skip to main content
Skip header Section
Model checkingApril 2000
Publisher:
  • MIT Press
  • 55 Hayward St.
  • Cambridge
  • MA
  • United States
ISBN:978-0-262-03270-4
Published:03 April 2000
Pages:
314
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Lewis M, Soudjani S and Zuliani P (2023). Formal Verification of Quantum Programs: Theory, Tools, and Challenges, ACM Transactions on Quantum Computing, 5:1, (1-35), Online publication date: 31-Mar-2024.
  2. Baharloo N, Bentahar J, Alwhishi G, Drawel N and Pedrycz W (2024). Verifying trust over IoT-ad hoc network-based applications under uncertainty, Ad Hoc Networks, 154:C, Online publication date: 1-Mar-2024.
  3. Rausch Fernandes H, Gomes G, Pinheiro de Oliveira A and Campos S (2024). Stochastic formal model of PI3K/mTOR pathway in Alzheimer's disease for drug repurposing, Science of Computer Programming, 232:C, Online publication date: 1-Jan-2024.
  4. Huang W, Krafczyk N and Peleska J (2024). Exhaustive property oriented model-based testing with symbolic finite state machines, Science of Computer Programming, 231:C, Online publication date: 1-Jan-2024.
  5. Alrahman Y, Azzopardi S, Di Stefano L and Piterman N (2023). Language support for verifying reconfigurable interacting systems, International Journal on Software Tools for Technology Transfer (STTT), 25:5-6, (765-784), Online publication date: 1-Dec-2023.
  6. Van Houdt G, Martin N and Depaire B (2024). AITIA-PM, Engineering Applications of Artificial Intelligence, 126:PD, Online publication date: 1-Nov-2023.
  7. Li Y, Liu W, Wang J, Yu X and Li C (2023). Model Checking of Possibilistic Linear-Time Properties Based on Generalized Possibilistic Decision Processes, IEEE Transactions on Fuzzy Systems, 31:10, (3495-3506), Online publication date: 1-Oct-2023.
  8. Brüning F, Gleirscher M, Huang W, Krafczyk N, Peleska J and Sachtleben R Complete Property-Oriented Module Testing Testing Software and Systems, (183-201)
  9. Hasanbeig H, Kroening D and Abate A (2023). Certified reinforcement learning with logic guidance, Artificial Intelligence, 322:C, Online publication date: 1-Sep-2023.
  10. Kouvaros P Towards formal verification of neuro-symbolic multi-agent systems Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, (7014-7019)
  11. Mehdipour N, Althoff M, Tebbens R and Belta C (2023). Formal methods to comply with rules of the road in autonomous driving, Automatica (Journal of IFAC), 152:C, Online publication date: 1-Jun-2023.
  12. Serna J, Day N and Esmaeilsabzali S (2023). Dash: declarative behavioural modelling in Alloy with control state hierarchy, Software and Systems Modeling (SoSyM), 22:2, (733-749), Online publication date: 1-Apr-2023.
  13. Conradie W, Della Monica D, Muñoz-Velasco E, Sciavicco G and Stan I (2023). Fuzzy Halpern and Shoham's interval temporal logics, Fuzzy Sets and Systems, 456:C, (107-124), Online publication date: 30-Mar-2023.
  14. Ordoni E, Mülle J and Böhm K (2023). Reduction of data-value-aware process models, Information Systems, 114:C, Online publication date: 1-Mar-2023.
  15. Gutierrez J, Kowara S, Kraus S, Steeples T and Wooldridge M (2023). Cooperative concurrent games, Artificial Intelligence, 314:C, Online publication date: 1-Jan-2023.
  16. Banks C, Slovak K, Coogan S and Egerstedt M Specification-Based Maneuvering of Quadcopters Through Hoops 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (5191-5197)
  17. Saeedloei N and Kluźniak F An Efficient Customized Clock Allocation Algorithm for a Class of Timed Automata Formal Methods: Foundations and Applications, (3-21)
  18. Gnatenko A and Zakharov V (2022). Satisfiability and Model Checking for One Parameterized Extension of Linear Temporal Logic, Automatic Control and Computer Sciences, 56:7, (649-660), Online publication date: 1-Dec-2022.
  19. Guerra P and Wassermann R (2022). Revising System Specifications in Temporal Logic, Journal of Logic, Language and Information, 31:4, (591-618), Online publication date: 1-Dec-2022.
  20. Hansen S, Thule C, Gomes C, van de Pol J, Palmieri M, Inci E, Madsen F, Alfonso J, Castellanos J and Rodriguez J (2022). Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps, International Journal on Software Tools for Technology Transfer (STTT), 24:6, (999-1024), Online publication date: 1-Dec-2022.
  21. Feng R, Acar E, Wang Y, Liu W, Schlobach S and Ding W (2022). Computing Sufficient and Necessary Conditions in CTL, Information Sciences: an International Journal, 616:C, (474-504), Online publication date: 1-Nov-2022.
  22. Berndt S, Liśkiewicz M, Lutter M and Reischuk R (2022). Learning residual alternating automata, Information and Computation, 289:PA, Online publication date: 1-Nov-2022.
  23. Casagrande A, Dang T, Dorigo L, Dreossi T, Piazza C and Pippia E (2022). Parameter synthesis of polynomial dynamical systems, Information and Computation, 289:PA, Online publication date: 1-Nov-2022.
  24. Xu M, Fu J, Mei J and Deng Y (2022). An algebraic method to fidelity-based model checking over quantum Markov chains, Theoretical Computer Science, 935:C, (61-81), Online publication date: 31-Oct-2022.
  25. Abd Alrahman Y, Azzopardi S and Piterman N Model Checking Reconfigurable Interacting Systems Leveraging Applications of Formal Methods, Verification and Validation. Adaptation and Learning, (373-389)
  26. Körner P and Leuschel M Towards Practical Partial Order Reduction for High-Level Formalisms Verified Software. Theories, Tools and Experiments., (72-91)
  27. ACM
    Wayama K, Yokogawa T, Amasaki S, Aman H and Arimoto K Verifying Game Logic in Unreal Engine 5 Blueprint Visual Scripting System Using Model Checking Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, (1-8)
  28. Mancini T, Melatti I and Tronci E (2022). Any-Horizon Uniform Random Sampling and Enumeration of Constrained Scenarios for Simulation-Based Formal Verification, IEEE Transactions on Software Engineering, 48:10, (4002-4013), Online publication date: 1-Oct-2022.
  29. Drawel N, Laarej A, Bentahar J and El Menshawy M (2022). Transformation-based model checking temporal trust in multi-agent systems, Journal of Systems and Software, 192:C, Online publication date: 1-Oct-2022.
  30. ACM
    Shu X and Yang Z A Bounded Model Checking Method for Concurrent Systems in xUML4MC Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition, (236-242)
  31. de Oliveira D, Faria-Campos A and Campos S BDDBlast—A Memory Efficient Architecture for Pairwise Alignments Advances in Bioinformatics and Computational Biology, (1-13)
  32. Rybakov M and Shkatov D (2022). Complexity of finite-variable fragments of propositional temporal and modal logics of computation, Theoretical Computer Science, 925:C, (45-60), Online publication date: 10-Aug-2022.
  33. ACM
    Gutsfeld J, Meier A, Ohrem C and Virtema J Temporal Team Semantics Revisited Proceedings of the 37th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
  34. Bittner B, Bozzano M, Cimatti A, Gario M, Tonetta S and Vozarova V (2022). Diagnosability of fair transition systems, Artificial Intelligence, 309:C, Online publication date: 1-Aug-2022.
  35. Song J, Kang J, Hyun S, Jee E and Bae D (2022). Continuous verification of system of systems with collaborative MAPE-K pattern and probability model slicing, Information and Software Technology, 147:C, Online publication date: 1-Jul-2022.
  36. Fumagalli M, Sales T, Baião F and Guizzardi G (2022). Conceptual model visual simulation and the inductive learning of missing domain constraints, Data & Knowledge Engineering, 140:C, Online publication date: 1-Jul-2022.
  37. Aminof B, Murano A, Rubin S and Zuleger F (2022). Verification of agent navigation in partially-known environments, Artificial Intelligence, 308:C, Online publication date: 1-Jul-2022.
  38. ACM
    Bruni R, Giacobazzi R, Gori R and Ranzato F Abstract interpretation repair Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (426-441)
  39. Saeedloei N and Kluźniak F Untangling the Graphs of Timed Automata to Decrease the Number of Clocks Integrated Formal Methods, (168-187)
  40. Havelund K and Peled D (2022). On monitoring linear temporal properties, Formal Methods in System Design, 60:3, (405-425), Online publication date: 1-Jun-2022.
  41. Amendola A, Barruffo L, Bozzano M, Cimatti A, De Simone S, Fedeli E, Gabbasov A, Garrubba D, Girardi M, Serra D, Tiella R and Zampedri G Formal Design and Validation of an Automatic Train Operation Control System Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, (169-178)
  42. Fang A and Kress-Gazit H Automated Task Updates of Temporal Logic Specifications for Heterogeneous Robots 2022 International Conference on Robotics and Automation (ICRA), (4363-4369)
  43. ACM
    Bajczi L, Ádám Z and Molnár V C for yourself Proceedings of the IEEE/ACM 10th International Conference on Formal Methods in Software Engineering, (1-11)
  44. Bentahar J, Drawel N and Sadiki A Quantitative Group Trust: A Two-Stage Verification Approach Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, (100-108)
  45. Camilli M, Janes A and Russo B (2022). Automated test-based learning and verification of performance models for microservices systems, Journal of Systems and Software, 187:C, Online publication date: 1-May-2022.
  46. Kaleeswaran A, Nordmann A, Vogel T and Grunske L (2022). A systematic literature review on counterexample explanation, Information and Software Technology, 145:C, Online publication date: 1-May-2022.
  47. Lyu Z, Xu X and Hong Y (2022). Small-gain theorem for safety verification of interconnected systems, Automatica (Journal of IFAC), 139:C, Online publication date: 1-May-2022.
  48. Brunese L, Mercaldo F, Reginelli A and Santone A (2022). A novel methodology for head and neck carcinoma treatment stage detection by means of model checking, Artificial Intelligence in Medicine, 127:C, Online publication date: 1-May-2022.
  49. Rubio R, Martí-Oliet N, Pita I and Verdejo A (2021). Model checking strategy-controlled systems in rewriting logic, Automated Software Engineering, 29:1, Online publication date: 1-May-2022.
  50. ACM
    Anevlavis T, Philippe M, Neider D and Tabuada P (2022). Being Correct Is Not Enough: Efficient Verification Using Robust Linear Temporal Logic, ACM Transactions on Computational Logic, 23:2, (1-39), Online publication date: 30-Apr-2022.
  51. ACM
    Lee E, Lee S and Seo Y Deep learning based self-adaptive framework for environmental interoperability in internet of things Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (32-35)
  52. Xu M, Fu J, Mei J and Deng Y (2022). Model checking QCTL plus on quantum Markov chains, Theoretical Computer Science, 913:C, (43-72), Online publication date: 20-Apr-2022.
  53. Masselot M, Patil S, Zhabelova G and Vyatkin V Towards a formal model of protection functions for power distribution networks IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, (5302-5309)
  54. Malkis A (2022). Reachability in parallel programs is polynomial in the number of threads, Journal of Parallel and Distributed Computing, 162:C, (1-16), Online publication date: 1-Apr-2022.
  55. Drawel N, Bentahar J, Laarej A and Rjoub G (2022). Formal verification of group and propagated trust in multi-agent systems, Autonomous Agents and Multi-Agent Systems, 36:1, Online publication date: 1-Apr-2022.
  56. Akintunde M, Botoeva E, Kouvaros P and Lomuscio A (2021). Formal verification of neural agents in non-deterministic environments, Autonomous Agents and Multi-Agent Systems, 36:1, Online publication date: 1-Apr-2022.
  57. Cai C, Sun J and Dobbie G (2022). B model quality assessments on automated reachability repair with ISO/IEC 25010, Science of Computer Programming, 214:C, Online publication date: 1-Feb-2022.
  58. ACM
    Witharana H, Lyu Y, Charles S and Mishra P (2022). A Survey on Assertion-based Hardware Verification, ACM Computing Surveys, 54:11s, (1-33), Online publication date: 31-Jan-2022.
  59. Horak T, Coenen N, Metzger N, Hahn C, Flemisch T, Méndez J, Dimov D, Finkbeiner B and Dachselt R (2022). Visual Analysis of Hyperproperties for Understanding Model Checking Results, IEEE Transactions on Visualization and Computer Graphics, 28:1, (357-367), Online publication date: 1-Jan-2022.
  60. De Giacomo G, Felli P, Logan B, Patrizi F and Sardiña S (2022). Situation calculus for controller synthesis in manufacturing systems with first-order state representation, Artificial Intelligence, 302:C, Online publication date: 1-Jan-2022.
  61. Krafczyk N and Peleska J Exhaustive Property Oriented Model-Based Testing with Symbolic Finite State Machines Software Engineering and Formal Methods, (84-102)
  62. Dubslaff C, Wienhöft P and Fehnker A Be Lazy and Don’t Care: Faster CTL Model Checking for Recursive State Machines Software Engineering and Formal Methods, (332-350)
  63. van Dongen B, De Smedt J, Di Ciccio C and Mendling J (2021). Conformance checking of mixed-paradigm process models, Information Systems, 102:C, Online publication date: 1-Dec-2021.
  64. Visconti E, Tsigkanos C, Hu Z and Ghezzi C (2021). Model-driven engineering city spaces via bidirectional model transformations, Software and Systems Modeling (SoSyM), 20:6, (2003-2022), Online publication date: 1-Dec-2021.
  65. Howar F, Jasper M, Mues M, Schmidt D and Steffen B (2021). The RERS challenge: towards controllable and scalable benchmark synthesis, International Journal on Software Tools for Technology Transfer (STTT), 23:6, (917-930), Online publication date: 1-Dec-2021.
  66. Xu M, Huang C and Feng Y (2021). Measuring the constrained reachability in quantum Markov chains, Acta Informatica, 58:6, (653-674), Online publication date: 1-Dec-2021.
  67. Gutierrez J, Murano A, Perelli G, Rubin S, Steeples T and Wooldridge M (2021). Equilibria for games with combined qualitative and quantitative objectives, Acta Informatica, 58:6, (585-610), Online publication date: 1-Dec-2021.
  68. Peleska J, Krafczyk N, Haxthausen A and Pinger R (2021). Efficient data validation for geographical interlocking systems, Formal Aspects of Computing, 33:6, (925-955), Online publication date: 1-Dec-2021.
  69. Ahishakiye F, Requeno Jarabo J, Kristensen L and Stolz V MC/DC Test Cases Generation Based on BDDs Dependable Software Engineering. Theories, Tools, and Applications, (178-197)
  70. Bergenthal M, Krafczyk N, Peleska J and Sachtleben R libfsmtest An Open Source Library for FSM-Based Testing Testing Software and Systems, (3-19)
  71. Zeng Y, Huang B, Zhang H, Gupta A and Malik S Generating Architecture-Level Abstractions from RTL Designs for Processors and Accelerators Part I: Determining Architectural State Variables 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), (1-9)
  72. ACM
    Shea-Blymyer C and Abbas H (2021). Algorithmic Ethics: Formalization and Verification of Autonomous Vehicle Obligations, ACM Transactions on Cyber-Physical Systems, 5:4, (1-25), Online publication date: 31-Oct-2021.
  73. Zhang Z, de Amorim A, Jia L and Păsăreanu C Learning Assumptions for Verifying Cryptographic Protocols Compositionally Formal Aspects of Component Software, (3-23)
  74. ACM
    He P, Westbrook E, Carmer B, Phifer C, Robert V, Smeltzer K, Ştefănescu A, Tomb A, Wick A, Yacavone M and Zdancewic S (2021). A type system for extracting functional specifications from memory-safe imperative programs, Proceedings of the ACM on Programming Languages, 5:OOPSLA, (1-29), Online publication date: 20-Oct-2021.
  75. Kopetzki D, Lybecait M, Naujokat S and Steffen B (2021). Towards language-to-language transformation, International Journal on Software Tools for Technology Transfer (STTT), 23:5, (655-677), Online publication date: 1-Oct-2021.
  76. Voit N and Bochkov S Formal Method to Analyze Design Workflows in Software Development Computational Science and Its Applications – ICCSA 2021, (182-194)
  77. Sievers S and Helmert M (2021). Merge-and-Shrink, Journal of Artificial Intelligence Research, 71, (781-883), Online publication date: 10-Sep-2021.
  78. Ballarini P and Horváth A Formal analysis of production line systems by probabilistic model checking tools 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), (01-08)
  79. Hustiu I, Mahulea C and Kloetzer M Optimal task allocation for distributed co-safe LTL specifications 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), (1-4)
  80. ACM
    Bozzano M, Cimatti A and Roveri M (2021). A Comprehensive Approach to On-board Autonomy Verification and Validation, ACM Transactions on Intelligent Systems and Technology, 12:4, (1-29), Online publication date: 31-Aug-2021.
  81. Liu J Closing the Gap Between Discrete Abstractions and Continuous Control: Completeness via Robustness and Controllability Formal Modeling and Analysis of Timed Systems, (67-83)
  82. Frohme M and Steffen B (2021). Compositional learning of mutually recursive procedural systems, International Journal on Software Tools for Technology Transfer (STTT), 23:4, (521-543), Online publication date: 1-Aug-2021.
  83. Havelund K and Peled D (2021). An extension of first-order LTL with rules with application to runtime verification, International Journal on Software Tools for Technology Transfer (STTT), 23:4, (547-563), Online publication date: 1-Aug-2021.
  84. Akhtar S and Zahoor E (2021). Formal Specification and Verification of MQTT Protocol in PlusCal-2, Wireless Personal Communications: An International Journal, 119:2, (1589-1606), Online publication date: 1-Jul-2021.
  85. Coti C, Petrucci L, Rodríguez C and Sousa M (2021). Quasi-optimal partial order reduction, Formal Methods in System Design, 57:1, (3-33), Online publication date: 1-Jul-2021.
  86. Chivilikhin D Temporal Specification Mining for IEC 61499 Function Blocks Using Evolutionary Algorithms and Model Checking 2021 IEEE Congress on Evolutionary Computation (CEC), (2419-2426)
  87. Amat N, Berthomieu B and Dal Zilio S On the Combination of Polyhedral Abstraction and SMT-Based Model Checking for Petri Nets Application and Theory of Petri Nets and Concurrency, (164-185)
  88. Attard D, Aceto L, Achilleos A, Francalanza A, Ingólfsdóttir A and Lehtinen K Better Late Than Never or: Verifying Asynchronous Components at Runtime Formal Techniques for Distributed Objects, Components, and Systems, (207-225)
  89. Istrate G Models We Can Trust: Toward a Systematic Discipline of (Agent-Based) Model Interpretation and Validation Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (6-11)
  90. Mohajeri Parizi M, Sileno G and van Engers T Seamless Integration and Testing for MAS Engineering Engineering Multi-Agent Systems, (254-272)
  91. ACM
    Witharana H, Lyu Y and Mishra P (2021). Directed Test Generation for Activation of Security Assertions in RTL Models, ACM Transactions on Design Automation of Electronic Systems, 26:4, (1-28), Online publication date: 1-Apr-2021.
  92. Fisher M, Mascardi V, Rozier K, Schlingloff B, Winikoff M and Yorke-Smith N (2020). Towards a framework for certification of reliable autonomous systems, Autonomous Agents and Multi-Agent Systems, 35:1, Online publication date: 1-Apr-2021.
  93. Aceto L, Achilleos A, Francalanza A, Ingólfsdóttir A and Lehtinen K (2021). An operational guide to monitorability with applications to regular properties, Software and Systems Modeling (SoSyM), 20:2, (335-361), Online publication date: 1-Apr-2021.
  94. Bouyer P, Henry L, Jaziri S, Jéron T and Markey N (2021). Diagnosing timed automata using timed markings, International Journal on Software Tools for Technology Transfer (STTT), 23:2, (229-253), Online publication date: 1-Apr-2021.
  95. Pola G, Manes C and Di Benedetto M On external behavior equivalence of continuous-time stochastic linear control systems 2016 IEEE 55th Conference on Decision and Control (CDC), (6583-6588)
  96. Pola G, Manes C, van der Schaft A and Di Benedetto M Model reduction of continuous-time stochastic linear control systems via bisimulation equivalence 2016 IEEE 55th Conference on Decision and Control (CDC), (6577-6582)
  97. Prabhakar P and Liu J Bisimulations for input-output stability of hybrid systems 2016 IEEE 55th Conference on Decision and Control (CDC), (5515-5520)
  98. Tolmach P, Li Y, Lin S and Liu Y Formal Analysis of Composable DeFi Protocols Financial Cryptography and Data Security. FC 2021 International Workshops, (149-161)
  99. Kwon Y and Kim E A Design of GPU-Based Quantitative Model Checking Verification, Model Checking, and Abstract Interpretation, (441-463)
  100. Zhang H, Gupta A and Malik S Syntax-Guided Synthesis for Lemma Generation in Hardware Model Checking Verification, Model Checking, and Abstract Interpretation, (325-349)
  101. Zhou Z, Zhi Q and Morisaki S (2021). A Composite Safety Assurance Method for Developing System Architecture Using Model Checking, International Journal of Systems and Software Security and Protection, 12:1, (78-93), Online publication date: 1-Jan-2021.
  102. Rehman A, Akhtar N, Alhazmi O and Margalef T (2021). Formal Modeling, Proving, and Model Checking of a Flood Warning, Monitoring, and Rescue System-of-Systems, Scientific Programming, 2021, Online publication date: 1-Jan-2021.
  103. Khan W, Khan F, Derhab A, Alhudhaif A and Chen H (2021). CoCEC, Complexity, 2021, Online publication date: 1-Jan-2021.
  104. Meng Y, Huang Z, Shen G and Ke C (2021). A security policy model transformation and verification approach for software defined networking, Computers and Security, 100:C, Online publication date: 1-Jan-2021.
  105. ACM
    Usman M, Wang W and Khurshid S TestMC Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, (709-721)
  106. Ceresa M, Gorostiaga F and Sánchez C Declarative Stream Runtime Verification (hLola) Programming Languages and Systems, (25-43)
  107. Riesco A and Ogata K CiMPG+F: A Proof Generator and Fixer-Upper for CafeOBJ Specifications Theoretical Aspects of Computing – ICTAC 2020, (64-82)
  108. Fernandes H, Gomes G, de Oliveira A and Campos S Statistical Model Checking in Drug Repurposing for Alzheimer’s Disease Formal Methods: Foundations and Applications, (64-80)
  109. Yu H, Chen Z, Huang C and Wang J Symbolic Verification of MPI Programs with Non-deterministic Synchronizations Dependable Software Engineering. Theories, Tools, and Applications, (160-176)
  110. Saeedloei N and Kluźniak F Synthesizing Clock-Efficient Timed Automata Integrated Formal Methods, (276-294)
  111. ACM
    Holtzen S, Van den Broeck G and Millstein T (2020). Scaling exact inference for discrete probabilistic programs, Proceedings of the ACM on Programming Languages, 4:OOPSLA, (1-31), Online publication date: 13-Nov-2020.
  112. ACM
    Feng J, Miao W, Zheng H, Huang Y, Li J, Wang Z, Su T, Gu B, Pu G, Yang M and He J FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1376-1386)
  113. Yacoub A, Hamri M and Frydman C (2021). DEv-PROMELA, Simulation, 96:11, (881-910), Online publication date: 1-Nov-2020.
  114. Cabanillas C, Ackermann L, Schönig S, Sturm C and Mendling J (2020). The RALph miner for automated discovery and verification of resource-aware process models, Software and Systems Modeling (SoSyM), 19:6, (1415-1441), Online publication date: 1-Nov-2020.
  115. ACM
    Munteanu A, Pasqua M and Merro M Impact Analysis of Cyber-Physical Attacks on a Water Tank System via Statistical Model Checking Proceedings of the 8th International Conference on Formal Methods in Software Engineering, (34-43)
  116. ACM
    Cavezza D, Alrajeh D and György A Minimal Assumptions Refinement for Realizable Specifications Proceedings of the 8th International Conference on Formal Methods in Software Engineering, (66-76)
  117. Nejati S Search-Based Software Testing for Formal Software Verification – and Vice Versa Search-Based Software Engineering, (3-6)
  118. Šmijáková E, Pastva S, Šafránek D and Brim L Parallel Parameter Synthesis for Multi-affine Hybrid Systems from Hybrid CTL Specifications Computational Methods in Systems Biology, (280-297)
  119. Gadelha R, Vieira L, Monteiro D, Vidal F and Maia P (2020). Scen@rist: an approach for verifying self-adaptive systems using runtime scenarios, Software Quality Journal, 28:3, (1303-1345), Online publication date: 1-Sep-2020.
  120. Bukhari S, Khalid F, Hasan O, Shafique M and Henkel J (2020). Toward Model Checking-Driven Fair Comparison of Dynamic Thermal Management Techniques Under Multithreaded Workloads, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39:8, (1725-1738), Online publication date: 1-Aug-2020.
  121. Hajdu Á and Micskei Z (2019). Efficient Strategies for CEGAR-Based Model Checking, Journal of Automated Reasoning, 64:6, (1051-1091), Online publication date: 1-Aug-2020.
  122. ACM
    Ahlgren J, Berezin M, Bojarczuk K, Dulskyte E, Dvortsova I, George J, Gucevska N, Harman M, Lämmel R, Meijer E, Sapora S and Spahr-Summers J WES Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, (276-284)
  123. ACM
    Chen Z, Yu H, Fu X and Wang J MPI-SV Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion Proceedings, (93-96)
  124. ACM
    Yu H, Chen Z, Fu X, Wang J, Su Z, Sun J, Huang C and Dong W Symbolic verification of message passing interface programs Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (1248-1260)
  125. ACM
    Ferrari A, Mazzanti F, Basile D, Beek M and Fantechi A Comparing formal tools for system design Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (62-74)
  126. ACM
    Cai Y, Meng R and Palsberg J Low-overhead deadlock prediction Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (1298-1309)
  127. Silva E, Batista T and Oquendo F (2020). On the verification of mission-related properties in software-intensive systems-of-systems architectural design, Science of Computer Programming, 192:C, Online publication date: 15-Jun-2020.
  128. Kantaros Y and Zavlanos M (2020). STyLuS*, International Journal of Robotics Research, 39:7, (812-836), Online publication date: 1-Jun-2020.
  129. Drawel N, Qu H, Bentahar J and Shakshuki E (2020). Specification and automatic verification of trust-based multi-agent systems, Future Generation Computer Systems, 107:C, (1047-1060), Online publication date: 1-Jun-2020.
  130. ACM
    Tsigkanos C, Garriga M, Baresi L and Ghezzi C (2020). Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems, ACM Transactions on Internet Technology, 20:2, (1-23), Online publication date: 31-May-2020.
  131. Cardoso R, Farrell M, Luckcuck M, Ferrando A and Fisher M Heterogeneous Verification of an Autonomous Curiosity Rover NASA Formal Methods, (353-360)
  132. Farheen S, Day N, Vakili A and Abbassi A (2020). Transitive-closure-based model checking (TCMC) in Alloy, Software and Systems Modeling (SoSyM), 19:3, (721-740), Online publication date: 1-May-2020.
  133. Rubio R, Martí-Oliet N, Pita I and Verdejo A Strategies, Model Checking and Branching-Time Properties in Maude Rewriting Logic and Its Applications, (156-175)
  134. ACM
    Han H, Maghenem M and Sanfelice R Sufficient conditions for satisfaction of formulas with until operators in hybrid systems Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, (1-10)
  135. ACM
    Ghasemi K, Sadraddini S and Belta C Compositional synthesis via a convex parameterization of assume-guarantee contracts Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, (1-10)
  136. ACM
    Shea-Blymyer C and Abbas H A deontic logic analysis of autonomous systems' safety Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, (1-11)
  137. Dennis L and Slavkovik M Model-Checking Information Diffusion in Social Networks with PRISM Multi-Agent Systems and Agreement Technologies, (475-492)
  138. Ring M, Bornebusch F, Lüth C, Wille R and Drechsler R Verification runtime analysis Proceedings of the 23rd Conference on Design, Automation and Test in Europe, (873-878)
  139. Guo C, Fu Z, Zhang Z, Ren S and Sha L (2021). A framework for supporting the development of verifiably safe medical best practice guideline systems, Journal of Systems Architecture: the EUROMICRO Journal, 104:C, Online publication date: 1-Mar-2020.
