (2011). Towards support for software model checking, Advances in Software Engineering, 2011, (1-13), Online publication date: 1-Jan-2011.
- Ficco M, Pietrantuono R and Russo S (2011). Bug localization in test-driven development, Advances in Software Engineering, 2011, (1-18), Online publication date: 1-Jan-2011.
- Viana A, Maag S and Zaidi F (2011). One step forward, ACM Computing Surveys, 43:2, (1-36), Online publication date: 1-Jan-2011.
- Bauland M, Mundhenk M, Schneider T, Schnoor H, Schnoor I and Vollmer H (2011). The tractability of model checking for LTL, ACM Transactions on Computational Logic, 12:2, (1-28), Online publication date: 1-Jan-2011.
- Dix J and Fisher M (2011). Where logic and agents meet, Annals of Mathematics and Artificial Intelligence, 61:1, (15-28), Online publication date: 1-Jan-2011.
- Bäumler S, Schellhorn G, Tofan B and Reif W (2011). Proving linearizability with temporal logic, Formal Aspects of Computing, 23:1, (91-112), Online publication date: 1-Jan-2011.
- Chen M, Wu K, Xu J and He P A new method for formalizing optimistic fair exchange protocols Proceedings of the 12th international conference on Information and communications security, (251-265)
- Chen M, Wu K, Xu J and He P A New Method for Formalizing Optimistic Fair Exchange Protocols Information and Communications Security, (251-265)
- Adler R, Schaefer I, Trapp M and Poetzsch-Heffter A (2011). Component-based modeling and verification of dynamic adaptation in safety-critical embedded systems, ACM Transactions on Embedded Computing Systems, 10:2, (1-39), Online publication date: 1-Dec-2010.
- Ezekiel J and Lomuscio A A methodology for automatic diagnosability analysis Proceedings of the 12th international conference on Formal engineering methods and software engineering, (549-564)
- Vogelsang A, Fehnker A, Huuck R and Reif W Software metrics in static program analysis Proceedings of the 12th international conference on Formal engineering methods and software engineering, (485-500)
- Rabbi F, Wang H and MacCaull W Compensable workflow nets Proceedings of the 12th international conference on Formal engineering methods and software engineering, (122-137)
- Conboy H, Avrunin G and Clarke L Process-based derivation of requirements for medical devices Proceedings of the 1st ACM International Health Informatics Symposium, (656-665)
- MacCaull W, Jewers H and Latzel M Using an interdisciplinary approach to develop a knowledge-driven careflow management system for collaborative patient-centred palliative care Proceedings of the 1st ACM International Health Informatics Symposium, (507-511)
- Younes H, Clarke E and Zuliani P Statistical verification of probabilistic properties with unbounded until Proceedings of the 13th Brazilian conference on Formal methods: foundations and applications, (144-160)
- Ganai M, Wang C and Li W Efficient state space exploration Proceedings of the International Conference on Computer-Aided Design, (786-793)
- Hu J, Zhang Y and Li R Towards automatic update of access control policy Proceedings of the 24th international conference on Large installation system administration, (1-7)
- Yang L, Dang Z, Fischer T, Kim M and Tan L Entropy and software systems Proceedings of the FSE/SDP workshop on Future of software engineering research, (427-432)
- Sheard T, Stump A and Weirich S Language-based verification will change the world Proceedings of the FSE/SDP workshop on Future of software engineering research, (343-348)
- Reiss S Writing and using program specifications Proceedings of the FSE/SDP workshop on Future of software engineering research, (299-302)
- Li G and Gopalakrishnan G Scalable SMT-based verification of GPU kernel functions Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, (187-196)
- Sinha N and Wang C Staged concurrent program analysis Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, (47-56)
- Tan L, Bu L, Zhao J and Wang L Analyzing the robustness of FTSP with timed automata Proceedings of the Second Asia-Pacific Symposium on Internetware, (1-4)
- Guerra P and Wassermann R Revision of CTL models Proceedings of the 12th Ibero-American conference on Advances in artificial intelligence, (153-162)
- Artho C Run-time verification of networked software Proceedings of the First international conference on Runtime verification, (59-73)
- Keng B, Safarpour S and Veneris A (2010). Bounded model debugging, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29:11, (1790-1803), Online publication date: 1-Nov-2010.
- Rajeev A, Mohalik S, Dixit M, Chokshi D and Ramesh S Schedulability and end-to-end latency in distributed ECU networks Proceedings of the tenth ACM international conference on Embedded software, (129-138)
- De Menezes M, Do L. Pereira S and De Barros L System design modification with actions Proceedings of the 20th Brazilian conference on Advances in artificial intelligence, (31-40)
- Zhao Y and Luo G Satisfiability degree analysis for transition system Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part I, (25-32)
- Bensalem S, Bozga M, Legay A, Nguyen T, Sifakis J and Yan R Incremental component-based construction and verification using invariants Proceedings of the 2010 Conference on Formal Methods in Computer-Aided Design, (257-266)
- Carvalho A, Carvalho J, Pinto J and De Sousa S Model-checking temporal properties of real-time HTL programs Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II, (191-205)
- Baier C, Blechmann T, Klein J, Klüppelholz S and Leister W Design and verification of systems with exogenous coordination using Vereofy Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II, (97-111)
- Roberson M and Boyapati C (2010). Efficient modular glass box software model checking, ACM SIGPLAN Notices, 45:10, (4-21), Online publication date: 17-Oct-2010.
- Roberson M and Boyapati C Efficient modular glass box software model checking Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (4-21)
- Nakajima S, Ishiguro M and Tanaka K Rewriting logic approach to modeling and analysis of client behavior in open systems Proceedings of the 8th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems, (83-94)
- Asirelli P, Beek M, Fantechi A and Gnesi S A logical framework to deal with variability Proceedings of the 8th international conference on Integrated formal methods, (43-58)
- Cho C, Babi ć D, Shin E and Song D Inference and analysis of formal models of botnet command and control protocols Proceedings of the 17th ACM conference on Computer and communications security, (426-439)
- van Amstel M, van den Brand M and Engelen L An exercise in iterative domain-specific language design Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), (48-57)
- Fu X Conformance verification of privacy policies Proceedings of the 7th international conference on Web services and formal methods, (86-100)
- Lohmann N and Wolf K How to implement a theory of correctness in the area of business processes and services Proceedings of the 8th international conference on Business process management, (61-77)
- Kelly M and Zhang Y Local model update with an application to sliding window protocol Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV, (11-21)
- Konur S, Dixon C and Fisher M Formal verification of probabilistic swarm behaviours Proceedings of the 7th international conference on Swarm intelligence, (440-447)
- Baier C, Haverkort B, Hermanns H and Katoen J (2010). Performance evaluation and model checking join forces, Communications of the ACM, 53:9, (76-85), Online publication date: 1-Sep-2010.
- Ding Y and Hemer D An optimised algorithm to tackle the model explosion problem in CTL model update Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence, (589-594)
- Wang W, Qin X and Mishra P Temperature- and energy-constrained scheduling in multitasking systems Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design, (85-90)
- Jongmans S, Hindriks K and Van Riemsdijk M Model checking agent programs by using the program interpreter Proceedings of the 11th international conference on Computational logic in multi-agent systems, (219-237)
- Cimatti A, Mover S, Roveri M and Tonetta S From sequential extended regular expressions to NFA with symbolic labels Proceedings of the 15th international conference on Implementation and application of automata, (87-94)
- Claßen J and Lakemeyer G On the Verification of Very Expressive Temporal Properties of Non-terminating Golog Programs Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (887-892)
- Bulling N and Farwer B On the (Un-)Decidability of Model Checking Resource-Bounded Agents Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (567-572)
- Kwiatkowska M, Lomuscio A and Qu H Parallel Model Checking for Temporal Epistemic Logic Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (543-548)
- Jamroga W and Penczek W Specification and verification of multi-agent systems Proceedings of the 2010 conference on ESSLLI 2010, and ESSLLI 2011 conference on Lectures on Logic and Computation, (210-263)
- Demeyer R, Van Assche M, Langevine L and Vanhoof W Declarative workflows to efficiently manage flexible and advanced business processes Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming, (209-218)
- Fioravanti F, Pettorossi A, Proietti M and Senni V Program specialization for verifying infinite state systems Proceedings of the 20th international conference on Logic-based program synthesis and transformation, (164-183)
- Ehlers R Symbolic bounded synthesis Proceedings of the 22nd international conference on Computer Aided Verification, (365-379)
- Křena B, Letko Z, Vojnar T and Ur S A platform for search-based testing of concurrent software Proceedings of the 8th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging, (48-58)
- Rabinovich E, Etzion O, Ruah S and Archushin S Analyzing the behavior of event processing applications Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, (223-234)
- Lomuscio A, Qu H and Russo F Automatic data-abstraction in model checking multi-agent systems Proceedings of the 6th international conference on Model checking and artificial intelligence, (52-68)
- Edelkamp S, Kellershoff M and Sulewski D Program model checking via action planning Proceedings of the 6th international conference on Model checking and artificial intelligence, (32-51)
- Giacobazzi R and Ranzato F Example-guided abstraction simplification Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II, (211-222)
- El-Menshawy M, Bentahar J and Dssouli R Modeling and verifying business interactions via commitments and dialogue actions Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part II, (11-21)
- Biswas J, Mokhtari M, Dong J and Yap P Mild dementia care at home - integrating activity monitoring, user interface plasticity and scenario verification Proceedings of the Aging friendly technology for health and independence, and 8th international conference on Smart homes and health telematics, (160-170)
- Lê D A characterization of combined traces using labeled stratified order structures Proceedings of the 31st international conference on Applications and Theory of Petri Nets, (104-124)
- Valmari A and Hansen H Can stubborn sets be optimal? Proceedings of the 31st international conference on Applications and Theory of Petri Nets, (43-62)
- Miner A and Jing Y A formal language toward the unification of model checking and performance evaluation Proceedings of the 17th international conference on Analytical and stochastic modeling techniques and applications, (130-144)
- Li W, Forin A and Seshia S Scalable specification mining for verification and diagnosis Proceedings of the 47th Design Automation Conference, (755-760)
- Chockler H, Kroening D and Purandare M Coverage in interpolation-based model checking Proceedings of the 47th Design Automation Conference, (182-187)
- Thalmaier M, Nguyen M, Wedler M, Stoffel D, Bormann J and Kunz W Analyzing k-step induction to compute invariants for SAT-based property checking Proceedings of the 47th Design Automation Conference, (176-181)
- Mitra S, Seshia S and Nicolici N Post-silicon validation opportunities, challenges and recent advances Proceedings of the 47th Design Automation Conference, (12-17)
- Li X, Tiwari M, Hardekopf B, Sherwood T and Chong F Secure information flow analysis for hardware design Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, (1-7)
- Hasebe K, Mabuchi M and Matsushita A Capability-based delegation model in RBAC Proceedings of the 15th ACM symposium on Access control models and technologies, (109-118)
- Hu J, Zhang Y, Li R and Lu Z Role updating for assignments Proceedings of the 15th ACM symposium on Access control models and technologies, (89-98)
- Wan W, Bentahar J and Hamza A Modeling and verifying agent-based communities of web services Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part II, (418-427)
- Metta G, Natale L, Pathak S, Pulina L and Tacchella A Safe learning with real-time constraints Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (133-142)
- Vardi M From automated verification to automated design (Invited Talk Abstract) Proceedings of the Twentieth International Conference on International Conference on Automated Planning and Scheduling, (271-271)
- El-Menshawy M, Bentahar J and Dssouli R Symbolic model checking commitment protocols using reduction Proceedings of the 8th international conference on Declarative agent languages and technologies VIII, (185-203)
- El-Menshawy M, Wan W, Bentahar J and Dssouli R Symbolic model checking for agent interactions Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (1555-1556)
- Lomuscio A, Penczek W and Qu H Partial order reductions for model checking temporal epistemic logics over interleaved multi-agent systems Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (659-666)
- De Giacomo G and Felli P Agent composition synthesis based on ATL Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (499-506)
- De Giacomo G, Lespérance Y and Pearce A Situation calculus-based programs for representing and reasoning about game structures Proceedings of the Twelfth International Conference on Principles of Knowledge Representation and Reasoning, (445-455)
- Hu Y and Levesque H A correctness result for reasoning about one-dimensional planning problems Proceedings of the Twelfth International Conference on Principles of Knowledge Representation and Reasoning, (362-371)
- De Giacomo G, Patrizi F and Sardina S Generalized planning with loops under strong fairness constraints Proceedings of the Twelfth International Conference on Principles of Knowledge Representation and Reasoning, (351-361)
- Pavese E, Braberman V and Uchitel S My model checker died! Proceedings of the 2010 ICSE Workshop on Quantitative Stochastic Models in the Verification and Design of Software Systems, (33-40)
- Chen Z and Motet G Towards better support for the evolution of safety requirements via the model monitoring approach Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, (219-222)
- Chiappini A, Cimatti A, Macchi L, Rebollo O, Roveri M, Susi A, Tonetta S and Vittorini B Formalization and validation of a subset of the European Train Control System Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, (109-118)
- Classen A, Heymans P, Schobbens P, Legay A and Raskin J Model checking lots of systems Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, (335-344)
- Yahav E and Sagiv M (2008). Verifying safety properties of concurrent heap-manipulating programs, ACM Transactions on Programming Languages and Systems, 32:5, (1-50), Online publication date: 1-May-2010.
- Kupferman O and Vardi M Synthesis of trigger properties Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning, (312-331)
- Yun H, Wu P, Rahmaniheris M, Kim C and Sha L A reduced complexity design pattern for distributed hierarchical command and control system Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, (42-49)
- Kerber F and van der Schaft A Compositional analysis for linear control systems Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, (21-30)
- Thiagarajan P and Yang S Succinct discrete time approximations of distributed hybrid automata Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, (1-10)
- Zhang L, Hustadt U and Dixon C (2010). CTL-RP: A computation tree logic resolution prover, AI Communications, 23:2-3, (111-136), Online publication date: 1-Apr-2010.
- Bäumler S, Balser M, Nafz F, Reif W and Schellhorn G (2010). Interactive verification of concurrent systems using symbolic execution, AI Communications, 23:2-3, (285-307), Online publication date: 1-Apr-2010.
- Brihaye T, Jungers M, Lasaulce S, Markey N and Oreiby G (2010). Using model checking for analyzing distributed power control problems, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
- Ballarini P and Guerriero M (2010). Query-based verification of qualitative trends and oscillations in biochemical systems, Theoretical Computer Science, 411:20, (2019-2036), Online publication date: 1-Apr-2010.
- Hsiung P, Lin S and Lin C (2010). Real-Time Embedded Software Design for Mobile and Ubiquitous Systems, Journal of Signal Processing Systems, 59:1, (13-32), Online publication date: 1-Apr-2010.
- Kang E, Jackson E and Schulte W An approach for effective design space exploration Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (33-54)
- Vassev E and Hinchey M Software verification of autonomic systems developed with ASSL Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (1-16)
- Deng T, Fan W, Libkin L and Wu Y On the aggregation problem for synthesized web services Proceedings of the 13th International Conference on Database Theory, (242-251)
- Hurnaus D and Prähofer H Programming assistance based on contracts and modular verification in the automation domain Proceedings of the 2010 ACM Symposium on Applied Computing, (2544-2551)
- Fellah A Time and alternation Proceedings of the 2010 ACM Symposium on Applied Computing, (2498-2502)
- Asăvoae I and Asăvoae M Collecting semantics under predicate abstraction in the K framework Proceedings of the 8th international conference on Rewriting logic and its applications, (123-139)
- Lauterburg S, Karmani R, Marinov D and Agha G Evaluating ordering heuristics for dynamic partial-order reduction techniques Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering, (308-322)
- Li J, Xie F, Ball T, Levin V and McGarvey C An automata-theoretic approach to hardware/software co-verification Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering, (248-262)
- Lämmermann S, Ruf J, Kropf T, Rosenstiel W, Viehl A, Jesser A and Hedrich L Towards assertion-based verification of heterogeneous system designs Proceedings of the Conference on Design, Automation and Test in Europe, (1171-1176)
- Chen M, Qin X and Mishra P Efficient decision ordering techniques for SAT-based test generation Proceedings of the Conference on Design, Automation and Test in Europe, (490-495)
- Di Guglielmo L, Fummi F and Pravadelli G Vacuity analysis for property qualification by mutation of checkers Proceedings of the Conference on Design, Automation and Test in Europe, (478-483)
- Aminof B, Kupferman O and Lampert R (2010). Reasoning about online algorithms with weighted automata, ACM Transactions on Algorithms, 6:2, (1-36), Online publication date: 1-Mar-2010.
- Schlich B (2010). Model checking of software for microcontrollers, ACM Transactions on Embedded Computing Systems, 9:4, (1-27), Online publication date: 1-Mar-2010.
- Chen M and Mishra P (2010). Functional test generation using efficient property clustering and learning techniques, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29:3, (396-404), Online publication date: 1-Mar-2010.
- Kroening D and Weissenbacher G (2010). Verification and falsification of programs with loops using predicate abstraction, Formal Aspects of Computing, 22:2, (105-128), Online publication date: 1-Mar-2010.
- Turner E, Butler M and Leuschel M A refinement-based correctness proof of symmetry reduced model checking Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z, (231-244)
- Kong W, Shiraishi T, Mizushima Y, Katahira N, Fukuda A and Watanabe M Formal analysis of STM design with SAL infinite bounded model checker Proceedings of the 12th international conference on Advanced communication technology, (1003-1008)
- Baier C, Cloth L, Haverkort B, Hermanns H and Katoen J (2010). Performability assessment by model checking of Markov reward models, Formal Methods in System Design, 36:1, (1-36), Online publication date: 1-Feb-2010.
- Kloetzer M and Belta C (2010). Automatic deployment of distributed teams of robots from temporal logic motion specifications, IEEE Transactions on Robotics, 26:1, (48-61), Online publication date: 1-Feb-2010.
- Chen X, Yang Y, Gopalakrishnan G and Chou C (2010). Efficient methods for formally verifying safety properties of hierarchical cache coherence protocols, Formal Methods in System Design, 36:1, (37-64), Online publication date: 1-Feb-2010.
- Bodik R, Chandra S, Galenson J, Kimelman D, Tung N, Barman S and Rodarmor C Programming with angelic nondeterminism Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (339-352)
- Vechev M, Yahav E and Yorsh G Abstraction-guided synthesis of synchronization Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (327-338)
- Attiya H, Ramalingam G and Rinetzky N Sequential verification of serializability Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (31-42)
- Aminof B, Kupferman O and Murano A Improved model checking of hierarchical systems Proceedings of the 11th international conference on Verification, Model Checking, and Abstract Interpretation, (61-77)
- Bodik R, Chandra S, Galenson J, Kimelman D, Tung N, Barman S and Rodarmor C (2010). Programming with angelic nondeterminism, ACM SIGPLAN Notices, 45:1, (339-352), Online publication date: 2-Jan-2010.
- Vechev M, Yahav E and Yorsh G (2010). Abstraction-guided synthesis of synchronization, ACM SIGPLAN Notices, 45:1, (327-338), Online publication date: 2-Jan-2010.
- Attiya H, Ramalingam G and Rinetzky N (2010). Sequential verification of serializability, ACM SIGPLAN Notices, 45:1, (31-42), Online publication date: 2-Jan-2010.
- Breitling R, Donaldson R, Gilbert D and Heiner M Biomodel engineering – from structure to behavior Transactions on Computational Systems Biology XII, (1-12)
- Simmonds J, Ben-David S and Chechik M Monitoring and recovery of web service applications The smart internet, (250-288)
- Simmonds J, Ben-David S and Chechik M Monitoring and recovery of web service applications The smart internet, (250-288)
- Lomuscio A, Penczek W and Qu H (2010). Partial Order Reductions for Model Checking Temporal-epistemic Logics over Interleaved Multi-agent Systems, Fundamenta Informaticae, 101:1-2, (71-90), Online publication date: 1-Jan-2010.
- Knapik M, Penczek W, Szreter M and Półrola A (2010). Bounded Parametric Verification for Distributed Time Petri Nets with Discrete-Time Semantics, Fundamenta Informaticae, 101:1-2, (9-27), Online publication date: 1-Jan-2010.
- Kupferman O, Piterman N and Vardi M An automata-theoretic approach to infinite-state systems Time for verification, (202-259)
- Delzanno G, Giacobazzi R and Ranzato F Static analysis, abstract interpretation and verification in (constraint logic) programming A 25-year perspective on logic programming, (136-158)
- Pettorossi A, Proietti M and Senni V The transformational approach to program development A 25-year perspective on logic programming, (112-135)
- Mukherjee A, Tari Z and Bertok P Memory efficient state-space analysis in software model-checking Proceedings of the Thirty-Third Australasian Conferenc on Computer Science - Volume 102, (23-32)
- Jeannet B, Loginov A, Reps T and Sagiv M (2010). A relational approach to interprocedural shape analysis, ACM Transactions on Programming Languages and Systems, 32:2, (1-52), Online publication date: 1-Jan-2010.
- Montali M, Pesic M, Aalst W, Chesani F, Mello P and Storari S (2010). Declarative specification and verification of service choreographiess, ACM Transactions on the Web, 4:1, (1-62), Online publication date: 1-Jan-2010.
- Ranzato F and Tapparo F (2010). An efficient simulation algorithm based on abstract interpretation, Information and Computation, 208:1, (1-22), Online publication date: 1-Jan-2010.
- Yavuz-Kahveci T and Bultan T (2009). Action Language verifier, Formal Methods in System Design, 35:3, (325-367), Online publication date: 1-Dec-2009.
- GüleşIr G, Berg K, Bergmans L and Akşit M (2009). Experimental evaluation of a tool for the verification and transformation of source code in event-driven systems, Empirical Software Engineering, 14:6, (720-777), Online publication date: 1-Dec-2009.
- Basuki T, Cerone A, Griesmayer A and Schlatte R (2009). Model-checking user behaviour using interacting components, Formal Aspects of Computing, 21:6, Online publication date: 1-Dec-2009.
- Xin-feng Z, Jian-dong W, Xin-feng Z, Bin L, Jun-wu Z and Jun W Methods to tackle state explosion problem in model checking Proceedings of the 3rd international conference on Intelligent information technology application, (329-331)
- Sturton C, Jha S, Seshia S and Wagner D On voting machine design for verification and testability Proceedings of the 16th ACM conference on Computer and communications security, (463-476)
- Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model Checking Coalition Nash Equilibria in MAD Distributed Systems Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (531-546)
- Brillout A, He N, Mazzucchi M, Kroening D, Purandare M, Rümmer P and Weissenbacher G Mutation-based test case generation for simulink models Proceedings of the 8th international conference on Formal methods for components and objects, (208-227)
- Clarke E, Emerson E and Sifakis J (2009). Model checking, Communications of the ACM, 52:11, (74-84), Online publication date: 1-Nov-2009.
- Brauer J, Schlich B, Reinbacher T and Kowalewski S Stack bounds analysis for microcontroller assembly code Proceedings of the 4th Workshop on Embedded Systems Security, (1-9)
- Geldenhuys J, Hansen H and Valmari A Exploring the Scope for Partial Order Reduction Automated Technology for Verification and Analysis, (39-53)
- Meller Y, Grumberg O and Shoham S A Framework for Compositional Verification of Multi-valued Systems via Abstraction-Refinement Automated Technology for Verification and Analysis, (271-288)
- Duret-Lutz A, Poitrenaud D and Couvreur J On-the-fly Emptiness Check of Transition-Based Streett Automata Automated Technology for Verification and Analysis, (213-227)
- Baier C, Groesser M and Ciesinski F Quantitative Analysis under Fairness Constraints Automated Technology for Verification and Analysis, (135-150)
- Woźna-Szcześniak B Bounded model checking for the existential part of real-time CTL and knowledge Proceedings of the 4th IFIP TC 2 Central and East European conference on Advances in Software Engineering Techniques, (164-178)
- Yokoyama S, Sato H and Kurihara M User-friendly GUI in software model checking Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (468-473)
- Roop P, Andalam S, von Hanxleden R, Yuan S and Traulsen C Tight WCRT analysis of synchronous C programs Proceedings of the 2009 international conference on Compilers, architecture, and synthesis for embedded systems, (205-214)
- Schaefer I and Poetzsch-Heffter A (2009). Model-based verification of adaptive embedded systems under environment constraints, ACM SIGBED Review, 6:3, (1-4), Online publication date: 1-Oct-2009.
- Kleinberg S and Mishra B (2009). Metamorphosis: the Coming Transformation of Translational Systems Biology, Queue, 7:9, (40-52), Online publication date: 1-Oct-2009.
- Shankar N (2009). Automated deduction for verification, ACM Computing Surveys, 41:4, (1-56), Online publication date: 1-Oct-2009.
- Safarpour S and Veneris A (2009). Automated design debugging with abstraction and refinement, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28:10, (1597-1608), Online publication date: 1-Oct-2009.
- Fernando T (2009). Situations in LTL as strings, Information and Computation, 207:10, (980-999), Online publication date: 1-Oct-2009.
- Hashimoto Y and Nakajima S (2009). Modular Checking with Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (105-122), Online publication date: 1-Oct-2009.
- Brauer J, Huuck R and Schlich B (2009). Interprocedural Pointer Analysis in Goanna, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (65-83), Online publication date: 1-Oct-2009.
- Brauer J, Schlich B and Kowalewski S (2009). Parallel and Distributed Invariant Checking of Microcontroller Software, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (45-63), Online publication date: 1-Oct-2009.
- Zhao Y and Rammig F (2009). Model-based Runtime Verification Framework, Electronic Notes in Theoretical Computer Science (ENTCS), 253:1, (179-193), Online publication date: 1-Oct-2009.
- Fenech S, Pace G, Okika J, Ravn A and Schneider G (2009). On the Specification of Full Contracts, Electronic Notes in Theoretical Computer Science (ENTCS), 253:1, (39-55), Online publication date: 1-Oct-2009.
- Kraemer F and Herrmann P Automated Encapsulation of UML Activities for Incremental Development and Verification Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems, (571-585)
- Jing L and Jinhua L Model checking the SET purchasing process protocol with SPIN Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4486-4489)
- Fages F and Rizk A From model-checking to temporal logic constraint solving Proceedings of the 15th international conference on Principles and practice of constraint programming, (319-334)
- Baader F, Bauer A and Lippmann M Runtime verification using a temporal description logic Proceedings of the 7th international conference on Frontiers of combining systems, (149-164)
- Wu J, Wang C, Tu X and Xie J On the Logic of Cellular Reactive Systems Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02, (241-248)
- Unno H and Kobayashi N Dependent type inference with interpolants Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, (277-288)
- El-Menshawy M, Bentahar J and Dssouli R Verifiable semantic model for agent interactions using social commitments Proceedings of the Second international conference on Languages, Methodologies, and Development Tools for Multi-Agent Systems, (128-152)
- Svensson H Implementing an LTL-to-Büchi translator in Erlang Proceedings of the 8th ACM SIGPLAN workshop on ERLANG, (63-70)
- Fainekos G and Pappas G (2009). Robustness of temporal logic specifications for continuous-time signals, Theoretical Computer Science, 410:42, (4262-4291), Online publication date: 1-Sep-2009.
- Hadjidj R and Boucheneb H (2009). On-the-fly TCTL model checking for time Petri nets, Theoretical Computer Science, 410:42, (4241-4261), Online publication date: 1-Sep-2009.
- Kanso K, Moller F and Setzer A (2009). Automated Verification of Signalling Principles in Railway Interlocking Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 250:2, (19-31), Online publication date: 1-Sep-2009.
- Donaldson A (2009). Vector Symmetry Reduction, Electronic Notes in Theoretical Computer Science (ENTCS), 250:2, (3-18), Online publication date: 1-Sep-2009.
- Pettorossi A, Proietti M and Senni V Deciding full branching time logic by program transformation Proceedings of the 19th international conference on Logic-Based Program Synthesis and Transformation, (5-21)
- Hung P, Aoki T and Katayama T An effective framework for assume-guarantee verification of evolving component-based software Proceedings of the joint international and annual ERCIM workshops on Principles of software evolution (IWPSE) and software evolution (Evol) workshops, (109-118)
- Belt J, Robby and Deng X Sireum/Topi LDP Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (355-364)
- Lo D, Mariani L and Pezzè M Automatic steering of behavioral model inference Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (345-354)
- Pavese E, Braberman V and Uchitel S Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (335-344)
- Ferrante A, Napoli, M and Parente M (2009). Model Checking for Graded CTL, Fundamenta Informaticae, 96:3, (323-339), Online publication date: 1-Aug-2009.
- Meyer R, Khomenko V and Strazny T (2009). A Practical Approach to Verification of Mobile Systems Using Net Unfoldings, Fundamenta Informaticae, 94:3-4, (439-471), Online publication date: 1-Aug-2009.
- Ferrante A, Napoli, M and Parente M (2009). Model Checking for Graded CTL, Fundamenta Informaticae, 96:3, (323-339), Online publication date: 1-Aug-2009.
- Meyer R, Khomenko V and Strazny T (2009). A Practical Approach to Verification of Mobile Systems Using Net Unfoldings, Fundamenta Informaticae, 94:3-4, (439-471), Online publication date: 1-Aug-2009.
- Liu Y and Stoller S (2009). From datalog rules to efficient programs with time and space guarantees, ACM Transactions on Programming Languages and Systems, 31:6, (1-38), Online publication date: 1-Aug-2009.
- Malik S and Zhang L (2009). Boolean satisfiability from theoretical hardness to practical success, Communications of the ACM, 52:8, (76-82), Online publication date: 1-Aug-2009.
- Liu H, Zhao J and Lu R (2009). Toward the formal verification of a unification system, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:4, (879-888), Online publication date: 1-Aug-2009.
- Roldán M, Durán F and Vallecillo A (2009). Invariant-driven specifications in Maude, Science of Computer Programming, 74:10, (812-835), Online publication date: 1-Aug-2009.
- Lescaylle A and Villanueva A (2009). A Tool for Generating a Symbolic Representation of tccp Executions, Electronic Notes in Theoretical Computer Science (ENTCS), 246, (131-145), Online publication date: 1-Aug-2009.
- Chauhan P, Goyal D, Hasteer G, Mathur A and Sharma N Non-cycle-accurate sequential equivalence checking Proceedings of the 46th Annual Design Automation Conference, (460-465)
- Gopalakrishnan G, Yang Y, Vakkalanka S, Vo A, Aananthakrishnan S, Szubzda G, Sawaya G, Williams J, Sharma S, DeLisi M and Atzeni S Some resources for teaching concurrency Proceedings of the 7th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging, (1-6)
- Pecheur C, Raimondi F and Brat G A formal analysis of requirements-based testing Proceedings of the eighteenth international symposium on Software testing and analysis, (47-56)
- Combéfis S and Pecheur C A bisimulation-based approach to the analysis of human-computer interaction Proceedings of the 1st ACM SIGCHI symposium on Engineering interactive computing systems, (101-110)
- Ganai M and Li W Bang for the buck Proceedings of the 7th IEEE/ACM international conference on Formal Methods and Models for Codesign, (8-17)
- Hoareau C and Satoh I From model checking to data management in pervasive computing Proceedings of the 2009 international conference on Pervasive services, (41-48)
- Mohammadi M, Pazhoumand-dar H, Soryani M and Moeinzadeh H HS-ROBDD Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers, (2115-2118)
- Altahat Z and Elrad T Minimize aspect interaction re-evaluation due to software evolution Proceedings of the Workshop on AOP and Meta-Data for Software Evolution, (1-3)
- Cansell D, Méry D and Proch C (2009). System-on-chip design by proof-based refinement, International Journal on Software Tools for Technology Transfer (STTT), 11:3, (217-238), Online publication date: 1-Jul-2009.
- Koo H and Mishra P (2009). Functional test generation using design and property decomposition techniques, ACM Transactions on Embedded Computing Systems, 8:4, (1-33), Online publication date: 1-Jul-2009.
- Klüppelholz S and Baier C (2009). Symbolic model checking for channel-based component connectors, Science of Computer Programming, 74:9, (688-701), Online publication date: 1-Jul-2009.
- Ding Z and Liu J (2009). An Improvement of Software Architecture Verification, Electronic Notes in Theoretical Computer Science (ENTCS), 243, (49-67), Online publication date: 1-Jul-2009.
- Kleinberg S and Mishra B The temporal logic of causal structures Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, (303-312)
- Poliakov I, Khomenko V and Yakovlev A Workcraft --- A Framework for Interpreted Graph Models Proceedings of the 30th International Conference on Applications and Theory of Petri Nets, (333-342)
- Srivastava S and Gulwani S Program verification using templates over predicate abstraction Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, (223-234)
- Fainekos G and Pappas G MTL robust testing and verification for LPV systems Proceedings of the 2009 conference on American Control Conference, (3748-3753)
- Faied M, Mostafa A and Girard A Dynamic optimal control of multiple depot vehicle routing problem with metric temporal logic Proceedings of the 2009 conference on American Control Conference, (3268-3273)
- Murano A A technological infrastructure design for a pediatric oncology network Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, (1-4)
- Riesco A and Verdejo A (2009). Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (249-266), Online publication date: 1-Jun-2009.
- Belardinelli F and Lomuscio A (2009). Quantified epistemic logics for reasoning about knowledge in multi-agent systems, Artificial Intelligence, 173:9-10, (982-1013), Online publication date: 1-Jun-2009.
- Monniaux D (2009). A minimalistic look at widening operators, Higher-Order and Symbolic Computation, 22:2, (145-154), Online publication date: 1-Jun-2009.
- Lomuscio A and Solanki M Towards an Agent Based Approach for Verification of OWL-S Process Models Proceedings of the 6th European Semantic Web Conference on The Semantic Web: Research and Applications, (578-592)
- Srivastava S and Gulwani S (2009). Program verification using templates over predicate abstraction, ACM SIGPLAN Notices, 44:6, (223-234), Online publication date: 28-May-2009.
- Casadei M and Viroli M An experience on probabilistic model checking and stochastic simulation to design self-organizing systems Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (1538-1545)
- Nakajima S, Ubayashi N and Hokamura K Runtime monitoring of cross-cutting policy Proceedings of the 2009 ICSE Workshop on Aspect-Oriented Requirements Engineering and Architecture Design, (20-24)
- Dalheimer M and Pfreundt F GenLM Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, (132-139)
- Lahijanian M, Kloetzer M, Itani S, Belta C and Andersson S Automatic deployment of autonomous cars in a robotic urban-like environment (rule) Proceedings of the 2009 IEEE international conference on Robotics and Automation, (2684-2689)
- Fallah-Seghrouchni A, Gomez-Sanz J and Singh M Formal methods in agent-oriented software engineering Proceedings of the 10th international conference on Agent-oriented software engineering, (213-228)
- Ezekiel J and Lomuscio A Combining fault injection and model checking to verify fault tolerance in multi-agent systems Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (113-120)
- Chen Y, Safarpour S, Veneris A and Marques-Silva J Spatial and temporal design debug using partial MaxSAT Proceedings of the 19th ACM Great Lakes symposium on VLSI, (345-350)
- Grosse D, Wille R, Kuehne U and Drechsler R Contradictory antecedent debugging in bounded model checking Proceedings of the 19th ACM Great Lakes symposium on VLSI, (173-176)
- Tsay Y, Chen Y, Tsai M, Wu K, Chan W, Luo C and Chang J (2009). Tool support for learning Büchi automata and linear temporal logic, Formal Aspects of Computing, 21:3, (259-275), Online publication date: 1-May-2009.
- Feinerer I and Salzer G (2009). A comparison of tools for teaching formal software verification, Formal Aspects of Computing, 21:3, (293-301), Online publication date: 1-May-2009.
- Kühne U, Große D and Drechsler R Property analysis and design understanding Proceedings of the Conference on Design, Automation and Test in Europe, (1246-1249)
- Chang S, Hsieh K and Lee J pTest Proceedings of the Conference on Design, Automation and Test in Europe, (1012-1017)
- Deng T, Huai J, Li X, Du Z and Guo H Automated synthesis of composite services with correctness guarantee Proceedings of the 18th international conference on World wide web, (1127-1128)
- Armstrong R and Mayo J Leveraging complexity in software for cybersecurity Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, (1-4)
- Liu H, Zhao J and Lu R (2009). Toward the formal verification of a unification system, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:2, (399-408), Online publication date: 1-Apr-2009.
- Gallardo M, Merino P and Sanán D (2009). Model Checking Dynamic Memory Allocation in Operating Systems, Journal of Automated Reasoning, 42:2-4, (229-264), Online publication date: 1-Apr-2009.
- Ciardo G, Miner A and Wan M (2009). Advanced features in SMART, ACM SIGMETRICS Performance Evaluation Review, 36:4, (58-63), Online publication date: 25-Mar-2009.
- Kwiatkowska M, Norman G and Parker D (2009). PRISM, ACM SIGMETRICS Performance Evaluation Review, 36:4, (40-45), Online publication date: 25-Mar-2009.
- Fritz C, Hull R and Su J Automatic construction of simple artifact-based business processes Proceedings of the 12th International Conference on Database Theory, (225-238)
- Vianu V Automatic verification of database-driven systems Proceedings of the 12th International Conference on Database Theory, (1-13)
- Lustig Y and Vardi M Synthesis from Component Libraries Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (395-409)
- Reith M, Niu J and Winsborough W Toward practical analysis for trust management policy Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (310-321)
- Bordini R, Fisher M and Sierhuis M Formal verification of human-robot teamwork Proceedings of the 4th ACM/IEEE international conference on Human robot interaction, (267-268)
- Hallé S and Villemaire R Runtime monitoring of web service choreographies using streaming XML Proceedings of the 2009 ACM symposium on Applied Computing, (2118-2125)
- ter Beek M, Mazzanti F and Gnesi S CMC-UMC Proceedings of the 2009 ACM symposium on Applied Computing, (2111-2117)
- Weitl F, Jakšić M and Freitag B (2009). Towards the automated verification of semi-structured documents, Data & Knowledge Engineering, 68:3, (292-317), Online publication date: 1-Mar-2009.
- Bui T and Nymeyer A Formal Verification Based on Guided Random Walks Proceedings of the 7th International Conference on Integrated Formal Methods, (72-87)
- Beneš N, Brim L, Černá I, Sochor J, Vařeková P and Zimmerova B Partial Order Reduction for State/Event LTL Proceedings of the 7th International Conference on Integrated Formal Methods, (307-321)
- Vo A, Vakkalanka S, DeLisi M, Gopalakrishnan G, Kirby R and Thakur R (2009). Formal verification of practical MPI programs, ACM SIGPLAN Notices, 44:4, (261-270), Online publication date: 14-Feb-2009.
- Vo A, Vakkalanka S, DeLisi M, Gopalakrishnan G, Kirby R and Thakur R Formal verification of practical MPI programs Proceedings of the 14th ACM SIGPLAN symposium on Principles and practice of parallel programming, (261-270)
- Hierons R, Bogdanov K, Bowen J, Cleaveland R, Derrick J, Dick J, Gheorghe M, Harman M, Kapoor K, Krause P, Lüttgen G, Simons A, Vilkomir S, Woodward M and Zedan H (2009). Using formal specifications to support testing, ACM Computing Surveys, 41:2, (1-76), Online publication date: 1-Feb-2009.
- Ballarini P, Mardare R and Mura I (2009). Analysing Biochemical Oscillation through Probabilistic Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 229:1, (3-19), Online publication date: 1-Feb-2009.
- Chockler H and Strichman O (2009). Before and after vacuity, Formal Methods in System Design, 34:1, (37-58), Online publication date: 1-Feb-2009.
- Dashti M, Nair S and Jonker H (2008). Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme, Fundamenta Informaticae, 89:4, (393-417), Online publication date: 31-Jan-2009.
- Liveris N, Zhou H and Banerjee P Complete-k-distinguishability for retiming and resynthesis equivalence checking without restricting synthesis Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (636-641)
- Aminof B, Kupferman O and Lampert R Reasoning about online algorithms with weighted automata Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (835-844)
- Rataj A, Woźna B and Zbrzezny A (2009). A Translator of Java Programs to TADDs, Fundamenta Informaticae, 93:1-3, (305-324), Online publication date: 1-Jan-2009.
- Leuschel M, Cansell D and Butler M Validating and animating higher-order recursive functions in b Rigorous Methods for Software Construction and Analysis, (78-92)
- Rataj A, Woźna B and Zbrzezny A (2009). A Translator of Java Programs to TADDs, Fundamenta Informaticae, 93:1-3, (305-324), Online publication date: 1-Jan-2009.
- Foster H (2009). Applied Assertion-Based Verification, Foundations and Trends in Electronic Design Automation, 3:1, (1-95), Online publication date: 1-Jan-2009.
- Sinha A, Dasgupta P, Pal B, Das S, Basu P and Chakrabarti P (2009). Design intent coverage revisited, ACM Transactions on Design Automation of Electronic Systems, 14:1, (1-32), Online publication date: 1-Jan-2009.
- Vyatkin V, Hanisch H, Pang C and Yang C (2009). Closed-loop modeling in future automation system engineering and validation, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 39:1, (17-28), Online publication date: 1-Jan-2009.
- Banks R, Khomenko V and Steggles L (2009). A Case for Using Signal Transition Graphs for Analysing and Refining Genetic Networks, Electronic Notes in Theoretical Computer Science (ENTCS), 227, (3-19), Online publication date: 1-Jan-2009.
- Xu L, Chen W, Xu Y and Zhang W (2009). Improved bounded model checking for the universal fragment of CTL, Journal of Computer Science and Technology, 24:1, (96-109), Online publication date: 1-Jan-2009.
- Sharpanskykh A and Treur J Relating Cognitive Process Models to Behavioural Models of Agents Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02, (330-335)
- Liu C, Billard A and Long B An Abstract Model for Dynamic Access Control Architectures Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (638-642)
- Thapa D, Park C, Han K, Park S and Wang G Architecture for modeling, simulation, and execution of PLC based manufacturing system Proceedings of the 40th Conference on Winter Simulation, (1794-1801)
- Dashti M, Nair S and Jonker H (2008). Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme, Fundamenta Informaticae, 89:4, (393-417), Online publication date: 1-Dec-2008.
- Clarke D (2008). A Basic Logic for Reasoning about Connector Reconfiguration, Fundamenta Informaticae, 82:4, (361-390), Online publication date: 1-Dec-2008.
- Mantovani J (2008). Automatic software verification for robotics, AI Communications, 21:4, (263-264), Online publication date: 1-Dec-2008.
- Bosse T, Lam D and Barber K (2008). Tools for analyzing intelligent agent systems, Web Intelligence and Agent Systems, 6:4, (355-371), Online publication date: 1-Dec-2008.
- Casagrande A, Piazza C, Policriti A and Mishra B (2008). Inclusion dynamics hybrid automata, Information and Computation, 206:12, (1394-1424), Online publication date: 1-Dec-2008.
- Botaschanjan J, Broy M, Gruler A, Harhurin A, Knapp S, Kof L, Paul W and Spichkova M (2008). On the correctness of upper layers of automotive systems, Formal Aspects of Computing, 20:6, (637-662), Online publication date: 1-Dec-2008.
- Grinchtein O and Leucker M (2008). Network invariants for real-time systems, Formal Aspects of Computing, 20:6, (619-635), Online publication date: 1-Dec-2008.
- Kupferman O, Li W and Seshia S A theory of mutations with applications to vacuity, coverage, and fault tolerance Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-9)
- Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model checking nash equilibria in MAD distributed systems Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-8)
- Keng B, Mangassarian H and Veneris A A succinct memory model for automated design debugging Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, (137-142)
- De A, Roychoudhury A and D'Souza D Java memory model aware software validation Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (8-14)
- Nejati S, Sabetzadeh M, Chechik M, Uchitel S and Zave P Towards compositional synthesis of evolving systems Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, (285-296)
- Park C and Sen K Randomized active atomicity violation detection in concurrent programs Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, (135-145)
- Ding Z, Zhang K and Hu J (2008). A rigorous approach towards test case generation, Information Sciences: an International Journal, 178:21, (4057-4079), Online publication date: 1-Nov-2008.
- Donaldson A and Miller A (2008). Automatic Symmetry Detection for Promela, Journal of Automated Reasoning, 41:3-4, (251-293), Online publication date: 1-Nov-2008.
- Tobarra L, Cazorla D, Cuartero F and Pardo J Modelling secure wireless sensor networks routing protocols with timed automata Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, (51-58)
- Roberson M, Harries M, Darga P and Boyapati C (2008). Efficient software model checking of soundness of type systems, ACM SIGPLAN Notices, 43:10, (493-504), Online publication date: 27-Oct-2008.
- Roberson M, Harries M, Darga P and Boyapati C Efficient software model checking of soundness of type systems Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications, (493-504)
- Hörne T and van der Poll J Planning as model checking Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology, (114-123)
- Hamberg R and Vaandrager F (2008). Using model checkers in an introductory course on operating systems, ACM SIGOPS Operating Systems Review, 42:6, (101-111), Online publication date: 1-Oct-2008.
- Smith R, Estan C, Jha S and Kong S (2008). Deflating the big bang, ACM SIGCOMM Computer Communication Review, 38:4, (207-218), Online publication date: 1-Oct-2008.
- Cuoq P and Doligez D Hashconsing in an incrementally garbage-collected system Proceedings of the 2008 ACM SIGPLAN workshop on ML, (13-22)
- Zbrzezny A and Woźna B (2008). Towards Verification of Java Programs in perICS, Fundamenta Informaticae, 85:1-4, (533-548), Online publication date: 20-Sep-2008.
- Zbrzezny A (2008). Improving the Translation from ECTL to SAT, Fundamenta Informaticae, 85:1-4, (513-531), Online publication date: 20-Sep-2008.
- Penczek W and Szreter M (2008). SAT-based Unbounded Model Checking of Timed Automata, Fundamenta Informaticae, 85:1-4, (425-440), Online publication date: 20-Sep-2008.
- Kacprzak M, Nabiałek W, Niewiadomski A, Penczek W, Półrola A, Szreter M, Woźna B and Zbrzezny A (2008). VerICS 2007 - a Model Checker for Knowledge and Real-Time, Fundamenta Informaticae, 85:1-4, (313-328), Online publication date: 20-Sep-2008.