  140. Cimino M, De Francesco N, Mercaldo F, Santone A and Vaglini G (2020). Model checking for malicious family detection and phylogenetic analysis in mobile environment, Computers and Security, 90:C, Online publication date: 1-Mar-2020.
  141. Yousefi F, Abhashkumar A, Subramanian K, Hans K, Ghorbani S and Akella A Liveness verification of stateful network functions Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (257-272)
  142. Yuan Y, Moon S, Uppal S, Jia L and Sekar V NetSMC Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (181-200)
  143. Wang M, Tian C, Zhang N, Duan Z and Yao C (2020). Translating Xd-C programs to MSVL programs, Theoretical Computer Science, 809:C, (430-465), Online publication date: 24-Feb-2020.
  144. Murano A, Parente M, Rubin S and Sorrentino L (2020). Model-checking graded computation-tree logic with finite path semantics, Theoretical Computer Science, 806:C, (577-586), Online publication date: 2-Feb-2020.
  145. Groefsema H, van Beest N and Armas-Cervantes A (2022). Efficient conditional compliance checking of business process models, Computers in Industry, 115:C, Online publication date: 1-Feb-2020.
  146. Baresi L, Bersani M, Marconi F, Quattrocchi G and Rossi M (2020). Using formal verification to evaluate the execution time of Spark applications, Formal Aspects of Computing, 32:1, (33-70), Online publication date: 1-Feb-2020.
  147. ACM
    Kafali Ö, Ajmeri N and Singh M (2019). DESEN, ACM Transactions on Software Engineering and Methodology, 29:1, (1-50), Online publication date: 31-Jan-2020.
  148. Porncharoenwase S, Bornholt J and Torlak E Fixing Code that Explodes Under Symbolic Evaluation Verification, Model Checking, and Abstract Interpretation, (44-67)
  149. Suenaga K and Ishizawa T Generalized Property-Directed Reachability for Hybrid Systems Verification, Model Checking, and Abstract Interpretation, (293-313)
  150. Webster M, Western D, Araiza-Illan D, Dixon C, Eder K, Fisher M and Pipe A (2020). A corroborative approach to verification and validation of human–robot teams, International Journal of Robotics Research, 39:1, (73-99), Online publication date: 1-Jan-2020.
  151. Khan W, Kamran M, Naqvi S, Khan F, Alghamdi A, Alsolami E and Al-Turjman F (2020). Formal Verification of Hardware Components in Critical Systems, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  152. ACM
    Tran H, Nguyen Q and Hung P On Implementation of the Improved Assume-Guarantee Verification Method for Timed Systems Proceedings of the 10th International Symposium on Information and Communication Technology, (457-464)
  153. ACM
    Berglund L and Artho C (2019). Method summaries for JPF, ACM SIGSOFT Software Engineering Notes, 44:4, (16-16), Online publication date: 2-Dec-2019.
  154. ACM
    Almaawi A, Converse H, Gligoric M, Misailovic S and Khurshid S (2019). Quantifying the Exploration of the Korat Solver for Imperative Constraints, ACM SIGSOFT Software Engineering Notes, 44:4, (15-15), Online publication date: 2-Dec-2019.
  155. Souri A, Rahmani A, Navimipour N and Rezaei R (2019). A symbolic model checking approach in formal verification of distributed systems, Human-centric Computing and Information Sciences, 9:1, (1-27), Online publication date: 1-Dec-2019.
  156. Khazeev M, Aslam H, de Carvalho D, Mazzara M, Bruel J and Brown J Reflections on Teaching Formal Methods for Software Development in Higher Education Frontiers in Software Engineering Education, (28-41)
  157. Godio A, Bengolea V, Ponzio P, Aguirre N and Frias M Efficient test generation guided by field coverage criteria Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, (91-101)
  158. Ali S, Sun H and Zhao Y Combining Model Learning and Model Checking to Analyze Java Libraries Structured Object-Oriented Formal Language and Method, (259-278)
  159. Hasegawa I and Yokogawa T Automatic Verification for Node-Based Visual Script Notation Using Model Checking Formal Methods and Software Engineering, (52-68)
  160. Ramesh Y, Anand N and Panduranga Rao M DyNeMoC: Statistical Model Checking for Agent Based Systems on Graphs PRIMA 2019: Principles and Practice of Multi-Agent Systems, (627-634)
  161. Cañizares P, Núñez A and de Lara J (2019). An expert system for checking the correctness of memory systems using simulation and metamorphic testing, Expert Systems with Applications: An International Journal, 132:C, (44-62), Online publication date: 15-Oct-2019.
  162. ACM
    Chatterjee K, Pavlogiannis A and Toman V (2019). Value-centric dynamic partial order reduction, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-29), Online publication date: 10-Oct-2019.
  163. Duan Z, Tian C, Zhang N, Ma Q and Du H (2019). Index set expressions can represent temporal logic formulas, Theoretical Computer Science, 788:C, (21-38), Online publication date: 8-Oct-2019.
  164. Aceto L, Cassar I, Francalanza A and Ingólfsdóttir A Comparing Controlled System Synthesis and Suppression Enforcement Runtime Verification, (148-164)
  165. Harrison M Examples of the Application of Formal Methods to Interactive Systems Formal Methods. FM 2019 International Workshops, (409-423)
  166. Becker M, Metta R, Venkatesh R and Chakraborty S (2019). Scalable and precise estimation and debugging of the worst-case execution time for analysis-friendly processors: a comeback of model checking, International Journal on Software Tools for Technology Transfer (STTT), 21:5, (515-543), Online publication date: 1-Oct-2019.
  167. ACM
    Khan Y, Konios A and Guelfi N (2018). A Survey of Petri Nets Slicing, ACM Computing Surveys, 51:5, (1-32), Online publication date: 30-Sep-2019.
  168. Bentriou M, Ballarini P and Cournède P Reachability Design Through Approximate Bayesian Computation Computational Methods in Systems Biology, (207-223)
  169. Shukla N, Pandey M and Srivastava S (2019). Formal modeling and verification of software‐defined networks, International Journal of Network Management, 29:5, Online publication date: 12-Sep-2019.
  170. ACM
    Huang X, Kwiatkowska M and Olejnik M (2019). Reasoning about Cognitive Trust in Stochastic Multiagent Systems, ACM Transactions on Computational Logic, 20:4, (1-64), Online publication date: 7-Sep-2019.
  171. Matinnejad R, Nejati S, Briand L and Bruckmann T (2019). Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior, IEEE Transactions on Software Engineering, 45:9, (919-944), Online publication date: 1-Sep-2019.
  172. Angius N (2019). Qualitative Models in Computational Simulative Sciences: Representation, Confirmation, Experimentation, Minds and Machines, 29:3, (397-416), Online publication date: 1-Sep-2019.
  173. Pi X, Shi J, Huang Y and Wei H Automated Mining and Checking of Formal Properties in Natural Language Requirements Knowledge Science, Engineering and Management, (75-87)
  174. ACM
    Antonino P, Gibson-Robinson T and Roscoe A (2019). Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving, ACM Transactions on Software Engineering and Methodology, 28:3, (1-43), Online publication date: 17-Aug-2019.
  175. ACM
    Nejati S, Gaaloul K, Menghi C, Briand L, Foster S and Wolfe D Evaluating model testing and model checking for finding requirements violations in Simulink models Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1015-1025)
  176. ACM
    Cai Y, Zhu B, Meng R, Yun H, He L, Su P and Liang B Detecting concurrency memory corruption vulnerabilities Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (706-717)
  177. Egger B, Song E, Lee H and Shin D (2019). Random test program generation for verification and validation of the Samsung Reconfigurable Processor, Journal of Systems Architecture: the EUROMICRO Journal, 97:C, (219-238), Online publication date: 1-Aug-2019.
  178. El-Kassabi H, Adel Serhani M, Dssouli R and Navaz A (2019). Trust enforcement through self-adapting cloud workflow orchestration, Future Generation Computer Systems, 97:C, (462-481), Online publication date: 1-Aug-2019.
  179. Akbari A, Lagriffoul F and Rosell J (2019). Combined heuristic task and motion planning for bi-manual robots, Autonomous Robots, 43:6, (1575-1590), Online publication date: 1-Aug-2019.
  180. Zhao L, Wang X, Shu X and Zhang N A Proof System for a Unified Temporal Logic Computing and Combinatorics, (663-676)
  181. Aceto L, Della Monica D, Fábregas I and Ingólfsdóttir A (2022). When are prime formulae characteristic?, Theoretical Computer Science, 777:C, (3-31), Online publication date: 19-Jul-2019.
  182. Somenzi F and Trivedi A Reinforcement Learning and Formal Requirements Numerical Software Verification, (26-41)
  183. ACM
    Ferrère T, Maler O, Ničković D and Pnueli A (2019). From Real-time Logic to Timed Automata, Journal of the ACM, 66:3, (1-31), Online publication date: 30-Jun-2019.
  184. Wiśniewski R, Karatkevich A, Stefanowicz Ł and Wojnakowski M (2019). Decomposition of distributed edge systems based on the Petri nets and linear algebra technique, Journal of Systems Architecture: the EUROMICRO Journal, 96:C, (20-31), Online publication date: 1-Jun-2019.
  185. Li Y, Lei L and Li S (2019). Computation tree logic model checking based on multi-valued possibility measures, Information Sciences: an International Journal, 485:C, (87-113), Online publication date: 1-Jun-2019.
  186. Aceituna D and Do H (2019). Addressing the state explosion problem when visualizing off-nominal behaviors in a set of reactive requirements, Requirements Engineering, 24:2, (161-180), Online publication date: 1-Jun-2019.
  187. Kember M, Tran L, Gao G and Day N Extracting counterexamples from transitive-closure-based model checking Proceedings of the 11th International Workshop on Modelling in Software Engineerings, (47-54)
  188. Lazreg S, Cordy M, Collet P, Heymans P and Mosser S Multifaceted automated analyses for variability-intensive embedded systems Proceedings of the 41st International Conference on Software Engineering, (854-865)
  189. Wang M, Tian C, Zhang N, Duan Z and Du H (2019). Verifying a scheduling protocol of safety-critical systems, Journal of Combinatorial Optimization, 37:4, (1191-1215), Online publication date: 1-May-2019.
  190. Yan J, Wang Y, Goto Y and Cheng J An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness Codes, Cryptology and Information Security, (399-408)
  191. ACM
    Anevlavis T, Neider D, Phillipe M and Tabuada P Evrostos Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, (218-223)
  192. Harrison M, Freitas L, Drinnan M, Campos J, Masci P, di Maria C and Whitaker M (2019). Formal techniques in the safety analysis of software components of a new dialysis machine, Science of Computer Programming, 175:C, (17-34), Online publication date: 15-Apr-2019.
  193. ACM
    Braga C π Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (1562-1569)
  194. ACM
    Ouchani S Towards a fractionation-based verification Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (2032-2039)
  195. UL Muram F, Tran H and Zdun U (2019). Supporting automated containment checking of software behavioural models using model transformations and model checking, Science of Computer Programming, 174:C, (38-71), Online publication date: 1-Apr-2019.
  196. Peixoto R, da Silva L and Perkusich A (2019). Model-based testing of software for automation systems using heuristics and coverage criterion, Software and Systems Modeling (SoSyM), 18:2, (797-823), Online publication date: 1-Apr-2019.
  197. Sobrinho A, da Silva L, Perkusich A, Cunha P, Cordeiro T and Lima A (2019). Formal modeling of biomedical signal acquisition systems: source of evidence for certification, Software and Systems Modeling (SoSyM), 18:2, (1467-1485), Online publication date: 1-Apr-2019.
  198. Zaraket F, Jaber M, Noureddine M and Falcone Y (2019). From high-level modeling toward efficient and trustworthy circuits, International Journal on Software Tools for Technology Transfer (STTT), 21:2, (143-163), Online publication date: 1-Apr-2019.
  199. Mülle J, Tex C and Böhm K (2019). A practical data-flow verification scheme for business processes, Information Systems, 81:C, (136-151), Online publication date: 1-Mar-2019.
  200. Abbasi R, Ghassemi F and Khosravi R (2019). Verification of asynchronous systems with an unspecified component, Acta Informatica, 56:2, (161-203), Online publication date: 1-Mar-2019.
  201. Ogata K (2019). A divide & conquer approach to liveness model checking under fairness & anti-fairness assumptions, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:1, (51-72), Online publication date: 1-Feb-2019.
  202. Hübner F, Huang W and Peleska J (2019). Experimental evaluation of a novel equivalence class partition testing strategy, Software and Systems Modeling (SoSyM), 18:1, (423-443), Online publication date: 1-Feb-2019.
  203. Gabmeyer S, Kaufmann P, Seidl M, Gogolla M and Kappel G (2019). A feature-based classification of formal verification techniques for software models, Software and Systems Modeling (SoSyM), 18:1, (473-498), Online publication date: 1-Feb-2019.
  204. Khan A, Mallet F and Rashid M (2019). A framework to specify system requirements using natural interpretation of UML/MARTE diagrams, Software and Systems Modeling (SoSyM), 18:1, (11-37), Online publication date: 1-Feb-2019.
  205. ACM
    Huang B, Zhang H, Subramanyan P, Vizel Y, Gupta A and Malik S (2018). Instruction-Level Abstraction (ILA), ACM Transactions on Design Automation of Electronic Systems, 24:1, (1-24), Online publication date: 11-Jan-2019.
  206. ACM
    Aceto L, Achilleos A, Francalanza A, Ingólfsdóttir A and Lehtinen K (2019). Adventures in monitorability: from branching to linear time and back again, Proceedings of the ACM on Programming Languages, 3:POPL, (1-29), Online publication date: 2-Jan-2019.
  207. ACM
    Bae K and Lee J (2019). Bounded model checking of signal temporal logic properties using syntactic separation, Proceedings of the ACM on Programming Languages, 3:POPL, (1-30), Online publication date: 2-Jan-2019.
  208. Bernardeschi C, Mercaldo F, Nardone V and Santone A (2020). Exploiting Model Checking for Mobile Botnet Detection, Procedia Computer Science, 159:C, (963-972), Online publication date: 1-Jan-2019.
  209. Anevlavis T, Philippe M, Neider D and Tabuada P Verifying rLTL formulas: now faster than ever before! 2018 IEEE Conference on Decision and Control (CDC), (1556-1561)
  210. ACM
    Bahrami A, De Maria E and Felty A Modelling and Verifying Dynamic Properties of Biological Neural Networks in Coq Proceedings of the 9th International Conference on Computational Systems-Biology and Bioinformatics, (1-11)
  211. ACM
    Egger B, Song E, Lee H and Shin D (2018). Verification of coarse-grained reconfigurable arrays through random test programs, ACM SIGPLAN Notices, 53:6, (76-88), Online publication date: 7-Dec-2018.
  212. ACM
    Van T, Fredivianus N, Tran H, Geihs K and Huynh T Formal Verification of ALICA Multi-agent Plans Using Model Checking Proceedings of the 9th International Symposium on Information and Communication Technology, (351-358)
  213. Ghosh K Computation of Kullback-Leibler Divergence Between Labeled Stochastic Systems with Non-identical State Spaces Algorithmic Aspects in Information and Management, (233-243)
  214. Khan W, Ullah H, Ahmad A, Sultan K, Alzahrani A, Khan S, Alhumaid M and Abdulaziz S (2018). CrashSafe, Human-centric Computing and Information Sciences, 8:1, (1-24), Online publication date: 1-Dec-2018.
  215. Kantaros Y, Johnson B, Chowdhury S, Cappelleri D and Zavlanos M (2018). Control of Magnetic Microrobot Teams for Temporal Micromanipulation Tasks, IEEE Transactions on Robotics, 34:6, (1472-1489), Online publication date: 1-Dec-2018.
  216. Ali S (2018). Formal verification of SysML diagram using case studies of real-time system, Innovations in Systems and Software Engineering, 14:4, (245-262), Online publication date: 1-Dec-2018.
  217. Peleska J, Brauer J and Huang W Model-Based Testing for Avionic Systems Proven Benefits and Further Challenges Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, (82-103)
  218. Bu L, Peled D, Shen D and Tzirulnikov Y Chasing Errors Using Biasing Automata Leveraging Applications of Formal Methods, Verification and Validation. Verification, (271-286)
  219. Given-Wilson T and Legay A X-by-C: Non-functional Security Challenges Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (486-501)
  220. Lybecait M, Kopetzki D and Steffen B Design for ‘X’ Through Model Transformation Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (381-398)
  221. Voelter M Fusing Modeling and Programming into Language-Oriented Programming Leveraging Applications of Formal Methods, Verification and Validation. Modeling, (309-339)
  222. Wang J, Sun J, Yuan Q and Pang J (2018). Learning probabilistic models for model checking, International Journal on Software Tools for Technology Transfer (STTT), 20:6, (689-704), Online publication date: 1-Nov-2018.
  223. ACM
    Rhein A, Liebig J, Janker A, Kästner C and Apel S (2018). Variability-Aware Static Analysis at Scale, ACM Transactions on Software Engineering and Methodology, 27:4, (1-33), Online publication date: 31-Oct-2018.
  224. ACM
    Li Y, Duan K, Jansen D, Pang J, Zhang L, Lv Y and Cai S (2018). An Automatic Proving Approach to Parameterized Verification, ACM Transactions on Computational Logic, 19:4, (1-25), Online publication date: 31-Oct-2018.
  225. ACM
    Tzoref-Brill R and Maoz S Modify, enhance, select: co-evolution of combinatorial models and test plans Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (235-245)
  226. ACM
    Eljadiri L, Assayad I and Zakari A Generic Verification of Safety Properties For SystemC Programs Using Incomplete Interactions Proceedings of the 2nd International Conference on Smart Digital Environment, (166-171)
  227. Roop P, Pearce H and Monadjem K Synchronous neural networks for cyber-physical systems Proceedings of the 16th ACM-IEEE International Conference on Formal Methods and Models for System Design, (33-42)
  228. ACM
    Shin S, Chaouch K, Nejati S, Sabetzadeh M, Briand L and Zimmer F HITECS Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, (357-367)
  229. ACM
    Lazreg S, Collet P and Mosser S (2018). Functional feasibility analysis of variability-intensive data flow-oriented applications over highly-configurable platforms, ACM SIGAPP Applied Computing Review, 18:3, (32-48), Online publication date: 11-Oct-2018.
  230. Bhagwan R, Kumar R, Maddila C and Philip A Orca Proceedings of the 13th USENIX conference on Operating Systems Design and Implementation, (493-509)
  231. Pek C and Althoff M Efficient Computation of Invariably Safe States for Motion Planning of Self-Driving Vehicles 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3523-3530)
  232. Valmari A and Vogler W (2018). Fair testing and stubborn sets, International Journal on Software Tools for Technology Transfer (STTT), 20:5, (589-610), Online publication date: 1-Oct-2018.
  233. Khamespanah E, Sirjani M, Mechitov K and Agha G (2018). Modeling and analyzing real-time wireless sensor and actuator networks using actors and model checking, International Journal on Software Tools for Technology Transfer (STTT), 20:5, (547-561), Online publication date: 1-Oct-2018.
  234. Danilov K, Rezin R, Afanasyev I and Kolotov A Towards Blockchain-Based Robonomics: Autonomous Agents Behavior Validation 2018 International Conference on Intelligent Systems (IS), (222-227)
  235. ACM
    Wang X, Hovakimyan N and Sha L (2018). RSimplex, ACM Transactions on Cyber-Physical Systems, 2:4, (1-26), Online publication date: 18-Sep-2018.
  236. Chivilikhin D, Buzhinskv I, Ulvantsev V, Stankevich A, Shalyto A and Vyatkin V Counterexample-guided inference of controller logic from execution traces and temporal formulas 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), (91-98)
  237. ACM
    Khosrowjerdi H and Meinke K Learning-based testing for autonomous systems using spatial and temporal requirements Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, (6-15)
  238. ACM
    Abdessalem R, Panichella A, Nejati S, Briand L and Stifter T Testing autonomous cars for feature interaction failures using many-objective search Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (143-154)
  239. Liu Y Logic programming applications Declarative Logic Programming, (519-548)
  240. Martinelli F, Mercaldo F, Nardone V, Santone A, Sangaiah A and Cimitile A (2022). Evaluating model checking for cyber threats code obfuscation identification, Journal of Parallel and Distributed Computing, 119:C, (203-218), Online publication date: 1-Sep-2018.
  241. Abd Elkader K, Grumberg O, Păsăreanu C and Shoham S (2018). Automated circular assume-guarantee reasoning, Formal Aspects of Computing, 30:5, (571-595), Online publication date: 1-Sep-2018.
  242. Mayr F and Yovine S Regular Inference on Artificial Neural Networks Machine Learning and Knowledge Extraction, (350-369)
  243. ACM
    Stoenescu R, Dumitrescu D, Popovici M, Negreanu L and Raiciu C Debugging P4 programs with vera Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, (518-532)
  244. Bianchi F, Margara A and Pezze M (2018). A Survey of Recent Trends in Testing Concurrent Software Systems, IEEE Transactions on Software Engineering, 44:8, (747-783), Online publication date: 1-Aug-2018.
  245. Wong K, Ehlers R and Kress-Gazit H (2018). Resilient, Provably-Correct, and High-Level Robot Behaviors, IEEE Transactions on Robotics, 34:4, (936-952), Online publication date: 1-Aug-2018.
  246. Picinin D, Farines J, Santos C and Koliver C (2018). A design-oriented method to build correct hypermedia documents, Multimedia Tools and Applications, 77:16, (21003-21032), Online publication date: 1-Aug-2018.
  247. Huang W and Peleska J (2018). Model-based testing strategies and their (in)dependence on syntactic model representations, International Journal on Software Tools for Technology Transfer (STTT), 20:4, (441-465), Online publication date: 1-Aug-2018.
  248. Matos Pedro A, Pinto J, Pereira D and Pinho L (2018). Runtime verification of autopilot systems using a fragment of MTL-$${\int }$$?, International Journal on Software Tools for Technology Transfer (STTT), 20:4, (379-395), Online publication date: 1-Aug-2018.
  249. Jing Y and Miner A (2018). Computation tree measurement language (CTML), Formal Aspects of Computing, 30:3-4, (443-462), Online publication date: 1-Aug-2018.
  250. Kouvaros P, Lomuscio A and Pirovano E Symbolic synthesis of fault-tolerance ratios in parameterised multi-agent systems Proceedings of the 27th International Joint Conference on Artificial Intelligence, (324-330)
  251. ACM
    Khurshid S, Păsăreanu C and Visser W Test input generation with Java PathFinder: then and now (invited talk abstract) Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (1-2)
  252. ACM
    Le T and Lo D Deep specification mining Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (106-117)
  253. Papapanagiotou P, Davoust A, Murray-Rust D, Manataki A, Van Kleek M, Shadbolt N and Robertson D Social Machines for All Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (1208-1212)
  254. Chen J, Moarref S and Kress-Gazit H Verifiable Control of Robotic Swarm from High-level Specifications Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (568-576)
  255. Jamroga W, Penczek W, Dembiński P and Mazurkiewicz A Towards Partial Order Reductions for Strategic Ability Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (156-165)
  256. ACM
    Egger B, Song E, Lee H and Shin D Verification of coarse-grained reconfigurable arrays through random test programs Proceedings of the 19th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems, (76-88)
  257. Mili S, Nguyen N and Chelouah R Attack Modeling and Verification for Connected System Security 2018 13th Annual Conference on System of Systems Engineering (SoSE), (157-162)
  258. Mazzanti F, Ferrari A and Spagnolo G (2018). Towards formal methods diversity in railways, International Journal on Software Tools for Technology Transfer (STTT), 20:3, (263-288), Online publication date: 1-Jun-2018.
  259. ACM
    Tsigkanos C, Li N, Jin Z, Hu Z and Ghezzi C On early statistical requirements validation of cyber-physical space systems Proceedings of the 4th International Workshop on Software Engineering for Smart Cyber-Physical Systems, (13-18)
  260. ACM
    Yu H Combining symbolic execution and model checking to verify MPI programs Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, (527-530)
  261. ACM
    Yu H, Chen Z, Wang J, Su Z and Dong W Symbolic verification of regular properties Proceedings of the 40th International Conference on Software Engineering, (871-881)
  262. Ghosh S, Berkenkamp F, Ranade G, Qadeer S and Kapoor A Verifying Controllers Against Adversarial Examples with Bayesian Optimization 2018 IEEE International Conference on Robotics and Automation (ICRA), (7306-7313)
  263. Seipp J and Helmert M (2019). Counterexample-guided Cartesian abstraction refinement for classical planning, Journal of Artificial Intelligence Research, 62:1, (535-577), Online publication date: 1-May-2018.
  264. Bakar N and Selamat A (2018). Agent systems verification, Applied Intelligence, 48:5, (1251-1274), Online publication date: 1-May-2018.
  265. ACM
    Li Y and Liu J ROCS Proceedings of the 21st International Conference on Hybrid Systems: Computation and Control (part of CPS Week), (130-135)
  266. Dutreix M and Coogan S Efficient verification for stochastic mixed monotone systems Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, (150-161)
  267. ACM
    Lazreg S, Collet P and Mosser S Assessing the functional feasibility of variability-intensive data flow-oriented systems Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (2066-2075)
  268. He F, Gao Y and Yin L (2018). Efficient software product-line model checking using induction and a SAT solver, Frontiers of Computer Science: Selected Publications from Chinese Universities, 12:2, (264-279), Online publication date: 1-Apr-2018.
  269. ACM
    Dokhanchi A, Hoxha B and Fainekos G (2017). Formal Requirement Debugging for Testing and Verification of Cyber-Physical Systems, ACM Transactions on Embedded Computing Systems, 17:2, (1-26), Online publication date: 31-Mar-2018.
  270. ACM
    Muram F, Tran H and Zdun U (2017). Systematic Review of Software Behavioral Model Consistency Checking, ACM Computing Surveys, 50:2, (1-39), Online publication date: 31-Mar-2018.
  271. Neto S, Zrate L and Song M (2018). Handling high dimensionality contexts in formal concept analysis via binary decision diagrams, Information Sciences: an International Journal, 429:C, (361-376), Online publication date: 1-Mar-2018.
  272. Li J, Zhang L, Zhu S, Pu G, Vardi M and He J (2018). An explicit transition system construction approach to LTL satisfiability checking, Formal Aspects of Computing, 30:2, (193-217), Online publication date: 1-Mar-2018.
  273. Lanna A, Castro T, Alves V, Rodrigues G, Schobbens P and Apel S (2018). Feature-family-based reliability analysis of software product lines, Information and Software Technology, 94:C, (59-81), Online publication date: 1-Feb-2018.
  274. Ulyantsev V, Buzhinsky I and Shalyto A (2018). Exact finite-state machine identification from scenarios and temporal properties, International Journal on Software Tools for Technology Transfer (STTT), 20:1, (35-55), Online publication date: 1-Feb-2018.
  275. ACM
    Su T, Wu K, Miao W, Pu G, He J, Chen Y and Su Z (2017). A Survey on Data-Flow Testing, ACM Computing Surveys, 50:1, (1-35), Online publication date: 31-Jan-2018.
  276. Lin B and Xie F SCbench Proceedings of the 23rd Asia and South Pacific Design Automation Conference, (440-445)
  277. ACM
    Wang K, Khurshid S and Gligoric M (2018). JPR, ACM SIGSOFT Software Engineering Notes, 42:4, (1-5), Online publication date: 11-Jan-2018.
  278. ACM
    Chalupa M, Chatterjee K, Pavlogiannis A, Sinha N and Vaidya K (2017). Data-centric dynamic partial order reduction, Proceedings of the ACM on Programming Languages, 2:POPL, (1-30), Online publication date: 1-Jan-2018.
  279. ACM
    Holík L, Janků P, Lin A, Rümmer P and Vojnar T (2017). String constraints with concatenation and transducers solved efficiently, Proceedings of the ACM on Programming Languages, 2:POPL, (1-32), Online publication date: 1-Jan-2018.
  280. Sardar M, Afaq N, Hasan O and Hoque K (2018). Towards Probabilistic Formal Analysis of SATS-Simultaneously Moving Aircraft (SATS-SMA), Journal of Automated Reasoning, 60:1, (85-105), Online publication date: 1-Jan-2018.
  281. ACM
    Afanasov M, Mottola L and Ghezzi C (2018). Software Adaptation in Wireless Sensor Networks, ACM Transactions on Autonomous and Adaptive Systems, 12:4, (1-29), Online publication date: 31-Dec-2018.
  282. ACM
    De Maria E, Di Giusto C and Ciatto G Formal Validation of Neural Networks as Timed Automata Proceedings of the 8th International Conference on Computational Systems-Biology and Bioinformatics, (15-22)
  283. Doud K and Yilmaz L A framework for formal automated analysis of simulation experiments using probabilistic model checking Proceedings of the 2017 Winter Simulation Conference, (1-12)
  284. ACM
    Sirjani M, Khamespanah E, Mechitov K and Agha G (2017). A compositional approach for modeling and timing analysis of wireless sensor and actuator networks, ACM SIGBED Review, 14:3, (49-56), Online publication date: 22-Nov-2017.
  285. Chumakova N, Olenev V and Lavrovskaya I Conformance Testing of the STP-ISS Protocol Implementation by Means of Temporal Logic Proceedings of the 21st Conference of Open Innovations Association FRUCT, (71-78)
  286. Makowsky J and Zamansky A (2017). Keeping logic in the trivium of computer science, Formal Methods in System Design, 51:2, (419-430), Online publication date: 1-Nov-2017.
  287. Demasi R, Castro P, Maibaum T and Aguirre N (2017). Simulation relations for fault-tolerance, Formal Aspects of Computing, 29:6, (1013-1050), Online publication date: 1-Nov-2017.
  288. Lin S, Sun J, Xiao H, Liu Y, Sanán D and Hansen H FiB: squeezing loop invariants by interpolation between Forward/Backward predicate transformers Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (793-803)
  289. Tata S, Klai K and Jain R Formal Model and Method to Decompose Process-Aware IoT Applications On the Move to Meaningful Internet Systems. OTM 2017 Conferences, (663-680)
  290. Ghazel M (2017). A Control Scheme for Automatic Level Crossings Under the ERTMS/ETCS Level 2/3 Operation, IEEE Transactions on Intelligent Transportation Systems, 18:10, (2667-2680), Online publication date: 1-Oct-2017.
  291. ACM
    Luo Z, Zheng M and Siegel S Verification of MPI programs using CIVL Proceedings of the 24th European MPI Users' Group Meeting, (1-11)
  292. Ovsiannikova P, Chivilikhin D, Ulyantsev V and Shalyto A Closed-loop verification of a compensating group drive model using synthesized formal plant model 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (1-4)
  293. Buzhinsky I and Vyatkin V Testing automation systems by means of model checking 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (1-7)
  294. Buzhinsky I and Vyatkin V Modular plant model synthesis from behavior traces and temporal properties 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (1-7)
  295. Kozachok A (2017). Formal logical language to set requirements for secure code execution, Programming and Computing Software, 43:5, (314-319), Online publication date: 1-Sep-2017.
  296. Kamide N and Yano R (2017). Logics and translations for hierarchical model checking, Procedia Computer Science, 112:C, (31-40), Online publication date: 1-Sep-2017.
  297. Abushark Y, Thangarajah J, Harland J and Miller T (2017). A framework for automatically ensuring the conformance of agent designs, Journal of Systems and Software, 131:C, (266-310), Online publication date: 1-Sep-2017.
  298. ACM
    Yu H Practical symbolic verification of regular properties Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (1053-1055)
  299. ACM
    Tsigkanos C, Kehrer T and Ghezzi C Modeling and verification of evolving cyber-physical spaces Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (38-48)
  300. Huang X and Ruan J ATL strategic reasoning meets correlated equilibrium Proceedings of the 26th International Joint Conference on Artificial Intelligence, (1102-1108)
  301. Belardinelli F and Herzig A Dynamic logic for data-aware systems Proceedings of the 26th International Joint Conference on Artificial Intelligence, (821-827)
  302. Belardinelli F, Kouvaros P and Lomuscio A Parameterised verification of data-aware multi-agent systems Proceedings of the 26th International Joint Conference on Artificial Intelligence, (98-104)
  303. Avni G, Guha S and Kupferman O An abstraction-refinement methodology for reasoning about network games Proceedings of the 26th International Joint Conference on Artificial Intelligence, (70-76)
  304. Francalanza A, Aceto L and Ingolfsdottir A (2017). Monitorability for the Hennessy---Milner logic with recursion, Formal Methods in System Design, 51:1, (87-116), Online publication date: 1-Aug-2017.
  305. ACM
    Husien I, Berthier N and Schewe S A hot method for synthesising cool controllers Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, (122-131)
  306. ACM
    Dini N, Yelen C and Khurshid S Optimizing parallel Korat using invalid ranges Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, (182-191)
  307. Kiefer S, Mayr R, Shirmohammadi M and Wojtczak D Parity objectives in countable MDPs Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (1-11)
  308. Quaas K, Shirmohammadi M and Worrell J Revisiting reachability in timed automata Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (1-12)
  309. ACM
    Wu M, Zeng H, Wang C and Yu H Safety Guard Proceedings of the 54th Annual Design Automation Conference 2017, (1-6)
  310. Mancini T, Mari F, Massini A, Melatti I, Salvo I and Tronci E (2017). On minimising the maximum expected verification time, Information Processing Letters, 122:C, (8-16), Online publication date: 1-Jun-2017.
  311. Al Zamil M, Samarah S, Rawashdeh M and Hossain M (2017). An ODT-based abstraction for mining closed sequential temporal patterns in IoT-cloud smart homes, Cluster Computing, 20:2, (1815-1829), Online publication date: 1-Jun-2017.
  312. Asteasuain F and Braberman V (2017). Declaratively building behavior by means of scenario clauses, Requirements Engineering, 22:2, (239-274), Online publication date: 1-Jun-2017.
  313. Cailliau A and van Lamsweerde A Runtime monitoring and resolution of probabilistic obstacles to system goals Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (1-11)
  314. Barbosa D, de Moura Lima R, Maia P and Junior E Lotus@Runtime Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (24-30)
  315. Tzoref-Brill R and Maoz S Syntactic and semantic differencing for combinatorial models of test designs Proceedings of the 39th International Conference on Software Engineering, (621-631)
  316. Anthonysamy P, Rashid A and Chitchyan R Privacy requirements Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track, (13-22)
  317. Tan T, Xue Y, Chen M, Liu S, Yu Y and Sun J JSFox Proceedings of the 39th International Conference on Software Engineering Companion, (256-258)
  318. Bataineh A, Bentahar J, El Menshawy M and Dssouli R (2017). Specifying and verifying contract-driven service compositions using commitments and model checking, Expert Systems with Applications: An International Journal, 74:C, (151-184), Online publication date: 15-May-2017.
  319. ACM
    Konnov I, Lazić M, Veith H and Widder J (2017). A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms, ACM SIGPLAN Notices, 52:1, (719-734), Online publication date: 11-May-2017.
  320. ACM
    Kobayashi N, Lozes É and Bruse F (2017). On the relationship between higher-order recursion schemes and higher-order fixpoint logic, ACM SIGPLAN Notices, 52:1, (246-259), Online publication date: 11-May-2017.
  321. ACM
    D'Antoni L and Veanes M (2017). Monadic second-order logic on finite sequences, ACM SIGPLAN Notices, 52:1, (232-245), Online publication date: 11-May-2017.
  322. Belardinelli F, Lomuscio A, Murano A and Rubin S Verification of Multi-agent Systems with Imperfect Information and Public Actions Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (1268-1276)
  323. ACM
    Wang C and Schaumont P (2017). Security by compilation, ACM SIGLOG News, 4:2, (76-89), Online publication date: 3-May-2017.
  324. Zurowska K and Dingel J (2017). Language-specific model checking of UML-RT models, Software and Systems Modeling (SoSyM), 16:2, (393-415), Online publication date: 1-May-2017.
  325. Duarte L, Kramer J and Uchitel S (2017). Using contexts to extract models from code, Software and Systems Modeling (SoSyM), 16:2, (523-557), Online publication date: 1-May-2017.
  326. Seki H (2017). On dual programs in co-logic programming and the Horn -calculus, Formal Aspects of Computing, 29:3, (401-421), Online publication date: 1-May-2017.
  327. Greitschus M, Dietsch D, Heizmann M, Nutz A, Schätzle C, Schilling C, Schüssele F and Podelski A Ultimate Taipan Proceedings, Part II, of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10206, (399-403)
  328. Sankur O and Talpin J An Abstraction Technique for Parameterized Model Checking of Leader Election Protocols Proceedings, Part I, of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10205, (23-40)
  329. Beek M, Vink E and Willemse T Family-Based Model Checking with mCRL2 Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (387-405)
  330. Wang J, Sun J, Yuan Q and Pang J Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (3-21)
  331. ACM
    Siirtola A, Tripakis S and Heljanko K (2017). When Do We Not Need Complex Assume-Guarantee Rules?, ACM Transactions on Embedded Computing Systems, 16:2, (1-25), Online publication date: 14-Apr-2017.
  332. ACM
    Basile D, Di Giandomenico F and Gnesi S Statistical model checking of an energy-saving cyber-physical system in the railway domain Proceedings of the Symposium on Applied Computing, (1356-1363)
  333. Hu J, Khan K, Zhang Y, Bai Y and Li R (2017). Role updating in information systems using model checking, Knowledge and Information Systems, 51:1, (187-234), Online publication date: 1-Apr-2017.
  334. Arcaini P, Gargantini A and Riccobene E (2017). Rigorous development process of a safety-critical system, International Journal on Software Tools for Technology Transfer (STTT), 19:2, (247-269), Online publication date: 1-Apr-2017.
  335. ACM
    Sankaranarayanan S, Kumar S, Cameron F, Bequette B, Fainekos G and Maahs D (2017). Model-based falsification of an artificial pancreas control system, ACM SIGBED Review, 14:2, (24-33), Online publication date: 31-Mar-2017.
  336. Jäschke C, Herter U, Wolkober C, Schmitt C and Zoellin C Static netlist verification for IBM high-frequency processors using a tree-grammar Proceedings of the Conference on Design, Automation & Test in Europe, (1556-1561)
  337. Bukhari S, Lodhi F, Hasan O, Shafique M and Henkel J CAnDy-TM Proceedings of the Conference on Design, Automation & Test in Europe, (1289-1292)
  338. ACM
    Alur R and Tripakis S (2017). Automatic Synthesis of Distributed Protocols, ACM SIGACT News, 48:1, (55-90), Online publication date: 10-Mar-2017.
  339. Xie D, Xiong W, Bu L and Li X (2017). Deriving Unbounded Reachability Proof of Linear Hybrid Automata during Bounded Checking Procedure, IEEE Transactions on Computers, 66:3, (416-430), Online publication date: 1-Mar-2017.
  340. Bolton M, Zheng X, Molinaro K, Houser A and Li M (2017). Improving the scalability of formal human---automation interaction verification analyses that use task-analytic models, Innovations in Systems and Software Engineering, 13:1, (1-17), Online publication date: 1-Mar-2017.
  341. Huang W and Peleska J (2017). Complete model-based equivalence class testing for nondeterministic systems, Formal Aspects of Computing, 29:2, (335-364), Online publication date: 1-Mar-2017.
  342. Kouvaros P and Lomuscio A Parameterised verification of infinite state multi-agent systems via predicate abstraction Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (3013-3020)
  343. (2017). An improved genetic algorithm for task scheduling in the cloud environments using the priority queues, Journal of Systems and Software, 124:C, (1-21), Online publication date: 1-Feb-2017.
  344. Lochau M, Bürdek J, Hölzle S and Schürr A (2017). Specification and automated validation of staged reconfiguration processes for dynamic software product lines, Software and Systems Modeling (SoSyM), 16:1, (125-152), Online publication date: 1-Feb-2017.
  345. Ye K and Woodcock J (2017). Model checking of state-rich formalism [InlineEquation not available, International Journal on Software Tools for Technology Transfer (STTT), 19:1, (73-96), Online publication date: 1-Feb-2017.
  346. Lomuscio A, Qu H and Raimondi F (2017). MCMAS, International Journal on Software Tools for Technology Transfer (STTT), 19:1, (9-30), Online publication date: 1-Feb-2017.
  347. Ahmed W, Hasan O, Pervez U and Qadir J (2017). Reliability modeling and analysis of communication networks, Journal of Network and Computer Applications, 78:C, (191-215), Online publication date: 15-Jan-2017.
  348. ACM
    Konnov I, Lazić M, Veith H and Widder J A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (719-734)
  349. ACM
    Kobayashi N, Lozes É and Bruse F On the relationship between higher-order recursion schemes and higher-order fixpoint logic Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (246-259)
  350. ACM
    D'Antoni L and Veanes M Monadic second-order logic on finite sequences Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (232-245)
  351. ACM
    Huang S and Huang J (2016). Maximal causality reduction for TSO and PSO, ACM SIGPLAN Notices, 51:10, (447-461), Online publication date: 5-Dec-2016.
  352. Shan L and Qin Z (2016). A fast transition of linear temporal logic formulae to transition-based Büchi automata, International Journal of Computer Applications in Technology, 53:1, (62-70), Online publication date: 1-Dec-2016.
  353. Vanden Broucke S, Caron F, Lismont J, Vanthienen J and Baesens B (2016). On the gap between reality and registration, Information Technology and Management, 17:4, (393-410), Online publication date: 1-Dec-2016.
  354. John A and Chakraborty S (2016). A layered algorithm for quantifier elimination from linear modular constraints, Formal Methods in System Design, 49:3, (272-323), Online publication date: 1-Dec-2016.
  355. Khalili A, Narizzano M and Tacchella A Learning for Verification in Embedded Systems: A Case Study AI*IA 2016 Advances in Artificial Intelligence, (525-538)
  356. Vázquez de Parga M, García P and López D (2016). A sufficient condition to polynomially compute a minimum separating DFA, Information Sciences: an International Journal, 370:C, (204-220), Online publication date: 20-Nov-2016.
  357. ACM
    Rehman W, Ayub M and Siddiqui J (2016). Verification of MPI Java programs using software model checking, ACM SIGPLAN Notices, 51:8, (1-2), Online publication date: 9-Nov-2016.
  358. ACM
    Bloemen V, Laarman A and van de Pol J (2016). Multi-core on-the-fly SCC decomposition, ACM SIGPLAN Notices, 51:8, (1-12), Online publication date: 9-Nov-2016.
  359. ACM
    Barreto F, Batista D, dos Santos J and Muchaluat-Saade D NCL-Tester Proceedings of the 22nd Brazilian Symposium on Multimedia and the Web, (91-94)
  360. Bernardini A, Ecker W and Schlichtmann U Where formal verification can help in functional safety analysis 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-8)
  361. ACM
    Hao J, Kang E, Sun J and Jackson D Designing minimal effective normative systems with the help of lightweight formal methods Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, (50-60)
  362. Lamprecht A, Steffen B and Margaria T (2016). Scientific workflows with the jABC framework, International Journal on Software Tools for Technology Transfer (STTT), 18:6, (629-651), Online publication date: 1-Nov-2016.
  363. Kirwan R, Miller A and Porr B (2016). Model checking learning agent systems using Promela with embedded C code and abstraction, Formal Aspects of Computing, 28:6, (1027-1056), Online publication date: 1-Nov-2016.
  364. Mehrpouyan H, Giannakopoulou D, Brat G, Tumer I and Hoyle C (2016). Complex Engineered Systems Design Verification Based on Assume-Guarantee Reasoning, Systems Engineering, 19:6, (461-476), Online publication date: 1-Nov-2016.
  365. ACM
    Huang S and Huang J Maximal causality reduction for TSO and PSO Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (447-461)
  366. Kuroiwa T, Aoyama Y and Kushiro N (2016). Testing Environment for CPS by Cooperating Model Checking with Execution Testing, Procedia Computer Science, 96:C, (1341-1350), Online publication date: 1-Oct-2016.
  367. (2016). Writing and verifying interoperability requirements, Computers in Industry, 82:C, (1-18), Online publication date: 1-Oct-2016.
  368. Wan W, Bentahar J, Yahyaoui H and Ben Hamza A (2016). Verifying concurrent probabilistic systems using probabilistic-epistemic logic specifications, Applied Intelligence, 45:3, (747-776), Online publication date: 1-Oct-2016.
  369. Tsigkanos C, Kehrer T and Ghezzi C (2016). Architecting dynamic cyber-physical spaces, Computing, 98:10, (1011-1040), Online publication date: 1-Oct-2016.
  370. ACM
    Santos I, Rocha L, Neto P and Andrade R Model Verification of Dynamic Software Product Lines Proceedings of the XXX Brazilian Symposium on Software Engineering, (113-122)
  371. ACM
    Situ L, Wang Y, Gao F, Wang L, Bu L, Zhao J and Li X ACSPChecker Proceedings of the 8th Asia-Pacific Symposium on Internetware, (99-102)
  372. ACM
    Sampaio G, Borba P and Teixeira L Partially safe evolution of software product lines Proceedings of the 20th International Systems and Software Product Line Conference, (124-133)
  373. ACM
    Almagor S, Boker U and Kupferman O (2016). Formally Reasoning About Quality, Journal of the ACM, 63:3, (1-56), Online publication date: 1-Sep-2016.
  374. Qu H and Veres S (2016). Verification of logical consistency in robotic reasoning, Robotics and Autonomous Systems, 83:C, (44-56), Online publication date: 1-Sep-2016.
  375. Murthy K, Paul S, Meel K, Cogumbreiro T and Mellor-Crummey J Design and Verification of Distributed Phasers Proceedings of the 22nd International Conference on Euro-Par 2016: Parallel Processing - Volume 9833, (405-418)
  376. Bellettini C, Camilli M, Capra L and Monga M (2016). Distributed CTL model checking using MapReduce, Concurrency and Computation: Practice & Experience, 28:11, (3025-3041), Online publication date: 10-Aug-2016.
  377. ACM
    Metta R, Becker M, Bokil P, Chakraborty S and Venkatesh R (2016). TIC: a scalable model checking based approach to WCET estimation, ACM SIGPLAN Notices, 51:5, (72-81), Online publication date: 1-Aug-2016.
  378. ACM
    Magid Y, Tzoref-Brill R and Zalmanovici M Coverage-based metrics for cloud adaptation Proceedings of the 2nd International Workshop on Quality-Aware DevOps, (1-6)
  379. D'Silva V and Urban C Büchi, Lindenbaum, Tarski Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (4150-4154)
  380. Huang X, Ruan J, Chen Q and Su K Normative multiagent systems Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (1123-1129)
  381. Bertello M, Gigante N, Montanari A and Reynolds M Leviathan Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (950-956)
  382. Huang X, Chen Q, Meng J and Su K Reconfigurability in reactive multiagent systems Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (315-321)
  383. Shilov N, Shilova S and Bernshtein A (2016). Program schemata technique for propositional program logics, Programming and Computing Software, 42:4, (239-256), Online publication date: 1-Jul-2016.
  384. ACM
    Metta R, Becker M, Bokil P, Chakraborty S and Venkatesh R TIC: a scalable model checking based approach to WCET estimation Proceedings of the 17th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, Tools, and Theory for Embedded Systems, (72-81)
  385. Sardar M, Afaq N, Hoque K, Johnson T and Hasan O Probabilistic Formal Verification of the SATS Concept of Operation Proceedings of the 8th International Symposium on NASA Formal Methods - Volume 9690, (191-205)
  386. Kahl T (2016). Topological abstraction of higher-dimensional automata, Theoretical Computer Science, 631:C, (97-117), Online publication date: 6-Jun-2016.
  387. Hajdu Á, Tóth T, Vörös A and Majzik I A Configurable CEGAR Framework with Interpolation-Based Refinements 36th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems - Volume 9688, (158-174)
  388. ACM
    Bloem R, Jacobs S, Khalimov A, Konnov I, Rubin S, Veith H and Widder J (2016). Decidability in Parameterized Verification, ACM SIGACT News, 47:2, (53-64), Online publication date: 3-Jun-2016.
  389. Darvas D, Vörös A and Bartha T (2016). Improving Saturation-based Bounded Model Checking, Acta Cybernetica, 22:3, (573-589), Online publication date: 1-Jun-2016.
  390. Huang W and Peleska J (2016). Complete model-based equivalence class testing, International Journal on Software Tools for Technology Transfer (STTT), 18:3, (265-283), Online publication date: 1-Jun-2016.
  391. ACM
    Bauch P, Havel V and Barnat J (2016). Control Explicit--Data Symbolic Model Checking, ACM Transactions on Software Engineering and Methodology, 25:2, (1-48), Online publication date: 16-May-2016.
  392. ACM
    Tsigkanos C, Kehrer T, Ghezzi C, Pasquale L and Nuseibeh B Adding static and dynamic semantics to building information models Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, (1-7)
  393. ACM
    Matinnejad R, Nejati S, Briand L and Bruckmann T Automated test suite generation for time-continuous simulink models Proceedings of the 38th International Conference on Software Engineering, (595-606)
  394. Kouvaros P and Lomuscio A Formal Verification of Opinion Formation in Swarms Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (1200-1208)
  395. ACM
    Chilana P, Singh R and Guo P Understanding Conversational Programmers Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (1462-1472)
  396. Song S, Zhang J, Liu Y, Auguston M, Sun J, Dong J and Chen T (2016). Formalizing and verifying stochastic system architectures using Monterey Phoenix, Software and Systems Modeling (SoSyM), 15:2, (453-471), Online publication date: 1-May-2016.
  397. Bensalem S, Bozga M, Legay A, Nguyen T, Sifakis J and Yan R (2016). Component-based verification using incremental design and invariants, Software and Systems Modeling (SoSyM), 15:2, (427-451), Online publication date: 1-May-2016.
  398. Molnár V, Vörös A, Darvas D, Bartha T and Majzik I (2016). Component-wise incremental LTL model checking, Formal Aspects of Computing, 28:3, (345-379), Online publication date: 1-May-2016.
  399. ACM
    Kafalı Ö, Singh M and Williams L Toward a normative approach for forensicability Proceedings of the Symposium and Bootcamp on the Science of Security, (65-67)
  400. ACM
    Alur R, Moarref S and Topcu U Compositional Synthesis with Parametric Reactive Controllers Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control, (215-224)
  401. Majumdar R Robots at the Edge of the Cloud Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 9636, (3-13)
  402. Zeng W, Koutny M, Watson P and Germanos V (2016). Formal verification of secure information flow in cloud computing, Journal of Information Security and Applications, 27:C, (103-116), Online publication date: 1-Apr-2016.
  403. Fayaz S, Yu T, Tobioka Y, Chaki S and Sekar V BUZZ Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (275-289)
  404. Hassan M and Patel H MCXplore Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1357-1362)
  405. Adler J, Maksimovic D and Veneris A Root-cause analysis for memory-locked errors Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1054-1059)
  406. Ramanathan A, Pullum L, Hussain F, Chakrabarty D and Jha S Integrating symbolic and statistical methods for testing intelligent systems applications to machine learning and computer vision Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (786-791)
  407. Chivilikhin D, Ulyantsev V and Shalyto A (2016). Modified ant colony algorithm for constructing finite state machines from execution scenarios and temporal formulas, Automation and Remote Control, 77:3, (473-484), Online publication date: 1-Mar-2016.
  408. ACM
    Rehman W, Ayub M and Siddiqui J Verification of MPI Java programs using software model checking Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (1-2)
  409. ACM
    Bloemen V, Laarman A and van de Pol J Multi-core on-the-fly SCC decomposition Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (1-12)
  410. Huang X, Chen Q and Su K Strengthening agents strategic ability with communication Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, (2509-2515)
  411. Berry A, Butler K, Harrington C, Braxton M, Walker A, Pete N, Johnson T, Oberle M, Haselkorn J, Paul Nichol W and Haselkorn M (2016). Using conceptual work products of health care to design health IT, Journal of Biomedical Informatics, 59:C, (15-30), Online publication date: 1-Feb-2016.
  412. Quesel J, Mitsch S, Loos S, Aréchiga N and Platzer A (2016). How to model and prove hybrid systems with KeYmaera: a tutorial on safety, International Journal on Software Tools for Technology Transfer (STTT), 18:1, (67-91), Online publication date: 1-Feb-2016.
  413. Shi H and Li Y (2016). Temporal normal form for Linear Temporal Logic formulae , Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 30:3, (1657-1662), Online publication date: 1-Jan-2016.
  414. ACM
    Feng Y, Wang X, Dillig I and Lin C (2015). EXPLORER : query- and demand-driven exploration of interprocedural control flow properties, ACM SIGPLAN Notices, 50:10, (520-534), Online publication date: 18-Dec-2015.
  415. Wang H, Duan Z and Tian C Symbolic Model Checking for Alternating Projection Temporal Logic Proceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 9486, (481-495)
  416. Le T, Le X, Lo D and Beschastnikh I Synergizing specification miners through model fissions and fusions Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (115-125)
  417. Groce A, Ahmed I, Jensen C and McKenney P How verified is my code? Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (737-748)
  418. Gerasimou S, Tamburrelli G and Calinescu R Search-based synthesis of probabilistic models for quality-of-service software engineering Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (319-330)
  419. Moszkowski B and Guelev D An Application of Temporal Projection toźInterleaving Concurrency Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - Volume 9409, (153-167)
  420. Golnari A, Vizel Y and Malik S Error-Tolerant Processors Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, (286-293)
  421. Kamkin A (2015). Projecting transition systems, Programming and Computing Software, 41:6, (311-324), Online publication date: 1-Nov-2015.
  422. Aarts F, Fiterau-Brostean P, Kuppens H and Vaandrager F Learning Register Automata with Fresh Value Generation Proceedings of the 12th International Colloquium on Theoretical Aspects of Computing - ICTAC 2015 - Volume 9399, (165-183)
  423. ACM
    Feng Y, Wang X, Dillig I and Lin C EXPLORER : query- and demand-driven exploration of interprocedural control flow properties Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (520-534)
  424. Štill V, RoăźKai P and Barnat J Weak Memory Models as LLVM-to-LLVM Transformations Revised Selected Papers of the 10th International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science - Volume 9548, (144-155)
  425. ACM
    Gesbert N, Genevès P and Layaïda N (2015). A Logical Approach to Deciding Semantic Subtyping, ACM Transactions on Programming Languages and Systems, 38:1, (1-31), Online publication date: 16-Oct-2015.
  426. Meller Y, Grumberg O and Yorav K Learning-Based Compositional Model Checking of Behavioral UML Systems Revised Selected Papers of the 12th International Conference on Formal Aspects of Component Software - Volume 9539, (275-293)
  427. Nghiem T and Mangharam R Scalable scheduling of energy control systems Proceedings of the 12th International Conference on Embedded Software, (137-146)
  428. Raman V, Falt M, Wongpiromsarn T and Murray R Online horizon selection in receding horizon temporal logic planning 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3493-3499)
  429. Agarwal C, Hylander P, Mahajan Y, Michelson J and Singhal V Compositional reasoning gotchas in practice Proceedings of the 15th Conference on Formal Methods in Computer-Aided Design, (17-24)
  430. ACM
    Benenson Z, Lenzini G, Oliveira D, Parkin S and Uebelacker S Maybe Poor Johnny Really Cannot Encrypt Proceedings of the 2015 New Security Paradigms Workshop, (85-99)
  431. Tóth T, Vörös A and Majzik I A Decomposition Method for the Verification of a Real-Time Safety-Critical Protocol Proceedings of the 7th International Workshop on Software Engineering for Resilient Systems - Volume 9274, (31-45)
  432. Wang J, Ding X, Lahijanian M, Paschalidis I and Belta C (2015). Temporal logic motion control using actor–critic methods, International Journal of Robotics Research, 34:10, (1329-1344), Online publication date: 1-Sep-2015.
  433. Metric interval temporal logic specification elicitation and debugging Proceedings of the 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign, (70-79)
  434. Amato F, De Paola F, Diomaiuta C, Giugni M, Mazzocca N and Moscato F (2015). A Model Driven Approach to Water Resource Analysis based on Formal Methods and Model Transformation, Procedia Computer Science, 51:C, (562-571), Online publication date: 1-Sep-2015.
  435. ACM
    Arcaini P, Gargantini A and Riccobene E Improving model-based test generation by model decomposition Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (119-130)
  436. ACM
    Matinnejad R, Nejati S, Briand L and Bruckmann T Effective test suites for mixed discrete-continuous stateflow controllers Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (84-95)
  437. ACM
    Sun J, Xiao H, Liu Y, Lin S and Qin S TLV: abstraction through testing, learning, and validation Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (698-709)
  438. ACM
    Sinha N and Karim R Responsive designs in a snap Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (544-554)
  439. ACM
    Longfield S, Nkounkou B, Manohar R and Tate R (2015). Preventing glitches and short circuits in high-level self-timed chip specifications, ACM SIGPLAN Notices, 50:6, (270-279), Online publication date: 7-Aug-2015.