- Belardinelli F and Lomuscio A A complete first-order logic of knowledge and time Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning, (705-714)
- Sardina S, Patrizi F and Giacomo G Behavior composition in the presence of failure Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning, (640-650)
- Claßen J and Lakemeyer G A logic for non-terminating Golog programs Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning, (589-599)
- Staats M, Deng W, Rajan A, Heimdahl M and Woodham K ReqsCov Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (499-500)
- Ispir M and Betin Can A An Assume Guarantee Verification Methodology for Aspect-Oriented Programming Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (391-394)
- Moonzoo Kim , Yunho Kim and Hotae Kim Unit Testing of Flash Memory Device Driver through a SAT-Based Model Checker Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (198-207)
- Bordini R, Dennis L, Farwer B and Fisher M Automated Verification of Multi-Agent Programs Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (69-78)
- Sardina S and De Giacomo G Realizing multiple autonomous agents through scheduling of shared devices Proceedings of the Eighteenth International Conference on International Conference on Automated Planning and Scheduling, (304-312)
- Anderson H, Ciobanu G and Freitas L UTP and temporal logic model checking Proceedings of the 2nd international conference on Unifying theories of programming, (22-41)
- Calder M and Miller A (2008). An automatic abstraction technique for verifying featured, parameterised systems, Theoretical Computer Science, 404:3, (235-255), Online publication date: 1-Sep-2008.
- Zhang M, Hung D and Liu Z Verification of Linear Duration Invariants by Model Checking CTL Properties Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (395-409)
- Wehrheim H Bounded Model Checking for Partial Kripke Structures Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (380-394)
- Schlatte R, Aichernig B, Boer F, Griesmayer A and Johnsen E Testing Concurrent Objects with Application-Specific Schedulers Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (319-333)
- Izadi M and Bonsangue M Recasting Constraint Automata into Büchi Automata Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (156-170)
- Smith R, Estan C, Jha S and Kong S Deflating the big bang Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (207-218)
- Andel T and Yasinsac A Automated Evaluation of Secure Route Discovery in MANET Protocols Proceedings of the 15th international workshop on Model Checking Software, (26-41)
- Abed N, Tripakis S and Vincent J Resource-Aware Verification Using Randomized Exploration of Large State Spaces Proceedings of the 15th international workshop on Model Checking Software, (214-231)
- Lo D and Khoo S (2008). Mining patterns and rules for software specification discovery, Proceedings of the VLDB Endowment, 1:2, (1609-1616), Online publication date: 1-Aug-2008.
- Milo T and Deutch D (2008). Querying and monitoring distributed business processes, Proceedings of the VLDB Endowment, 1:2, (1512-1515), Online publication date: 1-Aug-2008.
- Bonet B and Geffner H (2008). Heuristics for planning with penalties and rewards formulated in logic and computed through circuits, Artificial Intelligence, 172:12-13, (1579-1604), Online publication date: 1-Aug-2008.
- Platzer A (2008). Differential Dynamic Logic for Hybrid Systems, Journal of Automated Reasoning, 41:2, (143-189), Online publication date: 1-Aug-2008.
- Clarke D (2008). A Basic Logic for Reasoning about Connector Reconfiguration, Fundamenta Informaticae, 82:4, (361-390), Online publication date: 30-Jul-2008.
- Hart T, Chechik M and Lie D Security benchmarking using partial verification Proceedings of the 3rd conference on Hot topics in security, (1-6)
- Cacovean L, Popa E, Brumar C and Pah I An application CTL formula based on problem solving methodology Proceedings of the 12th WSEAS international conference on Computers, (218-223)
- Lo D, Khoo S and Liu C Mining past-time temporal rules from execution traces Proceedings of the 2008 international workshop on dynamic analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), (50-56)
- Elkarablieh B, Marinov D and Khurshid S Efficient solving of structural constraints Proceedings of the 2008 international symposium on Software testing and analysis, (39-50)
- Leuschel M Declarative programming for verification Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming, (1-7)
- Sintzoff M Synthesis of Optimal Control Policies for Some Infinite-State Transition Systems Proceedings of the 9th international conference on Mathematics of Program Construction, (336-359)
- Alba E and Chicano F Searching for liveness property violations in concurrent systems with ACO Proceedings of the 10th annual conference on Genetic and evolutionary computation, (1727-1734)
- Edelkamp S, Sanders P and Šimeček P Semi-external LTL Model Checking Proceedings of the 20th international conference on Computer Aided Verification, (530-542)
- Kashyap S and Garg V Producing Short Counterexamples Using "Crucial Events" Proceedings of the 20th international conference on Computer Aided Verification, (491-503)
- Kaminski M (2008). Invariance Under Stuttering in a Temporal Logic without the "Until" Operator, Fundamenta Informaticae, 82:1-2, (127-140), Online publication date: 1-Jul-2008.
- Mishra P and Dutt N (2008). Specification-driven directed test generation for validation of pipelined processors, ACM Transactions on Design Automation of Electronic Systems, 13:3, (1-36), Online publication date: 1-Jul-2008.
- Slanina M, Sipma H and Manna Z (2008). Deductive verification of alternating systems, Formal Aspects of Computing, 20:4-5, (507-560), Online publication date: 1-Jul-2008.
- Jiang M, Zhou C, Wu G and Zhang F A CSP-Based Approach for Solving Parity Game Proceedings of the 2nd annual international workshop on Frontiers in Algorithmics, (135-146)
- Monteiro P, Ropers D, Mateescu R, Freitas A and de Jong H Temporal Logic Patterns for Querying Qualitative Models of Genetic Regulatory Networks Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (229-233)
- Meyer R, Khomenko V and Strazny T A Practical Approach to Verification of Mobile Systems Using Net Unfoldings Proceedings of the 29th international conference on Applications and Theory of Petri Nets, (327-347)
- Hu H and Ahn G Enabling verification and conformance testing for access control model Proceedings of the 13th ACM symposium on Access control models and technologies, (195-204)
- Benedikt M, Jeffrey A and Ley-Wild R Stream firewalling of xml constraints Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (487-498)
- Khasidashvili Z On formal equivalence verification of hardware Proceedings of the 3rd international conference on Computer science: theory and applications, (11-12)
- Gulwani S, Srivastava S and Venkatesan R Program analysis as constraint solving Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (281-292)
- Sen K Race directed random testing of concurrent programs Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (11-21)
- Fages F and Soliman S Formal cell biology in biocham Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (54-80)
- Chockler H, Halpern J and Kupferman O (2008). What causes a system to satisfy a specification?, ACM Transactions on Computational Logic, 9:3, (1-26), Online publication date: 1-Jun-2008.
- Vacuity Analysis by Fault Simulation Proceedings of the Sixth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (27-36)
- Dworschak S, Grell S, Nikiforova V, Schaub T and Selbig J (2008). Modeling Biological Networks by Action Languages via Answer Set Programming, Constraints, 13:1-2, (21-65), Online publication date: 1-Jun-2008.
- Gulwani S, Srivastava S and Venkatesan R (2008). Program analysis as constraint solving, ACM SIGPLAN Notices, 43:6, (281-292), Online publication date: 30-May-2008.
- Sen K (2008). Race directed random testing of concurrent programs, ACM SIGPLAN Notices, 43:6, (11-21), Online publication date: 30-May-2008.
- Li J, Sun X, Xie F and Song X Component-Based Abstraction and Refinement Proceedings of the 10th international conference on Software Reuse: High Confidence Software Reuse in Large Systems, (39-51)
- Bauer A and Juerjens J Security protocols, properties, and their monitoring Proceedings of the fourth international workshop on Software engineering for secure systems, (33-40)
- Chen B, Avrunin G, Henneman E, Clarke L, Osterweil L and Henneman P Analyzing medical processes Proceedings of the 30th international conference on Software engineering, (623-632)
- Lauterburg S, Sobeih A, Marinov D and Viswanathan M Incremental state-space exploration for programs with dynamically allocated data Proceedings of the 30th international conference on Software engineering, (291-300)
- Dennis L, Farwer B, Bordini R and Fisher M A flexible framework for verifying agent programs Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 3, (1303-1306)
- Lomuscio A, Qu H and Solanki M Towards verifying compliance in agent-based web service compositions Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 1, (265-272)
- Astefanoaei L and de Boer F Model-checking agent refinement Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (705-712)
- Bulling N, Dix J and Chesñevar C Modelling coalitions Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (681-688)
- Ågotnes T, van der Hoek W and Wooldridge M Quantifying over coalitions in epistemic logic Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (665-672)
- Schaefer I and Poetzsch-Heffter A Slicing for model reduction in adaptive embedded systems development Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems, (25-32)
- Nejati S and Chechik M Behavioural model fusion Proceedings of the 2008 international workshop on Models in software engineering, (1-6)
- Flores S, Lucas S and Villanueva A (2008). Formal Verification of Websites, Electronic Notes in Theoretical Computer Science (ENTCS), 200:3, (103-118), Online publication date: 1-May-2008.
- Ball T and Kupferman O Vacuity in testing Proceedings of the 2nd international conference on Tests and proofs, (4-17)
- Katz E and Katz S Incremental analysis of interference among aspects Proceedings of the 7th workshop on Foundations of aspect-oriented languages, (29-38)
- Khatchadourian R, Dovland J and Soundarajan N Enforcing behavioral constraints in evolving aspect-oriented programs Proceedings of the 7th workshop on Foundations of aspect-oriented languages, (19-28)
- Carmona J, Cortadella J, Takada Y and Peper F (2008). Formal methods for the analysis and synthesis of nanometer-scale cellular arrays, ACM Journal on Emerging Technologies in Computing Systems, 4:2, (1-27), Online publication date: 1-Apr-2008.
- Wilhelm R, Engblom J, Ermedahl A, Holsti N, Thesing S, Whalley D, Bernat G, Ferdinand C, Heckmann R, Mitra T, Mueller F, Puaut I, Puschner P, Staschulat J and Stenström P (2008). The worst-case execution-time problem—overview of methods and survey of tools, ACM Transactions on Embedded Computing Systems, 7:3, (1-53), Online publication date: 1-Apr-2008.
- Sadot A, Fisher J, Barak D, Admanit Y, Stern M, Hubbard E and Harel D (2008). Toward Verified Biological Models, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:2, (223-234), Online publication date: 1-Apr-2008.
- Massart T, Meuter C and Van Begin L (2008). On the complexity of partial order trace model checking, Information Processing Letters, 106:3, (120-126), Online publication date: 1-Apr-2008.
- Xu K, Liu Y and Wu C (2008). BPSL Modeler -- Visual Notation Language for Intuitive Business Property Reasoning, Electronic Notes in Theoretical Computer Science (ENTCS), 211, (211-220), Online publication date: 1-Apr-2008.
- Hanna Y, Rajan H and Zhang W Slede Proceedings of the first ACM conference on Wireless network security, (109-118)
- Ong C Verification of higher-order computation Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems, (299-306)
- Duarte L, Kramer J and Uchitel S Towards faithful model extraction based on contexts Proceedings of the Theory and practice of software, 11th international conference on Fundamental approaches to software engineering, (101-115)
- Abdulla P, Henda N, De Alfaro L, Mayr R and Sandberg S Stochastic games with lossy channels Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures, (35-49)
- Bakewell A and Ghica D On-the-fly techniques for game-based software model checking Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems, (78-92)
- Meolic R, Kapus T and Brezočnik Z (2008). ACTLW - An action-based computation tree logic with unless operator, Information Sciences: an International Journal, 178:6, (1542-1557), Online publication date: 20-Mar-2008.
- Lo D, Khoo S and Liu C Efficient mining of recurrent rules from a sequence database Proceedings of the 13th international conference on Database systems for advanced applications, (67-83)
- Voron J and Kordon F Transforming sources to petri nets Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (1-10)
- Krioukov A, Bairavasundaram L, Goodson G, Srinivasan K, Thelen R, Arpaci-Dusseau A and Arpaci-Dussea R Parity lost and parity regained Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-15)
- Vakkalanka S, Sharma S, Gopalakrishnan G and Kirby R ISP Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, (285-286)
- Lomuscio A, Raimondi F and Woźna B (2007). Verification of the TESLA protocol in MCMAS-X, Fundamenta Informaticae, 79:3-4, (473-486), Online publication date: 1-Feb-2008.
- Pradella M and Crespi Reghizzi S (2008). A SAT-based parser and completer for pictures specified by tiling, Pattern Recognition, 41:2, (555-566), Online publication date: 1-Feb-2008.
- Edelkamp S, Jabbar S and Sulewski D (2008). Distributed Verification of Multi-threaded C++ Programs, Electronic Notes in Theoretical Computer Science (ENTCS), 198:1, (33-46), Online publication date: 1-Feb-2008.
- Jensen R, Veloso M and Bryant R (2008). State-set branching, Artificial Intelligence, 172:2-3, (103-139), Online publication date: 1-Feb-2008.
- Jesser A and Hedrich L A symbolic approach for mixed-signal model checking Proceedings of the 2008 Asia and South Pacific Design Automation Conference, (404-409)
- Ranzato F, Doria O and Tapparo F A forward-backward abstraction refinement algorithm Proceedings of the 9th international conference on Verification, model checking, and abstract interpretation, (248-262)
- Kacprzak M, Nabiałek W, Niewiadomski A, Penczek W, Półrola A, Szreter M, Woźna B and Zbrzezny A (2008). VerICS 2007 - a Model Checker for Knowledge and Real-Time, Fundamenta Informaticae, 85:1-4, (313-328), Online publication date: 1-Jan-2008.
- Zbrzezny A and Woźna B (2008). Towards Verification of Java Programs in perICS, Fundamenta Informaticae, 85:1-4, (533-548), Online publication date: 1-Jan-2008.
- Zbrzezny A (2008). Improving the Translation from ECTL to SAT, Fundamenta Informaticae, 85:1-4, (513-531), Online publication date: 1-Jan-2008.
- Penczek W and Szreter M (2008). SAT-based Unbounded Model Checking of Timed Automata, Fundamenta Informaticae, 85:1-4, (425-440), Online publication date: 1-Jan-2008.
- Kaminski M (2008). Invariance Under Stuttering in a Temporal Logic without the "Until" Operator, Fundamenta Informaticae, 82:1-2, (127-140), Online publication date: 1-Jan-2008.
- Fages F and Soliman S Model revision from temporal logic properties in computational systems biology Probabilistic inductive logic programming, (287-304)
- Zhang Y and Ding Y (2008). CTL model update for system modifications, Journal of Artificial Intelligence Research, 31:1, (113-155), Online publication date: 1-Jan-2008.
- Woźna B and Zbrzezny A (2007). Bounded Model Checking for the Existential Fragment of TCTL_{-G} and Diagonal Timed Automata, Fundamenta Informaticae, 79:1-2, (229-256), Online publication date: 1-Jan-2008.
- Desmet L, Joosen W, Massacci F, Philippaerts P, Piessens F, Siahaan I and Vanoverberghe D (2008). Security-by-contract on the .NET platform, Information Security Tech. Report, 13:1, (25-32), Online publication date: 1-Jan-2008.
- Hsiung P, Lin S, Hung C, Fu J, Lin C, Chiang C, Chiang K, Lu C and Lu P Real-time embedded software design for mobile and ubiquitous systems Proceedings of the 2007 international conference on Embedded and ubiquitous computing, (718-729)
- Hsiung P, Lin S, Hung C, Fu J, Lin C, Chiang C, Chiang K, Lu C and Lu P Real-Time Embedded Software Design for Mobile and Ubiquitous Systems Embedded and Ubiquitous Computing, (718-729)
- Benedikt M and Jeffrey A Efficient and Expressive Tree Filters FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, (461-472)
- Bollig B, Kuske D and Meinecke I Propositional Dynamic Logic for Message-Passing Systems FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, (303-315)
- Uribe T and Cheung S (2007). Automatic analysis of firewall and network intrusion detection system configurations, Journal of Computer Security, 15:6, (691-715), Online publication date: 1-Dec-2007.
- Shoham S and Grumberg O (2007). A game-based framework for CTL counterexamples and 3-valued abstraction-refinement, ACM Transactions on Computational Logic, 9:1, (1-es), Online publication date: 1-Dec-2007.
- Pesic M, Schonenberg M, Sidorova N and Van Der Aalst W Constraint-based workflow models Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I, (77-94)
- Adler R, Schaefer I, Schuele T and Vecchié E From model-based design to formal verification of adaptive embedded systems Proceedings of the formal engineering methods 9th international conference on Formal methods and software engineering, (76-95)
- Adler R, Schaefer I, Schuele T and Vecchié E From Model-Based Design to Formal Verification of Adaptive Embedded Systems Formal Methods and Software Engineering, (76-95)
- Cheng X, He N and Hsiao M Hybrid testing and verification techniques for a cognitive radio system Proceedings of the 11th IASTED International Conference on Software Engineering and Applications, (240-245)
- Pike L Model checking for the practical verificationist Proceedings of the second workshop on Automated formal methods, (21-31)
- Kroening D and Seshia S Formal verification at higher levels of abstraction Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (572-578)
- Sen K Effective random testing of concurrent programs Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (323-332)
- Brunel J, Cuppens F, Cuppens N, Sans T and Bodeveix J Security policy compliance with violation management Proceedings of the 2007 ACM workshop on Formal methods in security engineering, (31-40)
- Gopalakrishnan G and Kirby R (2007). Formal Methods for MPI Programs, Electronic Notes in Theoretical Computer Science (ENTCS), 193, (19-27), Online publication date: 1-Nov-2007.
- Fang L and Sassa M (2007). Generating Java Compiler Optimizers Using Bidirectional CTL, Electronic Notes in Theoretical Computer Science (ENTCS), 190:4, (49-63), Online publication date: 1-Nov-2007.
- Lomuscio A, Penczek W and Woźna B (2007). Bounded model checking for knowledge and real time, Artificial Intelligence, 171:16-17, (1011-1038), Online publication date: 1-Nov-2007.
- Thapa D, Park C, Park S and Wang G Formal modeling and verification of shop floor controller logics Proceedings of the IASTED Asian Conference on Modelling and Simulation, (209-213)
- Stoller S, Yang P, Ramakrishnan C and Gofman M Efficient policy analysis for administrative role based access control Proceedings of the 14th ACM conference on Computer and communications security, (445-455)
- Noll T and Schlich B Delayed nondeterminism in model checking embedded systems assembly code Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing, (185-201)
- Bensalem S, Peled D, Qu H, Tripakis S and Zuck L Test case generation for ultimately periodic paths Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing, (120-135)
- Noll T and Schlich B Delayed Nondeterminism in Model Checking Embedded Systems Assembly Code Hardware and Software: Verification and Testing, (185-201)
- Bensalem S, Peled D, Qu H, Tripakis S and Zuck L Test Case Generation for Ultimately Periodic Paths Hardware and Software: Verification and Testing, (120-135)
- Bošnački D, Donaldson A, Leuschel M and Massart T Efficient approximate verification of Promela models via symmetry markers Proceedings of the 5th international conference on Automated technology for verification and analysis, (300-315)
- Nain S and Vardi M Branching vs. linear time Proceedings of the 5th international conference on Automated technology for verification and analysis, (19-34)
- Harmon S, DeLoach S and Robby Trace-Based Specification of Law and Guidance Policies for Multi-Agent Systems Engineering Societies in the Agents World VIII, (333-349)
- Nain S and Vardi M Branching vs. Linear Time: Semantical Perspective Automated Technology for Verification and Analysis, (19-34)
- Elkarablieh B, Khurshid S, Vu D and McKinley K (2007). Starc, ACM SIGPLAN Notices, 42:10, (387-404), Online publication date: 21-Oct-2007.
- Elkarablieh B, Khurshid S, Vu D and McKinley K Starc Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (387-404)
- Fröschle S and Lasota S (2007). Causality versus true-concurrency, Theoretical Computer Science, 386:3, (169-187), Online publication date: 20-Oct-2007.
- Ferrante A, Murano A and Parente M Enriched µ-calculus pushdown module checking Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning, (438-453)
- Abate P, Goré R and Widmann F One-pass tableaux for computation tree logic Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning, (32-46)
- Ferrante A, Murano A and Parente M Enriched μ–Calculus Pushdown Module Checking Logic for Programming, Artificial Intelligence, and Reasoning, (438-453)
- Guo Q and Derrick J Verification of timed erlang/OTP components using the process algebra μcrl Proceedings of the 2007 SIGPLAN workshop on ERLANG Workshop, (55-64)
- Beyer D, Henzinger T, Jhala R and Majumdar R (2007). The software model checker Blast, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (505-525), Online publication date: 1-Oct-2007.
- Chechik M and Gurfinkel A (2007). A framework for counterexample generation and exploration, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (429-445), Online publication date: 1-Oct-2007.
- Larsen K, Nyman U and Wasowski A (2007). Modeling software product lines using color-blind transition systems, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (471-487), Online publication date: 1-Oct-2007.
- Bakhshi R, Bonnet F, Fokkink W and Haverkort B (2007). Formal analysis techniques for gossiping protocols, ACM SIGOPS Operating Systems Review, 41:5, (28-36), Online publication date: 1-Oct-2007.
- Seo S, Yang H, Yi K and Han T (2007). Goal-directed weakening of abstract interpretation results, ACM Transactions on Programming Languages and Systems, 29:6, (39-es), Online publication date: 1-Oct-2007.
- Miyamoto T, Sakamoto M and Kumagai S (2007). On Reachability Analysis of Multi Agent Nets, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:10, (2257-2260), Online publication date: 1-Oct-2007.
- Pervez S, Gopalakrishnan G, Kirby R, Palmer R, Thakur R and Gropp W Practical model-checking method for verifying correctness of MPI programs Proceedings of the 14th European conference on Recent Advances in Parallel Virtual Machine and Message Passing Interface, (344-353)
- Siegel S and Avrunin G Verification of halting properties for MPI programs using nonblocking operations Proceedings of the 14th European conference on Recent Advances in Parallel Virtual Machine and Message Passing Interface, (326-334)
- Fábregas I, Palomino M and De Frutos Escrig D Reflection and preservation of properties in coalgebraic (bi)simulations Proceedings of the 4th international conference on Theoretical aspects of computing, (231-245)
- Deutch D and Milo T Querying structural and behavioral properties of business processes Proceedings of the 11th international conference on Database programming languages, (169-185)
- Güdemann M, Ortmeier F and Reif W Using deductive cause-consequence analysis (DCCA) with SCADE Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (465-478)
- Chen Y, Hsiung P and Chen S Modeling and automatic failure analysis of safety-critical systems using extended safecharts Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (451-464)
- Hassine J, Rilling J and Dssouli R Formal verification of use case maps with real time extensions Proceedings of the 13th international SDL Forum conference on Design for dependable systems, (225-241)
- Shilov N and Garanina N Combined logics of knowledge, time, and actions for reasoning about multi-agent systems Proceedings of the First international conference on Knowledge processing and data analysis, (48-58)
- Wu L and Su J Symbolic model checking temporal logics of knowledge in multi-agent system via extended Mu-calculus Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications, (510-522)
- Kupferman O Tightening the exchange rates between automata Proceedings of the 21st international conference, and Proceedings of the 16th annuall conference on Computer Science Logic, (7-22)
- Langmead C and Jha S Predicting protein folding kinetics via temporal logic model checking Proceedings of the 7th international conference on Algorithms in Bioinformatics, (252-264)
- Hanna Y SLEDE Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (591-594)
- Pradella M, Morzenti A and San Pietro P The symmetry of the past and of the future Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (312-320)
- Tiella R, Villafiorita A and Tomasi S FSMC+, a tool for the generation of Java code from statecharts Proceedings of the 5th international symposium on Principles and practice of programming in Java, (93-102)
- Hanna Y SLEDE The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering: companion papers, (591-594)
- Sykes D, Heaven W, Magee J and Kramer J Plan-directed architectural change for autonomous systems Proceedings of the 2007 conference on Specification and verification of component-based systems: 6th Joint Meeting of the European Conference on Software Engineering and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, (15-21)
- Lomuscio A and Penczek W (2007). Symbolic model checking for temporal-epistemic logics, ACM SIGACT News, 38:3, (77-99), Online publication date: 1-Sep-2007.