  440. ACM
    Zhang N, Kusano M and Wang C (2015). Dynamic partial order reduction for relaxed memory models, ACM SIGPLAN Notices, 50:6, (250-259), Online publication date: 7-Aug-2015.
  441. Glinz M and Fricker S (2015). On shared understanding in software engineering, Computer Science - Research and Development, 30:3-4, (363-376), Online publication date: 1-Aug-2015.
  442. Gutiérrez-Basulto V, Jung J and Schneider T Lightweight temporal description logics with rigid roles and restricted TBoxes Proceedings of the 24th International Conference on Artificial Intelligence, (3015-3021)
  443. Kouvaros P and Lomuscio A Verifying emergent properties of swarms Proceedings of the 24th International Conference on Artificial Intelligence, (1083-1089)
  444. Huang X, Chen Q and Su K The complexity of model checking succinct multiagent systems Proceedings of the 24th International Conference on Artificial Intelligence, (1076-1082)
  445. ACM
    Steffen B, Lamprecht A and Margaria T User-level synthesis Proceedings of the 19th International Conference on Software Product Line, (427-431)
  446. ACM
    ter Beek M, Fantechi A, Gnesi S and Mazzanti F Using FMC for family-based analysis of software product lines Proceedings of the 19th International Conference on Software Product Line, (432-439)
  447. ACM
    Sato Y, Hozumi S and Chiba S Calculation coverage testing in scientific applications Proceedings of the 2015 International Symposium on Software Testing and Analysis, (350-360)
  448. ACM
    Gui L, Sun J, Liu Y and Dong J Reliability assessment for distributed systems via communication abstraction and refinement Proceedings of the 2015 International Symposium on Software Testing and Analysis, (293-304)
  449. Seki H On Dual Programs in Co-Logic Programming Revised Selected Papers of the 25th International Symposium on Logic-Based Program Synthesis and Transformation - Volume 9527, (21-35)
  450. Albrecht S and Ramamoorthy S Are you doing what i think you are doing? criticising uncertain agent models Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, (52-61)
  451. ACM
    Poulding S and Feldt R Heuristic Model Checking using a Monte-Carlo Tree Search Algorithm Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1359-1366)
  452. Kobayashi N and Li X Automata-Based Abstraction Refinement for µHORS Model Checking Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (713-724)
  453. Autili M, Grunske L, Lumpe M, Pelliccione P and Tang A (2015). Aligning Qualitative, Real-Time, and Probabilistic Property Specification Patterns Using a Structured English Grammar, IEEE Transactions on Software Engineering, 41:7, (620-638), Online publication date: 1-Jul-2015.
  454. Rosner N, Geldenhuys J, Aguirre N, Visser W and Frias M (2015). BLISS: Improved Symbolic Execution by Bounded Lazy Initialization with SAT Support, IEEE Transactions on Software Engineering, 41:7, (639-660), Online publication date: 1-Jul-2015.
  455. ACM
    Seshia S, Sadigh D and Sastry S Formal methods for semi-autonomous driving Proceedings of the 52nd Annual Design Automation Conference, (1-5)
  456. ACM
    Longfield S, Nkounkou B, Manohar R and Tate R Preventing glitches and short circuits in high-level self-timed chip specifications Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (270-279)
  457. ACM
    Zhang N, Kusano M and Wang C Dynamic partial order reduction for relaxed memory models Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, (250-259)
  458. ACM
    Kumar Thakur R and Srikant Y Efficient Compilation of Stream Programs for Heterogeneous Architectures Proceedings of the 18th International Workshop on Software and Compilers for Embedded Systems, (38-47)
  459. ACM
    Crampton J, Morisset C and Zannone N On Missing Attributes in Access Control Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, (99-109)
  460. Hao Zheng , Zhen Zhang , Myers C, Rodriguez E and Yingying Zhang (2015). Compositional Model Checking of Concurrent Systems, IEEE Transactions on Computers, 64:6, (1607-1621), Online publication date: 1-Jun-2015.
  461. Milazzo P, Pardini G, Sestini D and Bove P Case studies of application of probabilistic and statistical model checking in game design Proceedings of the Fourth International Workshop on Games and Software Engineering, (29-35)
  462. Anthonysamy P and Rashid A Software engineering for privacy in-the-large Proceedings of the 37th International Conference on Software Engineering - Volume 2, (947-948)
  463. Tsigkanos C, Pasquale L, Ghezzi C and Nuseibeh B Ariadne Proceedings of the 37th International Conference on Software Engineering - Volume 2, (729-732)
  464. Regis G, Degiovanni R, D'Ippolito N and Aguirre N Specifying event-based systems with a counting fluent temporal logic Proceedings of the 37th International Conference on Software Engineering - Volume 1, (733-743)
  465. ACM
    Yi J, Qi D, Tan S and Roychoudhury A (2015). Software Change Contracts, ACM Transactions on Software Engineering and Methodology, 24:3, (1-43), Online publication date: 13-May-2015.
  466. Herd B, Miles S, Mcburney P and Luck M Quantitative Analysis of Multiagent Systems Through Statistical Model Checking Revised, Selected, and Invited Papers of the Third International Workshop on Engineering Multi-Agent Systems - Volume 9318, (109-130)
  467. Kim H, Reich J, Gupta A, Shahbaz M, Feamster N and Clark R Kinetic Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (59-72)
  468. Alechina N, Bulling N, Dastani M and Logan B Practical Run-Time Norm Enforcement with Bounded Lookahead Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (443-451)
  469. Rubin S Parameterised Verification of Autonomous Mobile-Agents in Static but Unknown Environments Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (199-208)
  470. Lomuscio A and Michaliszyn J Verifying Multi-Agent Systems by Model Checking Three-valued Abstractions Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (189-198)
  471. Huang X (2015). Bounded model checking of strategy ability with perfect recall, Artificial Intelligence, 222:C, (182-200), Online publication date: 1-May-2015.
  472. Fiedor J, Hrubá V, Křena B, Letko Z, Ur S and Vojnar T (2015). Advances in noise-based testing of concurrent software, Software Testing, Verification & Reliability, 25:3, (272-309), Online publication date: 1-May-2015.
  473. ACM
    Svoreňová M, Chmelík M, Leahy K, Eniser H, Chatterjee K, Černá I and Belta C Temporal logic motion planning using POMDPs with parity objectives Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, (233-238)
  474. ACM
    Svoreňová M, Křetínský J, Chmelík M, Chatterjee K, Černá I and Belta C Temporal logic control for stochastic linear systems using abstraction refinement of probabilistic games Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, (259-268)
  475. ACM
    Coogan S and Arcak M Efficient finite abstraction of mixed monotone systems Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, (58-67)
  476. ACM
    Gregorio-Rodríguez C, Llana L and Martínez-Torres R Extending mCRL2 with ready simulation and iocos input-output conformance simulation Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1781-1788)
  477. Kai J, Miao H, Zhao K, Zhou J and Gao H (2015). A Platform for Analyzing Behaviors of Service-Oriented Application Based on the Probabilistic Model Checking, International Journal of Software Innovation, 3:2, (24-38), Online publication date: 1-Apr-2015.
  478. Rönkkö M, Heikkinen J, Kotovirta V and Chandrasekar V (2015). Automated preprocessing of environmental data, Future Generation Computer Systems, 45:C, (13-24), Online publication date: 1-Apr-2015.
  479. Nouri A, Bensalem S, Bozga M, Delahaye B, Jegourel C and Legay A (2015). Statistical model checking QoS properties of systems with SBIP, International Journal on Software Tools for Technology Transfer (STTT), 17:2, (171-185), Online publication date: 1-Apr-2015.
  480. ACM
    de Matos Pedro A, Pereira D, Pinho L and Pinto J (2015). Logic-based schedulability analysis for compositional hard real-time embedded systems, ACM SIGBED Review, 12:1, (56-64), Online publication date: 27-Mar-2015.
  481. ACM
    Genevès P, Layaïda N, Schmitt A and Gesbert N (2015). Efficiently Deciding μ-Calculus with Converse over Finite Trees, ACM Transactions on Computational Logic, 16:2, (1-41), Online publication date: 21-Mar-2015.
  482. Hoque K, Mohamed O and Savaria Y Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (1635-1640)
  483. ACM
    Mezzanzanica M, Boselli R, Cesarini M and Mercorio F (2015). A Model-Based Approach for Developing Data Cleansing Solutions, Journal of Data and Information Quality, 5:4, (1-28), Online publication date: 3-Mar-2015.
  484. Sotudeh G and Movaghar A (2015). Abstraction and approximation in fuzzy temporal logics and models, Formal Aspects of Computing, 27:2, (309-334), Online publication date: 1-Mar-2015.
  485. He J, Nguyen D, Arpaci-Dusseau A and Arpaci-Dusseau R Reducing file system tail latencies with Chopper Proceedings of the 13th USENIX Conference on File and Storage Technologies, (119-133)
  486. ACM
    Alur R, Henzinger T and Vardi M (2015). Theory in practice for system design and verification, ACM SIGLOG News, 2:1, (46-51), Online publication date: 28-Jan-2015.
  487. ACM
    Benduhn F, Thüm T, Lochau M, Leich T and Saake G A Survey on Modeling Techniques for Formal Behavioral Verification of Software Product Lines Proceedings of the 9th International Workshop on Variability Modelling of Software-Intensive Systems, (80-87)
  488. Saha R, Esparza J, Jha S, Mukund M and Thiagarajan P Distributed Markov Chains Proceedings of the 16th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 8931, (117-134)
  489. Schubert K, Ludden J, Ayub S, Behrend J, Brock B, Copty F, German S, Hershkovitz O, Horbach H, Jackson J, Keuerleber K, Koesters J, Leitner L, Meil G, Meissner C, Morad R, Nahir A, Paruthi V, Peterson R, Pratt R, Rimon M and Schumann J (2015). Solutions to IBM POWER8 verification challenges, IBM Journal of Research and Development, 59:1, (11:1-11:17), Online publication date: 1-Jan-2015.
  490. Qadir J and Hasan O (2015). Applying Formal Methods to Networking: Theory, Techniques, and Applications, IEEE Communications Surveys & Tutorials, 17:1, (256-291), Online publication date: 1-Jan-2015.
  491. Mrasek R, Mülle J and Böhm K (2015). A new verification technique for large processes based on identification of relevant tasks, Information Systems, 47:C, (82-97), Online publication date: 1-Jan-2015.
  492. Elleuch M, Hasan O, Tahar S and Abid M (2015). Formal probabilistic analysis of detection properties in wireless sensor networks, Formal Aspects of Computing, 27:1, (79-102), Online publication date: 1-Jan-2015.
  493. ACM
    Eldib H, Wang C and Schaumont P (2014). Formal Verification of Software Countermeasures against Side-Channel Attacks, ACM Transactions on Software Engineering and Methodology, 24:2, (1-24), Online publication date: 23-Dec-2014.
  494. ACM
    Kholy W, Bentahar J, Menshawy M, Qu H and Dssouli R (2014). Conditional Commitments, ACM Transactions on Software Engineering and Methodology, 24:2, (1-49), Online publication date: 23-Dec-2014.
  495. Kikuchi S Performance Estimation for Business Workflows on Public Cloud Offerings Using Probabilistic Model Checker Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (317-326)
  496. ACM
    Deutsch A, Hull R and Vianu V (2014). Automatic Verification of Database-Centric Systems, ACM SIGMOD Record, 43:3, (5-17), Online publication date: 4-Dec-2014.
  497. Daskalopoulos I, Ahmed M, Hailes S, Roussos G, Delamothe T, Kwon J and Brown L Policy-enabled internet of things deployable platforms for vaccine cold chains Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (295-302)
  498. Aslam B, Ahmad J, Ali A, Zafar Paracha R, Tareen S, Niazi U and Saeed T (2014). On the modelling and analysis of the regulatory network of dengue virus pathogenesis and clearance, Computational Biology and Chemistry, 53:PB, (277-291), Online publication date: 1-Dec-2014.
  499. ACM
    Rathje W and Richards B (2014). A framework for model checking UDP network programs with Java pathfinder, ACM SIGAda Ada Letters, 34:3, (81-86), Online publication date: 26-Nov-2014.
  500. ACM
    Shi Y, Wei O and Zhou Y Model checking partial software product line designs Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, (21-29)
  501. ACM
    Cordy M, Heymans P, Legay A, Schobbens P, Dawagne B and Leucker M Counterexample guided abstraction refinement of product-line behavioural models Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (190-201)
  502. ACM
    Vakili A and Day N Verifying CTL-live properties of infinite state models using an SMT solver Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (213-223)
  503. Longfield S and Manohar R Removing concurrency for rapid functional verification Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, (332-339)
  504. Vakili A and Day N Reducing CTL-live Model Checking to First-Order Logic Validity Checking Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design, (215-218)
  505. ACM
    Rathje W and Richards B A framework for model checking UDP network programs with Java pathfinder Proceedings of the 2014 ACM SIGAda annual conference on High integrity language technology, (81-86)
  506. Jörges S and Steffen B Back-To-Back Testing of Model-Based Code Generators Part I of the Proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - Volume 8802, (425-444)
  507. Aarts F, Howar F, Kuppens H and Vaandrager F Algorithms for Inferring Register Automata Part I of the Proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - Volume 8802, (202-219)
  508. Woźna-Szcześniak B and Zbrzezny A (2014). Checking MTL Properties of Discrete Timed Automata via Bounded Model Checking, Fundamenta Informaticae, 135:4, (553-568), Online publication date: 1-Oct-2014.
  509. From visual to logical formalisms for SoC validation Proceedings of the Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign, (165-174)
  510. Bonet B, Haslum P, Khomenko V, Thiébaux S and Vogler W (2014). Recent advances in unfolding technique, Theoretical Computer Science, 551:C, (84-101), Online publication date: 25-Sep-2014.
  511. Calvanese D, Ceylan İ, Montali M and Santoso A Verification of Context-Sensitive Knowledge and Action Bases Proceedings of the 14th European Conference on Logics in Artificial Intelligence - Volume 8761, (514-528)
  512. Yessad A, Mounier I, Labat J, Kordon F and Carron T Have You Found the Error? A Formal Framework for Learning Game Verification Proceedings of the 9th European Conference on Open Learning and Teaching in Educational Communities - Volume 8719, (476-481)
  513. ACM
    Thüm T, Meinicke J, Benduhn F, Hentschel M, von Rhein A and Saake G Potential synergies of theorem proving and model checking for software product lines Proceedings of the 18th International Software Product Line Conference - Volume 1, (177-186)
  514. ACM
    Cordy M, Willemart M, Dawagne B, Heymans P and Schobbens P An extensible platform for product-line behavioural analysis Proceedings of the 18th International Software Product Line Conference: Companion Volume for Workshops, Demonstrations and Tools - Volume 2, (102-109)
  515. ACM
    Meinicke J, Thüm T, Schröter R, Benduhn F and Saake G An overview on analysis tools for software product lines Proceedings of the 18th International Software Product Line Conference: Companion Volume for Workshops, Demonstrations and Tools - Volume 2, (94-101)
  516. ACM
    Basu S and Bultan T Automatic verification of interactions in asynchronous systems with unbounded buffers Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, (743-754)
  517. ACM
    Kusano M and Wang C Assertion guided abstraction Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, (175-186)
  518. Yamagata Y, Kong W, Fukuda A, Van Tang N, Ohsaki H and Taguchi K (2014). A formal semantics of extended hierarchical state transition matrices using CSP#, Formal Aspects of Computing, 26:5, (943-962), Online publication date: 1-Sep-2014.
  519. ACM
    Armando A, Costa G, Merlo A and Verderame L Enabling BYOD through secure meta-market Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, (219-230)
  520. ACM
    Blahoudek F, Duret-Lutz A, Křetínský M and Strejček J Is there a best büchi automaton for explicit model checking? Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, (68-76)
  521. ACM
    Sullivan A, Zaeem R, Khurshid S and Marinov D Towards a test automation framework for alloy Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, (113-116)
  522. ACM
    Nejati S and Briand L Identifying optimal trade-offs between CPU time usage and temporal constraints using search Proceedings of the 2014 International Symposium on Software Testing and Analysis, (351-361)
  523. ACM
    Pastore F, Mariani L, Hyvärinen A, Fedyukovich G, Sharygina N, Sehestedt S and Muhammad A Verification-aided regression testing Proceedings of the 2014 International Symposium on Software Testing and Analysis, (37-48)
  524. Lomuscio A and Michaliszyn J Model checking unbounded artifact-centric systems Proceedings of the Fourteenth International Conference on Principles of Knowledge Representation and Reasoning, (488-497)
  525. Gutiérrez-Basulto V, Jung J and Schneider T Lightweight description logics and branching time Proceedings of the Fourteenth International Conference on Principles of Knowledge Representation and Reasoning, (278-287)
  526. Chatterjee K, Chmelík M and Daca P CEGAR for Qualitative Analysis of Probabilistic Systems Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, (473-490)
  527. ACM
    Baier C, Klein J, Klüppelholz S and Wunderlich S Weight monitoring with linear temporal logic Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
  528. ACM
    Barceló P and Muñoz P Graph logics with rational relations Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
  529. ACM
    Baier C, Dubslaff C and Klüppelholz S Trade-off analysis meets probabilistic model checking Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
  530. ACM
    Buzhinsky I, Chivilikhin D, Ulyantsev V and Tsarev F Improving the quality of supervised finite-state machine construction using real-valued variables Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1037-1040)
  531. ACM
    Chivilikhin D and Ulyantsev V Inferring automata-based programs from specification with mutation-based ant colony optimization Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (67-68)
  532. Pan H, Zhang M, Wu H and Chen Y (2014). Quantitative Analysis of Lattice-valued Kripke Structures, Fundamenta Informaticae, 135:3, (269-293), Online publication date: 1-Jul-2014.
  533. ACM
    Thüm T, Apel S, Kästner C, Schaefer I and Saake G (2014). A Classification and Survey of Analysis Strategies for Software Product Lines, ACM Computing Surveys, 47:1, (1-45), Online publication date: 1-Jul-2014.
  534. Ferreira A, Huynen J, Koenig V and Lenzini G A Conceptual Framework to Study Socio-Technical Security Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533, (318-329)
  535. ACM
    Cauchi A, Oladimeji P, Niezen G and Thimbleby H Triangulating empirical and analytic techniques for improving number entry user interfaces Proceedings of the 2014 ACM SIGCHI symposium on Engineering interactive computing systems, (243-252)
  536. Gmeiner A, Konnov I, Schmid U, Veith H and Widder J Tutorial on Parameterized Model Checking of Fault-Tolerant Distributed Algorithms Advanced Lectures of the 14th International School on Formal Methods for Executable Software Models - Volume 8483, (122-171)
  537. ACM
    Sayar I and Bhiri M From an abstract specification in event-b toward an UML/OCL model Proceedings of the 2nd FME Workshop on Formal Methods in Software Engineering, (17-23)
  538. ACM
    Murugesan A, Feng L, Heimdahl M, Rayadurgam S, Whalen M and Lee I Exploring the twin peaks using probabilistic verification techniques Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture, (18-23)
  539. ACM
    Rungta N, Tkachuk O, Person S, Biatek J, Whalen M, Castle J and Gundy-Burlet K Helping system engineers bridge the peaks Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture, (9-13)
  540. ACM
    Eldib H, Wang C, Taha M and Schaumont P QMS Proceedings of the 51st Annual Design Automation Conference, (1-6)
  541. ACM
    Youn S, Gu C and Kim J Probabilistic Bug Localization via Statistical Inference based on Partially Observed Data Proceedings of the 51st Annual Design Automation Conference, (1-6)
  542. Carrillo M and Rosenblueth D (2014). CTL update of Kripke models through protections, Artificial Intelligence, 211:1, (51-74), Online publication date: 1-Jun-2014.
  543. ACM
    Aceituna D, Do H and Srinivasan S A systematic approach to transforming system requirements into model checking specifications Companion Proceedings of the 36th International Conference on Software Engineering, (165-174)
  544. ACM
    Menghi C Verifying incomplete and evolving specifications Companion Proceedings of the 36th International Conference on Software Engineering, (670-673)
  545. ACM
    Camilli M Formal verification problems in a big data world: towards a mighty synergy Companion Proceedings of the 36th International Conference on Software Engineering, (638-641)
  546. ACM
    Chen M, Tan T, Sun J, Liu Y and Dong J VeriWS: a tool for verification of combined functional and non-functional requirements of web service composition Companion Proceedings of the 36th International Conference on Software Engineering, (564-567)
  547. ACM
    Nguyen H, Kästner C and Nguyen T Exploring variability-aware execution for testing plugin-based web applications Proceedings of the 36th International Conference on Software Engineering, (907-918)
  548. ACM
    He F, Wang B, Yin L and Zhu L Symbolic assume-guarantee reasoning through BDD learning Proceedings of the 36th International Conference on Software Engineering, (1071-1082)
  549. ACM
    Maoz S, Ringert J and Rumpe B Verifying component and connector models against crosscutting structural views Proceedings of the 36th International Conference on Software Engineering, (95-105)
  550. ACM
    Peng D, Ewald R and Uhrmacher A Towards semantic model composition via experiments Proceedings of the 2nd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (151-162)
  551. Vasanta Lakshmi K, Acharya A and Komondoor R Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis Proceedings of the 19th International Symposium on FM 2014: Formal Methods - Volume 8442, (335-350)
  552. Gasparini L, Norman T, Kollingbaum M and Chen L Severity-Sensitive Robustness Analysis in Normative Systems Revised Selected Papers of the International Workshops on Coordination, Organizations, Institutions, and Norms in Agent Systems X - Volume 9372, (72-88)
  553. Belardinelli F Verification of non-uniform and unbounded artifact-centric systems Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (717-724)
  554. Montali M, Calvanese D and De Giacomo G Verification of data-aware commitment-based multiagent system Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (157-164)
  555. Primiero G, Raimondi F and Rungta N Model checking degrees of belief in a system of agents Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (133-140)
  556. Dixit M, Ramesh S and Dasgupta P (2014). Time-budgeting: a component based development methodology for real-time embedded systems, Formal Aspects of Computing, 26:3, (591-621), Online publication date: 1-May-2014.
  557. Coogan S and Arcak M Freeway traffic control from linear temporal logic specifications ICCPS '14: ACM/IEEE 5th International Conference on Cyber-Physical Systems (with CPS Week 2014), (36-47)
  558. ACM
    Mazzone S, Pagnozzi M, Fattori A, Reina A, Lanzi A and Bruschi D Improving Mac OS X security through gray box fuzzing technique Proceedings of the Seventh European Workshop on System Security, (1-6)
  559. Ranjan A, Raha A, Venkataramani S, Roy K and Raghunathan A ASLAN Proceedings of the conference on Design, Automation & Test in Europe, (1-6)
  560. ACM
    Siegmund N, von Rhein A and Apel S (2013). Family-based performance measurement, ACM SIGPLAN Notices, 49:3, (95-104), Online publication date: 5-Mar-2014.
  561. ACM
    Moscato M, Pombo C and Frias M (2014). Dynamite, ACM Transactions on Software Engineering and Methodology, 23:2, (1-37), Online publication date: 1-Mar-2014.
  562. ACM
    Yang J, Cui H, Wu J, Tang Y and Hu G (2014). Making parallel programs reliable with stable multithreading, Communications of the ACM, 57:3, (58-69), Online publication date: 1-Mar-2014.
  563. Eshra A and El-Sayed A (2014). An odd parity checker prototype using DNAzyme finite state machine, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 11:2, (316-324), Online publication date: 1-Mar-2014.
  564. Pan H, Cao Y, Zhang M and Chen Y (2014). Simulation for lattice-valued doubly labeled transition systems, International Journal of Approximate Reasoning, 55:3, (797-811), Online publication date: 1-Mar-2014.
  565. Fages F Cells as Machines Proceedings of the 10th International Conference on Distributed Computing and Internet Technology - Volume 8337, (50-67)
  566. Natarajan A, Mittal N and Garg V Online Algorithms to Generate Slices for Regular Temporal Logic Predicates Proceedings of the 15th International Conference on Distributed Computing and Networking - Volume 8314, (165-180)
  567. Evangelista S and Kristensen L (2014). A Sweep-Line Method for Büchi Automata-based Model Checking, Fundamenta Informaticae, 131:1, (27-53), Online publication date: 1-Jan-2014.
  568. Niu J, Reith M and Winsborough W (2014). Formal verification of security properties in trust management policy, Journal of Computer Security, 22:1, (69-153), Online publication date: 1-Jan-2014.
  569. ACM
    Fontana P and Cleaveland R (2014). A menagerie of timed automata, ACM Computing Surveys, 46:3, (1-56), Online publication date: 1-Jan-2014.
  570. ACM
    Furia C, Meyer B and Velder S (2014). Loop invariants, ACM Computing Surveys, 46:3, (1-51), Online publication date: 1-Jan-2014.
  571. Kryvyi S and Maksymets O (2014). Program Verification, Cybernetics and Systems Analysis, 50:1, (8-16), Online publication date: 1-Jan-2014.
  572. Bagheri Hariri B, Calvanese D, Montali M, Santoso A and Solomakhin D Verification of Semantically-Enhanced Artifact Systems Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (600-607)
  573. Masellis R and Su J Runtime Enforcement of First-Order LTL Properties on Data-Aware Business Processes Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (54-68)
  574. Solomakhin D, Montali M, Tessaris S and Masellis R Verification of Artifact-Centric Systems Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (252-266)
  575. ACM
    Schwarz C, Zöbel D and Wagner M (2013). Formal verification of service-oriented adaptive driver assistance systems, ACM SIGBED Review, 10:4, (49-52), Online publication date: 1-Dec-2013.
  576. Qian Z, Huang H and Song F VTOS: Research on Methodology of “Light-Weight” Formal Design and Verification for Microkernel OS Information and Communications Security, (17-32)
  577. Sakai Y Analyzing Convergence and Reachability of Asynchronous Iterations 15th International Symposium on Stabilization, Safety, and Security of Distributed Systems - Volume 8255, (360-362)
  578. Nejati S, Adedjouma M, Briand L, Hellebaut J, Begey J and Clement Y Minimizing CPU time shortage risks in integrated embedded software Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (529-539)
  579. Artho C, Hagiya M, Potter R, Tanabe Y, Weitl F and Yamamoto M Software model checking for distributed systems with selector-based, non-blocking communication Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (169-179)
  580. Maezawa Y, Washizaki H, Tanabe Y and Honiden S Automated verification of pattern-based interaction invariants in Ajax applications Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (158-168)
  581. Zhang S, Sun J, Suny C, Liuz Y, Ma J and Dong J Constraint-based automatic symmetry detection Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (15-25)
  582. ACM
    dos Santos J, Braga C and Muchaluat-Saade D Automating the analysis of NCL documents with a model-driven approach Proceedings of the 19th Brazilian symposium on Multimedia and the web, (193-200)
  583. ACM
    Gammie P (2013). Synchronous digital circuits as functional programs, ACM Computing Surveys, 46:2, (1-27), Online publication date: 1-Nov-2013.
  584. Wang X, Duan Z and Zhao L Formalizing and Implementing Types in MSVL Structured Object-Oriented Formal Language and Method, (62-75)
  585. ACM
    Siegmund N, von Rhein A and Apel S Family-based performance measurement Proceedings of the 12th international conference on Generative programming: concepts & experiences, (95-104)
  586. Carrillo O, Chouali S and Mountassir H Incremental Modeling of System Architecture Satisfying SysML Functional Requirements Formal Aspects of Component Software, (79-99)
  587. ACM
    Al-Shaer E, Duan Q, Al-Haj S and Youssef M SensorChecker Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, (51-56)
  588. Symbolic software model validation Proceedings of the Eleventh ACM/IEEE International Conference on Formal Methods and Models for Codesign, (97-108)
  589. Fioravanti F, Pettorossi A, Proietti M and Senni V (2013). Controlling Polyvariance for Specialization-based Verification, Fundamenta Informaticae, 124:4, (483-502), Online publication date: 1-Oct-2013.
  590. D'Agostino G and Lenzi G (2013). On Modal μ-Calculus in S5 and Applications, Fundamenta Informaticae, 124:4, (465-482), Online publication date: 1-Oct-2013.