- Shoham S and Grumberg O Compositional verification and 3-valued abstractions join forces Proceedings of the 14th international conference on Static Analysis, (69-86)
- Viganò F and Colombetti M Symbolic model checking of institutions Proceedings of the ninth international conference on Electronic commerce, (35-44)
- Ranganath V, Amtoft T, Banerjee A, Hatcliff J and Dwyer M (2007). A new foundation for control dependence and slicing for modern program structures, ACM Transactions on Programming Languages and Systems, 29:5, (27-es), Online publication date: 2-Aug-2007.
- Lomuscio A, Raimondi F and Woźna B (2007). Verification of the TESLA protocol in MCMAS-X, Fundamenta Informaticae, 79:3-4, (473-486), Online publication date: 1-Aug-2007.
- Laplante S, Lassaigne R, Magniez F, Peyronnet S and de Rougemont M (2007). Probabilistic abstraction for model checking, ACM Transactions on Computational Logic, 8:4, (20-es), Online publication date: 1-Aug-2007.
- Ogata K and Futatsugi K (2007). Comparison of Maude and SAL by Conducting Case Studies Model Checking a Distributed Algorithm, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:8, (1690-1703), Online publication date: 1-Aug-2007.
- Şuşu A, Magno M, Acquaviva A, Atienza D and Micheli G Reconfiguration Strategies for Environmentally Powered Devices Transactions on High-Performance Embedded Architectures and Compilers I, (341-360)
- Vardi M Linear-time model checking Proceedings of the 12th international conference on Implementation and application of automata, (5-10)
- Thapa D, Park S, Park C and Wang G Modeling, verification, and implementation of PLC program using timed-MPSG Proceedings of the 2007 Summer Computer Simulation Conference, (533-540)
- Cheney J and Momigliano A Mechanized metatheory model-checking Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming, (75-86)
- Krena B, Letko Z, Tzoref R, Ur S and Vojnar T Healing data races on-the-fly Proceedings of the 2007 ACM workshop on Parallel and distributed systems: testing and debugging, (54-64)
- Palmer R, Gopalakrishnan G and Kirby R Semantics driven dynamic partial-order reduction of MPI-based parallel programs Proceedings of the 2007 ACM workshop on Parallel and distributed systems: testing and debugging, (43-53)
- d'Amorim M, Lauterburg S and Marinov D Delta execution for efficient state-space exploration of object-oriented programs Proceedings of the 2007 international symposium on Software testing and analysis, (50-60)
- Alba E and Chicano F ACOhg Proceedings of the 9th annual conference on Genetic and evolutionary computation, (10-17)
- Amit D, Rinetzky N, Reps T, Sagiv M and Yahav E Comparison under abstraction for verifying linearizability Proceedings of the 19th international conference on Computer aided verification, (477-490)
- Barnat J, Brim L and Šimeček P I/O efficient accepting cycle detection Proceedings of the 19th international conference on Computer aided verification, (281-293)
- Ezekiel J, Lüttgen G and Ciardo G Parallelising symbolic state-space generators Proceedings of the 19th international conference on Computer aided verification, (268-280)
- Carotenuto D, Murano A and Peron A 2-visibly pushdown automata Proceedings of the 11th international conference on Developments in language theory, (132-144)
- Platzer A Differential Dynamic Logic for Verifying Parametric Hybrid Systems Proceedings of the 16th international conference on Automated Reasoning with Analytic Tableaux and Related Methods, (216-232)
- Metzler B Decomposing integrated specifications for verification Proceedings of the 6th international conference on Integrated formal methods, (459-479)
- Bolton C Capturing conflict and confusion in CSP Proceedings of the 6th international conference on Integrated formal methods, (413-438)
- Gheorghiu M, Gurfinkel A and Chechik M Finding state solutions to temporal logic queries Proceedings of the 6th international conference on Integrated formal methods, (273-292)
- Couchot J and Dadeau F Guiding the correction of parameterized specifications Proceedings of the 6th international conference on Integrated formal methods, (176-194)
- Harrison J A short survey of automated reasoning Proceedings of the 2nd international conference on Algebraic biology, (334-349)
- Palmer R, DeLisi M, Gopalakrishnan G and Kirby R An approach to formalization and analysis of message passing libraries Proceedings of the 12th international conference on Formal methods for industrial critical systems, (164-181)
- Schlich B, Löll J and Kowalewski S Application of static analyses for state space reduction to microcontroller assembly code Proceedings of the 12th international conference on Formal methods for industrial critical systems, (21-37)
- Lafuente A Towards model checking spatial properties with SPIN Proceedings of the 14th international SPIN conference on Model checking software, (223-242)
- Rozier K and Vardi M LTL satisfiability checking Proceedings of the 14th international SPIN conference on Model checking software, (149-167)
- Gueta G, Flanagan C, Yahav E and Sagiv M Cartesian partial-order reduction Proceedings of the 14th international SPIN conference on Model checking software, (95-112)
- Evangelista S and Pajault C Some solutions to the ignoring problem Proceedings of the 14th international SPIN conference on Model checking software, (76-94)
- Basu S and Smolka S (2007). Model checking the Java metalocking algorithm, ACM Transactions on Software Engineering and Methodology, 16:3, (12-es), Online publication date: 1-Jul-2007.
- Kwiatkowska M, Norman G, Sproston J and Wang F (2007). Symbolic model checking for probabilistic timed automata, Information and Computation, 205:7, (1027-1077), Online publication date: 1-Jul-2007.
- Neuhäußer M and Noll T (2007). Abstraction and Model Checking of Core Erlang Programs in Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (147-163), Online publication date: 1-Jul-2007.
- Durán F, Riesco A and Verdejo A (2007). A Distributed Implementation of Mobile Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (113-131), Online publication date: 1-Jul-2007.
- Ölveczky P and Meseguer J (2007). Abstraction and Completeness for Real-Time Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (5-27), Online publication date: 1-Jul-2007.
- Ruys T and de Brugh N (2007). MMC, Electronic Notes in Theoretical Computer Science (ENTCS), 190:1, (149-160), Online publication date: 1-Jul-2007.
- Genevès P, Layaïda N and Schmitt A Efficient static analysis of XML paths and types Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (342-351)
- Cook B, Podelski A and Rybalchenko A Proving thread termination Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (320-330)
- Genevès P, Layaïda N and Schmitt A (2007). Efficient static analysis of XML paths and types, ACM SIGPLAN Notices, 42:6, (342-351), Online publication date: 10-Jun-2007.
- Cook B, Podelski A and Rybalchenko A (2007). Proving thread termination, ACM SIGPLAN Notices, 42:6, (320-330), Online publication date: 10-Jun-2007.
- Riesco A and Verdejo A Distributed applications implemented in maude with parameterized skeletons Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems, (91-106)
- Zhou C A compositional symbolic verification framework for concurrent software Proceedings of the 2nd international conference on Scalable information systems, (1-4)
- Vardi M Formal techniques for SystemC verification Proceedings of the 44th annual Design Automation Conference, (188-192)
- Platzer A A Temporal Dynamic Logic for Verifying Hybrid System Invariants Proceedings of the international symposium on Logical Foundations of Computer Science, (457-471)
- Gentilini R, Schneider K and Mishra B Successive Abstractions of Hybrid Automata for Monotonic CTL Model Checking Proceedings of the international symposium on Logical Foundations of Computer Science, (224-240)
- Pucella R (2007). Alternative Logics: a book review, ACM SIGACT News, 38:2, (75-86), Online publication date: 1-Jun-2007.
- Ölveczky P and Meseguer J (2007). Semantics and pragmatics of Real-Time Maude, Higher-Order and Symbolic Computation, 20:1-2, (161-196), Online publication date: 1-Jun-2007.
- Meseguer J and Thati P (2007). Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Higher-Order and Symbolic Computation, 20:1-2, (123-160), Online publication date: 1-Jun-2007.
- Van Der Straeten R, Jonckers V and Mens T (2007). A formal approach to model refactoring and model refinement, Software and Systems Modeling (SoSyM), 6:2, (139-162), Online publication date: 1-Jun-2007.
- Betin-Can A and Bultan T (2007). Highly dependable concurrent programming using design for verification, Formal Aspects of Computing, 19:2, (243-268), Online publication date: 1-Jun-2007.
- Dwyer M, Hatcliff J, Robby R, Pasareanu C and Visser W Formal Software Analysis Emerging Trends in Software Model Checking 2007 Future of Software Engineering, (120-136)
- Schafer W and Wehrheim H The Challenges of Building Advanced Mechatronic Systems 2007 Future of Software Engineering, (72-84)
- Heimdahl M Safety and Software Intensive Systems 2007 Future of Software Engineering, (137-152)
- Ma Y, Jin B, Li Y and Wu K A timing analysis model for ontology evolutions based on distributed environments Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (183-192)
- Viganò F and Colombetti M Model checking norms and sanctions in institutions Proceedings of the 2007 international conference on Coordination, organizations, institutions, and norms in agent systems III, (316-329)
- Lomuscio A and Woźna B A temporal epistemic logic with a reset operation Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-8)
- Belardinelli F and Lomuscio A A quantified epistemic logic for reasoning about multiagent systems Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-3)
- Wenzel I, Kirner R, Rieder B and Puschner P Cross-platform verification framework for embedded systems Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems, (137-148)
- Tang C and Ternovska E (2007). Model Checking Abstract State Machines with Answer Set Programming, Fundamenta Informaticae, 77:1-2, (105-141), Online publication date: 1-May-2007.
- Hsiung P, Chen Y and Lin Y (2007). Model Checking Safety-Critical Systems Using Safecharts, IEEE Transactions on Computers, 56:5, (692-705), Online publication date: 1-May-2007.
- Yagi I, Takata Y and Seki H (2007). A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power, IEICE - Transactions on Information and Systems, E90-D:5, (799-807), Online publication date: 1-May-2007.
- Marques-Silva J (2007). Interpolant Learning and Reuse in SAT-Based Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 174:3, (31-43), Online publication date: 1-May-2007.
- Chen Z, Tao Z, Xu B and Wang L Implication-based approximating bounded model checking Proceedings of the 2007 international conference on Fundamentals of software engineering, (350-363)
- Seshia S, Li W and Mitra S Verification-guided soft error resilience Proceedings of the conference on Design, automation and test in Europe, (1442-1447)
- Kroening D and Sharygina N Interactive presentation: Image computation and predicate refinement for RTL verilog using word level proofs Proceedings of the conference on Design, automation and test in Europe, (1325-1330)
- Große D, Kühne U and Drechsler R Estimating functional coverage in bounded model checking Proceedings of the conference on Design, automation and test in Europe, (1176-1181)
- Moon I, Bjesse P and Pixley C A compositional approach to the combination of combinational and sequential equivalence checking of circuits without known reset states Proceedings of the conference on Design, automation and test in Europe, (1170-1175)
- Johnson C Genetic programming with fitness based on model checking Proceedings of the 10th European conference on Genetic programming, (114-124)
- Tabuada P Approximate simulation relations and finite abstractions of quantized control systems Proceedings of the 10th international conference on Hybrid systems: computation and control, (529-542)
- Platzer A and Clarke E The image computation problem in hybrid systems model checking Proceedings of the 10th international conference on Hybrid systems: computation and control, (473-486)
- Jha S, Krogh B, Weimer J and Clarke E Reachability for linear hybrid automata using iterative relaxation abstraction Proceedings of the 10th international conference on Hybrid systems: computation and control, (287-300)
- Batt G, Belta C and Weiss R Model checking genetic regulatory networks with parameter uncertainty Proceedings of the 10th international conference on Hybrid systems: computation and control, (61-75)
- Dosch W, Muenchaisri P, Ruanthong W and Stümpel A Model checking for input/output properties of a black-box model Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology, (120-127)
- Wang C, Yang Z, Ivančić F and Gupta A (2007). Disjunctive image computation for software verification, ACM Transactions on Design Automation of Electronic Systems, 12:2, (10-es), Online publication date: 1-Apr-2007.
- Baier C, Cloth L, Haverkort B, Kuntz M and Siegle M (2007). Model Checking Markov Chains with Actions and State Labels, IEEE Transactions on Software Engineering, 33:4, (209-224), Online publication date: 1-Apr-2007.
- Sen A and Garg V (2007). Formal Verification of Simulation Traces Using Computation Slicing, IEEE Transactions on Computers, 56:4, (511-527), Online publication date: 1-Apr-2007.
- Pacholik A and Fengler W A system model for formal verification of TLM based transaction properties Proceedings of the 2007 spring simulaiton multiconference - Volume 1, (93-99)
- Yu A, Ciardo G and Lüttgen G Bounded reachability checking of asynchronous systems using decision diagrams Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (648-663)
- Tsay Y, Chen Y, Tsai M, Wu K and Chan W GOAL Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (466-471)
- Batt G, Belta C and Weiss R Model checking liveness properties of genetic regulatory networks Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (323-338)
- Goldman M and Katz S MAVEN Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (308-322)
- Gheorghiu M, Giannakopoulou D and Păsăreanu C Refining interface alphabets for compositional verification Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (292-307)
- Jurdziński M, Laroussinie F and Sproston J Model checking probabilistic timed automata with one or two clocks Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (170-184)
- Ferrante A and Murano A Enriched µ-calculi module checking Proceedings of the 10th international conference on Foundations of software science and computational structures, (183-197)
- Blech J, Schaefer I and Poetzsch-Heffter A Translation validation of system abstractions Proceedings of the 7th international conference on Runtime verification, (139-150)
- Morimoto S, Shigematsu S, Goto Y and Cheng J Formal verification of security specifications with common criteria Proceedings of the 2007 ACM symposium on Applied computing, (1506-1512)
- Oliveira E, Almeida H and Silva L Formal modelling and verification of a component model using coloured petri nets and model checking Proceedings of the 2007 ACM symposium on Applied computing, (1427-1431)
- Gentilini R, Schneider K and Dreyer A Three-valued automated reasoning on analog properties Proceedings of the 17th ACM Great Lakes symposium on VLSI, (485-488)
- Karlsson D, Eles P and Peng Z (2007). Formal verification of component-based designs, Design Automation for Embedded Systems, 11:1, (49-90), Online publication date: 1-Mar-2007.
- Artho C, Zweimüller B, Biere A, Shibayama E and Honiden S Efficient model checking of applications with input/output Proceedings of the 11th international conference on Computer aided systems theory, (515-522)
- Choi Y Checking Interaction Consistency in MARMOT Component Refinements Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (832-843)
- Henzinger T Games, Time, and Probability Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (103-110)
- Revesz P The constraint database approach to software verification Proceedings of the 8th international conference on Verification, model checking, and abstract interpretation, (329-345)
- Vardi M Automata-theoretic model checking revisited Proceedings of the 8th international conference on Verification, model checking, and abstract interpretation, (137-150)
- Lomuscio A, Pecheur C and Raimondi F Automatic verification of knowledge and time with NuSMV Proceedings of the 20th international joint conference on Artifical intelligence, (1384-1389)
- Dixon C, Fisher M and Konev B Tractable temporal reasoning Proceedings of the 20th international joint conference on Artifical intelligence, (318-323)
- Woźna B and Zbrzezny A (2007). Bounded Model Checking for the Existential Fragment of TCTL$_{-G}$ and Diagonal Timed Automata, Fundamenta Informaticae, 79:1-2, (229-256), Online publication date: 1-Jan-2007.
- Tang C and Ternovska E (2007). Model Checking Abstract State Machines with Answer Set Programming, Fundamenta Informaticae, 77:1-2, (105-141), Online publication date: 1-Jan-2007.
- Liu D, Wu P and Lin H Symbolic test generation using a temporal logic with constrained events Formal methods and hybrid real-time systems, (467-471)
- Lam V (2007). A formalism for reasoning about UML activity diagrams, Nordic Journal of Computing, 14:1, (43-64), Online publication date: 1-Jan-2007.
- Bosse T, Lam D and Barber K Empirical Analysis for Agent System Comprehension and Verification Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology, (723-729)
- Cambronero M, Pardo J, Díaz G and Valero V Timed automata for web services verification Proceedings of the 6th WSEAS international conference on Applied computer science, (531-536)
- Fisher J and Henzinger T Executable biology Proceedings of the 38th conference on Winter simulation, (1675-1682)
- Delvenne J, Kůrka P and Blondel V (2006). Decidability and Universality in Symbolic Dynamical Systems, Fundamenta Informaticae, 74:4, (463-490), Online publication date: 1-Dec-2006.
- Poddar R and Bhaduri P (2006). Verification of Giotto based embedded control systems, Nordic Journal of Computing, 13:4, (266-293), Online publication date: 1-Dec-2006.
- Delvenne J, Kůrka P and Blondel V (2006). Decidability and Universality in Symbolic Dynamical Systems, Fundamenta Informaticae, 74:4, (463-490), Online publication date: 1-Dec-2006.
- Kishi T and Noda N (2006). Formal verification and software product lines, Communications of the ACM, 49:12, (73-77), Online publication date: 1-Dec-2006.
- Leucker M Learning meets verification Proceedings of the 5th international conference on Formal methods for components and objects, (127-151)
- Sirjani M Rebeca Proceedings of the 5th international conference on Formal methods for components and objects, (102-126)
- Yang J, Sar C and Engler D EXPLODE Proceedings of the 7th symposium on Operating systems design and implementation, (131-146)
- Carmona J, Cortadella J, Takada Y and Peper F From molecular interactions to gates Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (891-898)
- Cobleigh R, Avrunin G and Clarke L User guidance for creating precise and accessible property specifications Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (208-218)
- Gulavani B, Henzinger T, Kannan Y, Nori A and Rajamani S SYNERGY Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (117-127)
- Rajan A (2006). Automated requirements-based test case generation, ACM SIGSOFT Software Engineering Notes, 31:6, (1-2), Online publication date: 1-Nov-2006.
- Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F (2006). Temporal search, ACM SIGPLAN Notices, 41:11, (25-36), Online publication date: 1-Nov-2006.
- Suhaib S, Mathaikutty D, Berner D and Shukla S (2006). Validating Families of Latency Insensitive Protocols, IEEE Transactions on Computers, 55:11, (1391-1401), Online publication date: 1-Nov-2006.
- Fine S, Freund A, Jaeger I, Mansour Y, Naveh Y and Ziv A (2006). Harnessing Machine Learning to Improve the Success Rate of Stimuli Generation, IEEE Transactions on Computers, 55:11, (1344-1355), Online publication date: 1-Nov-2006.
- Brichau J, Chitchyan R, Clarke S, D'Hondt E, Garcia A, Haupt M, Joosen W, Katz S, Noye J, Rashid A and Sudholt M (2006). A Model Curriculum for Aspect-Oriented Software Development, IEEE Software, 23:6, (53-61), Online publication date: 1-Nov-2006.
- Kristensen L, Schmidt K and Valmari A (2006). Question-guided stubborn set methods for state properties, Formal Methods in System Design, 29:3, (215-251), Online publication date: 1-Nov-2006.
- Bauer A, Leucker M and Streit J SALT—structured assertion language for temporal logic Proceedings of the 8th international conference on Formal Methods and Software Engineering, (757-775)
- Derrick J, North S and Simons T Issues in implementing a model checker for z Proceedings of the 8th international conference on Formal Methods and Software Engineering, (678-696)
- McComb T and Wildman L Verifying abstract information flow properties in fault tolerant security devices Proceedings of the 8th international conference on Formal Methods and Software Engineering, (621-638)
- Wehrheim H Incremental slicing Proceedings of the 8th international conference on Formal Methods and Software Engineering, (514-528)
- Zhao X, Long Q and Qiu Z Model checking dynamic UML consistency Proceedings of the 8th international conference on Formal Methods and Software Engineering, (440-459)
- Kruger L, Jha S, Goh E and Boneh D Secure function evaluation with ordered binary decision diagrams Proceedings of the 13th ACM conference on Computer and communications security, (410-420)
- Barner S, Eisner C, Glazberg Z, Kroening D and Rabinovitz I ExpliSAT Proceedings of the 2nd international Haifa verification conference on Hardware and software, verification and testing, (138-154)
- Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F Temporal search Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, (25-36)
- Darga P and Boyapati C Efficient software model checking of data structure properties Proceedings of the 21st annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, (363-382)
- Abdulla P, Ben Henda N, Mayr R and Sandberg S Eager markov chains Proceedings of the 4th international conference on Automated Technology for Verification and Analysis, (24-38)
- Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F (2006). Temporal search, ACM SIGARCH Computer Architecture News, 34:5, (25-36), Online publication date: 20-Oct-2006.
- Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F (2006). Temporal search, ACM SIGOPS Operating Systems Review, 40:5, (25-36), Online publication date: 20-Oct-2006.
- Bela G and Ignat I A typed specification for security protocols Proceedings of the 5th WSEAS international conference on Data networks, communications and computers, (113-118)
- Darga P and Boyapati C (2006). Efficient software model checking of data structure properties, ACM SIGPLAN Notices, 41:10, (363-382), Online publication date: 16-Oct-2006.
- Knapp A and Wuttke J Model checking of UML 2.0 interactions Proceedings of the 2006 international conference on Models in software engineering, (42-51)
- Avrunin G, Clarke L, Henneman E and Osterweil L (2006). Complex medical processes as context for embedded systems, ACM SIGBED Review, 3:4, (9-14), Online publication date: 1-Oct-2006.
- Liu C, Fei L, Yan X, Han J and Midkiff S (2006). Statistical Debugging, IEEE Transactions on Software Engineering, 32:10, (831-848), Online publication date: 1-Oct-2006.
- Duarte L, Kramer J and Uchitel S Model extraction using context information Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems, (380-394)
- Miller A, Donaldson A and Calder M (2006). Symmetry in temporal logic model checking, ACM Computing Surveys, 38:3, (8-es), Online publication date: 30-Sep-2006.
- Peikenkamp T, Cavallo A, Valacca L, Böde E, Pretzer M and Hahn E Towards a unified model-based safety assessment Proceedings of the 25th international conference on Computer Safety, Reliability, and Security, (275-288)
- Maler O, Nickovic D and Pnueli A From MITL to timed automata Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (274-289)
- Laroussinie F, Markey N and Oreiby G Model-checking timed ATL for durational concurrent game structures Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (245-259)
- Fainekos G, Girard A and Pappas G Temporal logic verification using simulation Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (171-186)
- Mehta V, Bartzis C, Zhu H, Clarke E and Wing J Ranking attack graphs Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, (127-144)
- Giffin J, Jha S and Miller B Automated discovery of mimicry attacks Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, (41-60)
- Edelkamp S, Jabbar S and Lafuente A Heuristic search for the analysis of graph transition systems Proceedings of the Third international conference on Graph Transformations, (414-429)
- Roy C, Noll T, Roy B and Cordy J Towards automatic verification of Erlang programs by π-calculus translation Proceedings of the 2006 ACM SIGPLAN workshop on Erlang, (38-50)
- Kacprzak M, Lomuscio A, Niewiadomski A, Penczek W, Raimondi F and Szreter M (2006). Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol, Fundamenta Informaticae, 72:1-3, (215-234), Online publication date: 15-Sep-2006.