  591. Woźna-Szcześniak B and Zbrzezny A (2013). A Translation of the Existential Model Checking Problem from MITL to HLTL, Fundamenta Informaticae, 122:4, (401-420), Online publication date: 1-Oct-2013.
  592. Lustig Y and Vardi M (2013). Synthesis from component libraries, International Journal on Software Tools for Technology Transfer (STTT), 15:5-6, (603-618), Online publication date: 1-Oct-2013.
  593. Zurowska K and Dingel J Model Checking of UML-RT Models Using Lazy Composition Proceedings of the 16th International Conference on Model-Driven Engineering Languages and Systems - Volume 8107, (304-319)
  594. Prabhakar P, Liu J and Murray R Pre-orders for reasoning about stability properties with respect to input of hybrid systems Proceedings of the Eleventh ACM International Conference on Embedded Software, (1-10)
  595. ACM
    Martinez-Alvarez M, Bonzanini M and Roelleke T Mathematical Specification and Logic Modelling in the context of IR Proceedings of the 2013 Conference on the Theory of Information Retrieval, (131-132)
  596. Greenyer J and Kindler E Compositional Synthesis of Controllers from Scenario-Based Assume-Guarantee Specifications Proceedings of the 16th International Conference on Model-Driven Engineering Languages and Systems - Volume 8107, (774-789)
  597. Bonacchi A, Fantechi A, Bacherini S, Tempestini M and Cipriani L Validation of Railway Interlocking Systems by Formal Verification, A Case Study Revised Selected Papers of the SEFM 2013 Collocated Workshops on Software Engineering and Formal Methods - Volume 8368, (237-252)
  598. Haxthausen A, Peleska J and Pinger R Applied Bounded Model Checking for Interlocking System Designs Revised Selected Papers of the SEFM 2013 Collocated Workshops on Software Engineering and Formal Methods - Volume 8368, (205-220)
  599. Fantechi A Twenty-Five Years of Formal Methods and Railways Revised Selected Papers of the SEFM 2013 Collocated Workshops on Software Engineering and Formal Methods - Volume 8368, (167-183)
  600. Bakar N and Selamat A Assessing Agents Interaction Quality via Multi-agent Runtime Verification Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083, (175-184)
  601. ACM
    Fisher M, Dennis L and Webster M (2013). Verifying autonomous systems, Communications of the ACM, 56:9, (84-93), Online publication date: 1-Sep-2013.
  602. Abdulla P, Clemente L, Mayr R and Sandberg S Stochastic parity games on lossy channel systems Proceedings of the 10th international conference on Quantitative Evaluation of Systems, (338-354)
  603. ACM
    Varshosaz M and Khosravi R Discrete time Markov chain families Proceedings of the 17th International Software Product Line Conference co-located workshops, (34-41)
  604. ACM
    Liebig J, von Rhein A, Kästner C, Apel S, Dörre J and Lengauer C Scalable analysis of variable software Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, (81-91)
  605. ACM
    Androutsopoulos K, Clark D, Harman M, Krinke J and Tratt L (2013). State-based model slicing, ACM Computing Surveys, 45:4, (1-36), Online publication date: 1-Aug-2013.
  606. van der Hoek W, Witteveen C and Wooldridge M (2013). Program equilibrium—a program reasoning approach, International Journal of Game Theory, 42:3, (639-671), Online publication date: 1-Aug-2013.
  607. Calvanese D, De Giacomo G, Montali M and Patrizi F Verification and synthesis in description logic based dynamic systems Proceedings of the 7th international conference on Web Reasoning and Rule Systems, (50-64)
  608. ACM
    Gui L, Sun J, Liu Y, Si Y, Dong J and Wang X Combining model checking and testing with an application to reliability prediction and distribution Proceedings of the 2013 International Symposium on Software Testing and Analysis, (101-111)
  609. Jegourel C, Legay A and Sedwards S Importance Splitting for Statistical Model Checking Rare Properties Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (576-591)
  610. Donzé A, Ferrère T and Maler O Efficient Robust Monitoring for STL Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (264-279)
  611. Bingham B, Bingham J, Erickson J and Greenstreet M Distributed Explicit State Model Checking of Deadlock Freedom Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (235-241)
  612. Colange M, Baarir S, Kordon F and Thierry-Mieg Y Towards Distributed Software Model-Checking Using Decision Diagrams Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (830-845)
  613. ACM
    Aleb N and Kechid S An interpolation based crossover operator for genetic programming Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (1107-1112)
  614. ACM
    Desnoyers M (2013). Proving the correctness of nonblocking data structures, Communications of the ACM, 56:7, (62-69), Online publication date: 1-Jul-2013.
  615. ACM
    Bagheri Hariri B, Calvanese D, De Giacomo G, Deutsch A and Montali M Verification of relational data-centric dynamic systems with external services Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGAI symposium on Principles of database systems, (163-174)
  616. ACM
    Windmüller S, Neubauer J, Steffen B, Howar F and Bauer O Active continuous quality control Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, (111-120)
  617. ACM
    Johnson K, Calinescu R and Kikuchi S An incremental verification framework for component-based software systems Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, (33-42)
  618. ACM
    Barnat J, Beneš N, Černá I and Petruchová Z DCCL Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering, (43-52)
  619. Williams R and Konev B Propositional temporal proving with reductions to a SAT problem Proceedings of the 24th international conference on Automated Deduction, (421-435)
  620. ACM
    Kobayashi N (2013). Model Checking Higher-Order Programs, Journal of the ACM, 60:3, (1-62), Online publication date: 1-Jun-2013.
  621. Lohmann N (2013). Compliance by design for artifact-centric business processes, Information Systems, 38:4, (606-618), Online publication date: 1-Jun-2013.
  622. Bensalem S, Legay A and Bozga M (2013). Rigorous embedded design, International Journal on Software Tools for Technology Transfer (STTT), 15:3, (149-154), Online publication date: 1-Jun-2013.
  623. de Oliveira D, Rakamarić Z, Gopalakrishnan G, Humphrey A, Meng Q and Berzins M Practical formal correctness checking of million-core problem solving environments for HPC Proceedings of the 5th International Workshop on Software Engineering for Computational Science and Engineering, (75-83)
  624. Dong J, Sun J and Liu Y Build your own model checker in one month Proceedings of the 2013 International Conference on Software Engineering, (1481-1483)
  625. ACM
    Heinzemann C, Sudmann O, Schäfer W and Tichy M A discipline-spanning development process for self-adaptive mechatronic systems Proceedings of the 2013 International Conference on Software and System Process, (36-45)
  626. Gerard S and Singh M Evolving protocols and agents in multiagent systems Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (997-1004)
  627. Kouvaros P and Lomuscio A Automatic verification of parameterised multi-agent systems Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (861-868)
  628. Huang X and Luo C A logic of probabilistic knowledge and strategy Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (845-852)
  629. ACM
    Desnoyers M (2013). Proving the Correctness of Nonblocking Data Structures, Queue, 11:5, (30-43), Online publication date: 1-May-2013.
  630. Perna J and George C (2013). Model checking RAISE applicative specifications, Formal Aspects of Computing, 25:3, (365-388), Online publication date: 1-May-2013.
  631. Han Z, Mosterman P, Zander J and Zhang F Systematic management of simulation state for multi-branch simulations in simulink Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium, (1-8)
  632. Kang E and Schobbens P Enabling formal analysis of energy-aware automotive embedded systems in East-adl Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium, (1-8)
  633. ACM
    Jayaraman K, Tripunitara M, Ganesh V, Rinard M and Chapin S (2013). Mohawk, ACM Transactions on Information and System Security, 15:4, (1-28), Online publication date: 1-Apr-2013.
  634. Armando A, Castiglione A, Costa G, Fiore U, Merlo A, Verderame L and You I Trustworthy opportunistic access to the internet of services Proceedings of the 2013 international conference on Information and Communication Technology, (469-478)
  635. She Y, Li H and Zhu H UVHM Proceedings of the 2013 international conference on Information and Communication Technology, (300-305)
  636. Loiacono C, Palena M, Pasini P, Patti D, Quer S, Ricossa S, Vendraminetto D and Baumgartner J Fast cone-of-influence computation and estimation in problems with multiple properties Proceedings of the Conference on Design, Automation and Test in Europe, (803-806)
  637. ACM
    Hellings J, Kuijpers B, Van den Bussche J and Zhang X Walk logic as a framework for path query languages on graph databases Proceedings of the 16th International Conference on Database Theory, (117-128)
  638. Grumberg O SAT-based model checking Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (xvii-xviii)
  639. Wijs A and Engelen L Efficient property preservation checking of model refinements Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (565-579)
  640. Vizel Y, Grumberg O and Shoham S Intertwined forward-backward reachability analysis using interpolants Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (308-323)
  641. Godefroid P and Yannakakis M Analysis of boolean programs Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (214-229)
  642. ACM
    Backasch R, Hochberger C, Weiss A, Leucker M and Lasslop R (2013). Runtime verification for multicore SoC with high-quality trace data, ACM Transactions on Design Automation of Electronic Systems, 18:2, (1-26), Online publication date: 1-Mar-2013.
  643. ACM
    Walkinshaw N and Bogdanov K (2013). Automated Comparison of State-Based Software Models in Terms of Their Language and Structure, ACM Transactions on Software Engineering and Methodology, 22:2, (1-37), Online publication date: 1-Mar-2013.
  644. De Giacomo G, Patrizi F and SardiñA S (2013). Automatic behavior composition synthesis, Artificial Intelligence, 196, (106-142), Online publication date: 1-Mar-2013.
  645. ACM
    Rastogi V, Chen Y and Enck W AppsPlayground Proceedings of the third ACM conference on Data and application security and privacy, (209-220)
  646. Ranzato F Complete Abstractions Everywhere Proceedings of the 14th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 7737, (15-26)
  647. ACM
    Santhanam G, Oster Z and Basu S Identifying a preferred countermeasure strategy for attack graphs Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, (1-4)
  648. Fioravanti F, Pettorossi A, Proietti M and Senni V (2013). Proving Theorems by Program Transformation, Fundamenta Informaticae, 127:1-4, (115-134), Online publication date: 1-Jan-2013.
  649. Radojicic C, Grimm C, Schupfer F and Rathmair M (2013). Verification of mixed-signal systems with affine arithmetic assertions, VLSI Design, 2013, (5-5), Online publication date: 1-Jan-2013.
  650. ACM
    Mosbahi O (2013). Combining Formal Methods for the Development of Reactive Systems, ACM Transactions on Embedded Computing Systems, 12:1, (1-29), Online publication date: 1-Jan-2013.
  651. ACM
    Méry D and Singh N (2013). Formal Specification of Medical Systems by Proof-Based Refinement, ACM Transactions on Embedded Computing Systems, 12:1, (1-25), Online publication date: 1-Jan-2013.
  652. Maccagnola D, Messina E, Gao Q and Gilbert D A machine learning approach for generating temporal logic classifications of complex model behaviours Proceedings of the Winter Simulation Conference, (1-12)
  653. Masi M, Pugliese R and Tiezzi F (2012). Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios, Journal of Medical Systems, 36:6, (3695-3711), Online publication date: 1-Dec-2012.
  654. Ware S and Malik R (2012). Conflict-preserving abstraction of discrete event systems using annotated automata, Discrete Event Dynamic Systems, 22:4, (451-477), Online publication date: 1-Dec-2012.
  655. Lin S, Liu Y, Hsiung P, Sun J and Dong J Automatic generation of provably correct embedded systems Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering, (214-229)
  656. Paul J, Guralnik E, Koyfman A, Nahir A and Panda S Leveraging accelerated simulation for floating-point regression Proceedings of the 8th international conference on Hardware and Software: verification and testing, (118-131)
  657. ACM
    Steinhorst S and Hedrich L Trajectory-directed discrete state space modeling for formal verification of nonlinear analog circuits Proceedings of the International Conference on Computer-Aided Design, (202-209)
  658. ACM
    Cimatti A, Roveri M, Susi A and Tonetta S (2013). Validation of requirements for hybrid systems, ACM Transactions on Software Engineering and Methodology, 21:4, (1-34), Online publication date: 1-Nov-2012.
  659. Chen C, Sun J, Liu Y, Dong J and Zheng M (2012). Formal modeling and validation of Stateflow diagrams, International Journal on Software Tools for Technology Transfer (STTT), 14:6, (653-671), Online publication date: 1-Nov-2012.
  660. Castro-Manzano J A defeasible logic of intention Proceedings of the 11th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (321-333)
  661. Budde C, D'Argenio P, Sánchez Terraf P and Wolovick N A Theory for the Semantics of Stochastic and Non-deterministic Continuous Systems Advanced Lectures of the International Autumn School on Stochastic Model Checking. Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems - Volume 8453, (67-86)
  662. ACM
    Sadigh D, Seshia S and Gupta M Automating exercise generation Proceedings of the Workshop on Embedded and Cyber-Physical Systems Education, (1-8)
  663. ACM
    Li A and Chen M Efficient self-learning techniques for SAT-based test generation Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (197-206)
  664. Grumberg O, Kupferman O and Sheinvald S Model checking systems and specifications with parameterized atomic propositions Proceedings of the 10th international conference on Automated Technology for Verification and Analysis, (122-136)
  665. Huang S, Hua J, Will H and Wu J (2012). Metamodeling to Control and Audit E-Commerce Web Applications, International Journal of Electronic Commerce, 17:1, (83-118), Online publication date: 1-Oct-2012.
  666. ACM
    Wijs A and Engelen L Incremental formal verification for model refining Proceedings of the Workshop on Model-Driven Engineering, Verification and Validation, (29-34)
  667. Jörges S, Lamprecht A, Margaria T, Schaefer I and Steffen B (2012). A constraint-based variability modeling framework, International Journal on Software Tools for Technology Transfer (STTT), 14:5, (511-530), Online publication date: 1-Oct-2012.
  668. Ouchani S, Ait Mohamed O and Debbabi M Efficient probabilistic abstraction for SysML activity diagrams Proceedings of the 10th international conference on Software Engineering and Formal Methods, (263-277)
  669. Nejati S, Di Alesio S, Sabetzadeh M and Briand L Modeling and analysis of CPU usage in safety-critical embedded systems to support stress testing Proceedings of the 15th international conference on Model Driven Engineering Languages and Systems, (759-775)
  670. Saffidine A Minimal proof search for modal logic k model checking Proceedings of the 13th European conference on Logics in Artificial Intelligence, (346-358)
  671. Armbrust C, Kiekbusch L, Ropertz T and Berns K Verification of behaviour networks using finite-state automata Proceedings of the 35th Annual German conference on Advances in Artificial Intelligence, (1-12)
  672. ACM
    Dimovski A Parameterized verification of open procedural programs Proceedings of the Fifth Balkan Conference in Informatics, (180-185)
  673. Cauchi A, Gimblett A, Thimbleby H, Curzon P and Masci P Safer "5-key" number entry user interfaces using differential formal analysis Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, (29-38)
  674. Calvanese D, De Giacomo G, Lembo D, Montali M and Santoso A Ontology-based governance of data-aware processes Proceedings of the 6th international conference on Web Reasoning and Rule Systems, (25-41)
  675. van der Hoek W and Wooldridge M (2012). Logics for Multiagent Systems, AI Magazine, 33:3, (92-105), Online publication date: 1-Sep-2012.
  676. ACM
    Zhang X, Shrestha B, Yoon S, Kambhampati S, DiBona P, Guo J, McFarlane D, Hofmann M, Whitebread K, Appling D, Whitaker E, Trewhitt E, Ding L, Michaelis J, McGuinness D, Hendler J, Doppa J, Parker C, Dietterich T, Tadepalli P, Wong W, Green D, Rebguns A, Spears D, Kuter U, Levine G, DeJong G, MacTavish R, Ontañón S, Radhakrishnan J, Ram A, Mostafa H, Zafar H, Zhang C, Corkill D, Lesser V and Song Z (2012). An Ensemble Architecture for Learning Complex Problem-Solving Techniques from Demonstration, ACM Transactions on Intelligent Systems and Technology, 3:4, (1-38), Online publication date: 1-Sep-2012.
  677. Monzón A, Fernández J and de la Puente J (2012). Application of Deadlock Risk Evaluation of Architectural Models, Software—Practice & Experience, 42:9, (1137-1163), Online publication date: 1-Sep-2012.
  678. ACM
    Méry D and Singh N Critical systems development methodology using formal techniques Proceedings of the 3rd Symposium on Information and Communication Technology, (3-12)
  679. ACM
    Šubelj L and Bajec M Software systems through complex networks science Proceedings of the First International Workshop on Software Mining, (9-16)
  680. ACM
    Nagarakatte S, Burckhardt S, Martin M and Musuvathi M (2012). Multicore acceleration of priority-based schedulers for concurrency bug detection, ACM SIGPLAN Notices, 47:6, (543-554), Online publication date: 6-Aug-2012.
  681. ACM
    Venu B and Singh A Formal verification methodology considerations for network on chips Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (220-225)
  682. Penczek W, Woźna-Szcześniak B and Zbrzezny A (2012). Towards SAT-based BMC for LTLK over Interleaved Interpreted Systems, Fundamenta Informaticae, 119:3-4, (373-392), Online publication date: 1-Aug-2012.
  683. Fioravanti F, Pettorossi A, Proietti M and Senni V (2012). Improving Reachability Analysis of Infinite State Systems by Specialization, Fundamenta Informaticae, 119:3-4, (281-300), Online publication date: 1-Aug-2012.
  684. Ditter A, Češka M and Lüttgen G On parallel software verification using boolean equation systems Proceedings of the 19th international conference on Model Checking Software, (80-97)
  685. ACM
    Aleb N and Kechid S A new framework for scalable genetic programming Proceedings of the 14th annual conference companion on Genetic and evolutionary computation, (487-492)
  686. Lal A, Qadeer S and Lahiri S A solver for reachability modulo theories Proceedings of the 24th international conference on Computer Aided Verification, (427-443)
  687. Drábik P, Maggiolo-Schettini A and Milazzo P (2012). On Conditions for Modular Verification in Systems of Synchronising Components, Fundamenta Informaticae, 120:3-4, (259-274), Online publication date: 1-Jul-2012.
  688. De Angelis E, Pettorossi A and Proietti M (2012). Synthesizing Concurrent Programs Using Answer Set Programming, Fundamenta Informaticae, 120:3-4, (205-229), Online publication date: 1-Jul-2012.
  689. Emmer M, Khasidashvili Z, Korovin K, Sticksel C and Voronkov A EPR-based bounded model checking at word level Proceedings of the 6th international joint conference on Automated Reasoning, (210-224)
  690. Platzer A Logics of Dynamical Systems Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (13-24)
  691. Męski A, Penczek W, Szreter M, Woźna-Szcześniak B and Zbrzezny A Two approaches to bounded model checking for linear time logic with knowledge Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications, (514-523)
  692. Woźna-Szcześniak B and Zbrzezny A SAT-Based bounded model checking for deontic interleaved interpreted systems Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications, (494-503)
  693. Zhang F, Nielson F and Nielson H Model checking as static analysis Proceedings of the 9th international conference on Integrated Formal Methods, (99-112)
  694. Blackmore T, Halliwell D, Barker P, Eder K and Ramaram N Analysing and closing simulation coverage by automatic generation and verification of formal properties from coverage reports Proceedings of the 9th international conference on Integrated Formal Methods, (84-98)
  695. Kindermann R, Junttila T and Niemelä I Beyond lassos Proceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems, (84-100)
  696. Johnson T and Mitra S A small model theorem for rectangular hybrid automata networks Proceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems, (18-34)
  697. ACM
    Kuperstein M, Vechev M and Yahav E (2012). Automatic inference of memory fences, ACM SIGACT News, 43:2, (108-123), Online publication date: 11-Jun-2012.
  698. ACM
    Nagarakatte S, Burckhardt S, Martin M and Musuvathi M Multicore acceleration of priority-based schedulers for concurrency bug detection Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, (543-554)
  699. Faria J, Martins J and Pinto J An approach to model checking ada programs Proceedings of the 17th Ada-Europe international conference on Reliable Software Technologies, (105-118)
  700. Belardinelli F, Lomuscio A and Patrizi F An abstraction technique for the verification of artifact-centric systems Proceedings of the Thirteenth International Conference on Principles of Knowledge Representation and Reasoning, (319-328)
  701. Rocha L and Andrade R Towards a formal model to reason about context-aware exception handling Proceedings of the 5th International Workshop on Exception Handling, (27-33)
  702. Meski A, Penczek W, Szreter M, Woźna-Szcześniak B and Zbrzezny A Bounded model checking for knowledge and linear time Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, (1447-1448)
  703. Jones A, Knapik M, Penczek W and Lomuscio A Group synthesis for parametric temporal-epistemic logic Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (1107-1114)
  704. Knobbout M and Dastani M Reasoning under compliance assumptions in normative multiagent systems Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (331-340)
  705. Chockler H and Ruah S Verification of software changes with ExpliSAT Proceedings of the 4th International Workshop on Hot Topics in Software Upgrades, (31-35)
  706. ACM
    Keng B and Veneris A Path directed abstraction and refinement in SAT-based design debugging Proceedings of the 49th Annual Design Automation Conference, (947-954)
  707. ACM
    Seshia S Sciduction Proceedings of the 49th Annual Design Automation Conference, (356-365)
  708. ACM
    Chou C, Ho Y, Hsieh C and Huang C Symbolic model checking on SystemC designs Proceedings of the 49th Annual Design Automation Conference, (327-333)
  709. Vakili A and Day N Avestan Proceedings of the 4th International Workshop on Modeling in Software Engineering, (36-42)
  710. Cordy M, Classen A, Perrouin G, Schobbens P, Heymans P and Legay A Simulation-based abstractions for software product-line model checking Proceedings of the 34th International Conference on Software Engineering, (672-682)
  711. He X, Kumar R, Mu L, Gjøsæter T and Li F (2012). Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol, Computer Standards & Interfaces, 34:4, (343-354), Online publication date: 1-Jun-2012.
  712. ACM
    Fantechi A, Gnesi S, Lapadula A, Mazzanti F, Pugliese R and Tiezzi F (2012). A logical verification methodology for service-oriented computing, ACM Transactions on Software Engineering and Methodology, 21:3, (1-46), Online publication date: 1-Jun-2012.
  713. ACM
    Hatcliff J, Leavens G, Leino K, Müller P and Parkinson M (2012). Behavioral interface specification languages, ACM Computing Surveys, 44:3, (1-58), Online publication date: 1-Jun-2012.
  714. Rodrigues Vieira E, Vieira D and Gallois J (2012). Challenges of a Validation Process Based on Models: An Industrial Case Study, Bell Labs Technical Journal, 17:1, (229-246), Online publication date: 1-Jun-2012.
  715. Mostafazadeh N, Bakhshandeh Babarsad O and Ghassem-Sani G Formal verification of temporal questions in the context of query-answering text summarization Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence, (350-355)
  716. Pralet C and Verfaillie G Combining static and dynamic models for boosting forward planning Proceedings of the 9th international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (322-338)
  717. Kazemian P, Varghese G and McKeown N Header space analysis Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (9-9)
  718. ACM
    Borri A, Pola G and Di Benedetto M A symbolic approach to the design of nonlinear networked control systems Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (255-264)
  719. ACM
    Aydin Gol E, Lazar M and Belta C Language-guided controller synthesis for discrete-time linear systems Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (95-104)
  720. ACM
    Topcu U, Ozay N, Liu J and Murray R On synthesizing robust discrete controllers under modeling uncertainty Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (85-94)
  721. Johnson T and Mitra S Parametrized Verification of Distributed Cyber-Physical Systems Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, (161-170)
  722. Dey P, Amin M, Romney G, Sinha B, Gonzales R, Farahani A and Badkoobehi H (2012). Relating automata to other fields, Journal of Computing Sciences in Colleges, 27:4, (168-173), Online publication date: 1-Apr-2012.
  723. ACM
    Bakhouya M, Campbell R, Coronato A, Pietro G and Ranganathan A (2012). Introduction to special section on formal methods in pervasive computing, ACM Transactions on Autonomous and Adaptive Systems, 7:1, (1-9), Online publication date: 1-Apr-2012.
  724. Hwang M Qualitative verification of finite and real-time DEVS networks Proceedings of the 2012 Symposium on Theory of Modeling and Simulation - DEVS Integrative M&S Symposium, (1-8)
  725. ACM
    Keshishzadeh S, Izadi M and Movaghar A A Büchi automata based model checking framework for reo connectors Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1536-1543)
  726. Fajstrup L, Goubault É, Haucourt E, Mimram S and Raussen M Trace spaces Proceedings of the 21st European conference on Programming Languages and Systems, (274-294)
  727. Yang J, Balakrishnan G, Maeda N, Ivančić F, Gupta A, Sinha N, Sankaranarayanan S and Sharma N Object model construction for inheritance in c++ and its applications to program analysis Proceedings of the 21st international conference on Compiler Construction, (144-164)
  728. Milushev D and Clarke D Towards incrementalization of holistic hyperproperties Proceedings of the First international conference on Principles of Security and Trust, (329-348)
  729. ACM
    Lyons D, Jiang S, Arkin R, Nirmal P, Fox S and Zafar M Characterizing performance guarantees for multiagent, real-time systems operating in noisy and uncertain environments Proceedings of the Workshop on Performance Metrics for Intelligent Systems, (114-120)
  730. Dräger K and Kwiatkowska M Towards communication-based steering of complex distributed systems Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management, (353-368)
  731. Colange M, Hillah L, Kordon F and Parutto P Extreme symmetries in complex distributed systems Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management, (330-352)
  732. Calinescu R, Kikuchi S and Johnson K Compositional reverification of probabilistic safety properties for large-scale complex IT systems Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management, (303-329)
  733. Soeken M, Wille R and Drechsler R Eliminating invariants in UML/OCL models Proceedings of the Conference on Design, Automation and Test in Europe, (1142-1145)
  734. Haedicke F, Große D and Drechsler R A guiding coverage metric for formal verification Proceedings of the Conference on Design, Automation and Test in Europe, (617-622)
  735. Yordanov B, Appleton E, Ganguly R, Gol E, Carr S, Bhatia S, Haddock T, Belta C and Densmore D Experimentally driven verification of synthetic biological circuits Proceedings of the Conference on Design, Automation and Test in Europe, (236-241)
  736. Rajeev A, Mohalik S and Ramesh S Verifying timing synchronization constraints in distributed embedded architectures Proceedings of the Conference on Design, Automation and Test in Europe, (200-205)
  737. Bulychev P, David A, Guldstrand Larsen K, Legay A, Li G, Bøgsted Poulsen D and Stainer A Monitor-Based statistical model checking for weighted metric temporal logic Proceedings of the 18th international conference on Logic for Programming, Artificial Intelligence, and Reasoning, (168-182)
  738. Benedikt M, Bourhis P and Ley C (2012). Querying schemas with access restrictions, Proceedings of the VLDB Endowment, 5:7, (634-645), Online publication date: 1-Mar-2012.
  739. ACM
    Fischbein D, D’Ippolito N, Brunet G, Chechik M and Uchitel S (2012). Weak Alphabet Merging of Partial Behavior Models, ACM Transactions on Software Engineering and Methodology, 21:2, (1-47), Online publication date: 1-Mar-2012.
  740. Lindsay P, Yatapanage N and Winter K (2012). Cut Set Analysis using Behavior Trees and model checking, Formal Aspects of Computing, 24:2, (249-266), Online publication date: 1-Mar-2012.
  741. ACM
    Banerjee A, Ray S, Dasgupta P, Chakrabarti P, Ramesh S, Vignesh P and Ganesan V (2012). A dynamic assertion-based verification platform for validation of UML designs, ACM SIGSOFT Software Engineering Notes, 37:1, (1-14), Online publication date: 27-Jan-2012.
  742. ACM
    Cordy M, Classen A, Schobbens P, Heymans P and Legay A Managing evolution in software product lines Proceedings of the 6th International Workshop on Variability Modeling of Software-Intensive Systems, (183-191)
  743. ACM
    Cousot P and Cousot R An abstract interpretation framework for termination Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (245-258)
  744. ACM
    Basu S, Bultan T and Ouederni M Deciding choreography realizability Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (191-202)
  745. Albarghouthi A, Gurfinkel A and Chechik M Whale Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (39-55)
  746. Klein U, Piterman N and Pnueli A Effective synthesis of asynchronous systems from GR(1) specifications Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (283-298)
  747. Howar F, Steffen B, Jonsson B and Cassel S Inferring canonical register automata Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (251-266)
  748. Kupferman O Recent challenges and ideas in temporal synthesis Proceedings of the 38th international conference on Current Trends in Theory and Practice of Computer Science, (88-98)
  749. ACM
    Cousot P and Cousot R (2012). An abstract interpretation framework for termination, ACM SIGPLAN Notices, 47:1, (245-258), Online publication date: 18-Jan-2012.