- Eiter T, Erdem E, Fink M and Senko J Comparing action descriptions based on semantic preferences Proceedings of the 10th European conference on Logics in Artificial Intelligence, (124-137)
- Franceschet M and Zimuel E A logic-based approach to cache answerability for XPath queries Proceedings of the 4th international conference on Database and XML Technologies, (46-60)
- Lamborn P and Jones M January: A Parallel Algorithm for Bug Hunting Based on Insect Behavior Parallel Problem Solving from Nature - PPSN IX, (731-740)
- Bordini R, Dastani M and Winikoff M Current issues in multi-agent systems development Proceedings of the 7th international conference on Engineering societies in the agents world VII, (38-61)
- Hammond K, Grov G, Michaelson G and Ireland A Low-level programming in Hume Proceedings of the 18th international conference on Implementation and application of functional languages, (91-107)
- Pesic M and van der Aalst W A declarative approach for flexible business processes management Proceedings of the 2006 international conference on Business Process Management Workshops, (169-180)
- Barnat J and Černá I (2006). Distributed breadth-first search LTL model checking, Formal Methods in System Design, 29:2, (117-134), Online publication date: 1-Sep-2006.
- Smith G and Derrick J (2006). Verifying data refinements using a model checker, Formal Aspects of Computing, 18:3, (264-287), Online publication date: 1-Sep-2006.
- Endriss U Temporal Logics for Representing Agent Communication Protocols Agent Communication II, (15-29)
- Schmidt D Underapproximating predicate transformers Proceedings of the 13th international conference on Static Analysis, (127-143)
- Grinchtein O, Jonsson B and Pettersson P Inference of event-recording automata using timed decision trees Proceedings of the 17th international conference on Concurrency Theory, (435-449)
- Ezekiel J, Lüttgen G and Siminiceanu R Can saturation be parallelised? Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (331-346)
- Barnat J and Moravec P Parallel algorithms for finding SCCs in implicitly given graphs Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (316-330)
- Mühlberg J and Lüttgen G Blasting Linux code Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (211-226)
- Brim L, Černá I, Moravec P and Šimša J On combining partial order reduction with fairness assumptions Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (84-99)
- Juvekar S and Piterman N Minimizing generalized büchi automata Proceedings of the 18th international conference on Computer Aided Verification, (45-58)
- Kupferman O, Piterman N and Vardi M Safraless compositional synthesis Proceedings of the 18th international conference on Computer Aided Verification, (31-44)
- Kroening D and Weissenbacher G Counterexamples with loops for predicate abstraction Proceedings of the 18th international conference on Computer Aided Verification, (152-165)
- Grell S, Schaub T and Selbig J Modelling biological networks by action languages via answer set programming Proceedings of the 22nd international conference on Logic Programming, (285-299)
- Li C and Dang Z Decompositional algorithms for safety verification and testing of aspect-oriented systems Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (100-114)
- Ernits J, Kull A, Raiend K and Vain J Generating tests from EFSM models using guided model checking and iterated search refinement Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (85-99)
- Fainekos G and Pappas G Robustness of temporal logic specifications Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (178-192)
- Armoni R, Korchemny D, Tiemeyer A, Vardi M and Zbar Y Deterministic dynamic monitors for linear-time assertions Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (163-177)
- Cao Z Model checking for epistemic and temporal properties of uncertain agents Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems, (46-58)
- Ding Y and Zhang Y A case study for CTL model update Proceedings of the First international conference on Knowledge Science, Engineering and Management, (88-101)
- Chockler H, Kupferman O and Vardi M (2006). Coverage metrics for formal verification, International Journal on Software Tools for Technology Transfer (STTT), 8:4-5, (373-386), Online publication date: 1-Aug-2006.
- Ganai M, Gupta A, Yang Z and Ashar P (2006). Efficient distributed SAT and SAT-based distributed Bounded Model Checking, International Journal on Software Tools for Technology Transfer (STTT), 8:4-5, (387-396), Online publication date: 1-Aug-2006.
- Tronci E (2006). Introductory Paper, International Journal on Software Tools for Technology Transfer (STTT), 8:4-5, (355-358), Online publication date: 1-Aug-2006.
- Miner A (2006). Saturation for a General Class of Models, IEEE Transactions on Software Engineering, 32:8, (559-570), Online publication date: 1-Aug-2006.
- Sproston J and Donatelli S (2006). Backward Bisimulation in Markov Chain Model Checking, IEEE Transactions on Software Engineering, 32:8, (531-546), Online publication date: 1-Aug-2006.
- Peranandam P, Nalla P, Ruf J, Weiss R, Kropf T and Rosenstiel W Fast falsification based on symbolic bounded property checking Proceedings of the 43rd annual Design Automation Conference, (1077-1082)
- Nanshi K and Somenzi F Guiding simulation with increasingly refined abstract traces Proceedings of the 43rd annual Design Automation Conference, (737-742)
- Vimjam V and Hsiao M Fast illegal state identification for improving SAT-based induction Proceedings of the 43rd annual Design Automation Conference, (241-246)
- Whalen M, Rajan A, Heimdahl M and Miller S Coverage metrics for requirements-based testing Proceedings of the 2006 international symposium on Software testing and analysis, (25-36)
- Owen D, Desovski D and Cukic B Random testing of formal software models and induced coverage Proceedings of the 1st international workshop on Random testing, (20-27)
- Lin S Reasoning about discrete event sources Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (868-873)
- Wang F, Huang G and Yu F (2006). TCTL Inevitability Analysis of Dense-Time Systems, IEEE Transactions on Software Engineering, 32:7, (510-526), Online publication date: 1-Jul-2006.
- Mongiello M (2006). Finite-state verification of the ebXML protocol, Electronic Commerce Research and Applications, 5:2, (147-169), Online publication date: 1-Jul-2006.
- Fokkink W, Pang J and De Pol J (2006). Cones and foci, Formal Methods in System Design, 29:1, (1-31), Online publication date: 1-Jul-2006.
- Carloni L, Passerone R, Pinto A and Sangiovanni-Vincentelli A (2006). Languages and Tools for Hybrid Systems Design, Foundations and Trends in Electronic Design Automation, 1:1-2, (1-193), Online publication date: 30-Jun-2006.
- Xie F and Browne J Verification of component-based software application families Proceedings of the 9th international conference on Component-Based Software Engineering, (50-66)
- Shilov N and Garanina N Well-structured model checking of multiagent systems Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics, (363-376)
- Kouchnarenko O and Lanoix A How to verify and exploit a refinement of component-based systems Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics, (297-309)
- Letichevsky A Basic protocols Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics, (21-25)
- Deutsch A, Sui L, Vianu V and Zhou D Verification of communicating data-driven web services Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (90-99)
- Evangelista S and Pradat-Peyre J On the computation of stubborn sets of colored petri nets Proceedings of the 27th international conference on Applications and Theory of Petri Nets and Other Models of Concurrency, (146-165)
- Merayo M, Núñez M and Rodríguez I Implementation relations for stochastic finite state machines Proceedings of the Third European conference on Formal Methods and Stochastic Models for Performance Evaluation, (123-137)
- Hoffmann J, Sabharwal A and Domshlak C Friends or foes? an AI planning perspective on abstraction and search Proceedings of the Sixteenth International Conference on International Conference on Automated Planning and Scheduling, (294-303)
- Behrmann G, Bouyer P, Larsen K and Pelánek R (2006). Lower and upper bounds in zone-based abstractions of timed automata, International Journal on Software Tools for Technology Transfer (STTT), 8:3, (204-215), Online publication date: 1-Jun-2006.
- Brückner I, Metzler B and Wehrheim H (2006). Optimizing slicing of formal specifications by deductive verification, Nordic Journal of Computing, 13:1, (22-45), Online publication date: 1-Jun-2006.
- Demri S, Laroussinie F and Schnoebelen P (2006). A parametric analysis of the state-explosion problem in model checking, Journal of Computer and System Sciences, 72:4, (547-575), Online publication date: 1-Jun-2006.
- Liu C, Ye E and Richardson D LtRules Proceedings of the 28th international conference on Software engineering, (823-826)
- Furusawa H, Choi E and Watanabe H Efficiency analysis of model-based review in actual software design Proceedings of the 28th international conference on Software engineering, (604-607)
- Du D, He K, Cao H and Ma Y Toward an integratred verification environment for embedded systems Proceedings of the 17th IASTED international conference on Modelling and simulation, (280-285)
- Artho C and Biere A Advanced unit testing Proceedings of the 2006 international workshop on Automation of software test, (92-98)
- Jørgensen J Addressing problem frame concerns via coloured petri nets and graphical animation Proceedings of the 2006 international workshop on Advances and applications of problem frames, (49-58)
- Ding Y and Zhang Y CTL Model Update Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (362-366)
- Sharpanskykh A and Treur J Verifying Interlevel Relations within Multi-Agent Systems Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (290-294)
- Chopinaud C, El Fallah Seghrouchni A and Taillibert P Prevention of harmful behaviors within cognitive and autonomous agents Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (205-209)
- Cheng K and Yap R Maintaining Generalized Arc Consistency on Ad-hoc n-ary Boolean Constraints Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (78-82)
- Manolios P Refinement and theorem proving Proceedings of the 6th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems, (176-210)
- Gupta A, Ganai M and Wang C SAT-Based verification methods and applications in hardware verification Proceedings of the 6th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems, (108-143)
- Schneider K, Schuele T and Trapp M Verifying the adaptation behavior of embedded systems Proceedings of the 2006 international workshop on Self-adaptation and self-managing systems, (16-22)
- Rodríguez I, Merayo M and Núñez M A logic for assessing sets of heterogeneous testing hypotheses Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems, (39-54)
- Zhou C and Ding D Improved SAT based bounded model checking Proceedings of the Third international conference on Theory and Applications of Models of Computation, (611-620)
- Botía J, Hernansáez J and Gómez-Skarmeta A On the application of clustering techniques to support debugging large-scale multi-agent systems Proceedings of the 4th international conference on Programming multi-agent systems, (217-227)
- Cao Z Representing and verifying temporal epistemic properties in multi-agent systems Proceedings of the 7th international conference on Computational logic in multi-agent systems, (134-150)
- Bosse T, Lam D and Barber K Automated analysis and verification of agent behavior Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (1317-1319)
- Lomuscio A and Raimondi F The complexity of model checking concurrent programs against CTLK specifications Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (548-550)
- Konikowska B and Penczek W Model checking for multivalued logic of knowledge and time Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (169-176)
- Lomuscio A and Raimondi F Model checking knowledge, strategies, and games in multi-agent systems Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (161-168)
- Lomuscio A and Raimondi F The complexity of model checking concurrent programs against CTLK specifications Proceedings of the 4th international conference on Declarative Agent Languages and Technologies, (29-42)
- Park S and Kwon G Avoidance of state explosion using dependency analysis in model checking control flow model Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (905-911)
- Lee T, Kwon G and Han H CTL model checking for boolean program Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV, (1081-1089)
- Deng S, Wu W and Bian J Bounded model checking combining symbolic trajectory evaluation abstraction with hybrid three-valued SAT solving Proceedings of the 10th international conference on Computer supported cooperative work in design III, (297-307)
- Xu K, Wang Y and Wu C Ensuring secure and robust grid applications – from a formal method point of view Proceedings of the First international conference on Advances in Grid and Pervasive Computing, (537-546)
- Hoffmann J, Edelkamp S, Thiébaux S, Englert R, dos Santos Liporace F and Trüg S (2006). Engineering benchmarks for planning, Journal of Artificial Intelligence Research, 26:1, (453-541), Online publication date: 1-May-2006.
- Stokely M, Chaki S and Ouaknine J (2006). Parallel Assignments in Software Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 157:1, (77-94), Online publication date: 1-May-2006.
- Castelluccia D, Mongiello M, Ruta M and Totaro R (2006). WAVer, Electronic Notes in Theoretical Computer Science (ENTCS), 157:1, (61-76), Online publication date: 1-May-2006.
- Chen D and Wu J (2006). Model Checking Temporal Aspects of Inconsistent Concurrent Systems Based on Paraconsistent Logic, Electronic Notes in Theoretical Computer Science (ENTCS), 157:1, (23-38), Online publication date: 1-May-2006.
- Amato G, Coppola M, Gnesi S, Scozzari F and Semini L (2006). Modeling Web Applications by the Multiple Levels of Integrity Policy, Electronic Notes in Theoretical Computer Science (ENTCS), 157:2, (167-185), Online publication date: 1-May-2006.
- Brookes S (2006). A Grainless Semantics for Parallel Programs with Shared Mutable Data, Electronic Notes in Theoretical Computer Science (ENTCS), 155, (277-307), Online publication date: 1-May-2006.
- Stoller S and Cohen E (2006). Optimistic synchronization-based state-space reduction, Formal Methods in System Design, 28:3, (263-289), Online publication date: 1-May-2006.
- Chockler H, Kupferman O and Vardi M (2006). Coverage metrics for temporal logic model checking, Formal Methods in System Design, 28:3, (189-212), Online publication date: 1-May-2006.
- Koo H and Mishra P Test generation using SAT-based bounded model checking for validation of pipelined processors Proceedings of the 16th ACM Great Lakes symposium on VLSI, (362-365)
- Chung M and Ciardo G A dynamic firing speculation to speedup distributed symbolic state-space generation Proceedings of the 20th international conference on Parallel and distributed processing, (136-136)
- Miner A and Basu S Verification of software via integration of design and implementation Proceedings of the 20th international conference on Parallel and distributed processing, (286-286)
- Gopalakrishnan G and Kirby R Toward reliable and efficient message passing software through formal analysis Proceedings of the 20th international conference on Parallel and distributed processing, (284-284)
- Jaghoori M, Movaghar A and Sirjani M Modere Proceedings of the 2006 ACM symposium on Applied computing, (1810-1815)
- Bigot C, Faivre A, Gaston C and Simon J Automatic test generation on a (U)SIM smart card Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (345-358)
- Tauriainen H (2006). Nested Emptiness Search for Generalized Büchi Automata, Fundamenta Informaticae, 70:1,2, (127-154), Online publication date: 1-Apr-2006.
- Winter K, Johnston W, Robinson P, Strooper P and van den Berg L Tool support for checking railway interlocking designs Proceedings of the 10th Australian workshop on Safety critical systems and software - Volume 55, (101-107)
- Tauriainen H (2005). Nested emptiness search for generalized Büchi automata, Fundamenta Informaticae, 70:1, (127-154), Online publication date: 1-Apr-2006.
- Fecher H, Leucker M and Wolf V Don’t know in probabilistic systems Proceedings of the 13th international conference on Model Checking Software, (71-88)
- Bhattacharya R, German S and Gopalakrishnan G Exploiting symmetry and transactions for partial order reduction of rule based specifications Proceedings of the 13th international conference on Model Checking Software, (252-270)
- Edelkamp S and Jabbar S Large-Scale directed model checking LTL Proceedings of the 13th international conference on Model Checking Software, (1-18)
- Alur R and Bernadsky M Bounded model checking for GSMP models of stochastic real-time systems Proceedings of the 9th international conference on Hybrid Systems: computation and control, (19-33)
- Ghosh I and Prasad M A Technique for Estimating the Difficulty of a Formal Verification Problem Proceedings of the 7th International Symposium on Quality Electronic Design, (63-70)
- Köb D and Wotawa F Fundamentals of debugging using a resolution calculus Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering, (278-292)
- Devereux B and Chechik M Automated support for building behavioral models of event-driven systems Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering, (122-138)
- Lomuscio A and Raimondi F MCMAS Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (450-454)
- Ghica D and Murawski A Compositional model extraction for higher-order concurrent programs Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (303-317)
- Kroening D and Sharygina N Approximating predicate images for bit-vector logic Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (242-256)
- Gurfinkel A and Chechik M Why waste a perfectly good abstraction? Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (212-226)
- Chaki S SAT-Based software certification Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (151-166)
- Koo H and Mishra P Functional test generation using property decompositions for validation of pipelined processors Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1240-1245)
- Karlsson D, Eles P and Peng Z Formal verification of systemc designs using a petri-net based representation Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1228-1233)
- Das S, Basu P, Dasgupta P and Chakrabarti P What lies between design intent coverage and model checking? Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1217-1222)
- Thang N and Katayama T (2005). Specification and verification of inter-component constraints in CTL, ACM SIGSOFT Software Engineering Notes, 31:2, (8-es), Online publication date: 1-Mar-2006.
- Brim L, Černá I, Vařeková P and Zimmerova B (2005). Component-interaction automata as a verification-oriented component-based system specification, ACM SIGSOFT Software Engineering Notes, 31:2, (4-es), Online publication date: 1-Mar-2006.
- Ciobanu G and Lucanu D (2005). A specification language for coordinated objects, ACM SIGSOFT Software Engineering Notes, 31:2, (3-es), Online publication date: 1-Mar-2006.
- Ossowski J and Baier C (2006). Symbolic Reasoning with Weighted and Normalized Decision Diagrams, Electronic Notes in Theoretical Computer Science (ENTCS), 151:1, (39-56), Online publication date: 1-Mar-2006.
- Schuppan V and Biere A (2006). Liveness Checking as Safety Checking for Infinite State Spaces, Electronic Notes in Theoretical Computer Science (ENTCS), 149:1, (79-96), Online publication date: 1-Feb-2006.
- Chung M and Ciardo G (2006). A Pattern Recognition Approach for Speculative Firing Prediction in Distributed Saturation State-Space Generation, Electronic Notes in Theoretical Computer Science (ENTCS), 135:2, (65-80), Online publication date: 1-Feb-2006.
- Nalla P, Weiss R, Peranandam P, Ruf J, Kropf T and Rosenstiel W (2006). Distributed Symbolic Bounded Property Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 135:2, (47-63), Online publication date: 1-Feb-2006.
- Qian K and Nymeyer A (2006). Language-Emptiness Checking of Alternating Tree Automata Using Symbolic Reachability Analysis, Electronic Notes in Theoretical Computer Science (ENTCS), 149:2, (33-49), Online publication date: 1-Feb-2006.
- Kwon G (2006). Relay Reachability Algorithm for Exploring Huge State Space, Electronic Notes in Theoretical Computer Science (ENTCS), 149:2, (19-31), Online publication date: 1-Feb-2006.
- Edelkamp S and Jabbar S (2006). Action Planning for Directed Model Checking of Petri Nets, Electronic Notes in Theoretical Computer Science (ENTCS), 149:2, (3-18), Online publication date: 1-Feb-2006.
- Basu P, Das S, Dasgupta P and Chakrabarti P Discovering the input assumptions in specification refinement coverage Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (13-18)
- Xu X, Kimura S, Horikawa K and Tsuchiya T Transition-based coverage estimation for symbolic model checking Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (1-6)
- Jurdziński M, Paterson M and Zwick U A deterministic subexponential algorithm for solving parity games Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (117-123)
- Wang B Automatic verification of a model checker by reflection Proceedings of the 8th international conference on Practical Aspects of Declarative Languages, (45-59)
- Ranzato F and Tapparo F Strong preservation of temporal fixpoint-based operators by abstract interpretation Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (332-347)
- Hristova K and Liu Y Improved algorithm complexities for linear temporal logic model checking of pushdown systems Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (190-206)
- Analyzing tabular requirements specifications using infinite state model checking Proceedings of the Fourth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (7-16)
- Kacprzak M, Lomuscio A, Niewiadomski A, Penczek W, Raimondi F and Szreter M (2006). Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol, Fundamenta Informaticae, 72:1-3, (215-234), Online publication date: 1-Jan-2006.
- Jha S and Shyamasundar R Adapting biochemical kripke structures for distributed model checking Transactions on Computational Systems Biology VII, (107-122)
- Katz S Aspect categories and classes of temporal properties Transactions on Aspect-Oriented Software Development I, (106-134)
- Fages F From syntax to semantics in systems biology towards automated reasoning tools Transactions on Computational Systems Biology IV, (68-70)
- Katz S Rigorous fault tolerance using aspects and formal methods Rigorous Development of Complex Fault-Tolerant Systems, (226-240)
- Fantechi A, Gnesi S and Semini L Achieving fault tolerance by a formally validated interaction policy Rigorous Development of Complex Fault-Tolerant Systems, (133-152)
- Meyer B Dependable software Dependable Systems, (1-33)
- Combi C and Rossato R Temporal constraints with multiple granularities in smart homes Designing Smart Homes, (35-56)
- Calzone L, Chabrier-Rivier N, Fages F and Soliman S Machine learning biochemical networks from temporal logic properties Transactions on Computational Systems Biology VI, (68-94)
- Hinze A, Malik P and Malik R Interaction design for a mobile context-aware system using discrete event modelling Proceedings of the 29th Australasian Computer Science Conference - Volume 48, (257-266)
- Bultan T, Su J and Fu X (2006). Analyzing Conversations of Web Services, IEEE Internet Computing, 10:1, (18-25), Online publication date: 1-Jan-2006.
- Component-based hardware/software co-verification Proceedings of the Fourth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (27-36)
- Mixed symbolic representations for model checking software programs Proceedings of the Fourth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (17-26)
- Peischl B and Wotawa F (2006). Automated Source-Level Error Localization in Hardware Designs, IEEE Design & Test, 23:1, (8-19), Online publication date: 1-Jan-2006.
- Amjad H (2006). Verification of AMBA Using a Combination of Model Checking and Theorem Proving, Electronic Notes in Theoretical Computer Science (ENTCS), 145, (45-61), Online publication date: 1-Jan-2006.
- Kroening D (2006). Computing Over-Approximations with Bounded Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 144:1, (79-92), Online publication date: 1-Jan-2006.
- Bloem R, Gabow H and Somenzi F (2006). An Algorithm for Strongly Connected Component Analysis in n log n Symbolic Steps, Formal Methods in System Design, 28:1, (37-56), Online publication date: 1-Jan-2006.
- Jaghoori M, Sirjani M, Mousavi M and Movaghar A Efficient symmetry reduction for an actor-based model Proceedings of the Second international conference on Distributed Computing and Internet Technology, (494-507)
- Mutsuda Y, Kato T and Yamane S Specification and verification techniques of embedded systems using probabilistic linear hybrid automata Proceedings of the Second international conference on Embedded Software and Systems, (346-360)
- Wu L, Su K and Chen Q Model checking temporal logics of knowledge and its application in security verification Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I, (349-354)
- Sivathanu M, Arpaci-Dusseau A, Arpaci-Dusseau R and Jha S A logic of file systems Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4, (1-1)
- Lü Y, Chen X, Fang L and Wang H Towards a symbolic bisimulation for the spi calculus Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (1095-1102)
- Jarnjak F, Kim J, Jing Y, In H, Jeong D and Baik D TS-U Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (161-170)
- Chen R and Wotawa F An object store model for diagnosing java programs Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (865-870)
- Ding Y and Zhang Y Model updating CTL systems Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (5-16)
- Fu X, Bultan T and Su J (2005). Synchronizability of Conversations among Web Services, IEEE Transactions on Software Engineering, 31:12, (1042-1055), Online publication date: 1-Dec-2005.
- Sinha R, Roop P and Khoussainov B (2005). Adaptive Verification using Forced Simulation, Electronic Notes in Theoretical Computer Science (ENTCS), 141:3, (171-197), Online publication date: 1-Dec-2005.
- Grunske L, Lindsay P, Yatapanage N and Winter K An automated failure mode and effect analysis based on high-level design specification with behavior trees Proceedings of the 5th international conference on Integrated Formal Methods, (129-149)
- Lluch-Lafuente A and Montanari U (2005). Quantitative μ-calculus and CTL defined over constraint semirings, Theoretical Computer Science, 346:1, (135-160), Online publication date: 23-Nov-2005.
- de Alfaro L, Faella M, Henzinger T, Majumdar R and Stoelinga M (2005). Model checking discounted temporal properties, Theoretical Computer Science, 345:1, (139-170), Online publication date: 21-Nov-2005.
- Li T, Guo Y, Li S and Zhu D Applying constraint logic programming to predicate abstraction of RTL verilog descriptions Proceedings of the 4th Mexican international conference on Advances in Artificial Intelligence, (175-184)
- Khasidashvili Z, Nadel A, Palti A and Hanna Z Simultaneous SAT-Based model checking of safety properties Proceedings of the First Haifa international conference on Hardware and Software Verification and Testing, (56-75)
- Grov G Verifying the correctness of hume programs Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (444-447)
- Haydar M, Boroday S, Petrenko A and Sahraoui H Properties and scopes in web model checking Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (400-404)
- Vardhan A and Viswanathan M Learning to verify branching time properties Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (325-328)
- Ankolekar A, Paolucci M and Sycara K Towards a formal verification of OWL-S process models Proceedings of the 4th international conference on The Semantic Web, (37-51)
- Huang Z and Stuckenschmidt H Reasoning with multi-version ontologies Proceedings of the 4th international conference on The Semantic Web, (398-412)
- Reps T, Balakrishnan G, Lim J and Teitelbaum T A next-generation platform for analyzing executables Proceedings of the Third Asian conference on Programming Languages and Systems, (212-229)
- Groesser M and Baier C Partial order reduction for markov decision processes Proceedings of the 4th international conference on Formal Methods for Components and Objects, (408-427)
- Barnat J, Brim L and Černá I Cluster-Based LTL model checking of large systems Proceedings of the 4th international conference on Formal Methods for Components and Objects, (259-279)
- Clarke E, Sharygina N and Sinha N Program compatibility approaches Proceedings of the 4th international conference on Formal Methods for Components and Objects, (243-258)
- Grumberg O Abstraction and refinement in model checking Proceedings of the 4th international conference on Formal Methods for Components and Objects, (219-242)
- Brückner I and Wehrheim H Slicing an integrated formal method for verification Proceedings of the 7th international conference on Formal Methods and Software Engineering, (360-374)
- Leuschel M and Butler M Automatic refinement checking for b Proceedings of the 7th international conference on Formal Methods and Software Engineering, (345-359)
- Sobeih A, Viswanathan M, Marinov D and Hou J Finding bugs in network protocols using simulation code and protocol-specific heuristics Proceedings of the 7th international conference on Formal Methods and Software Engineering, (235-250)
- Wehrheim H (2005). Slicing techniques for verification re-use, Theoretical Computer Science, 343:3, (509-528), Online publication date: 17-Oct-2005.
- Bardin S, Finkel A, Leroux J and Schnoebelen P Flat acceleration in symbolic model checking Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (474-488)
- Kim M and Kang K Formal construction and verification of home service robots Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (429-443)
- Lin S, Hsiung P, Huang C and Chen Y Model checking prioritized timed automata Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (370-384)
- Shoham S and Grumberg O Multi-valued model checking games Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (354-369)
- Yagi I, Takata Y and Seki H A static analysis using tree automata for XML access control Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (234-247)
- Li T, Guo Y, Li S and Liu G Predicate abstraction of RTL verilog descriptions using constraint logic programming Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (174-186)
- Damm W, Pinto G and Ratschan S Guaranteed termination in the verification of LTL properties of non-linear robust discrete time hybrid systems Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (99-113)
- Gurfinkel A and Chechik M How thorough is thorough enough? Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (65-80)
- Chakrabarti A, Chatterjee K, Henzinger T, Kupferman O and Majumdar R Verifying quantitative properties using bound functions Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (50-64)
- Staber S, Jobstmann B and Bloem R Finding and fixing faults Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (35-49)
- Kapschitz T and Ginosar R Formal verification of synchronizers Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (359-362)
- Bhattacharya R, German S and Gopalakrishnan G Symbolic partial order reduction for rule based transition systems Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (332-335)
- Wei O, Gurfinkel A and Chechik M Identification and counter abstraction for full virtual symmetry Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (285-300)
- Bustan D, Flaisher A, Grumberg O, Kupferman O and Vardi M Regular vacuity Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (191-206)
- Ciardo G and Yu A Saturation-based symbolic reachability analysis using conjunctive and disjunctive partitioning Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (146-161)
- Grumberg O, Heyman T, Ifergan N and Schuster A Achieving speedups in distributed symbolic reachability analysis through asynchronous computation Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (129-145)
- Dang Z, Ibarra O, Li C and Xie G On model-checking of p systems Proceedings of the 4th international conference on Unconventional Computation, (82-93)
- Chandrasekar K and Hsiao M State Set Management for SAT-based Unbounded Model Checking Proceedings of the 2005 International Conference on Computer Design, (585-590)
- Ivančić F, Shlyakhter I, Gupta A and Ganai M Model Checking C Programs Using F-SOFT Proceedings of the 2005 International Conference on Computer Design, (297-308)
- Rasse A, Perronne J, Muller P and Thirion B Using process algebra to validate behavioral aspects of object-oriented models Proceedings of the 2005 international conference on Satellite Events at the MoDELS, (39-47)
- Zhang D and Cleaveland R Fast generic model-checking for data-based systems Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (83-97)
- Hsiung P and Lin Y Modeling and verification of safety-critical systems using safecharts Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (290-304)
- Qian K, Nymeyer A and Susanto S Abstraction-Guided model checking using symbolic IDA* and heuristic synthesis Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (275-289)
- Wang B Proving ∀µ-calculus properties with SAT-based model checking Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (113-127)
- Monniaux D (2005). Abstract interpretation of programs as Markov decision processes, Science of Computer Programming, 58:1-2, (179-205), Online publication date: 1-Oct-2005.
- Field J, Goyal D, Ramalingam G and Yahav E (2005). Typestate verification, Science of Computer Programming, 58:1-2, (57-82), Online publication date: 1-Oct-2005.
- Pan G and Vardi M (2005). Symbolic Techniques in Satisfiability Solving, Journal of Automated Reasoning, 35:1-3, (25-50), Online publication date: 1-Oct-2005.
- Noll T and Roy C Modeling Erlang in the pi-calculus Proceedings of the 2005 ACM SIGPLAN workshop on Erlang, (72-77)
- Lindig C Random testing of C calling conventions Proceedings of the sixth international symposium on Automated analysis-driven debugging, (3-12)
- Wu P and Lin H Model-Based Testing of Concurrent Programs with Predicate Sequencing Constraints Proceedings of the Fifth International Conference on Quality Software, (3-10)
- Ding Y and Zhang Y Algorithms for CTL system modification Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II, (1000-1006)
- Loer K and Harrison M Analysing user confusion in context aware mobile applications Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction, (184-197)
- Pu F, Zhang W and Wang S An improved case-based approach to LTL model checking Proceedings of the Second international conference on Rapid Integration of Software Engineering Techniques, (190-202)
- Subramaniam M and Shi J Using Dominators to Extract Observable Protocol Contexts Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (96-105)
- Nejati S, Gurfinkel A and Chechik M Stuttering Abstraction for Model Checkin Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (311-320)
- Blech J, Gesellensetter L and Glesner S Formal Verification of Dead Code Elimination in Isabelle/HOL Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (200-209)
- Cerone A, Lindsay P and Connelly S Formal Analysis of Human-computer Interaction using Model-checking Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (352-362)
- Simon L, Mallya A and Gupta G Design and Implementation of A Proceedings of the 15th international conference on Logic Based Program Synthesis and Transformation, (44-60)
- Pettorossi A, Proietti M and Senni V Transformational verification of parameterized protocols using array formulas Proceedings of the 15th international conference on Logic Based Program Synthesis and Transformation, (23-43)
- Fages F Temporal logic constraints in the biochemical abstract machine BIOCHAM Proceedings of the 15th international conference on Logic Based Program Synthesis and Transformation, (1-5)
- Cook B, Podelski A and Rybalchenko A Abstraction refinement for termination Proceedings of the 12th international conference on Static Analysis, (87-101)
- Thang N and Katayama T Specification and verification of inter-component constraints in CTL Proceedings of the 2005 conference on Specification and verification of component-based systems, (8-es)
- Brim L, Černá I, Vařeková P and Zimmerova B Component-interaction automata as a verification-oriented component-based system specification Proceedings of the 2005 conference on Specification and verification of component-based systems, (4-es)
- Ciobanu G and Lucanu D A specification language for coordinated objects Proceedings of the 2005 conference on Specification and verification of component-based systems, (3-es)
- Liu C, Yan X, Fei L, Han J and Midkiff S SOBER Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, (286-295)
- Palomino M, Meseguer J and Martí-Oliet N A categorical approach to simulations Proceedings of the First international conference on Algebra and Coalgebra in Computer Science, (313-330)
- Liu C, Yan X, Fei L, Han J and Midkiff S (2005). SOBER, ACM SIGSOFT Software Engineering Notes, 30:5, (286-295), Online publication date: 1-Sep-2005.
- Barner S and Grumberg O (2005). Combining symmetry reduction and under-approximation for symbolic model checking, Formal Methods in System Design, 27:1-2, (29-66), Online publication date: 1-Sep-2005.
- Diaz G, Pardo J, Cambronero M, Valero V and Cuartero F Automatic translation of WS-CDL choreographies to timed automata Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes, (230-242)
- Tobarra L, Cazorla D, Cuartero F and Díaz G Application of formal methods to the analysis of web services security Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes, (215-229)
- Ortner V and Schirmer N Verification of BDD normalization Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (261-277)
- Cook B, Kroening D and Sharygina N Symbolic model checking for asynchronous boolean programs Proceedings of the 12th international conference on Model Checking Software, (75-90)
- Luttik B and Trčka N Stuttering congruence for χ Proceedings of the 12th international conference on Model Checking Software, (185-199)
- Levin V, Palmer R, Qadeer S and Rajamani S Sound transaction-based reduction without cycle detection Proceedings of the 12th international conference on Model Checking Software, (106-122)
- Wilson D and Philipose M Maximum a posteriori path estimation with input trace perturbation Proceedings of the 19th international joint conference on Artificial intelligence, (895-901)
- Batt G, Ropers D, De Jong H, Geiselmann J, Mateescu R, Page M and Schneider D Analysis and verification of qualitative models of genetic regulatory networks Proceedings of the 19th international joint conference on Artificial intelligence, (370-375)
- Di Sciascio E, Donini F, Mongiello M, Totaro R and Castelluccia D Design verification of web applications using symbolic model checking Proceedings of the 5th international conference on Web Engineering, (69-74)
- Chopinaud C, El Fallah Seghrouchni A and Taillibert P Dynamic self-control of autonomous agents Proceedings of the Third international conference on Programming Multi-Agent Systems, (41-56)
- Qian K, Nymeyer A and Susanto S Experiments with multiple abstraction heuristics in symbolic verification Proceedings of the 6th international conference on Abstraction, Reformulation and Approximation, (290-304)
- Anderson S and Revesz P Verifying the incorrectness of programs and automata Proceedings of the 6th international conference on Abstraction, Reformulation and Approximation, (1-13)
- Woźna B, Lomuscio A and Penczek W Bounded model checking for knowledge and real time Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (165-172)
- Mao W and Wu J Application of Wu's method to symbolic model checking Proceedings of the 2005 international symposium on Symbolic and algebraic computation, (237-244)
- Sharygina N, Chaki S, Clarke E and Sinha N Dynamic component substitutability analysis Proceedings of the 2005 international conference on Formal Methods, (512-528)
- Donaldson A and Miller A Automatic symmetry detection for model checking using computational group theory Proceedings of the 2005 international conference on Formal Methods, (481-496)
- Butler M and Leuschel M Combining CSP and b for specification and property verification Proceedings of the 2005 international conference on Formal Methods, (221-236)
- Bolton C Adding conflict and confusion to CSP Proceedings of the 2005 international conference on Formal Methods, (205-220)
- ter Beek M, Massink M and Latella D Towards model checking stochastic aspects of the thinkteam user interface Proceedings of the 12th international conference on Interactive Systems: design, specification, and verification, (39-50)
- Gow J, Thimbleby H and Cairns P Automatic critiques of interface modes Proceedings of the 12th international conference on Interactive Systems: design, specification, and verification, (201-212)
- Libkin L Logics for unranked trees Proceedings of the 32nd international conference on Automata, Languages and Programming, (35-50)
- Li C, Dang Z, Ibarra O and Yen H Signaling p systems and verification problems Proceedings of the 32nd international conference on Automata, Languages and Programming, (1462-1473)
- Kinder J, Katzenbeisser S, Schallhart C and Veith H Detecting malicious code by model checking Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, (174-187)
- Rabinovitz I and Grumberg O Bounded model checking of concurrent programs Proceedings of the 17th international conference on Computer Aided Verification, (82-97)
- Chaki S, Clarke E, Sinha N and Thati P Automated assume-guarantee reasoning for simulation conformance Proceedings of the 17th international conference on Computer Aided Verification, (534-547)
- d'Amorim M and Roşu G Efficient monitoring of ω-languages Proceedings of the 17th international conference on Computer Aided Verification, (364-378)
- Jobstmann B, Griesmayer A and Bloem R Program repair as a game Proceedings of the 17th international conference on Computer Aided Verification, (226-238)
- Vecchié E and de Simone R Syntax-driven reachable state space construction of synchronous reactive programs Proceedings of the 17th international conference on Computer Aided Verification, (213-225)
- Kaivola R Formal verification of pentium ® 4 components with symbolic simulation and inductive invariants Proceedings of the 17th international conference on Computer Aided Verification, (170-184)
- Barner S, Glazberg Z and Rabinovitz I Wolf Proceedings of the 17th international conference on Computer Aided Verification, (153-157)
- Dwyer M, Hatcliff J, Hoosier M and Robby Building your own software model checker using the bogor extensible model checking framework Proceedings of the 17th international conference on Computer Aided Verification, (148-152)
- Tang D, Malik S, Gupta A and Ip C Symmetry reduction in SAT-based model checking Proceedings of the 17th international conference on Computer Aided Verification, (125-138)
- d'Amorim M and Havelund K (2005). Event-based runtime verification of java programs, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
- Boroday S, Petrenko A, Singh J and Hallal H (2005). Dynamic analysis of java applications for multithreaded antipatterns, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
- Kacprzak M and Penczek W (2005). Fully Symbolic Unbounded Model Checking for Alternating-time Temporal Logic1, Autonomous Agents and Multi-Agent Systems, 11:1, (69-89), Online publication date: 1-Jul-2005.
- Fisher M Implementing temporal logics Proceedings of the 6th international conference on Computational Logic in Multi-Agent Systems, (129-142)
- Belli F and Güldali B A holistic approach to test-driven model checking Proceedings of the 18th international conference on Innovations in Applied Artificial Intelligence, (321-331)
- Griesmayer A, Bloem R, Hautzendorfer M and Wotawa F Formal verification of control software Proceedings of the 18th international conference on Innovations in Applied Artificial Intelligence, (783-788)
- Shacham O, Sagiv M and Schuster A Scaling model checking of dataraces using dynamic information Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of parallel programming, (107-118)
- Siegel S and Avrunin G Modeling wildcard-free MPI programs for verification Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of parallel programming, (95-106)
- Ganai M, Gupta A and Ashar P Beyond safety Proceedings of the 42nd annual Design Automation Conference, (738-743)
- Jain H, Kroening D, Sharygina N and Clarke E Word level predicate abstraction and refinement for verifying RTL verilog Proceedings of the 42nd annual Design Automation Conference, (445-450)
- Palacios H, Bonet B, Darwiche A and Geffner H Pruning conformant plans by counting models on compiled d-DNNF representations Proceedings of the Fifteenth International Conference on International Conference on Automated Planning and Scheduling, (141-150)
- Bayse E, Cavalli A, Núñez M and Zaïdi F (2005). A passive testing approach based on invariants, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:2, (247-266), Online publication date: 1-Jun-2005.
- Armoni R, Egorov S, Fraer R, Korchemny D and Vardi M Efficient LTL compilation for SAT-based model checking Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (877-884)
- Manolios P and Srinivasan S A complete compositional reasoning framework for the efficient verification of pipelined machines Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (863-870)
- Ding Y and Zhang Y A logic approach for LTL system modification Proceedings of the 15th international conference on Foundations of Intelligent Systems, (435-444)
- d'Amorim M and Havelund K Event-based runtime verification of java programs Proceedings of the third international workshop on Dynamic analysis, (1-7)
- Boroday S, Petrenko A, Singh J and Hallal H Dynamic analysis of java applications for multithreaded antipatterns Proceedings of the third international workshop on Dynamic analysis, (1-7)
- Acquaviva A, Aldini A, Bernardo M, Bogliolo A, Bontà E and Lattanzi E A methodology based on formal methods for predicting the impact of dynamic power management Proceedings of the 5th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems: mobile computing, (155-189)
- Holmén F, Leucker M and Lindström M (2005). UppDMC, Electronic Notes in Theoretical Computer Science (ENTCS), 128:3, (91-105), Online publication date: 19-Apr-2005.
- Brim L, Černá I, Moravec P and Šimša J (2005). Distributed Partial Order Reduction of State Spaces, Electronic Notes in Theoretical Computer Science (ENTCS), 128:3, (63-74), Online publication date: 19-Apr-2005.
- Brückner I and Wehrheim H Slicing object-z specifications for verification Proceedings of the 4th international conference on Formal Specification and Development in Z and B, (414-433)
- Leuschel M and Turner E Visualising larger state spaces in ProB Proceedings of the 4th international conference on Formal Specification and Development in Z and B, (6-23)
- Ranganath V, Amtoft T, Banerjee A, Dwyer M and Hatcliff J A new foundation for control-dependence and slicing for modern program structures Proceedings of the 14th European conference on Programming Languages and Systems, (77-93)
- Chechik M and Gurfinkel A A framework for counterexample generation and exploration Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (220-236)
- Larsen K, Larsen U and Wasowski A Color-Blind specifications for transformations of reactive synchronous programs Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (160-174)
- Eiter T, Fink M, Sabbatini G and Tompits H (2005). Reasoning about evolving nonmonotonic knowledge bases, ACM Transactions on Computational Logic, 6:2, (389-440), Online publication date: 1-Apr-2005.
- Kupferman O and Vardi M (2005). From linear time to branching time, ACM Transactions on Computational Logic, 6:2, (273-294), Online publication date: 1-Apr-2005.
- Tsukada Y (2005). Interactive and Probabilistic Proof of Mobile Code Safety, Automated Software Engineering, 12:2, (237-257), Online publication date: 1-Apr-2005.
- Clarke E, Kroening D, Ouaknine J and Strichman O (2005). Computational challenges in bounded model checking, International Journal on Software Tools for Technology Transfer (STTT), 7:2, (174-183), Online publication date: 1-Apr-2005.
- Li B, Wang C and Somenzi F (2005). Abstraction refinement in symbolic model checking using satisfiability as the only decision procedure, International Journal on Software Tools for Technology Transfer (STTT), 7:2, (143-155), Online publication date: 1-Apr-2005.
- Hong H and Ural H Dependence testing Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems, (23-39)
- Byun Y and Sanders B A pattern-based development methodology for communication protocols Proceedings of the 2005 ACM symposium on Applied computing, (1524-1528)
- Wieringa R and Gordijn J Value-oriented design of service coordination processes Proceedings of the 2005 ACM symposium on Applied computing, (1320-1327)
- Fisteus J, Fernández L and Kloos C Applying model checking to BPEL4WS business collaborations Proceedings of the 2005 ACM symposium on Applied computing, (826-830)
- De Nicola R, Latella D and Massink M Formal modeling and quantitative analysis of KLAIM-based mobile systems Proceedings of the 2005 ACM symposium on Applied computing, (428-435)
- Ratschan S and She Z Safety verification of hybrid systems by constraint propagation based abstraction refinement Proceedings of the 8th international conference on Hybrid Systems: computation and control, (573-589)
- Ganai M, Gupta A and Ashar P Verification of Embedded Memory Systems using Efficient Memory Modeling Proceedings of the conference on Design, Automation and Test in Europe - Volume 2, (1096-1101)
- Baier C, Ciesinski F and Größer M (2005). ProbMela and verification of Markov decision processes, ACM SIGMETRICS Performance Evaluation Review, 32:4, (22-27), Online publication date: 1-Mar-2005.
- Baier C, Haverkort B, Hermanns H and Katoen J (2005). Model checking meets performance evaluation, ACM SIGMETRICS Performance Evaluation Review, 32:4, (10-15), Online publication date: 1-Mar-2005.
- Pucella R (2005). The finite and the infinite in temporal logic, ACM SIGACT News, 36:1, (86-99), Online publication date: 1-Mar-2005.
- Damm W and Westphal B (2005). Live and let die, Science of Computer Programming, 55:1-3, (117-159), Online publication date: 1-Mar-2005.
- Grumberg O, Heyman T and Schuster A (2005). Distributed Symbolic Model Checking for μ-Calculus, Formal Methods in System Design, 26:2, (197-219), Online publication date: 1-Mar-2005.
- Ruanthong W and Muenchaisri P Model checking for aspect-oriented software evolution Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems, (1-6)
- Attie P and Chockler H Efficiently verifiable conditions for deadlock-freedom of large concurrent programs Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (465-481)
- Siegel S Efficient verification of halting properties for MPI programs with wildcard receives Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (413-429)
- Jabbar S and Edelkamp S I/O efficient directed model checking Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (313-329)
- Grumberg O, Lange M, Leucker M and Shoham S Don't know in the µ-calculus Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (233-249)
- Grumberg O, Lerda F, Strichman O and Theobald M (2005). Proof-guided underapproximation-widening for multi-process systems, ACM SIGPLAN Notices, 40:1, (122-131), Online publication date: 12-Jan-2005.
- Flanagan C and Godefroid P (2005). Dynamic partial-order reduction for model checking software, ACM SIGPLAN Notices, 40:1, (110-121), Online publication date: 12-Jan-2005.
- Grumberg O, Lerda F, Strichman O and Theobald M Proof-guided underapproximation-widening for multi-process systems Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (122-131)
- Flanagan C and Godefroid P Dynamic partial-order reduction for model checking software Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (110-121)
- Zhu D and Xi H Safe programming with pointers through stateful views Proceedings of the 7th international conference on Practical Aspects of Declarative Languages, (83-97)
- Vardi M Model checking for database theoreticians Proceedings of the 10th international conference on Database Theory, (1-16)
- Lenders W and Baier C Genetic algorithms for the variable ordering problem of binary decision diagrams Proceedings of the 8th international conference on Foundations of Genetic Algorithms, (1-20)
- Maydl W and Grunske L Behavioral types for embedded software Component-Based Software Development for Embedded Systems, (82-106)
- da Silva L and Perkusich A A model-based approach to formal specification and verification of embedded systems using colored petri nets Component-Based Software Development for Embedded Systems, (35-58)
- Oliveira de Almeida H, Dias da Silva L, Perkusich A and de Barros Costa E A formal approach for the modelling and verification of multiagent plans based on model checking and petri nets Software Engineering for Multi-Agent Systems III, (162-179)
- Bagherzadeh M and Arun-Kumar S A multi-agent framework based on communication and concurrency Proceedings of the 6th international conference on Distributed Computing, (114-125)
- Chatterjee K, Dasgupta P and Chakrabarti P Complexity of compositional model checking of computation tree logic on simple structures Proceedings of the 6th international conference on Distributed Computing, (102-113)
- Lee D, Liu C and Yannakakis M Protocol system integration, interface and interoperability Proceedings of the 8th international conference on Principles of Distributed Systems, (1-19)
- Chockler H and Kupferman O (2004). ω-Regular languages are testable with a constant number of queries, Theoretical Computer Science, 329:1-3, (71-92), Online publication date: 13-Dec-2004.