  750. ACM
    Basu S, Bultan T and Ouederni M (2012). Deciding choreography realizability, ACM SIGPLAN Notices, 47:1, (191-202), Online publication date: 18-Jan-2012.
  751. ACM
    Braverman M, Grigo A and Rojas C Noise vs computational intractability in dynamics Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (128-141)
  752. Lomuscio A and Penczek W Symbolic model checking for temporal-epistemic logic Logic Programs, Norms and Action, (172-195)
  753. Ortmeier F (2012). Dependability in Pervasive Computing, Journal of Information Technology Research, 5:1, (1-17), Online publication date: 1-Jan-2012.
  754. Dhaussy P, Boniol F, Roger J and Leroux L (2012). Improving model checking with context modelling, Advances in Software Engineering, 2012, (9-9), Online publication date: 1-Jan-2012.
  755. ACM
    Abeywickrama D and Ramakrishnan S (2012). Context-aware services engineering, ACM Transactions on Internet Technology, 11:3, (1-28), Online publication date: 1-Jan-2012.
  756. ACM
    Gurfinkel A and Chechik M (2012). Robust Vacuity for Branching Temporal Logic, ACM Transactions on Computational Logic, 13:1, (1-32), Online publication date: 1-Jan-2012.
  757. Chupilko M (2012). Developing test systems for multi-modules hardware designs, Programming and Computing Software, 38:1, (34-42), Online publication date: 1-Jan-2012.
  758. Kamide N Reasoning about time-dependent multi-agents Transactions on Compuational Collective Intelligence VI, (181-201)
  759. ACM
    Poroor J and Jayaraman B Formal specification and verification of vehicular handoff using π-calculus Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, (165-168)
  760. Blair G, Bennaceur A, Georgantas N, Grace P, Issarny V, Nundloll V and Paolucci M The role of ontologies in emergent middleware Proceedings of the 12th International Middleware Conference, (400-419)
  761. Blair G, Bennaceur A, Georgantas N, Grace P, Issarny V, Nundloll V and Paolucci M The role of ontologies in emergent middleware Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware, (410-430)
  762. Khasidashvili Z and Nadel A Implicative simultaneous satisfiability and applications Proceedings of the 7th international Haifa Verification conference on Hardware and Software: verification and testing, (66-79)
  763. Dolev S, Goldfeld J and Puzis R On-Line detection and prediction of temporal patterns Proceedings of the 7th international Haifa Verification conference on Hardware and Software: verification and testing, (254-256)
  764. Bosse T, Hoogendoorn M, Klein M and Treur J (2011). An ambient agent model for monitoring and analysing dynamics of complex human behaviour, Journal of Ambient Intelligence and Smart Environments, 3:4, (283-303), Online publication date: 1-Dec-2011.
  765. Bosse T, Hoogendoom M, Klein M and Treur J (2011). An ambient agent model for monitoring and analysing dynamics of complex human behaviour, Journal of Ambient Intelligence and Smart Environments, 3:4, (283-303), Online publication date: 1-Dec-2011.
  766. Talamo M, Galinium M, Schunck C and Arcieri F Interleaving command sequences Proceedings of the 10th WSEAS international conference on Computational Intelligence, Man-Machine Systems and Cybernetics, and proceedings of the 10th WSEAS international conference on Information Security and Privacy, (102-107)
  767. Castro P, Kilmurray C, Acosta A and Aguirre N dCTL Proceedings of the 9th international conference on Software engineering and formal methods, (106-121)
  768. Vassev E and Hinchey M Developing model-checking mechanisms for ASSL Proceedings of the 9th international conference on Software engineering and formal methods, (19-34)
  769. ACM
    Park C, Sen K, Hargrove P and Iancu C Efficient data race detection for distributed memory parallel programs Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, (1-12)
  770. Althoff M, Rajhans A, Krogh B, Yaldiz S, Li X and Pileggi L Formal verification of phase-locked loops using reachability analysis and continuization Proceedings of the International Conference on Computer-Aided Design, (659-666)
  771. Vakili A Analyzing temporal properties of abstract models Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (656-659)
  772. Vakili A and Day N Using model checking to analyze static properties of declarative models Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (428-431)
  773. Leungwattanakit W, Artho C, Hagiya M, Tanabe Y and Yamamoto M Model checking distributed systems by combining caching and process checkpointing Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (103-112)
  774. ACM
    Alur R, Chaudhuri S and Madhusudan P (2011). Software model checking using languages of nested trees, ACM Transactions on Programming Languages and Systems, 33:5, (1-45), Online publication date: 1-Nov-2011.
  775. Bingham B, Greenstreet M and Bingham J Parameterized verification of deadlock freedom in symmetric cache coherence protocols Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (186-195)
  776. Siddique U and Hasan O Formal analysis of fractional order systems in HOL Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (163-170)
  777. Chockler H, Ivrii A, Matsliah A, Moran S and Nevo Z Incremental formal verification of hardware Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (135-143)
  778. Mezzanzanica M, Boselli R, Cesarini M and Mercorio F Data quality through model checking techniques Proceedings of the 10th international conference on Advances in intelligent data analysis X, (270-281)
  779. Xing Z, Sun J, Liu Y and Dong J Differencing labeled transition systems Proceedings of the 13th international conference on Formal methods and software engineering, (537-552)
  780. ACM
    Jayaraman K, Ganesh V, Tripunitara M, Rinard M and Chapin S Automatic error finding in access-control policies Proceedings of the 18th ACM conference on Computer and communications security, (163-174)
  781. Carrillo M and Rosenblueth D Nondeterministic update of CTL models by preserving satisfaction through protections Proceedings of the 9th international conference on Automated technology for verification and analysis, (60-74)
  782. Wozna-Szczesniak B, Zbrzezny A and Zbrzezny A The BMC method for the existential part of RTCTLK and interleaved interpreted systems Proceedings of the 15th Portugese conference on Progress in artificial intelligence, (551-565)
  783. Löwe B, Pacuit E and Witzel A DEL planning and some tractable cases Proceedings of the Third international conference on Logic, rationality, and interaction, (179-192)
  784. ACM
    Fournier L, Ziv A, Kutsy E and Strichman O (2011). A probabilistic analysis of coverage methods, ACM Transactions on Design Automation of Electronic Systems, 16:4, (1-20), Online publication date: 1-Oct-2011.
  785. ACM
    Fisher J, Harel D and Henzinger T (2011). Biology as reactivity, Communications of the ACM, 54:10, (72-82), Online publication date: 1-Oct-2011.
  786. Kaneiwa K and Kamide N (2011). Paraconsistent Computation Tree Logic, New Generation Computing, 29:4, (391-408), Online publication date: 1-Oct-2011.
  787. Aleb N, Tamen Z and Kamel N An evolutionary approach for program model checking Proceedings of the First international conference on Model and data engineering, (186-199)
  788. Fioravanti F, Pettorossi A, Proietti M and Senni V Improving reachability analysis of infinite state systems by specialization Proceedings of the 5th international conference on Reachability problems, (165-179)
  789. Leucker M Teaching runtime verification Proceedings of the Second international conference on Runtime verification, (34-48)
  790. Wang S, Ayoub A, Sokolsky O and Lee I Runtime verification of traces under recording uncertainty Proceedings of the Second international conference on Runtime verification, (442-456)
  791. Křena B, Letko Z and Vojnar T Coverage metrics for saturation-based and search-based testing of concurrent software Proceedings of the Second international conference on Runtime verification, (177-192)
  792. Dinculescu M, Hundt C, Panangaden P, Pineau J and Precup D The duality of state and observation in probabilistic transition systems Proceedings of the 9th international conference on Logic, Language, and Computation, (206-230)
  793. Zhang G, Di H, Rong M and Shi H Specification and verification of data and time in web service composition Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II, (436-443)
  794. Zhang G, Shi H, Rong M and Di H Model checking for asynchronous web service composition based on XYZ/ADL Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II, (428-435)
  795. Fantechi A and Gnesi S On the adoption of model checking in safety-related software industry Proceedings of the 30th international conference on Computer safety, reliability, and security, (383-396)
  796. Webster M, Fisher M, Cameron N and Jump M Formal methods for the certification of autonomous unmanned aircraft systems Proceedings of the 30th international conference on Computer safety, reliability, and security, (228-242)
  797. Bonichon R, Canet G, Correnson L, Goubault E, Haucourt E, Hirschowitz M, Labbé S and Mimram S Rigorous evidence of freedom from concurrency faults in industrial control software Proceedings of the 30th international conference on Computer safety, reliability, and security, (85-98)
  798. Yeung W (2011). A formal and visual modeling approach to choreography based web services composition and conformance verification, Expert Systems with Applications: An International Journal, 38:10, (12772-12785), Online publication date: 15-Sep-2011.
  799. Fisher J, Henzinger T, Nickovic D, Piterman N, Singh A and Vardi M Dynamic reactive modules Proceedings of the 22nd international conference on Concurrency theory, (404-418)
  800. ACM
    Bauer A, Leucker M and Schallhart C (2011). Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, 20:4, (1-64), Online publication date: 1-Sep-2011.
  801. Grigore E, Eder K, Lenz A, Skachek S, Pipe A and Melhuish C Towards safe human-robot interaction Proceedings of the 12th Annual conference on Towards autonomous robotic systems, (323-335)
  802. Maggi F, Montali M, Westergaard M and Van Der Aalst W Monitoring business constraints with linear temporal logic Proceedings of the 9th international conference on Business process management, (132-147)
  803. Lohmann N Compliance by design for artifact-centric business processes Proceedings of the 9th international conference on Business process management, (99-115)
  804. Rocha C and Meseguer J Proving safety properties of rewrite theories Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (314-328)
  805. Hasuo I The microcosm principle and compositionality of GSOS-based component calculi Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (222-236)
  806. Gupta G, Saeedloei N, DeVries B, Min R, Marple K and Kluźniak F Infinite computation, co-induction and computational logic Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (40-54)
  807. Daskaya I, Huhn M and Milius S Formal safety analysis in industrial practice Proceedings of the 16th international conference on Formal methods for industrial critical systems, (68-84)
  808. Méry D and Singh N Formalization of heart models based on the conduction of electrical impulses and cellular automata Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems, (140-159)
  809. Méry D and Singh N Medical protocol diagnosis using formal methods Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems, (1-20)
  810. Ipate F, Lefticaru R, Pérez-Hurtado I, Pérez-Jiménez M and Tudose C Formal verification of p systems with active membranes through model checking Proceedings of the 12th international conference on Membrane Computing, (215-225)
  811. Hostettler S, Marechal A, Linard A, Risoldi M and Buchs D (2011). High-Level Petri Net Model Checking with AlPiNA, Fundamenta Informaticae, 113:3-4, (229-264), Online publication date: 1-Aug-2011.
  812. Carbone R (2011). LTL model-checking for security protocols, AI Communications, 24:3, (281-283), Online publication date: 1-Aug-2011.
  813. Ataullah A and Tompa F (2020). Business policy modeling and enforcement in databases, Proceedings of the VLDB Endowment, 4:11, (921-931), Online publication date: 1-Aug-2011.
  814. Alrajeh D, Russo A, Uchitel S and Kramer J Integrating model checking and inductive logic programming Proceedings of the 21st international conference on Inductive Logic Programming, (45-60)
  815. ACM
    Uchio S, Ubayashi N and Kamei Y CJAdviser Proceedings of the 3rd ACM International Workshop on Context-Oriented Programming, (1-6)
  816. ACM
    Krepska E, Kielmann T, Fokkink W and Bal H (2011). HipG, ACM SIGOPS Operating Systems Review, 45:2, (3-13), Online publication date: 18-Jul-2011.
  817. Fioravanti F, Pettorossi A, Proietti M and Senni V Using real relaxations during program specialization Proceedings of the 21st international conference on Logic-Based Program Synthesis and Transformation, (106-122)
  818. Seki H Proving properties of co-logic programs by unfold/fold transformations Proceedings of the 21st international conference on Logic-Based Program Synthesis and Transformation, (205-220)
  819. ACM
    Segall I, Tzoref-Brill R and Farchi E Using binary decision diagrams for combinatorial test design Proceedings of the 2011 International Symposium on Software Testing and Analysis, (254-264)
  820. ACM
    Babić D, Martignoni L, McCamant S and Song D Statically-directed dynamic automated test generation Proceedings of the 2011 International Symposium on Software Testing and Analysis, (12-22)
  821. Mateescu R and Wijs A Property-dependent reductions for the modal Mu-calculus Proceedings of the 18th international SPIN conference on Model checking software, (2-19)
  822. Raman V and Kress-Gazit H Analyzing unsynthesizable specifications for high-level robot behavior using LTLMoP Proceedings of the 23rd international conference on Computer aided verification, (663-668)
  823. Cook B, Koskinen E and Vardi M Temporal property verification as a program analysis task Proceedings of the 23rd international conference on Computer aided verification, (333-348)
  824. ACM
    Huang X, Luo C and van der Meyden R Symbolic model checking of probabilistic knowledge Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge, (177-186)
  825. ACM
    Ball T, Levin V and Rajamani S (2011). A decade of software model checking with SLAM, Communications of the ACM, 54:7, (68-76), Online publication date: 1-Jul-2011.
  826. Yang L, Dang Z and Fischer T (2011). Information gain of black-box testing, Formal Aspects of Computing, 23:4, (513-539), Online publication date: 1-Jul-2011.
  827. Tan L State coverage metrics for specification-based testing with Büchi automata Proceedings of the 5th international conference on Tests and proofs, (171-186)
  828. Meinke K and Sindhu M Incremental learning-based testing for reactive systems Proceedings of the 5th international conference on Tests and proofs, (134-151)
  829. Wan W, Bentahar J and Hamza A Model checking epistemic and probabilistic properties of multi-agent systems Proceedings of the 24th international conference on Industrial engineering and other applications of applied intelligent systems conference on Modern approaches in applied intelligence - Volume Part II, (68-78)
  830. El-Menshawy M, Bentahar J and Dssouli R Model checking commitment protocols Proceedings of the 24th international conference on Industrial engineering and other applications of applied intelligent systems conference on Modern approaches in applied intelligence - Volume Part II, (37-47)
  831. Garanina N Exponential acceleration of model checking for perfect recall systems Proceedings of the 8th international conference on Perspectives of System Informatics, (111-124)
  832. Awad A, Goré R, Thomson J and Weidlich M An iterative approach for business process template synthesis from compliance rules Proceedings of the 23rd international conference on Advanced information systems engineering, (406-421)
  833. Haxthausen A, Kjær A and Bliguet M Formal development of a tool for automated modelling and verification of relay interlocking systems Proceedings of the 17th international conference on Formal methods, (118-132)
  834. ACM
    Heinzemann C and Henkler S Reusing dynamic communication protocols in self-adaptive embedded component architectures Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, (109-118)
  835. ACM
    Naldurg P and K.R. R SEAL Proceedings of the 16th ACM symposium on Access control models and technologies, (83-92)
  836. ACM
    Thimbleby H, Gimblett A and Cauchi A Buffer automata Proceedings of the 3rd ACM SIGCHI symposium on Engineering interactive computing systems, (73-78)
  837. Asirelli P, Beek M, Fantechi A and Gnesi S A model-checking tool for families of services Proceedings of the joint 13th IFIP WG 6.1 and 30th IFIP WG 6.1 international conference on Formal techniques for distributed systems, (44-58)
  838. ACM
    Rahim L and Whittle J Identifying state space reduction techniques from behavioural design patterns Proceedings of the Third Workshop on Behavioural Modelling, (49-55)
  839. ACM
    Holcomb D, Brady B and Seshia S Abstraction-based performance verification of NoCs Proceedings of the 48th Design Automation Conference, (492-497)
  840. ACM
    He N, Rümmer P and Kroening D Test-case generation for embedded simulink via formal concept analysis Proceedings of the 48th Design Automation Conference, (224-229)
  841. ACM
    Ramesh S and Gadkari A Rigorous model-based design & verification flow for in-vehicle software Proceedings of the 48th Design Automation Conference, (13-16)
  842. ACM
    Bu L, Wang Q, Chen X, Wang L, Zhang T, Zhao J and Li X (2011). Toward online hybrid systems model checking of cyber-physical systems' time-bounded short-run behavior, ACM SIGBED Review, 8:2, (7-10), Online publication date: 1-Jun-2011.
  843. ACM
    Zhang S Scalable automatic linearizability checking Proceedings of the 33rd International Conference on Software Engineering, (1185-1187)
  844. ACM
    Filieri A, Ghezzi C and Tamburrelli G Run-time efficient probabilistic model checking Proceedings of the 33rd International Conference on Software Engineering, (341-350)
  845. Taktak S and Kristensen L Formal modelling and initial validation of the chelonia distributed storage system Proceedings of the 6th international conference on Advances in grid and pervasive computing, (127-137)
  846. Köster M and Lohmann P Abstraction for model checking modular interpreted systems over ATL Proceedings of the 9th international conference on Programming Multi-Agent Systems, (95-113)
  847. El Menshawy M, Bentahar J, Qu H and Dssouli R On the verification of social commitments and time The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (483-490)
  848. Napp N and Klavins E (2011). A compositional framework for programming stochastically interacting robots, International Journal of Robotics Research, 30:6, (713-729), Online publication date: 1-May-2011.
  849. ACM
    Nielson F, Nanz S and Nielson H (2011). Modal abstractions of concurrent behavior, ACM Transactions on Computational Logic, 12:3, (1-40), Online publication date: 1-May-2011.
  850. Rozier K (2011). Survey, Computer Science Review, 5:2, (163-203), Online publication date: 1-May-2011.
  851. Turner R (2011). Specification, Minds and Machines, 21:2, (135-152), Online publication date: 1-May-2011.
  852. Angius N and Tamburrini G (2011). Scientific Theories of Computational Systems in Model Checking, Minds and Machines, 21:2, (323-336), Online publication date: 1-May-2011.
  853. Katoen J Model checking Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering, (1-14)
  854. Meulen J and Pecheur C Combining partial-order reduction and symbolic model checking to verify LTL properties Proceedings of the Third international conference on NASA Formal methods, (406-421)
  855. Kumazawa T and Tamai T Counter example-based error localization of behavior models Proceedings of the Third international conference on NASA Formal methods, (222-236)
  856. ACM
    Geilen M, Tripakis S and Wiggers M The earlier the better Proceedings of the 14th international conference on Hybrid systems: computation and control, (23-32)
  857. Napoli M and Parente M Graded CTL model checking for test generation Proceedings of the 2011 Symposium on Theory of Modeling & Simulation: DEVS Integrative M&S Symposium, (59-66)
  858. Cesta A, Fratini S, Orlandini A, Finzi A and Tronci E (2011). Flexible Plan Verification: Feasibility Results, Fundamenta Informaticae, 107:2-3, (111-137), Online publication date: 1-Apr-2011.
  859. Doberkat E and Schubert C (2011). Coalgebraic logic over general measurable spaces ??? a survey, Mathematical Structures in Computer Science, 21:2, (175-234), Online publication date: 1-Apr-2011.
  860. ACM
    Basu S and Bultan T Choreography conformance via synchronizability Proceedings of the 20th international conference on World wide web, (795-804)
  861. Li J, Xie F, Ball T and Levin V Model checking büchi pushdown systems Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software, (141-155)
  862. Cimatti A, Narasamdya I and Roveri M Boosting lazy abstraction for systemc with partial order reduction Proceedings of the 17th international conference on Tools and algorithms for the construction and analysis of systems: part of the joint European conferences on theory and practice of software, (341-356)
  863. ACM
    Disenfeld C and Katz S Compositional verification of events and observers Proceedings of the 10th international workshop on Foundations of aspect-oriented languages, (1-5)
  864. ACM
    Cook B and Koskinen E Making prophecies with decision predicates Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (399-410)
  865. ACM
    Cook B and Koskinen E (2011). Making prophecies with decision predicates, ACM SIGPLAN Notices, 46:1, (399-410), Online publication date: 26-Jan-2011.
  866. Howar F, Steffen B and Merten M Automata learning with automated alphabet abstraction refinement Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation, (263-277)
  867. Frohardt R, Chang B and Sankaranarayanan S Access nets Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation, (184-198)
  868. Ober I and Dragomir I Unambiguous UML composite structures Proceedings of the 37th international conference on Current trends in theory and practice of computer science, (418-430)
  869. McCabe-Dansted J On the succinctness of RoCTL Proceedings of the Seventeenth Computing on The Australasian Theory Symposium - Volume 119, (85-94)
  870. Ware S and Malik R A process-algebraic semantics for generalised nonblocking Proceedings of the Seventeenth Computing on The Australasian Theory Symposium - Volume 119, (75-84)
  871. McCabe-Dansted J On the succinctness of RoCTL Proceedings of the Seventeenth Computing: The Australasian Theory Symposium - Volume 119, (85-94)
  872. Ware S and Malik R A process-algebraic semantics for generalised nonblocking Proceedings of the Seventeenth Computing: The Australasian Theory Symposium - Volume 119, (75-84)
  873. Cui C, Dang Z and Fischer T (2011). Typical Paths of a Graph, Fundamenta Informaticae, 110:1-4, (95-109), Online publication date: 1-Jan-2011.
  874. Crafa S, Ranzato F and Tapparo F (2011). Saving Space in a Time Efficient Simulation Algorithm, Fundamenta Informaticae, 108:1-2, (23-42), Online publication date: 1-Jan-2011.
  875. Belardinelli F, Jones A and Lomuscio A (2011). Model Checking Temporal-Epistemic Logic Using Alternating Tree Automata, Fundamenta Informaticae, 112:1, (19-37), Online publication date: 1-Jan-2011.
  876. Bosse T and Treur J Patterns in world dynamics indicating agency Transactions on computational collective intelligence III, (128-151)
  877. Ceterchi R and Tomescu A Computing the maximum bisimulation with spiking neural P systems Computation, cooperation, and life, (151-157)
  878. Carbone R, Minea M, Mödersheim S, Ponta S, Turuani M and Viganò L Towards formal validation of trust and security in the internet of services The future internet, (193-207)
  879. Salamah S, Gates A, Roach S and Engskow M (2011). Towards support for software model checking, Advances in Software Engineering, 2011, (1-13), Online publication date: 1-Jan-2011.
  880. Ficco M, Pietrantuono R and Russo S (2011). Bug localization in test-driven development, Advances in Software Engineering, 2011, (1-18), Online publication date: 1-Jan-2011.
  881. ACM
    Viana A, Maag S and Zaidi F (2011). One step forward, ACM Computing Surveys, 43:2, (1-36), Online publication date: 1-Jan-2011.
  882. ACM
    Bauland M, Mundhenk M, Schneider T, Schnoor H, Schnoor I and Vollmer H (2011). The tractability of model checking for LTL, ACM Transactions on Computational Logic, 12:2, (1-28), Online publication date: 1-Jan-2011.
  883. Dix J and Fisher M (2011). Where logic and agents meet, Annals of Mathematics and Artificial Intelligence, 61:1, (15-28), Online publication date: 1-Jan-2011.
  884. Bäumler S, Schellhorn G, Tofan B and Reif W (2011). Proving linearizability with temporal logic, Formal Aspects of Computing, 23:1, (91-112), Online publication date: 1-Jan-2011.
  885. Chen M, Wu K, Xu J and He P A new method for formalizing optimistic fair exchange protocols Proceedings of the 12th international conference on Information and communications security, (251-265)
  886. Chen M, Wu K, Xu J and He P A New Method for Formalizing Optimistic Fair Exchange Protocols Information and Communications Security, (251-265)
  887. ACM
    Adler R, Schaefer I, Trapp M and Poetzsch-Heffter A (2011). Component-based modeling and verification of dynamic adaptation in safety-critical embedded systems, ACM Transactions on Embedded Computing Systems, 10:2, (1-39), Online publication date: 1-Dec-2010.
  888. Ezekiel J and Lomuscio A A methodology for automatic diagnosability analysis Proceedings of the 12th international conference on Formal engineering methods and software engineering, (549-564)
  889. Vogelsang A, Fehnker A, Huuck R and Reif W Software metrics in static program analysis Proceedings of the 12th international conference on Formal engineering methods and software engineering, (485-500)
  890. Rabbi F, Wang H and MacCaull W Compensable workflow nets Proceedings of the 12th international conference on Formal engineering methods and software engineering, (122-137)
  891. ACM
    Conboy H, Avrunin G and Clarke L Process-based derivation of requirements for medical devices Proceedings of the 1st ACM International Health Informatics Symposium, (656-665)
  892. ACM
    MacCaull W, Jewers H and Latzel M Using an interdisciplinary approach to develop a knowledge-driven careflow management system for collaborative patient-centred palliative care Proceedings of the 1st ACM International Health Informatics Symposium, (507-511)
  893. Younes H, Clarke E and Zuliani P Statistical verification of probabilistic properties with unbounded until Proceedings of the 13th Brazilian conference on Formal methods: foundations and applications, (144-160)
  894. Ganai M, Wang C and Li W Efficient state space exploration Proceedings of the International Conference on Computer-Aided Design, (786-793)
  895. Hu J, Zhang Y and Li R Towards automatic update of access control policy Proceedings of the 24th international conference on Large installation system administration, (1-7)
  896. ACM
    Yang L, Dang Z, Fischer T, Kim M and Tan L Entropy and software systems Proceedings of the FSE/SDP workshop on Future of software engineering research, (427-432)
  897. ACM
    Sheard T, Stump A and Weirich S Language-based verification will change the world Proceedings of the FSE/SDP workshop on Future of software engineering research, (343-348)
  898. ACM
    Reiss S Writing and using program specifications Proceedings of the FSE/SDP workshop on Future of software engineering research, (299-302)
  899. ACM
    Li G and Gopalakrishnan G Scalable SMT-based verification of GPU kernel functions Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, (187-196)
  900. ACM
    Sinha N and Wang C Staged concurrent program analysis Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, (47-56)
  901. ACM
    Tan L, Bu L, Zhao J and Wang L Analyzing the robustness of FTSP with timed automata Proceedings of the Second Asia-Pacific Symposium on Internetware, (1-4)
  902. Guerra P and Wassermann R Revision of CTL models Proceedings of the 12th Ibero-American conference on Advances in artificial intelligence, (153-162)
  903. Artho C Run-time verification of networked software Proceedings of the First international conference on Runtime verification, (59-73)
  904. Keng B, Safarpour S and Veneris A (2010). Bounded model debugging, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29:11, (1790-1803), Online publication date: 1-Nov-2010.
  905. ACM
    Rajeev A, Mohalik S, Dixit M, Chokshi D and Ramesh S Schedulability and end-to-end latency in distributed ECU networks Proceedings of the tenth ACM international conference on Embedded software, (129-138)
  906. De Menezes M, Do L. Pereira S and De Barros L System design modification with actions Proceedings of the 20th Brazilian conference on Advances in artificial intelligence, (31-40)
  907. Zhao Y and Luo G Satisfiability degree analysis for transition system Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part I, (25-32)
  908. Bensalem S, Bozga M, Legay A, Nguyen T, Sifakis J and Yan R Incremental component-based construction and verification using invariants Proceedings of the 2010 Conference on Formal Methods in Computer-Aided Design, (257-266)
  909. Carvalho A, Carvalho J, Pinto J and De Sousa S Model-checking temporal properties of real-time HTL programs Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II, (191-205)
  910. Baier C, Blechmann T, Klein J, Klüppelholz S and Leister W Design and verification of systems with exogenous coordination using Vereofy Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II, (97-111)
  911. ACM
    Roberson M and Boyapati C (2010). Efficient modular glass box software model checking, ACM SIGPLAN Notices, 45:10, (4-21), Online publication date: 17-Oct-2010.