- Glesner S and Blech J Coalgebraic semantics for component systems Proceedings of the 2004 international conference on Architecting Systems with Trustworthy Components, (245-261)
- Zhu M, Bian J and Wu W Model optimization techniques in a verification platform for classified properties Proceedings of the First international conference on Embedded Software and Systems, (542-548)
- Zhan J, Sang N and Xiong G Formal co-verification for soc design with colored petri net Proceedings of the First international conference on Embedded Software and Systems, (188-195)
- Yang J, Twohey P, Engler D and Musuvathi M Using model checking to find serious file system errors Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (19-19)
- Sirjani M, Movaghar A, Shali A and de Boer F (2004). Modeling and Verification of Reactive Systems using Rebeca, Fundamenta Informaticae, 63:4, (385-410), Online publication date: 1-Dec-2004.
- Alpuente M, Falaschi M and Villanueva A A symbolic model checker for tccp programs Proceedings of the First international conference on Rapid Integration of Software Engineering Techniques, (45-56)
- Gerede Ç, Hull R, Ibarra O and Su J Automated composition of e-services Proceedings of the 2nd international conference on Service oriented computing, (252-262)
- Li B and Somenzi F Efficient computation of small abstraction refinements Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (518-525)
- Ganai M, Gupta A and Ashar P Efficient SAT-based unbounded symbolic model checking using circuit cofactoring Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (510-517)
- Zhang L, Prasad M and Hsiao M Incremental deductive & inductive reasoning for SAT-based bounded model checking Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (502-509)
- Gupta S, Krogh B and Rutenbar R Towards formal verification of analog designs Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (210-217)
- Das A, Basu P, Banerjee A, Dasgupta P, Chakrabarti P, Rama Mohan C, Fix L and Armoni R Formal verification coverage Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (198-203)
- Khasidashvili Z, Skaba M, Kaiss D and Hanna Z Theoretical framework for compositional sequential hardware equivalence verification in presence of design constraints Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (58-65)
- Krishnamurthi S, Fisler K and Greenberg M (2004). Verifying aspect advice modularly, ACM SIGSOFT Software Engineering Notes, 29:6, (137-146), Online publication date: 1-Nov-2004.
- Chaki S, Groce A and Strichman O (2004). Explaining abstract counterexamples, ACM SIGSOFT Software Engineering Notes, 29:6, (73-82), Online publication date: 1-Nov-2004.
- Krishnamurthi S, Fisler K and Greenberg M Verifying aspect advice modularly Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (137-146)
- Chaki S, Groce A and Strichman O Explaining abstract counterexamples Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (73-82)
- Clarke D, Costa D and Arbab F Modelling coordination in biological systems Proceedings of the First international conference on Leveraging Applications of Formal Methods, (9-25)
- Hoosier M, Dwyer M, Robby and Hatcliff J A case study in domain-customized model checking for real-time component software Proceedings of the First international conference on Leveraging Applications of Formal Methods, (161-180)
- Uribe T and Cheung S Automatic analysis of firewall and network intrusion detection system configurations Proceedings of the 2004 ACM workshop on Formal methods in security engineering, (66-74)
- Dwyer M, Robby J and Hoosier M Supporting model checking education using BOGOR/Eclipse Proceedings of the 2004 OOPSLA workshop on eclipse technology eXchange, (88-92)
- Madan B and Trivedi K (2004). Security modeling and quantification of intrusion tolerant systems using attack-response graph, Journal of High Speed Networks, 13:4, (297-308), Online publication date: 1-Oct-2004.
- Dwyer M, Clarke L, Cobleigh J and Naumovich G (2004). Flow analysis for verifying properties of concurrent software systems, ACM Transactions on Software Engineering and Methodology, 13:4, (359-430), Online publication date: 1-Oct-2004.
- Hsiung P, Lin S, Tseng C, Lee T, Fu J and See W (2004). VERTAF, IEEE Transactions on Software Engineering, 30:10, (656-674), Online publication date: 1-Oct-2004.
- Brylow D and Palsberg J (2004). Deadline Analysis of Interrupt-Driven Software, IEEE Transactions on Software Engineering, 30:10, (634-655), Online publication date: 1-Oct-2004.
- Beng Kuan Tan H and Lar Thein N (2004). Recovery of PTUIE Handling from Source Codes through Recognizing Its Probable Properties, IEEE Transactions on Knowledge and Data Engineering, 16:10, (1217-1231), Online publication date: 1-Oct-2004.
- Arts T, Claessen K and Svensson H Semi-formal development of a fault-tolerant leader election protocol in erlang Proceedings of the 4th international conference on Formal Approaches to Software Testing, (140-154)
- Licata D and Krishnamurthi S Verifying Interactive Web Programs Proceedings of the 19th IEEE international conference on Automated software engineering, (164-173)
- Choi Y and Heimdahl M Combination Model Checking Proceedings of the 19th IEEE international conference on Automated software engineering, (354-357)
- Heimdahl M and George D Test-Suite Reduction for Model Based Tests Proceedings of the 19th IEEE international conference on Automated software engineering, (176-185)
- Thai P and Van Hung D Verifying linear duration constraints of timed automata Proceedings of the First international conference on Theoretical Aspects of Computing, (295-309)
- Wen Y, Wang J and Qi Z Reverse observation equivalence between labelled state transition systems Proceedings of the First international conference on Theoretical Aspects of Computing, (204-219)
- Cai K and Wang X Towards a Control-Theoretical Approach to Software Fault-Tolerance Proceedings of the Quality Software, Fourth International Conference, (198-205)
- Drouineaud M, Bortin M, Torrini P and Sohr K A First Step Towards Formal Verification of Security Policy Properties for RBAC Proceedings of the Quality Software, Fourth International Conference, (60-67)
- Harel D, Kugler H and Pnueli A Smart Play-Out Extended Proceedings of the Quality Software, Fourth International Conference, (2-10)
- Koshkina M and van Breugel F (2004). Modelling and verifying web service orchestration by means of the concurrency workbench, ACM SIGSOFT Software Engineering Notes, 29:5, (1-10), Online publication date: 1-Sep-2004.
- Riemenschneider R, Saidi H and Dutertre B (2004). Using Model Checking to Assess the Dependability of Agent-Based Systems, IEEE Intelligent Systems, 19:5, (62-70), Online publication date: 1-Sep-2004.
- Bordini R, Fisher M, Visser W and Wooldridge M (2004). Model Checking Rational Agents, IEEE Intelligent Systems, 19:5, (46-52), Online publication date: 1-Sep-2004.
- Sharygina N, Browne J, Xie F, Kurshan R and Levin V (2004). Lessons Learned from Model Checking a NASA Robot Controller, Formal Methods in System Design, 25:2-3, (241-270), Online publication date: 1-Sep-2004.
- Dwyer M, Hatcliff J, Robby and Ranganath V (2004). Exploiting Object Escape and Locking Information in Partial-Order Reductions for Concurrent Object-Oriented Programs, Formal Methods in System Design, 25:2-3, (199-240), Online publication date: 1-Sep-2004.
- Chaki S, Clarke E, Groce A, Ouaknine J, Strichman O and Yorav K (2004). Efficient Verification of Sequential and Concurrent C Programs, Formal Methods in System Design, 25:2-3, (129-166), Online publication date: 1-Sep-2004.
- Clarke E, Kroening D, Sharygina N and Yorav K (2004). Predicate Abstraction of ANSI-C Programs Using SAT, Formal Methods in System Design, 25:2-3, (105-127), Online publication date: 1-Sep-2004.
- Dwyer M and Leue S (2004). Introductory paper, International Journal on Software Tools for Technology Transfer (STTT), 6:4, (257-259), Online publication date: 1-Aug-2004.
- Edelkamp S, Leue S and Lluch-Lafuente A (2004). Partial-order reduction and trail improvement in directed model checking, International Journal on Software Tools for Technology Transfer (STTT), 6:4, (277-301), Online publication date: 1-Aug-2004.
- Xie G, Li C and Dang Z Testability of oracle automata Proceedings of the 9th international conference on Implementation and Application of Automata, (331-332)
- Seow K, Ma C and Yokoo M Multiagent Planning as Control Synthesis Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2, (972-979)
- Wasowski A (2004). Flattening statecharts without explosions, ACM SIGPLAN Notices, 39:7, (257-266), Online publication date: 11-Jul-2004.
- Edwards J, Jackson D, Torlak E and Yeung V Faster constraint solving with subtypes Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (232-242)
- Visser W, Pǎsǎreanu C and Khurshid S Test input generation with java PathFinder Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (97-107)
- Edwards J, Jackson D, Torlak E and Yeung V (2004). Faster constraint solving with subtypes, ACM SIGSOFT Software Engineering Notes, 29:4, (232-242), Online publication date: 1-Jul-2004.
- Visser W, Pǎsǎreanu C and Khurshid S (2004). Test input generation with java PathFinder, ACM SIGSOFT Software Engineering Notes, 29:4, (97-107), Online publication date: 1-Jul-2004.
- Eshuis R and Wieringa R (2004). Tool Support for Verifying UML Activity Diagrams, IEEE Transactions on Software Engineering, 30:7, (437-447), Online publication date: 1-Jul-2004.
- Iacono M, Marrone S, Mazzocca N, Moscato F and Vittorini V A model analysis of a distributed monitoring system using a multi-formalism approach Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing, (499-508)
- Hull R and Su J Tools for design of composite Web services Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (958-961)
- Wasowski A Flattening statecharts without explosions Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems, (257-266)
- Henzinger T, Jhala R and Majumdar R (2004). Race checking by context inference, ACM SIGPLAN Notices, 39:6, (1-13), Online publication date: 9-Jun-2004.
- Henzinger T, Jhala R and Majumdar R Race checking by context inference Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, (1-13)
- Chauhan P, Clarke E and Kroening D A SAT-based algorithm for reparameterization in symbolic simulation Proceedings of the 41st annual Design Automation Conference, (524-529)
- Lu Y and Jorda M Verifying a gigabit ethernet switch using SMV Proceedings of the 41st annual Design Automation Conference, (230-233)
- Behm M, Ludden J, Lichtenstein Y, Rimon M and Vinov M Industrial experience with test generation languages for processor verification Proceedings of the 41st annual Design Automation Conference, (36-40)
- Sirjani M, Movaghar A, Shali A and de Boer F (2004). Modeling and Verification of Reactive Systems using Rebeca, Fundamenta Informaticae, 63:4, (385-410), Online publication date: 1-Jun-2004.
- Huth M (2004). Mathematics for the exploration of requirements, ACM SIGCSE Bulletin, 36:2, (34-39), Online publication date: 1-Jun-2004.
- Chaki S, Clarke E, Groce A, Jha S and Veith H (2004). Modular Verification of Software Components in C, IEEE Transactions on Software Engineering, 30:6, (388-402), Online publication date: 1-Jun-2004.
- Franceschet M, Montanari A and De Rijke M (2004). Model Checking for Combined Logics with an Application to Mobile Systems, Automated Software Engineering, 11:3, (289-321), Online publication date: 1-Jun-2004.
- Fisher J, Harel D, Hubbard E, Piterman N, Stern M and Swerdlin N Combining state-based and scenario-based approaches in modeling biological systems Proceedings of the 20 international conference on Computational Methods in Systems Biology, (236-241)
- Chabrier-Rivier N, Fages F and Soliman S The biochemical abstract machine BIOCHAM Proceedings of the 20 international conference on Computational Methods in Systems Biology, (172-191)
- Pan G and Vardi M Search vs. symbolic techniques in satisfiability solving Proceedings of the 7th international conference on Theory and Applications of Satisfiability Testing, (235-250)
- Jha S and Reps T (2004). Model checking SPKI/SDSI, Journal of Computer Security, 12:3,4, (317-353), Online publication date: 1-May-2004.
- Kacprzak M, Lomuscio A and Penczek W (2004). From Bounded to Unbounded Model Checking for Temporal Epistemic Logic, Fundamenta Informaticae, 63:2-3, (221-240), Online publication date: 1-May-2004.
- Roychoudhury A, Kumar K, Ramakrishnan C and Ramakrishnan I (2004). An unfold/fold transformation framework for definite logic programs, ACM Transactions on Programming Languages and Systems, 26:3, (464-509), Online publication date: 1-May-2004.
- Leuschel M (2004). A framework for the integration of partial evaluation and abstract interpretation of logic programs, ACM Transactions on Programming Languages and Systems, 26:3, (413-463), Online publication date: 1-May-2004.
- Bouyer P (2004). Forward Analysis of Updatable Timed Automata, Formal Methods in System Design, 24:3, (281-320), Online publication date: 1-May-2004.
- Kacprzak M, Lomuscio A and Penczek W (2004). From Bounded to Unbounded Model Checking for Temporal Epistemic Logic, Fundamenta Informaticae, 63:2-3, (221-240), Online publication date: 1-Apr-2004.
- Woźna B (2004). ACTLS properties and Bounded Model Checking, Fundamenta Informaticae, 63:1, (65-87), Online publication date: 1-Apr-2004.
- Martí-Oliet N, Meseguer J and Palomino M Theoroidal maps as algebraic simulations Proceedings of the 17th international conference on Recent Trends in Algebraic Development Techniques, (126-143)
- Edelkamp S, Leue S and Lluch-Lafuente A (2004). Directed explicit-state model checking in the validation of communication protocols, International Journal on Software Tools for Technology Transfer (STTT), 5:2-3, (247-267), Online publication date: 1-Mar-2004.
- Parthasarathy G, Iyer M, Cheng K and Wang L (2004). Safety Property Verification Using Sequential SAT and Bounded Model Checking, IEEE Design & Test, 21:2, (132-143), Online publication date: 1-Mar-2004.
- Adir A, Almog E, Fournier L, Marcus E, Rimon M, Vinov M and Ziv A (2004). Genesys-Pro, IEEE Design & Test, 21:2, (84-93), Online publication date: 1-Mar-2004.
- Basu P, Das S, Dasgupta P, Chakrabarti P, Mohan C and Fix L Formal Verification Coverage Proceedings of the conference on Design, automation and test in Europe - Volume 1
- Parthasarathy G, Iyer M, Cheng K and Wang L Efficient reachability checking using sequential SAT Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (418-423)
- Das B, Sarkar D and Chattopadhyay S Model checking on state transition diagram Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (412-417)
- Abdi S and Gajski D On deriving equivalent architecture model from system specification Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (322-327)
- Dovier A, Piazza C and Policriti A (2004). An efficient algorithm for computing bisimulation equivalence, Theoretical Computer Science, 311:1-3, (221-256), Online publication date: 23-Jan-2004.
- Williams K and Esser R Verification of the Futurebus+ cache coherence protocol Proceedings of the 27th Australasian conference on Computer science - Volume 26, (65-71)
- Woźna B (2004). ACTLS properties and Bounded Model Checking, Fundamenta Informaticae, 63:1, (65-87), Online publication date: 1-Jan-2004.
- Konikowka B and Penczek W (2004). On Designated Values in Multi-valued CTL^* Model Checking, Fundamenta Informaticae, 60:1-4, (211-224), Online publication date: 1-Jan-2004.
- Börger E Linking architectural and component system views by abstract state machines Languages for system specification, (247-269)
- Petrenko A, Boroday S and Groz R (2004). Confirming Configurations in EFSM Testing, IEEE Transactions on Software Engineering, 30:1, (29-42), Online publication date: 1-Jan-2004.
- Nicol D, Sanders W and Trivedi K (2004). Model-Based Evaluation, IEEE Transactions on Dependable and Secure Computing, 1:1, (48-65), Online publication date: 1-Jan-2004.
- Automated, compositional and iterative deadlock detection Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (201-210)
- Check and simulate Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (27-36)
- Bounded model checking of infinite state systems Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (17-26)
- Verification of SpecC using predicate abstraction Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (7-16)
- Engler D and Ashcraft K (2003). RacerX, ACM SIGOPS Operating Systems Review, 37:5, (237-252), Online publication date: 1-Dec-2003.
- Cortés L, Eles P and Peng Z (2003). Modeling and formal verification of embedded systems based on a Petri net representation, Journal of Systems Architecture: the EUROMICRO Journal, 49:12-15, (571-598), Online publication date: 1-Dec-2003.
- Gupta A, Ganai M, Yang Z and Ashar P Iterative Abstraction using SAT-based BMC with Proof Analysis Proceedings of the 2003 IEEE/ACM international conference on Computer-aided design
- Saïdi H, Dutertre B, Levy J and Valdes A Self-regenerative software components Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security, (115-120)
- Harel D, Kugler H, Marelly R and Pnueli A Smart play-out Companion of the 18th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (68-69)
- Engler D and Ashcraft K RacerX Proceedings of the nineteenth ACM symposium on Operating systems principles, (237-252)
- Barnat J, Brim L and Chaloupka J Parallel breadth-first search LTL model-checking Proceedings of the 18th IEEE International Conference on Automated Software Engineering, (106-115)
- Gentilini R, Piazza C and Policriti A (2003). From Bisimulation to Simulation, Journal of Automated Reasoning, 31:1, (73-103), Online publication date: 6-Oct-2003.
- Miller T and Strooper P (2003). A framework and tool support for the systematic testing of model-based specifications, ACM Transactions on Software Engineering and Methodology, 12:4, (409-439), Online publication date: 1-Oct-2003.
- Chechik M, Devereux B, Easterbrook S and Gurfinkel A (2003). Multi-valued symbolic model-checking, ACM Transactions on Software Engineering and Methodology, 12:4, (371-408), Online publication date: 1-Oct-2003.
- Konikowka B and Penczek W (2003). On Designated Values in Multi-valued CTL^* Model Checking, Fundamenta Informaticae, 60:1-4, (211-224), Online publication date: 1-Sep-2003.
- Sen K, Rosu G and Agha G (2003). Runtime safety analysis of multithreaded programs, ACM SIGSOFT Software Engineering Notes, 28:5, (337-346), Online publication date: 1-Sep-2003.
- Xie F and Browne J (2003). Verified systems by composition from verified components, ACM SIGSOFT Software Engineering Notes, 28:5, (277-286), Online publication date: 1-Sep-2003.
- Robby , Dwyer M and Hatcliff J (2003). Bogor, ACM SIGSOFT Software Engineering Notes, 28:5, (267-276), Online publication date: 1-Sep-2003.
- Brylow D and Palsberg J (2003). Deadline analysis of interrupt-driven software, ACM SIGSOFT Software Engineering Notes, 28:5, (198-207), Online publication date: 1-Sep-2003.
- Jeffords R and Heitmeyer C (2003). A strategy for efficiently verifying requirements, ACM SIGSOFT Software Engineering Notes, 28:5, (28-37), Online publication date: 1-Sep-2003.
- Sen K, Rosu G and Agha G Runtime safety analysis of multithreaded programs Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (337-346)
- Xie F and Browne J Verified systems by composition from verified components Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (277-286)
- Robby , Dwyer M and Hatcliff J Bogor Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (267-276)
- Brylow D and Palsberg J Deadline analysis of interrupt-driven software Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (198-207)
- Jeffords R and Heitmeyer C A strategy for efficiently verifying requirements Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (28-37)
- Henderson P (2003). Mathematical reasoning in software engineering education, Communications of the ACM, 46:9, (45-50), Online publication date: 1-Sep-2003.
- Liu Y and Stoller S From datalog rules to efficient programs with time and space guarantees Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming, (172-183)
- Ray A Security check Proceedings of the 2003 workshop on New security paradigms, (59-65)
- Vardi M Automated verification Proceedings of the 18th international joint conference on Artificial intelligence, (1603-1606)
- Cimatti A, Pecheur C and Cavada R Formal verification of diagnosability via symbolic model checking Proceedings of the 18th international joint conference on Artificial intelligence, (363-369)
- Anderson P, Reps T and Teitelbaum T (2003). Design and Implementation of a Fine-Grained Software Inspection Tool, IEEE Transactions on Software Engineering, 29:8, (721-733), Online publication date: 1-Aug-2003.
- Tozawa A and Hagiya M XML schema containment checking based on semi-implicit techniques Proceedings of the 8th international conference on Implementation and application of automata, (213-225)
- Fu X, Bultan T and Su J Conversation protocols Proceedings of the 8th international conference on Implementation and application of automata, (188-200)
- Wallmeier N, Hütten P and Thomas W Symbolic synthesis of finite-state controllers for request-response specifications Proceedings of the 8th international conference on Implementation and application of automata, (11-22)
- Lomuscio A, Raimondi F and Sergot M Towards model checking interpreted systems Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (1054-1055)
- Penczek W and Lomuscio A Verifying epistemic properties of multi-agent systems via bounded model checking Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (209-216)
- Cimatti A, Pistore M, Roveri M and Traverso P (2003). Weak, strong, and strong cyclic planning via symbolic model checking, Artificial Intelligence, 147:1-2, (35-84), Online publication date: 1-Jul-2003.
- Schnoebelen P Oracle circuits for branching-time model checking Proceedings of the 30th international conference on Automata, languages and programming, (790-801)
- Dekhtyar M, Dikovsky A and Valiev M (2003). On feasible cases of checking multi-agent systems behavior, Theoretical Computer Science, 303:1, (63-81), Online publication date: 28-Jun-2003.
- Backes M, Pfitzmann B and Waidner M Security in business process engineering Proceedings of the 2003 international conference on Business process management, (168-183)
- Brinksma E Compositional theories of qualitative and quantitative behaviour Proceedings of the 24th international conference on Applications and theory of Petri nets, (37-42)
- Field J, Goyal D, Ramalingam G and Yahav E Typestate verification Proceedings of the 10th international conference on Static analysis, (439-462)
- Monniaux D Abstract interpretation of programs as Markov decision processes Proceedings of the 10th international conference on Static analysis, (237-254)
- Lazic R and Nowak D On a semantic definition of data independence Proceedings of the 6th international conference on Typed lambda calculi and applications, (226-240)
- Jensen R, Veloso M and Bryant R Guided symbolic universal planning Proceedings of the Thirteenth International Conference on International Conference on Automated Planning and Scheduling, (123-132)
- Hull R, Benedikt M, Christophides V and Su J E-services Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (1-14)
- Revesz P A retrospective on constraint databases Proceedings of the Paris C. Kanellakis memorial workshop on Principles of computing & knowledge: Paris C. Kanellakis memorial workshop on the occasion of his 50th birthday, (12-27)
- Smith G and Winter K Proving temporal properties of Z specifications using abstraction Proceedings of the 3rd international conference on Formal specification and development in Z and B, (260-279)
- Kang H and Park I SAT-based unbounded symbolic model checking Proceedings of the 40th annual Design Automation Conference, (840-843)
- Gupta A, Ganai M, Wang C, Yang Z and Ashar P Learning from BDDs in SAT-based bounded model checking Proceedings of the 40th annual Design Automation Conference, (824-829)
- Jayakumar N, Purandare M and Somenzi F Dos and don'ts of CTL state coverage estimation Proceedings of the 40th annual Design Automation Conference, (292-295)
- Robinson W, Pawlowski S and Volkov V (2003). Requirements interaction management, ACM Computing Surveys, 35:2, (132-190), Online publication date: 1-Jun-2003.