  912. ACM
    Roberson M and Boyapati C Efficient modular glass box software model checking Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (4-21)
  913. Nakajima S, Ishiguro M and Tanaka K Rewriting logic approach to modeling and analysis of client behavior in open systems Proceedings of the 8th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems, (83-94)
  914. Asirelli P, Beek M, Fantechi A and Gnesi S A logical framework to deal with variability Proceedings of the 8th international conference on Integrated formal methods, (43-58)
  915. ACM
    Cho C, Babi ć D, Shin E and Song D Inference and analysis of formal models of botnet command and control protocols Proceedings of the 17th ACM conference on Computer and communications security, (426-439)
  916. ACM
    van Amstel M, van den Brand M and Engelen L An exercise in iterative domain-specific language design Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), (48-57)
  917. Fu X Conformance verification of privacy policies Proceedings of the 7th international conference on Web services and formal methods, (86-100)
  918. Lohmann N and Wolf K How to implement a theory of correctness in the area of business processes and services Proceedings of the 8th international conference on Business process management, (61-77)
  919. Kelly M and Zhang Y Local model update with an application to sliding window protocol Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV, (11-21)
  920. Konur S, Dixon C and Fisher M Formal verification of probabilistic swarm behaviours Proceedings of the 7th international conference on Swarm intelligence, (440-447)
  921. ACM
    Baier C, Haverkort B, Hermanns H and Katoen J (2010). Performance evaluation and model checking join forces, Communications of the ACM, 53:9, (76-85), Online publication date: 1-Sep-2010.
  922. Ding Y and Hemer D An optimised algorithm to tackle the model explosion problem in CTL model update Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence, (589-594)
  923. ACM
    Wang W, Qin X and Mishra P Temperature- and energy-constrained scheduling in multitasking systems Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design, (85-90)
  924. Jongmans S, Hindriks K and Van Riemsdijk M Model checking agent programs by using the program interpreter Proceedings of the 11th international conference on Computational logic in multi-agent systems, (219-237)
  925. Cimatti A, Mover S, Roveri M and Tonetta S From sequential extended regular expressions to NFA with symbolic labels Proceedings of the 15th international conference on Implementation and application of automata, (87-94)
  926. Claßen J and Lakemeyer G On the Verification of Very Expressive Temporal Properties of Non-terminating Golog Programs Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (887-892)
  927. Bulling N and Farwer B On the (Un-)Decidability of Model Checking Resource-Bounded Agents Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (567-572)
  928. Kwiatkowska M, Lomuscio A and Qu H Parallel Model Checking for Temporal Epistemic Logic Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (543-548)
  929. Jamroga W and Penczek W Specification and verification of multi-agent systems Proceedings of the 2010 conference on ESSLLI 2010, and ESSLLI 2011 conference on Lectures on Logic and Computation, (210-263)
  930. ACM
    Demeyer R, Van Assche M, Langevine L and Vanhoof W Declarative workflows to efficiently manage flexible and advanced business processes Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming, (209-218)
  931. Fioravanti F, Pettorossi A, Proietti M and Senni V Program specialization for verifying infinite state systems Proceedings of the 20th international conference on Logic-based program synthesis and transformation, (164-183)
  932. Ehlers R Symbolic bounded synthesis Proceedings of the 22nd international conference on Computer Aided Verification, (365-379)
  933. ACM
    Křena B, Letko Z, Vojnar T and Ur S A platform for search-based testing of concurrent software Proceedings of the 8th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging, (48-58)
  934. ACM
    Rabinovich E, Etzion O, Ruah S and Archushin S Analyzing the behavior of event processing applications Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, (223-234)
  935. Lomuscio A, Qu H and Russo F Automatic data-abstraction in model checking multi-agent systems Proceedings of the 6th international conference on Model checking and artificial intelligence, (52-68)
  936. Edelkamp S, Kellershoff M and Sulewski D Program model checking via action planning Proceedings of the 6th international conference on Model checking and artificial intelligence, (32-51)
  937. Giacobazzi R and Ranzato F Example-guided abstraction simplification Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II, (211-222)
  938. El-Menshawy M, Bentahar J and Dssouli R Modeling and verifying business interactions via commitments and dialogue actions Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part II, (11-21)
  939. Biswas J, Mokhtari M, Dong J and Yap P Mild dementia care at home - integrating activity monitoring, user interface plasticity and scenario verification Proceedings of the Aging friendly technology for health and independence, and 8th international conference on Smart homes and health telematics, (160-170)
  940. Lê D A characterization of combined traces using labeled stratified order structures Proceedings of the 31st international conference on Applications and Theory of Petri Nets, (104-124)
  941. Valmari A and Hansen H Can stubborn sets be optimal? Proceedings of the 31st international conference on Applications and Theory of Petri Nets, (43-62)
  942. Miner A and Jing Y A formal language toward the unification of model checking and performance evaluation Proceedings of the 17th international conference on Analytical and stochastic modeling techniques and applications, (130-144)
  943. ACM
    Li W, Forin A and Seshia S Scalable specification mining for verification and diagnosis Proceedings of the 47th Design Automation Conference, (755-760)
  944. ACM
    Chockler H, Kroening D and Purandare M Coverage in interpolation-based model checking Proceedings of the 47th Design Automation Conference, (182-187)
  945. ACM
    Thalmaier M, Nguyen M, Wedler M, Stoffel D, Bormann J and Kunz W Analyzing k-step induction to compute invariants for SAT-based property checking Proceedings of the 47th Design Automation Conference, (176-181)
  946. ACM
    Mitra S, Seshia S and Nicolici N Post-silicon validation opportunities, challenges and recent advances Proceedings of the 47th Design Automation Conference, (12-17)
  947. ACM
    Li X, Tiwari M, Hardekopf B, Sherwood T and Chong F Secure information flow analysis for hardware design Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, (1-7)
  948. ACM
    Hasebe K, Mabuchi M and Matsushita A Capability-based delegation model in RBAC Proceedings of the 15th ACM symposium on Access control models and technologies, (109-118)
  949. ACM
    Hu J, Zhang Y, Li R and Lu Z Role updating for assignments Proceedings of the 15th ACM symposium on Access control models and technologies, (89-98)
  950. Wan W, Bentahar J and Hamza A Modeling and verifying agent-based communities of web services Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part II, (418-427)
  951. Metta G, Natale L, Pathak S, Pulina L and Tacchella A Safe learning with real-time constraints Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (133-142)
  952. Vardi M From automated verification to automated design (Invited Talk Abstract) Proceedings of the Twentieth International Conference on International Conference on Automated Planning and Scheduling, (271-271)
  953. El-Menshawy M, Bentahar J and Dssouli R Symbolic model checking commitment protocols using reduction Proceedings of the 8th international conference on Declarative agent languages and technologies VIII, (185-203)
  954. El-Menshawy M, Wan W, Bentahar J and Dssouli R Symbolic model checking for agent interactions Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (1555-1556)
  955. Lomuscio A, Penczek W and Qu H Partial order reductions for model checking temporal epistemic logics over interleaved multi-agent systems Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (659-666)
  956. De Giacomo G and Felli P Agent composition synthesis based on ATL Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (499-506)
  957. De Giacomo G, Lespérance Y and Pearce A Situation calculus-based programs for representing and reasoning about game structures Proceedings of the Twelfth International Conference on Principles of Knowledge Representation and Reasoning, (445-455)
  958. Hu Y and Levesque H A correctness result for reasoning about one-dimensional planning problems Proceedings of the Twelfth International Conference on Principles of Knowledge Representation and Reasoning, (362-371)
  959. De Giacomo G, Patrizi F and Sardina S Generalized planning with loops under strong fairness constraints Proceedings of the Twelfth International Conference on Principles of Knowledge Representation and Reasoning, (351-361)
  960. ACM
    Pavese E, Braberman V and Uchitel S My model checker died! Proceedings of the 2010 ICSE Workshop on Quantitative Stochastic Models in the Verification and Design of Software Systems, (33-40)
  961. ACM
    Chen Z and Motet G Towards better support for the evolution of safety requirements via the model monitoring approach Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, (219-222)
  962. ACM
    Chiappini A, Cimatti A, Macchi L, Rebollo O, Roveri M, Susi A, Tonetta S and Vittorini B Formalization and validation of a subset of the European Train Control System Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, (109-118)
  963. ACM
    Classen A, Heymans P, Schobbens P, Legay A and Raskin J Model checking lots of systems Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, (335-344)
  964. ACM
    Yahav E and Sagiv M (2008). Verifying safety properties of concurrent heap-manipulating programs, ACM Transactions on Programming Languages and Systems, 32:5, (1-50), Online publication date: 1-May-2010.
  965. Kupferman O and Vardi M Synthesis of trigger properties Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning, (312-331)
  966. ACM
    Yun H, Wu P, Rahmaniheris M, Kim C and Sha L A reduced complexity design pattern for distributed hierarchical command and control system Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, (42-49)
  967. ACM
    Kerber F and van der Schaft A Compositional analysis for linear control systems Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, (21-30)
  968. ACM
    Thiagarajan P and Yang S Succinct discrete time approximations of distributed hybrid automata Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, (1-10)
  969. Zhang L, Hustadt U and Dixon C (2010). CTL-RP: A computation tree logic resolution prover, AI Communications, 23:2-3, (111-136), Online publication date: 1-Apr-2010.
  970. Bäumler S, Balser M, Nafz F, Reif W and Schellhorn G (2010). Interactive verification of concurrent systems using symbolic execution, AI Communications, 23:2-3, (285-307), Online publication date: 1-Apr-2010.
  971. Brihaye T, Jungers M, Lasaulce S, Markey N and Oreiby G (2010). Using model checking for analyzing distributed power control problems, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
  972. Ballarini P and Guerriero M (2010). Query-based verification of qualitative trends and oscillations in biochemical systems, Theoretical Computer Science, 411:20, (2019-2036), Online publication date: 1-Apr-2010.
  973. Hsiung P, Lin S and Lin C (2010). Real-Time Embedded Software Design for Mobile and Ubiquitous Systems, Journal of Signal Processing Systems, 59:1, (13-32), Online publication date: 1-Apr-2010.
  974. Kang E, Jackson E and Schulte W An approach for effective design space exploration Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (33-54)
  975. Vassev E and Hinchey M Software verification of autonomic systems developed with ASSL Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (1-16)
  976. ACM
    Deng T, Fan W, Libkin L and Wu Y On the aggregation problem for synthesized web services Proceedings of the 13th International Conference on Database Theory, (242-251)
  977. ACM
    Hurnaus D and Prähofer H Programming assistance based on contracts and modular verification in the automation domain Proceedings of the 2010 ACM Symposium on Applied Computing, (2544-2551)
  978. ACM
    Fellah A Time and alternation Proceedings of the 2010 ACM Symposium on Applied Computing, (2498-2502)
  979. Asăvoae I and Asăvoae M Collecting semantics under predicate abstraction in the K framework Proceedings of the 8th international conference on Rewriting logic and its applications, (123-139)
  980. Lauterburg S, Karmani R, Marinov D and Agha G Evaluating ordering heuristics for dynamic partial-order reduction techniques Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering, (308-322)
  981. Li J, Xie F, Ball T, Levin V and McGarvey C An automata-theoretic approach to hardware/software co-verification Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering, (248-262)
  982. Lämmermann S, Ruf J, Kropf T, Rosenstiel W, Viehl A, Jesser A and Hedrich L Towards assertion-based verification of heterogeneous system designs Proceedings of the Conference on Design, Automation and Test in Europe, (1171-1176)
  983. Chen M, Qin X and Mishra P Efficient decision ordering techniques for SAT-based test generation Proceedings of the Conference on Design, Automation and Test in Europe, (490-495)
  984. Di Guglielmo L, Fummi F and Pravadelli G Vacuity analysis for property qualification by mutation of checkers Proceedings of the Conference on Design, Automation and Test in Europe, (478-483)
  985. ACM
    Aminof B, Kupferman O and Lampert R (2010). Reasoning about online algorithms with weighted automata, ACM Transactions on Algorithms, 6:2, (1-36), Online publication date: 1-Mar-2010.
  986. ACM
    Schlich B (2010). Model checking of software for microcontrollers, ACM Transactions on Embedded Computing Systems, 9:4, (1-27), Online publication date: 1-Mar-2010.
  987. Chen M and Mishra P (2010). Functional test generation using efficient property clustering and learning techniques, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29:3, (396-404), Online publication date: 1-Mar-2010.
  988. Kroening D and Weissenbacher G (2010). Verification and falsification of programs with loops using predicate abstraction, Formal Aspects of Computing, 22:2, (105-128), Online publication date: 1-Mar-2010.
  989. Turner E, Butler M and Leuschel M A refinement-based correctness proof of symmetry reduced model checking Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z, (231-244)
  990. Kong W, Shiraishi T, Mizushima Y, Katahira N, Fukuda A and Watanabe M Formal analysis of STM design with SAL infinite bounded model checker Proceedings of the 12th international conference on Advanced communication technology, (1003-1008)
  991. Baier C, Cloth L, Haverkort B, Hermanns H and Katoen J (2010). Performability assessment by model checking of Markov reward models, Formal Methods in System Design, 36:1, (1-36), Online publication date: 1-Feb-2010.
  992. Kloetzer M and Belta C (2010). Automatic deployment of distributed teams of robots from temporal logic motion specifications, IEEE Transactions on Robotics, 26:1, (48-61), Online publication date: 1-Feb-2010.
  993. Chen X, Yang Y, Gopalakrishnan G and Chou C (2010). Efficient methods for formally verifying safety properties of hierarchical cache coherence protocols, Formal Methods in System Design, 36:1, (37-64), Online publication date: 1-Feb-2010.
  994. ACM
    Bodik R, Chandra S, Galenson J, Kimelman D, Tung N, Barman S and Rodarmor C Programming with angelic nondeterminism Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (339-352)
  995. ACM
    Vechev M, Yahav E and Yorsh G Abstraction-guided synthesis of synchronization Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (327-338)
  996. ACM
    Attiya H, Ramalingam G and Rinetzky N Sequential verification of serializability Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (31-42)
  997. Aminof B, Kupferman O and Murano A Improved model checking of hierarchical systems Proceedings of the 11th international conference on Verification, Model Checking, and Abstract Interpretation, (61-77)
  998. ACM
    Bodik R, Chandra S, Galenson J, Kimelman D, Tung N, Barman S and Rodarmor C (2010). Programming with angelic nondeterminism, ACM SIGPLAN Notices, 45:1, (339-352), Online publication date: 2-Jan-2010.
  999. ACM
    Vechev M, Yahav E and Yorsh G (2010). Abstraction-guided synthesis of synchronization, ACM SIGPLAN Notices, 45:1, (327-338), Online publication date: 2-Jan-2010.
  1000. ACM
    Attiya H, Ramalingam G and Rinetzky N (2010). Sequential verification of serializability, ACM SIGPLAN Notices, 45:1, (31-42), Online publication date: 2-Jan-2010.
  1001. Breitling R, Donaldson R, Gilbert D and Heiner M Biomodel engineering – from structure to behavior Transactions on Computational Systems Biology XII, (1-12)
  1002. Simmonds J, Ben-David S and Chechik M Monitoring and recovery of web service applications The smart internet, (250-288)
  1003. Simmonds J, Ben-David S and Chechik M Monitoring and recovery of web service applications The smart internet, (250-288)
  1004. Lomuscio A, Penczek W and Qu H (2010). Partial Order Reductions for Model Checking Temporal-epistemic Logics over Interleaved Multi-agent Systems, Fundamenta Informaticae, 101:1-2, (71-90), Online publication date: 1-Jan-2010.
  1005. Knapik M, Penczek W, Szreter M and Półrola A (2010). Bounded Parametric Verification for Distributed Time Petri Nets with Discrete-Time Semantics, Fundamenta Informaticae, 101:1-2, (9-27), Online publication date: 1-Jan-2010.
  1006. Kupferman O, Piterman N and Vardi M An automata-theoretic approach to infinite-state systems Time for verification, (202-259)
  1007. Delzanno G, Giacobazzi R and Ranzato F Static analysis, abstract interpretation and verification in (constraint logic) programming A 25-year perspective on logic programming, (136-158)
  1008. Pettorossi A, Proietti M and Senni V The transformational approach to program development A 25-year perspective on logic programming, (112-135)
  1009. Mukherjee A, Tari Z and Bertok P Memory efficient state-space analysis in software model-checking Proceedings of the Thirty-Third Australasian Conferenc on Computer Science - Volume 102, (23-32)
  1010. ACM
    Jeannet B, Loginov A, Reps T and Sagiv M (2010). A relational approach to interprocedural shape analysis, ACM Transactions on Programming Languages and Systems, 32:2, (1-52), Online publication date: 1-Jan-2010.
  1011. ACM
    Montali M, Pesic M, Aalst W, Chesani F, Mello P and Storari S (2010). Declarative specification and verification of service choreographiess, ACM Transactions on the Web, 4:1, (1-62), Online publication date: 1-Jan-2010.
  1012. Ranzato F and Tapparo F (2010). An efficient simulation algorithm based on abstract interpretation, Information and Computation, 208:1, (1-22), Online publication date: 1-Jan-2010.
  1013. Yavuz-Kahveci T and Bultan T (2009). Action Language verifier, Formal Methods in System Design, 35:3, (325-367), Online publication date: 1-Dec-2009.
  1014. GüleşIr G, Berg K, Bergmans L and Akşit M (2009). Experimental evaluation of a tool for the verification and transformation of source code in event-driven systems, Empirical Software Engineering, 14:6, (720-777), Online publication date: 1-Dec-2009.
  1015. Basuki T, Cerone A, Griesmayer A and Schlatte R (2009). Model-checking user behaviour using interacting components, Formal Aspects of Computing, 21:6, Online publication date: 1-Dec-2009.
  1016. Xin-feng Z, Jian-dong W, Xin-feng Z, Bin L, Jun-wu Z and Jun W Methods to tackle state explosion problem in model checking Proceedings of the 3rd international conference on Intelligent information technology application, (329-331)
  1017. ACM
    Sturton C, Jha S, Seshia S and Wagner D On voting machine design for verification and testability Proceedings of the 16th ACM conference on Computer and communications security, (463-476)
  1018. Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model Checking Coalition Nash Equilibria in MAD Distributed Systems Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (531-546)
  1019. Brillout A, He N, Mazzucchi M, Kroening D, Purandare M, Rümmer P and Weissenbacher G Mutation-based test case generation for simulink models Proceedings of the 8th international conference on Formal methods for components and objects, (208-227)
  1020. ACM
    Clarke E, Emerson E and Sifakis J (2009). Model checking, Communications of the ACM, 52:11, (74-84), Online publication date: 1-Nov-2009.
  1021. ACM
    Brauer J, Schlich B, Reinbacher T and Kowalewski S Stack bounds analysis for microcontroller assembly code Proceedings of the 4th Workshop on Embedded Systems Security, (1-9)
  1022. Geldenhuys J, Hansen H and Valmari A Exploring the Scope for Partial Order Reduction Automated Technology for Verification and Analysis, (39-53)
  1023. Meller Y, Grumberg O and Shoham S A Framework for Compositional Verification of Multi-valued Systems via Abstraction-Refinement Automated Technology for Verification and Analysis, (271-288)
  1024. Duret-Lutz A, Poitrenaud D and Couvreur J On-the-fly Emptiness Check of Transition-Based Streett Automata Automated Technology for Verification and Analysis, (213-227)
  1025. Baier C, Groesser M and Ciesinski F Quantitative Analysis under Fairness Constraints Automated Technology for Verification and Analysis, (135-150)
  1026. Woźna-Szcześniak B Bounded model checking for the existential part of real-time CTL and knowledge Proceedings of the 4th IFIP TC 2 Central and East European conference on Advances in Software Engineering Techniques, (164-178)
  1027. Yokoyama S, Sato H and Kurihara M User-friendly GUI in software model checking Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (468-473)
  1028. ACM
    Roop P, Andalam S, von Hanxleden R, Yuan S and Traulsen C Tight WCRT analysis of synchronous C programs Proceedings of the 2009 international conference on Compilers, architecture, and synthesis for embedded systems, (205-214)
  1029. ACM
    Schaefer I and Poetzsch-Heffter A (2009). Model-based verification of adaptive embedded systems under environment constraints, ACM SIGBED Review, 6:3, (1-4), Online publication date: 1-Oct-2009.
  1030. ACM
    Kleinberg S and Mishra B (2009). Metamorphosis: the Coming Transformation of Translational Systems Biology, Queue, 7:9, (40-52), Online publication date: 1-Oct-2009.
  1031. ACM
    Shankar N (2009). Automated deduction for verification, ACM Computing Surveys, 41:4, (1-56), Online publication date: 1-Oct-2009.
  1032. Safarpour S and Veneris A (2009). Automated design debugging with abstraction and refinement, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28:10, (1597-1608), Online publication date: 1-Oct-2009.
  1033. Fernando T (2009). Situations in LTL as strings, Information and Computation, 207:10, (980-999), Online publication date: 1-Oct-2009.
  1034. Hashimoto Y and Nakajima S (2009). Modular Checking with Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (105-122), Online publication date: 1-Oct-2009.
  1035. Brauer J, Huuck R and Schlich B (2009). Interprocedural Pointer Analysis in Goanna, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (65-83), Online publication date: 1-Oct-2009.
  1036. Brauer J, Schlich B and Kowalewski S (2009). Parallel and Distributed Invariant Checking of Microcontroller Software, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (45-63), Online publication date: 1-Oct-2009.
  1037. Zhao Y and Rammig F (2009). Model-based Runtime Verification Framework, Electronic Notes in Theoretical Computer Science (ENTCS), 253:1, (179-193), Online publication date: 1-Oct-2009.
  1038. Fenech S, Pace G, Okika J, Ravn A and Schneider G (2009). On the Specification of Full Contracts, Electronic Notes in Theoretical Computer Science (ENTCS), 253:1, (39-55), Online publication date: 1-Oct-2009.
  1039. Kraemer F and Herrmann P Automated Encapsulation of UML Activities for Incremental Development and Verification Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems, (571-585)
  1040. Jing L and Jinhua L Model checking the SET purchasing process protocol with SPIN Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4486-4489)
  1041. Fages F and Rizk A From model-checking to temporal logic constraint solving Proceedings of the 15th international conference on Principles and practice of constraint programming, (319-334)
  1042. Baader F, Bauer A and Lippmann M Runtime verification using a temporal description logic Proceedings of the 7th international conference on Frontiers of combining systems, (149-164)
  1043. Wu J, Wang C, Tu X and Xie J On the Logic of Cellular Reactive Systems Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02, (241-248)
  1044. ACM
    Unno H and Kobayashi N Dependent type inference with interpolants Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, (277-288)
  1045. El-Menshawy M, Bentahar J and Dssouli R Verifiable semantic model for agent interactions using social commitments Proceedings of the Second international conference on Languages, Methodologies, and Development Tools for Multi-Agent Systems, (128-152)
  1046. ACM
    Svensson H Implementing an LTL-to-Büchi translator in Erlang Proceedings of the 8th ACM SIGPLAN workshop on ERLANG, (63-70)
  1047. Fainekos G and Pappas G (2009). Robustness of temporal logic specifications for continuous-time signals, Theoretical Computer Science, 410:42, (4262-4291), Online publication date: 1-Sep-2009.
  1048. Hadjidj R and Boucheneb H (2009). On-the-fly TCTL model checking for time Petri nets, Theoretical Computer Science, 410:42, (4241-4261), Online publication date: 1-Sep-2009.
  1049. Kanso K, Moller F and Setzer A (2009). Automated Verification of Signalling Principles in Railway Interlocking Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 250:2, (19-31), Online publication date: 1-Sep-2009.
  1050. Donaldson A (2009). Vector Symmetry Reduction, Electronic Notes in Theoretical Computer Science (ENTCS), 250:2, (3-18), Online publication date: 1-Sep-2009.
  1051. Pettorossi A, Proietti M and Senni V Deciding full branching time logic by program transformation Proceedings of the 19th international conference on Logic-Based Program Synthesis and Transformation, (5-21)
  1052. ACM
    Hung P, Aoki T and Katayama T An effective framework for assume-guarantee verification of evolving component-based software Proceedings of the joint international and annual ERCIM workshops on Principles of software evolution (IWPSE) and software evolution (Evol) workshops, (109-118)
  1053. ACM
    Belt J, Robby and Deng X Sireum/Topi LDP Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (355-364)
  1054. ACM
    Lo D, Mariani L and Pezzè M Automatic steering of behavioral model inference Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (345-354)
  1055. ACM
    Pavese E, Braberman V and Uchitel S Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (335-344)
  1056. Ferrante A, Napoli, M and Parente M (2009). Model Checking for Graded CTL, Fundamenta Informaticae, 96:3, (323-339), Online publication date: 1-Aug-2009.
  1057. Meyer R, Khomenko V and Strazny T (2009). A Practical Approach to Verification of Mobile Systems Using Net Unfoldings, Fundamenta Informaticae, 94:3-4, (439-471), Online publication date: 1-Aug-2009.
  1058. Ferrante A, Napoli, M and Parente M (2009). Model Checking for Graded CTL, Fundamenta Informaticae, 96:3, (323-339), Online publication date: 1-Aug-2009.
  1059. Meyer R, Khomenko V and Strazny T (2009). A Practical Approach to Verification of Mobile Systems Using Net Unfoldings, Fundamenta Informaticae, 94:3-4, (439-471), Online publication date: 1-Aug-2009.
  1060. ACM
    Liu Y and Stoller S (2009). From datalog rules to efficient programs with time and space guarantees, ACM Transactions on Programming Languages and Systems, 31:6, (1-38), Online publication date: 1-Aug-2009.
  1061. ACM
    Malik S and Zhang L (2009). Boolean satisfiability from theoretical hardness to practical success, Communications of the ACM, 52:8, (76-82), Online publication date: 1-Aug-2009.
  1062. Liu H, Zhao J and Lu R (2009). Toward the formal verification of a unification system, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:4, (879-888), Online publication date: 1-Aug-2009.
  1063. Roldán M, Durán F and Vallecillo A (2009). Invariant-driven specifications in Maude, Science of Computer Programming, 74:10, (812-835), Online publication date: 1-Aug-2009.
  1064. Lescaylle A and Villanueva A (2009). A Tool for Generating a Symbolic Representation of tccp Executions, Electronic Notes in Theoretical Computer Science (ENTCS), 246, (131-145), Online publication date: 1-Aug-2009.
  1065. ACM
    Chauhan P, Goyal D, Hasteer G, Mathur A and Sharma N Non-cycle-accurate sequential equivalence checking Proceedings of the 46th Annual Design Automation Conference, (460-465)
  1066. ACM
    Gopalakrishnan G, Yang Y, Vakkalanka S, Vo A, Aananthakrishnan S, Szubzda G, Sawaya G, Williams J, Sharma S, DeLisi M and Atzeni S Some resources for teaching concurrency Proceedings of the 7th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging, (1-6)
  1067. ACM
    Pecheur C, Raimondi F and Brat G A formal analysis of requirements-based testing Proceedings of the eighteenth international symposium on Software testing and analysis, (47-56)
  1068. ACM
    Combéfis S and Pecheur C A bisimulation-based approach to the analysis of human-computer interaction Proceedings of the 1st ACM SIGCHI symposium on Engineering interactive computing systems, (101-110)
  1069. Ganai M and Li W Bang for the buck Proceedings of the 7th IEEE/ACM international conference on Formal Methods and Models for Codesign, (8-17)
  1070. ACM
    Hoareau C and Satoh I From model checking to data management in pervasive computing Proceedings of the 2009 international conference on Pervasive services, (41-48)
  1071. ACM
    Mohammadi M, Pazhoumand-dar H, Soryani M and Moeinzadeh H HS-ROBDD Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers, (2115-2118)
  1072. ACM
    Altahat Z and Elrad T Minimize aspect interaction re-evaluation due to software evolution Proceedings of the Workshop on AOP and Meta-Data for Software Evolution, (1-3)
  1073. Cansell D, Méry D and Proch C (2009). System-on-chip design by proof-based refinement, International Journal on Software Tools for Technology Transfer (STTT), 11:3, (217-238), Online publication date: 1-Jul-2009.
  1074. ACM
    Koo H and Mishra P (2009). Functional test generation using design and property decomposition techniques, ACM Transactions on Embedded Computing Systems, 8:4, (1-33), Online publication date: 1-Jul-2009.
  1075. Klüppelholz S and Baier C (2009). Symbolic model checking for channel-based component connectors, Science of Computer Programming, 74:9, (688-701), Online publication date: 1-Jul-2009.
  1076. Ding Z and Liu J (2009). An Improvement of Software Architecture Verification, Electronic Notes in Theoretical Computer Science (ENTCS), 243, (49-67), Online publication date: 1-Jul-2009.