- Edelkamp S Promela planning Proceedings of the 10th international conference on Model checking software, (197-213)
- Groce A and Visser W What went wrong Proceedings of the 10th international conference on Model checking software, (121-136)
- Černá I and Pelánek R Distributed explicit fair cycle detection Proceedings of the 10th international conference on Model checking software, (49-73)
- Chaki S, Clarke E, Groce A, Jha S and Veith H Modular verification of software components in C Proceedings of the 25th International Conference on Software Engineering, (385-395)
- Hatcliff J, Deng X, Dwyer M, Jung G and Ranganath V Cadena Proceedings of the 25th International Conference on Software Engineering, (160-173)
- Wang F and Tahar S Language emptiness checking using MDGs Proceedings of the 13th ACM Great Lakes symposium on VLSI, (88-91)
- Stoller S and Cohen E Optimistic synchronization-based state-space reduction Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (489-504)
- Khomenko V and Koutny M Branching processes of high-level Petri nets Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (458-472)
- Cobleigh J, Giannakopoulou D and Păsăreanu C Learning assumptions for compositional verification Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (331-346)
- Behrmann G, Bouyer P, Fleury E and Larsen K Static guard analysis in timed automata verification Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (254-270)
- Clarke E, Fehnker A, Han Z, Krogh B, Stursberg O and Theobald M Verification of hybrid systems based on counterexample-guided abstraction refinement Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (192-207)
- Glusman M, Kamhi G, Mador-Haim S, Fraer R and Vardi M Multiple-counterexample guided iterative abstraction refinement Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (176-191)
- Gurfinkel A and Chechik M Proof-like counter-examples Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (160-175)
- Henzinger T, Kupferman O and Majumdar R On the universal and existential fragments of the µ-calculus Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (49-64)
- Danos V and Laneve C Core formal molecular biology Proceedings of the 12th European conference on Programming, (302-318)
- Yahav E, Reps T, Sagiv M and Wilhelm R Verifying temporal heap properties specified via evolution logic Proceedings of the 12th European conference on Programming, (204-222)
- Fokkink W and Pang J Cones and foci for protocol verification revisited Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software, (267-281)
- Tabuada P and Pappas G Model checking LTL over controllable linear systems is decidable Proceedings of the 6th international conference on Hybrid systems: computation and control, (498-513)
- Penczek W and Lomuscio A (2003). Verifying Epistemic Properties of Multi-agent Systems via Bounded Model Checking, Fundamenta Informaticae, 55:2, (167-185), Online publication date: 1-Apr-2003.
- Bustan D and Grumberg O (2003). Simulation-based minimization, ACM Transactions on Computational Logic, 4:2, (181-206), Online publication date: 1-Apr-2003.
- Laroussinie F, Schnoebelen P and Turuani M (2003). On the expressivity and complexity of quantitative branching-time temporal logics, Theoretical Computer Science, 297:1-3, (297-315), Online publication date: 17-Mar-2003.
- Hissam S, Moreno G, Stafford J and Wallnau K (2003). Enabling predictable assembly, Journal of Systems and Software, 65:3, (185-198), Online publication date: 15-Mar-2003.
- Roychoudhury A, Mitra T and Karri S Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
- Doucet F, Shukla S and Gupta R Introspection in System-Level Language Frameworks Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
- Déharbe D A tutorial introduction to symbolic model checking Logic for concurrency and synchronisation, (215-237)
- Hähnle R Complexity of many-valued logics Beyond two, (211-233)
- Konikowska B and Penczek W Model checking for multi-valued computation tree logics Beyond two, (193-210)
- Baumgartner P First-order logic Davis-Putnam-Logemann-Loveland procedure Exploring artificial intelligence in the new millennium, (289-329)
- Wolter F and Zakharyaschev M Qualitative spatiotemporal representation and reasoning Exploring artificial intelligence in the new millennium, (175-215)
- Bernardo M and Bravetti M (2003). Performance measure sensitive congruences for Markovian process algebras, Theoretical Computer Science, 290:1, (117-160), Online publication date: 1-Jan-2003.
- Musuvathi M, Park D, Chou A, Engler D and Dill D (2002). CMC, ACM SIGOPS Operating Systems Review, 36:SI, (75-88), Online publication date: 31-Dec-2003.
- Musuvathi M, Park D, Chou A, Engler D and Dill D CMC Proceedings of the 5th symposium on Operating systems design and implementation (Copyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading), (75-88)
- Hornos M and Capel M (2002). On-the-fly model checking from interval logic specifications, ACM SIGPLAN Notices, 37:12, (108-119), Online publication date: 1-Dec-2002.
- Gurfinkel A, Devereux B and Chechik M Model exploration with temporal logic query checking Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, (139-148)
- Li H, Krishnamurthi S and Fisler K Verifying cross-cutting features as open systems Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, (89-98)
- Biere A and Kunz W SAT and ATPG Proceedings of the 2002 IEEE/ACM international conference on Computer-aided design, (782-785)
- Yang J and Goel A GSTE through a case study Proceedings of the 2002 IEEE/ACM international conference on Computer-aided design, (534-541)
- Milicia G and Sassone V Jeeg Proceedings of the 2002 joint ACM-ISCOPE conference on Java Grande, (212-221)
- Gurfinkel A, Devereux B and Chechik M (2002). Model exploration with temporal logic query checking, ACM SIGSOFT Software Engineering Notes, 27:6, (139-148), Online publication date: 1-Nov-2002.
- Li H, Krishnamurthi S and Fisler K (2002). Verifying cross-cutting features as open systems, ACM SIGSOFT Software Engineering Notes, 27:6, (89-98), Online publication date: 1-Nov-2002.
- Karlsson D, Eles P and Peng Z Formal verification in a component-based reuse methodology Proceedings of the 15th international symposium on System Synthesis, (156-161)
- Serafini L and Giunchiglia F (2002). ML Systems, Journal of Logic, Language and Information, 11:4, (471-518), Online publication date: 1-Sep-2002.
- Castro J, Kolp M and Mylopoulos J (2002). Towards requirements-driven information systems engineering, Information Systems, 27:6, (365-389), Online publication date: 1-Sep-2002.
- Penczek W and Lomuscio A (2002). Verifying epistemic properties of multi-agent systems via bounded model checking, Fundamenta Informaticae, 55:2, (167-185), Online publication date: 1-Aug-2002.
- Kalantari L and Ternovska E A model checker for verifying ConGolog programs Eighteenth national conference on Artificial intelligence, (953-954)
- Jensen R, Bryant R and Veloso M SetA* Eighteenth national conference on Artificial intelligence, (668-673)
- Balsamo S, Bernardo M and Simeoni M Combining stochastic process algebras and queueing networks for software architecture analysis Proceedings of the 3rd international workshop on Software and performance, (190-202)
- Grieskamp W, Gurevich Y, Schulte W and Veanes M Generating finite state machines from abstract state machines Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis, (112-122)
- Groce A and Visser W Model checking Java programs using structural heuristics Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis, (12-21)
- Di Sciascio E, Donini F, Mongiello M and Piscitelli G AnWeb Proceedings of the 14th international conference on Software engineering and knowledge engineering, (609-616)
- van der Hoek W and Wooldridge M Tractable multiagent planning for epistemic goals Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3, (1167-1174)
- Grieskamp W, Gurevich Y, Schulte W and Veanes M (2002). Generating finite state machines from abstract state machines, ACM SIGSOFT Software Engineering Notes, 27:4, (112-122), Online publication date: 1-Jul-2002.
- Groce A and Visser W (2002). Model checking Java programs using structural heuristics, ACM SIGSOFT Software Engineering Notes, 27:4, (12-21), Online publication date: 1-Jul-2002.
- Musuvathi M, Chou A, Dill D and Engler D Model checking system software with CMC Proceedings of the 10th workshop on ACM SIGOPS European workshop, (219-222)
- Pucella R and Weissman V A Logic for Reasoning about Digital Rights Proceedings of the 15th IEEE workshop on Computer Security Foundations
- Jha S and Reps T Analysis of SPKI/SDSI Certificates Using Model Checking Proceedings of the 15th IEEE workshop on Computer Security Foundations
- Jha S, Sheyner O and Wing J Two Formal Analys s of Attack Graphs Proceedings of the 15th IEEE workshop on Computer Security Foundations
- Boroday S, Groz R, Petrenko A and Quemener Y Techniques for abstracting SDL specifications Proceedings of the 3rd international conference on Telecommunications and beyond: the broader applicability of SDL and MSC, (141-157)
- Hallem S, Chelf B, Xie Y and Engler D A system and language for building system-specific, static analyses Proceedings of the ACM SIGPLAN 2002 conference on Programming language design and implementation, (69-82)
- Larus J and Parkes M Using Cohort-Scheduling to Enhance Server Performance Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference, (103-114)
- Chakrabarti A, Dasgupta P, Chakrabarti P and Banerjee A Formal verification of module interfaces against real time specifications Proceedings of the 39th annual Design Automation Conference, (141-145)
- Eder K and Barrett G Achieving maximum performance Proceedings of the 39th annual Design Automation Conference, (135-140)
- Thimbleby H Reflections on symmetry Proceedings of the Working Conference on Advanced Visual Interfaces, (28-33)
- Chandra S, Godefroid P and Palm C Software model checking in practice Proceedings of the 24th International Conference on Software Engineering, (431-441)
- Eshuis R and Wieringa R Verification support for workflow design with UML activity graphs Proceedings of the 24th International Conference on Software Engineering, (166-176)
- Smith R, Avrunin G, Clarke L and Osterweil L PROPEL Proceedings of the 24th International Conference on Software Engineering, (11-21)
- Hallem S, Chelf B, Xie Y and Engler D (2002). A system and language for building system-specific, static analyses, ACM SIGPLAN Notices, 37:5, (69-82), Online publication date: 17-May-2002.
- Varea M, Al-Hashimi B, Cortés L, Eles P and Peng Z Symbolic model checking of Dual Transition Petri Nets Proceedings of the tenth international symposium on Hardware/software codesign, (43-48)
- Ubayashi N and Tamai T Aspect-oriented programming with model checking Proceedings of the 1st international conference on Aspect-oriented software development, (148-154)
- Sihman M and Katz S A calculus of superimpositions for distributed systems Proceedings of the 1st international conference on Aspect-oriented software development, (28-40)
- Penczek W, Wozna B and Zbrzezny A (2002). Bounded model checking for the universal fragment of CTL, Fundamenta Informaticae, 51:1, (135-156), Online publication date: 15-Mar-2002.
- Dembiński P, Penczek W and Pólrola A (2002). Verification of timed automata based on similarity, Fundamenta Informaticae, 51:1, (59-89), Online publication date: 15-Mar-2002.
- Harel D, Kupferman O and Vardi M (2002). On the complexity of verifying concurrent transition systems, Information and Computation, 173:2, (143-161), Online publication date: 15-Mar-2002.
- Gallardo M, Martínez J, Merino P and Rosales E Using XML to implement abstraction for Model Checking Proceedings of the 2002 ACM symposium on Applied computing, (1021-1025)
- Seigel S and Avrunin G (2002). Improving the Precision of INCA by Eliminating Solutions with Spurious Cycles, IEEE Transactions on Software Engineering, 28:2, (115-128), Online publication date: 1-Feb-2002.
- Ciardo G Distributed and structured analysis approaches to study large and complex systems Lectures on formal methods and performance analysis, (344-374)
- Haverkort B Markovian models for performance and dependability evaluation Lectures on formal methods and performance analysis, (38-83)
- Henzinger T, Jhala R, Majumdar R and Sutre G Lazy abstraction Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (58-70)
- Chaki S, Rajamani S and Rehof J Types as models Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (45-57)
- Dasgupta P, Chakrabarti A and Chakrabarti P Open Computation Tree Logic for Formal Verification of Modules Proceedings of the 2002 Asia and South Pacific Design Automation Conference
- Gupta A, Casavant A, Ashar P, Mukaiyama A, Wakabayashi K and Liu X Property-Specific Testbench Generation for Guided Simulation Proceedings of the 2002 Asia and South Pacific Design Automation Conference
- Schmidt D Structure-preserving binary relations for program abstraction The essence of computation, (245-265)
- Lindsay P and Connelly S (2002). Modelling erroneous operator behaviours for an air-traffic control task, Australian Computer Science Communications, 24:4, (43-54), Online publication date: 1-Jan-2002.
- Lindsay P and Connelly S Modelling erroneous operator behaviours for an air-traffic control task Proceedings of the Third Australasian conference on User interfaces - Volume 7, (43-54)
- Penczek W, Woźna B and Zbrzezny A (2002). Bounded Model Checking for the Universal Fragment of CTL, Fundamenta Informaticae, 51:1-2, (135-156), Online publication date: 1-Jan-2002.
- Dembiński P and Półrola A (2002). Verification of Timed Automata Based on Similarity, Fundamenta Informaticae, 51:1-2, (59-89), Online publication date: 1-Jan-2002.
- Henzinger T, Jhala R, Majumdar R and Sutre G (2002). Lazy abstraction, ACM SIGPLAN Notices, 37:1, (58-70), Online publication date: 1-Jan-2002.
- Chaki S, Rajamani S and Rehof J (2002). Types as models, ACM SIGPLAN Notices, 37:1, (45-57), Online publication date: 1-Jan-2002.
- Gottlob G, Grädel E and Veith H (2002). Datalog LITE, ACM Transactions on Computational Logic, 3:1, (42-79), Online publication date: 1-Jan-2002.
- Pucella R (2001). Review of Dynamic Logic (Foundations of Computing), ACM SIGACT News, 32:4, (9-17), Online publication date: 1-Dec-2001.
- Brat G and Visser W Combining Static Analysis and Model Checking for Software Analysis Proceedings of the 16th IEEE international conference on Automated software engineering
- Giannakopoulou D and Havelund K Automata-Based Verification of Temporal Properties on Running Programs Proceedings of the 16th IEEE international conference on Automated software engineering
- Bultan T and Yavuz-Kahveci T Action Language Verifier Proceedings of the 16th IEEE international conference on Automated software engineering
- Nitta N, Takata Y and Seki H An efficient security verification method for programs with stack inspection Proceedings of the 8th ACM conference on Computer and Communications Security, (68-77)
- Chauhan P, Clarke E, Jha S, Kukula J, Shiple T, Veith H and Wang D Non-linear quantification scheduling in image computation Proceedings of the 2001 IEEE/ACM international conference on Computer-aided design, (293-298)
- Gupta A, Yang Z, Ashar P, Zhang L and Malik S Partition-based decision heuristics for image computation using SAT and BDDs Proceedings of the 2001 IEEE/ACM international conference on Computer-aided design, (286-292)
- Peled D, Vardi M and Yannakakis M (2001). Black box checking, Journal of Automata, Languages and Combinatorics, 7:2, (225-246), Online publication date: 1-Nov-2001.
- Bouyer P and Petit A (2001). A Kleene/Büchi-like theorem for clock languages, Journal of Automata, Languages and Combinatorics, 7:2, (167-186), Online publication date: 1-Nov-2001.
- Fuxman A, Giorgini P, Kolp M and Mylopoulos J Information systems as social structures Proceedings of the international conference on Formal Ontology in Information Systems - Volume 2001, (10-21)
- Choi Y, Rayadurgam S and Heimdahl M Automatic abstraction for model checking software systems with interrelated numeric constraints Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (164-174)
- Fisler K and Krishnamurthi S Modular verification of collaboration-based software designs Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (152-163)
- Choi Y, Rayadurgam S and Heimdahl M (2001). Automatic abstraction for model checking software systems with interrelated numeric constraints, ACM SIGSOFT Software Engineering Notes, 26:5, (164-174), Online publication date: 1-Sep-2001.
- Fisler K and Krishnamurthi S (2001). Modular verification of collaboration-based software designs, ACM SIGSOFT Software Engineering Notes, 26:5, (152-163), Online publication date: 1-Sep-2001.
- Campos J and Harrison M (2001). Model Checking Interactor Specifications, Automated Software Engineering, 8:3-4, (275-310), Online publication date: 1-Aug-2001.
- Alur R, de Alfaro L, Grosu R, Henzinger T, Kang M, Kirsch C, Majumdar R, Mang F and Wang B JMOCHA Proceedings of the 23rd International Conference on Software Engineering, (835-836)
- Campailla A, Chaki S, Clarke E, Jha S and Veith H Efficient filtering in publish-subscribe systems using binary decision diagrams Proceedings of the 23rd International Conference on Software Engineering, (443-452)
- Jha S and Wing J Survivability analysis of networked systems Proceedings of the 23rd International Conference on Software Engineering, (307-317)
- Hunt H, Marathe M and Stearns R Strongly-local reductions and the complexity/efficient approximability of algebra and optimization on abstract algebraic structures Proceedings of the 2001 international symposium on Symbolic and algebraic computation, (183-191)
- Bening L and Foster H (2001). Optimizing Multiple EDA Tools within the ASIC Design Flow, IEEE Design & Test, 18:4, (46-55), Online publication date: 1-Jul-2001.
- Clarke E, Biere A, Raimi R and Zhu Y (2001). Bounded Model Checking Using Satisfiability Solving, Formal Methods in System Design, 19:1, (7-34), Online publication date: 1-Jul-2001.
- Hiraishi K (2001). Synthesis of Supervisors Using Learning Algorithm of RegularLanguages, Discrete Event Dynamic Systems, 11:3, (211-234), Online publication date: 1-Jul-2001.
- Garavel H, Mateescu R and Smarandache I Parallel state space construction for model-checking Proceedings of the 8th international SPIN workshop on Model checking of software, (217-234)
- Jia G and Graf S Verification experiments on the MASCARA protocol Proceedings of the 8th international SPIN workshop on Model checking of software, (123-142)
- Edelkamp S, Lafuente A and Leue S Directed explicit model checking with HSF-SPIN Proceedings of the 8th international SPIN workshop on Model checking of software, (57-79)
- Peled D and Zuck L From model checking to a temporal proof Proceedings of the 8th international SPIN workshop on Model checking of software, (1-14)
- Nitta N, Seki H and Takata Y Security verification of programs with stack inspection Proceedings of the sixth ACM symposium on Access control models and technologies, (31-40)
- Concrete Impact of Formal Verification on Quality in IP Design and Implementation Proceedings of the 2nd International Symposium on Quality Electronic Design
- Yahav E (2001). Verifying safety properties of concurrent Java programs using 3-valued logic, ACM SIGPLAN Notices, 36:3, (27-40), Online publication date: 1-Mar-2001.
- Beer I, Ben-David S, Eisner C and Rodeh Y (2001). Efficient Detection of Vacuity in Temporal Model Checking, Formal Methods in System Design, 18:2, (141-163), Online publication date: 1-Mar-2001.
- Clarke E and Schlingloff B Model checking Handbook of automated reasoning, (1635-1790)
- Merz S Model checking Modeling and verification of parallel processes, (3-38)
- Yahav E Verifying safety properties of concurrent Java programs using 3-valued logic Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (27-40)
- Tsuchiya T, Nagano S, Paidi R and Kikuno T (2001). Symbolic Model Checking for Self-Stabilizing Algorithms, IEEE Transactions on Parallel and Distributed Systems, 12:1, (81-95), Online publication date: 1-Jan-2001.
- Gottlob G, Grädel E and Veith H Linear time datalog and branching time logic Logic-based artificial intelligence, (443-467)
- Lev-Ami T, Reps T, Sagiv M and Wilhelm R (2000). Putting static analysis to work for verification, ACM SIGSOFT Software Engineering Notes, 25:5, (26-38), Online publication date: 1-Sep-2000.
- Lev-Ami T, Reps T, Sagiv M and Wilhelm R Putting static analysis to work for verification Proceedings of the 2000 ACM SIGSOFT international symposium on Software testing and analysis, (26-38)
- Ciardo G, Lüttgen G and Siminiceanu R Efficient symbolic state-space construction for asynchronous systems Proceedings of the 21st international conference on Application and theory of petri nets, (103-122)
- Velev M and Bryant R Formal verification of superscale microprocessors with multicycle functional units, exception, and branch prediction Proceedings of the 37th Annual Design Automation Conference, (112-117)
- Yang J and Tiemeyer A Lazy symbolic model checking Proceedings of the 37th Annual Design Automation Conference, (35-38)
- van Lamsweerde A Requirements engineering in the year 00 Proceedings of the 22nd international conference on Software engineering, (5-19)
- Lamsweerde A Formal specification Proceedings of the Conference on The Future of Software Engineering, (147-159)
- Varpaaniemi K (2000). Stable Models for Stubborn Sets, Fundamenta Informaticae, 43:1-4, (355-375), Online publication date: 1-Jan-2000.
- Song D Athena Proceedings of the 12th IEEE workshop on Computer Security Foundations
- Jensen R and Veloso M OBDD-based universal planning Artificial intelligence today, (213-248)
- Ulewicz S, Ulbrich M, Weigl A, Kirsten M, Wiebe F, Beckert B and Vogel-Heuser B A verification-supported evolution approach to assist software application engineers in industrial factory automation 2016 IEEE International Symposium on Assembly and Manufacturing (ISAM), (19-25)
- Golnari A, Vizel Y and Malik S Error-tolerant processors: Formal specification and verification 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (286-293)
- Zhang S and Li Y Expressive power of linear-temporal logic based on generalized possibility measures 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (431-436)
- Cochard T, Gouyon D and Pétin J Generation of safe operation sequences using iterative refinements and abstractions of timed automata 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), (1-8)
- Kerber F and Haendel G A UML-based approach to manage product variability in automated production lines 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), (1-5)
- Bin Lin , Zhenkun Yang , Kai Cong and Fei Xie Generating high coverage tests for SystemC designs using symbolic execution 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), (166-171)
- Lyu Y and Mishra P Automated Test Generation for Activation of Assertions in RTL Models 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), (223-228)
- Askarpour M, Ghezzi C, Mandrioli D, Rossi M and Tsigkanos C Formal Methods in Designing Critical Cyber-Physical Systems From Software Engineering to Formal Methods and Tools, and Back, (110-130)
- Tegeler T, Murtovi A, Frohme M and Steffen B Product Line Verification via Modal Meta Model Checking From Software Engineering to Formal Methods and Tools, and Back, (313-337)
Index Terms
- Model checking
Recommendations
Conditional model checking: a technique to pass information between verifiers
FSE '12: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software EngineeringSoftware model checking, as an undecidable problem, has three possible outcomes: (1) the program satisfies the specification, (2) the program does not satisfy the specification, and (3) the model checker fails. The third outcome usually manifests itself ...
Model Checking CTL*[DC]
TACAS 2001: Proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of SystemsWe define a logic called CTL*[DC] which extends CTL* with ability to specify past-time and quantitative timing properties using the formulae of Quantified Discrete-time Duration Calculus (QDDC). Alternately, we can consider CTL*[DC] as extending logic ...
Modular Model Checking
COMPOS'97: Revised Lectures from the International Symposium on Compositionality: The Significant DifferenceIn modular verification the specification of a module consists of two parts. One part describes the guaranteed behavior of the module. The other part describes the assumed behavior of the system in which the module is interacting. This is called the ...