  1077. Kleinberg S and Mishra B The temporal logic of causal structures Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, (303-312)
  1078. Poliakov I, Khomenko V and Yakovlev A Workcraft --- A Framework for Interpreted Graph Models Proceedings of the 30th International Conference on Applications and Theory of Petri Nets, (333-342)
  1079. ACM
    Srivastava S and Gulwani S Program verification using templates over predicate abstraction Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, (223-234)
  1080. Fainekos G and Pappas G MTL robust testing and verification for LPV systems Proceedings of the 2009 conference on American Control Conference, (3748-3753)
  1081. Faied M, Mostafa A and Girard A Dynamic optimal control of multiple depot vehicle routing problem with metric temporal logic Proceedings of the 2009 conference on American Control Conference, (3268-3273)
  1082. ACM
    Murano A A technological infrastructure design for a pediatric oncology network Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, (1-4)
  1083. Riesco A and Verdejo A (2009). Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (249-266), Online publication date: 1-Jun-2009.
  1084. Belardinelli F and Lomuscio A (2009). Quantified epistemic logics for reasoning about knowledge in multi-agent systems, Artificial Intelligence, 173:9-10, (982-1013), Online publication date: 1-Jun-2009.
  1085. Monniaux D (2009). A minimalistic look at widening operators, Higher-Order and Symbolic Computation, 22:2, (145-154), Online publication date: 1-Jun-2009.
  1086. Lomuscio A and Solanki M Towards an Agent Based Approach for Verification of OWL-S Process Models Proceedings of the 6th European Semantic Web Conference on The Semantic Web: Research and Applications, (578-592)
  1087. ACM
    Srivastava S and Gulwani S (2009). Program verification using templates over predicate abstraction, ACM SIGPLAN Notices, 44:6, (223-234), Online publication date: 28-May-2009.
  1088. Casadei M and Viroli M An experience on probabilistic model checking and stochastic simulation to design self-organizing systems Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (1538-1545)
  1089. Nakajima S, Ubayashi N and Hokamura K Runtime monitoring of cross-cutting policy Proceedings of the 2009 ICSE Workshop on Aspect-Oriented Requirements Engineering and Architecture Design, (20-24)
  1090. Dalheimer M and Pfreundt F GenLM Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, (132-139)
  1091. Lahijanian M, Kloetzer M, Itani S, Belta C and Andersson S Automatic deployment of autonomous cars in a robotic urban-like environment (rule) Proceedings of the 2009 IEEE international conference on Robotics and Automation, (2684-2689)
  1092. Fallah-Seghrouchni A, Gomez-Sanz J and Singh M Formal methods in agent-oriented software engineering Proceedings of the 10th international conference on Agent-oriented software engineering, (213-228)
  1093. Ezekiel J and Lomuscio A Combining fault injection and model checking to verify fault tolerance in multi-agent systems Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (113-120)
  1094. ACM
    Chen Y, Safarpour S, Veneris A and Marques-Silva J Spatial and temporal design debug using partial MaxSAT Proceedings of the 19th ACM Great Lakes symposium on VLSI, (345-350)
  1095. ACM
    Grosse D, Wille R, Kuehne U and Drechsler R Contradictory antecedent debugging in bounded model checking Proceedings of the 19th ACM Great Lakes symposium on VLSI, (173-176)
  1096. Tsay Y, Chen Y, Tsai M, Wu K, Chan W, Luo C and Chang J (2009). Tool support for learning Büchi automata and linear temporal logic, Formal Aspects of Computing, 21:3, (259-275), Online publication date: 1-May-2009.
  1097. Feinerer I and Salzer G (2009). A comparison of tools for teaching formal software verification, Formal Aspects of Computing, 21:3, (293-301), Online publication date: 1-May-2009.
  1098. Kühne U, Große D and Drechsler R Property analysis and design understanding Proceedings of the Conference on Design, Automation and Test in Europe, (1246-1249)
  1099. Chang S, Hsieh K and Lee J pTest Proceedings of the Conference on Design, Automation and Test in Europe, (1012-1017)
  1100. ACM
    Deng T, Huai J, Li X, Du Z and Guo H Automated synthesis of composite services with correctness guarantee Proceedings of the 18th international conference on World wide web, (1127-1128)
  1101. ACM
    Armstrong R and Mayo J Leveraging complexity in software for cybersecurity Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, (1-4)
  1102. Liu H, Zhao J and Lu R (2009). Toward the formal verification of a unification system, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:2, (399-408), Online publication date: 1-Apr-2009.
  1103. Gallardo M, Merino P and Sanán D (2009). Model Checking Dynamic Memory Allocation in Operating Systems, Journal of Automated Reasoning, 42:2-4, (229-264), Online publication date: 1-Apr-2009.
  1104. ACM
    Ciardo G, Miner A and Wan M (2009). Advanced features in SMART, ACM SIGMETRICS Performance Evaluation Review, 36:4, (58-63), Online publication date: 25-Mar-2009.
  1105. ACM
    Kwiatkowska M, Norman G and Parker D (2009). PRISM, ACM SIGMETRICS Performance Evaluation Review, 36:4, (40-45), Online publication date: 25-Mar-2009.
  1106. ACM
    Fritz C, Hull R and Su J Automatic construction of simple artifact-based business processes Proceedings of the 12th International Conference on Database Theory, (225-238)
  1107. ACM
    Vianu V Automatic verification of database-driven systems Proceedings of the 12th International Conference on Database Theory, (1-13)
  1108. Lustig Y and Vardi M Synthesis from Component Libraries Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (395-409)
  1109. ACM
    Reith M, Niu J and Winsborough W Toward practical analysis for trust management policy Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (310-321)
  1110. ACM
    Bordini R, Fisher M and Sierhuis M Formal verification of human-robot teamwork Proceedings of the 4th ACM/IEEE international conference on Human robot interaction, (267-268)
  1111. ACM
    Hallé S and Villemaire R Runtime monitoring of web service choreographies using streaming XML Proceedings of the 2009 ACM symposium on Applied Computing, (2118-2125)
  1112. ACM
    ter Beek M, Mazzanti F and Gnesi S CMC-UMC Proceedings of the 2009 ACM symposium on Applied Computing, (2111-2117)
  1113. Weitl F, Jakšić M and Freitag B (2009). Towards the automated verification of semi-structured documents, Data & Knowledge Engineering, 68:3, (292-317), Online publication date: 1-Mar-2009.
  1114. Bui T and Nymeyer A Formal Verification Based on Guided Random Walks Proceedings of the 7th International Conference on Integrated Formal Methods, (72-87)
  1115. Beneš N, Brim L, Černá I, Sochor J, Vařeková P and Zimmerova B Partial Order Reduction for State/Event LTL Proceedings of the 7th International Conference on Integrated Formal Methods, (307-321)
  1116. ACM
    Vo A, Vakkalanka S, DeLisi M, Gopalakrishnan G, Kirby R and Thakur R (2009). Formal verification of practical MPI programs, ACM SIGPLAN Notices, 44:4, (261-270), Online publication date: 14-Feb-2009.
  1117. ACM
    Vo A, Vakkalanka S, DeLisi M, Gopalakrishnan G, Kirby R and Thakur R Formal verification of practical MPI programs Proceedings of the 14th ACM SIGPLAN symposium on Principles and practice of parallel programming, (261-270)
  1118. ACM
    Hierons R, Bogdanov K, Bowen J, Cleaveland R, Derrick J, Dick J, Gheorghe M, Harman M, Kapoor K, Krause P, Lüttgen G, Simons A, Vilkomir S, Woodward M and Zedan H (2009). Using formal specifications to support testing, ACM Computing Surveys, 41:2, (1-76), Online publication date: 1-Feb-2009.
  1119. Ballarini P, Mardare R and Mura I (2009). Analysing Biochemical Oscillation through Probabilistic Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 229:1, (3-19), Online publication date: 1-Feb-2009.
  1120. Chockler H and Strichman O (2009). Before and after vacuity, Formal Methods in System Design, 34:1, (37-58), Online publication date: 1-Feb-2009.
  1121. Dashti M, Nair S and Jonker H (2008). Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme, Fundamenta Informaticae, 89:4, (393-417), Online publication date: 31-Jan-2009.
  1122. Liveris N, Zhou H and Banerjee P Complete-k-distinguishability for retiming and resynthesis equivalence checking without restricting synthesis Proceedings of the 2009 Asia and South Pacific Design Automation Conference, (636-641)
  1123. Aminof B, Kupferman O and Lampert R Reasoning about online algorithms with weighted automata Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (835-844)
  1124. Rataj A, Woźna B and Zbrzezny A (2009). A Translator of Java Programs to TADDs, Fundamenta Informaticae, 93:1-3, (305-324), Online publication date: 1-Jan-2009.
  1125. Leuschel M, Cansell D and Butler M Validating and animating higher-order recursive functions in b Rigorous Methods for Software Construction and Analysis, (78-92)
  1126. Rataj A, Woźna B and Zbrzezny A (2009). A Translator of Java Programs to TADDs, Fundamenta Informaticae, 93:1-3, (305-324), Online publication date: 1-Jan-2009.
  1127. Foster H (2009). Applied Assertion-Based Verification, Foundations and Trends in Electronic Design Automation, 3:1, (1-95), Online publication date: 1-Jan-2009.
  1128. ACM
    Sinha A, Dasgupta P, Pal B, Das S, Basu P and Chakrabarti P (2009). Design intent coverage revisited, ACM Transactions on Design Automation of Electronic Systems, 14:1, (1-32), Online publication date: 1-Jan-2009.
  1129. Vyatkin V, Hanisch H, Pang C and Yang C (2009). Closed-loop modeling in future automation system engineering and validation, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 39:1, (17-28), Online publication date: 1-Jan-2009.
  1130. Banks R, Khomenko V and Steggles L (2009). A Case for Using Signal Transition Graphs for Analysing and Refining Genetic Networks, Electronic Notes in Theoretical Computer Science (ENTCS), 227, (3-19), Online publication date: 1-Jan-2009.
  1131. Xu L, Chen W, Xu Y and Zhang W (2009). Improved bounded model checking for the universal fragment of CTL, Journal of Computer Science and Technology, 24:1, (96-109), Online publication date: 1-Jan-2009.
  1132. Sharpanskykh A and Treur J Relating Cognitive Process Models to Behavioural Models of Agents Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02, (330-335)
  1133. Liu C, Billard A and Long B An Abstract Model for Dynamic Access Control Architectures Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (638-642)
  1134. Thapa D, Park C, Han K, Park S and Wang G Architecture for modeling, simulation, and execution of PLC based manufacturing system Proceedings of the 40th Conference on Winter Simulation, (1794-1801)
  1135. Dashti M, Nair S and Jonker H (2008). Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme, Fundamenta Informaticae, 89:4, (393-417), Online publication date: 1-Dec-2008.
  1136. Clarke D (2008). A Basic Logic for Reasoning about Connector Reconfiguration, Fundamenta Informaticae, 82:4, (361-390), Online publication date: 1-Dec-2008.
  1137. Mantovani J (2008). Automatic software verification for robotics, AI Communications, 21:4, (263-264), Online publication date: 1-Dec-2008.
  1138. Bosse T, Lam D and Barber K (2008). Tools for analyzing intelligent agent systems, Web Intelligence and Agent Systems, 6:4, (355-371), Online publication date: 1-Dec-2008.
  1139. Casagrande A, Piazza C, Policriti A and Mishra B (2008). Inclusion dynamics hybrid automata, Information and Computation, 206:12, (1394-1424), Online publication date: 1-Dec-2008.
  1140. Botaschanjan J, Broy M, Gruler A, Harhurin A, Knapp S, Kof L, Paul W and Spichkova M (2008). On the correctness of upper layers of automotive systems, Formal Aspects of Computing, 20:6, (637-662), Online publication date: 1-Dec-2008.
  1141. Grinchtein O and Leucker M (2008). Network invariants for real-time systems, Formal Aspects of Computing, 20:6, (619-635), Online publication date: 1-Dec-2008.
  1142. Kupferman O, Li W and Seshia S A theory of mutations with applications to vacuity, coverage, and fault tolerance Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-9)
  1143. Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model checking nash equilibria in MAD distributed systems Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-8)
  1144. Keng B, Mangassarian H and Veneris A A succinct memory model for automated design debugging Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, (137-142)
  1145. ACM
    De A, Roychoudhury A and D'Souza D Java memory model aware software validation Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (8-14)
  1146. ACM
    Nejati S, Sabetzadeh M, Chechik M, Uchitel S and Zave P Towards compositional synthesis of evolving systems Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, (285-296)
  1147. ACM
    Park C and Sen K Randomized active atomicity violation detection in concurrent programs Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, (135-145)
  1148. Ding Z, Zhang K and Hu J (2008). A rigorous approach towards test case generation, Information Sciences: an International Journal, 178:21, (4057-4079), Online publication date: 1-Nov-2008.
  1149. Donaldson A and Miller A (2008). Automatic Symmetry Detection for Promela, Journal of Automated Reasoning, 41:3-4, (251-293), Online publication date: 1-Nov-2008.
  1150. ACM
    Tobarra L, Cazorla D, Cuartero F and Pardo J Modelling secure wireless sensor networks routing protocols with timed automata Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, (51-58)
  1151. ACM
    Roberson M, Harries M, Darga P and Boyapati C (2008). Efficient software model checking of soundness of type systems, ACM SIGPLAN Notices, 43:10, (493-504), Online publication date: 27-Oct-2008.
  1152. ACM
    Roberson M, Harries M, Darga P and Boyapati C Efficient software model checking of soundness of type systems Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications, (493-504)
  1153. ACM
    Hörne T and van der Poll J Planning as model checking Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology, (114-123)
  1154. ACM
    Hamberg R and Vaandrager F (2008). Using model checkers in an introductory course on operating systems, ACM SIGOPS Operating Systems Review, 42:6, (101-111), Online publication date: 1-Oct-2008.
  1155. ACM
    Smith R, Estan C, Jha S and Kong S (2008). Deflating the big bang, ACM SIGCOMM Computer Communication Review, 38:4, (207-218), Online publication date: 1-Oct-2008.
  1156. ACM
    Cuoq P and Doligez D Hashconsing in an incrementally garbage-collected system Proceedings of the 2008 ACM SIGPLAN workshop on ML, (13-22)
  1157. Zbrzezny A and Woźna B (2008). Towards Verification of Java Programs in perICS, Fundamenta Informaticae, 85:1-4, (533-548), Online publication date: 20-Sep-2008.
  1158. Zbrzezny A (2008). Improving the Translation from ECTL to SAT, Fundamenta Informaticae, 85:1-4, (513-531), Online publication date: 20-Sep-2008.
  1159. Penczek W and Szreter M (2008). SAT-based Unbounded Model Checking of Timed Automata, Fundamenta Informaticae, 85:1-4, (425-440), Online publication date: 20-Sep-2008.
  1160. Kacprzak M, Nabiałek W, Niewiadomski A, Penczek W, Półrola A, Szreter M, Woźna B and Zbrzezny A (2008). VerICS 2007 - a Model Checker for Knowledge and Real-Time, Fundamenta Informaticae, 85:1-4, (313-328), Online publication date: 20-Sep-2008.
  1161. Belardinelli F and Lomuscio A A complete first-order logic of knowledge and time Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning, (705-714)
  1162. Sardina S, Patrizi F and Giacomo G Behavior composition in the presence of failure Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning, (640-650)
  1163. Claßen J and Lakemeyer G A logic for non-terminating Golog programs Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning, (589-599)
  1164. Staats M, Deng W, Rajan A, Heimdahl M and Woodham K ReqsCov Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (499-500)
  1165. Ispir M and Betin Can A An Assume Guarantee Verification Methodology for Aspect-Oriented Programming Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (391-394)
  1166. Moonzoo Kim , Yunho Kim and Hotae Kim Unit Testing of Flash Memory Device Driver through a SAT-Based Model Checker Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (198-207)
  1167. Bordini R, Dennis L, Farwer B and Fisher M Automated Verification of Multi-Agent Programs Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (69-78)
  1168. Sardina S and De Giacomo G Realizing multiple autonomous agents through scheduling of shared devices Proceedings of the Eighteenth International Conference on International Conference on Automated Planning and Scheduling, (304-312)
  1169. Anderson H, Ciobanu G and Freitas L UTP and temporal logic model checking Proceedings of the 2nd international conference on Unifying theories of programming, (22-41)
  1170. Calder M and Miller A (2008). An automatic abstraction technique for verifying featured, parameterised systems, Theoretical Computer Science, 404:3, (235-255), Online publication date: 1-Sep-2008.
  1171. Zhang M, Hung D and Liu Z Verification of Linear Duration Invariants by Model Checking CTL Properties Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (395-409)
  1172. Wehrheim H Bounded Model Checking for Partial Kripke Structures Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (380-394)
  1173. Schlatte R, Aichernig B, Boer F, Griesmayer A and Johnsen E Testing Concurrent Objects with Application-Specific Schedulers Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (319-333)
  1174. Izadi M and Bonsangue M Recasting Constraint Automata into Büchi Automata Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (156-170)
  1175. ACM
    Smith R, Estan C, Jha S and Kong S Deflating the big bang Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (207-218)
  1176. Andel T and Yasinsac A Automated Evaluation of Secure Route Discovery in MANET Protocols Proceedings of the 15th international workshop on Model Checking Software, (26-41)
  1177. Abed N, Tripakis S and Vincent J Resource-Aware Verification Using Randomized Exploration of Large State Spaces Proceedings of the 15th international workshop on Model Checking Software, (214-231)
  1178. Lo D and Khoo S (2008). Mining patterns and rules for software specification discovery, Proceedings of the VLDB Endowment, 1:2, (1609-1616), Online publication date: 1-Aug-2008.
  1179. Milo T and Deutch D (2008). Querying and monitoring distributed business processes, Proceedings of the VLDB Endowment, 1:2, (1512-1515), Online publication date: 1-Aug-2008.
  1180. Bonet B and Geffner H (2008). Heuristics for planning with penalties and rewards formulated in logic and computed through circuits, Artificial Intelligence, 172:12-13, (1579-1604), Online publication date: 1-Aug-2008.
  1181. Platzer A (2008). Differential Dynamic Logic for Hybrid Systems, Journal of Automated Reasoning, 41:2, (143-189), Online publication date: 1-Aug-2008.
  1182. Clarke D (2008). A Basic Logic for Reasoning about Connector Reconfiguration, Fundamenta Informaticae, 82:4, (361-390), Online publication date: 30-Jul-2008.
  1183. Hart T, Chechik M and Lie D Security benchmarking using partial verification Proceedings of the 3rd conference on Hot topics in security, (1-6)
  1184. Cacovean L, Popa E, Brumar C and Pah I An application CTL formula based on problem solving methodology Proceedings of the 12th WSEAS international conference on Computers, (218-223)
  1185. ACM
    Lo D, Khoo S and Liu C Mining past-time temporal rules from execution traces Proceedings of the 2008 international workshop on dynamic analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), (50-56)
  1186. ACM
    Elkarablieh B, Marinov D and Khurshid S Efficient solving of structural constraints Proceedings of the 2008 international symposium on Software testing and analysis, (39-50)
  1187. ACM
    Leuschel M Declarative programming for verification Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming, (1-7)
  1188. Sintzoff M Synthesis of Optimal Control Policies for Some Infinite-State Transition Systems Proceedings of the 9th international conference on Mathematics of Program Construction, (336-359)
  1189. ACM
    Alba E and Chicano F Searching for liveness property violations in concurrent systems with ACO Proceedings of the 10th annual conference on Genetic and evolutionary computation, (1727-1734)
  1190. Edelkamp S, Sanders P and Šimeček P Semi-external LTL Model Checking Proceedings of the 20th international conference on Computer Aided Verification, (530-542)
  1191. Kashyap S and Garg V Producing Short Counterexamples Using "Crucial Events" Proceedings of the 20th international conference on Computer Aided Verification, (491-503)
  1192. Kaminski M (2008). Invariance Under Stuttering in a Temporal Logic without the "Until" Operator, Fundamenta Informaticae, 82:1-2, (127-140), Online publication date: 1-Jul-2008.
  1193. ACM
    Mishra P and Dutt N (2008). Specification-driven directed test generation for validation of pipelined processors, ACM Transactions on Design Automation of Electronic Systems, 13:3, (1-36), Online publication date: 1-Jul-2008.
  1194. Slanina M, Sipma H and Manna Z (2008). Deductive verification of alternating systems, Formal Aspects of Computing, 20:4-5, (507-560), Online publication date: 1-Jul-2008.
  1195. Jiang M, Zhou C, Wu G and Zhang F A CSP-Based Approach for Solving Parity Game Proceedings of the 2nd annual international workshop on Frontiers in Algorithmics, (135-146)
  1196. Monteiro P, Ropers D, Mateescu R, Freitas A and de Jong H Temporal Logic Patterns for Querying Qualitative Models of Genetic Regulatory Networks Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (229-233)
  1197. Meyer R, Khomenko V and Strazny T A Practical Approach to Verification of Mobile Systems Using Net Unfoldings Proceedings of the 29th international conference on Applications and Theory of Petri Nets, (327-347)
  1198. ACM
    Hu H and Ahn G Enabling verification and conformance testing for access control model Proceedings of the 13th ACM symposium on Access control models and technologies, (195-204)
  1199. ACM
    Benedikt M, Jeffrey A and Ley-Wild R Stream firewalling of xml constraints Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (487-498)
  1200. Khasidashvili Z On formal equivalence verification of hardware Proceedings of the 3rd international conference on Computer science: theory and applications, (11-12)
  1201. ACM
    Gulwani S, Srivastava S and Venkatesan R Program analysis as constraint solving Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (281-292)
  1202. ACM
    Sen K Race directed random testing of concurrent programs Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (11-21)
  1203. Fages F and Soliman S Formal cell biology in biocham Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (54-80)
  1204. ACM
    Chockler H, Halpern J and Kupferman O (2008). What causes a system to satisfy a specification?, ACM Transactions on Computational Logic, 9:3, (1-26), Online publication date: 1-Jun-2008.
  1205. Vacuity Analysis by Fault Simulation Proceedings of the Sixth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (27-36)
  1206. Dworschak S, Grell S, Nikiforova V, Schaub T and Selbig J (2008). Modeling Biological Networks by Action Languages via Answer Set Programming, Constraints, 13:1-2, (21-65), Online publication date: 1-Jun-2008.
  1207. ACM
    Gulwani S, Srivastava S and Venkatesan R (2008). Program analysis as constraint solving, ACM SIGPLAN Notices, 43:6, (281-292), Online publication date: 30-May-2008.
  1208. ACM
    Sen K (2008). Race directed random testing of concurrent programs, ACM SIGPLAN Notices, 43:6, (11-21), Online publication date: 30-May-2008.
  1209. Li J, Sun X, Xie F and Song X Component-Based Abstraction and Refinement Proceedings of the 10th international conference on Software Reuse: High Confidence Software Reuse in Large Systems, (39-51)
  1210. ACM
    Bauer A and Juerjens J Security protocols, properties, and their monitoring Proceedings of the fourth international workshop on Software engineering for secure systems, (33-40)
  1211. ACM
    Chen B, Avrunin G, Henneman E, Clarke L, Osterweil L and Henneman P Analyzing medical processes Proceedings of the 30th international conference on Software engineering, (623-632)
  1212. ACM
    Lauterburg S, Sobeih A, Marinov D and Viswanathan M Incremental state-space exploration for programs with dynamically allocated data Proceedings of the 30th international conference on Software engineering, (291-300)
  1213. Dennis L, Farwer B, Bordini R and Fisher M A flexible framework for verifying agent programs Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 3, (1303-1306)
  1214. Lomuscio A, Qu H and Solanki M Towards verifying compliance in agent-based web service compositions Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 1, (265-272)
  1215. Astefanoaei L and de Boer F Model-checking agent refinement Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (705-712)
  1216. Bulling N, Dix J and Chesñevar C Modelling coalitions Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (681-688)
  1217. Ågotnes T, van der Hoek W and Wooldridge M Quantifying over coalitions in epistemic logic Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (665-672)
  1218. ACM
    Schaefer I and Poetzsch-Heffter A Slicing for model reduction in adaptive embedded systems development Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems, (25-32)
  1219. ACM
    Nejati S and Chechik M Behavioural model fusion Proceedings of the 2008 international workshop on Models in software engineering, (1-6)
  1220. Flores S, Lucas S and Villanueva A (2008). Formal Verification of Websites, Electronic Notes in Theoretical Computer Science (ENTCS), 200:3, (103-118), Online publication date: 1-May-2008.
  1221. Ball T and Kupferman O Vacuity in testing Proceedings of the 2nd international conference on Tests and proofs, (4-17)
  1222. ACM
    Katz E and Katz S Incremental analysis of interference among aspects Proceedings of the 7th workshop on Foundations of aspect-oriented languages, (29-38)
  1223. ACM
    Khatchadourian R, Dovland J and Soundarajan N Enforcing behavioral constraints in evolving aspect-oriented programs Proceedings of the 7th workshop on Foundations of aspect-oriented languages, (19-28)
  1224. ACM
    Carmona J, Cortadella J, Takada Y and Peper F (2008). Formal methods for the analysis and synthesis of nanometer-scale cellular arrays, ACM Journal on Emerging Technologies in Computing Systems, 4:2, (1-27), Online publication date: 1-Apr-2008.
  1225. ACM
    Wilhelm R, Engblom J, Ermedahl A, Holsti N, Thesing S, Whalley D, Bernat G, Ferdinand C, Heckmann R, Mitra T, Mueller F, Puaut I, Puschner P, Staschulat J and Stenström P (2008). The worst-case execution-time problem—overview of methods and survey of tools, ACM Transactions on Embedded Computing Systems, 7:3, (1-53), Online publication date: 1-Apr-2008.
  1226. Sadot A, Fisher J, Barak D, Admanit Y, Stern M, Hubbard E and Harel D (2008). Toward Verified Biological Models, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:2, (223-234), Online publication date: 1-Apr-2008.
  1227. Massart T, Meuter C and Van Begin L (2008). On the complexity of partial order trace model checking, Information Processing Letters, 106:3, (120-126), Online publication date: 1-Apr-2008.
  1228. Xu K, Liu Y and Wu C (2008). BPSL Modeler -- Visual Notation Language for Intuitive Business Property Reasoning, Electronic Notes in Theoretical Computer Science (ENTCS), 211, (211-220), Online publication date: 1-Apr-2008.
  1229. ACM
    Hanna Y, Rajan H and Zhang W Slede Proceedings of the first ACM conference on Wireless network security, (109-118)
  1230. Ong C Verification of higher-order computation Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems, (299-306)
  1231. Duarte L, Kramer J and Uchitel S Towards faithful model extraction based on contexts Proceedings of the Theory and practice of software, 11th international conference on Fundamental approaches to software engineering, (101-115)
  1232. Abdulla P, Henda N, De Alfaro L, Mayr R and Sandberg S Stochastic games with lossy channels Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures, (35-49)
  1233. Bakewell A and Ghica D On-the-fly techniques for game-based software model checking Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems, (78-92)
  1234. Meolic R, Kapus T and Brezočnik Z (2008). ACTLW - An action-based computation tree logic with unless operator, Information Sciences: an International Journal, 178:6, (1542-1557), Online publication date: 20-Mar-2008.
  1235. Lo D, Khoo S and Liu C Efficient mining of recurrent rules from a sequence database Proceedings of the 13th international conference on Database systems for advanced applications, (67-83)
  1236. Voron J and Kordon F Transforming sources to petri nets Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (1-10)
  1237. Krioukov A, Bairavasundaram L, Goodson G, Srinivasan K, Thelen R, Arpaci-Dusseau A and Arpaci-Dussea R Parity lost and parity regained Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-15)
  1238. ACM
    Vakkalanka S, Sharma S, Gopalakrishnan G and Kirby R ISP Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, (285-286)
  1239. Lomuscio A, Raimondi F and Woźna B (2007). Verification of the TESLA protocol in MCMAS-X, Fundamenta Informaticae, 79:3-4, (473-486), Online publication date: 1-Feb-2008.
  1240. Pradella M and Crespi Reghizzi S (2008). A SAT-based parser and completer for pictures specified by tiling, Pattern Recognition, 41:2, (555-566), Online publication date: 1-Feb-2008.
  1241. Edelkamp S, Jabbar S and Sulewski D (2008). Distributed Verification of Multi-threaded C++ Programs, Electronic Notes in Theoretical Computer Science (ENTCS), 198:1, (33-46), Online publication date: 1-Feb-2008.
  1242. Jensen R, Veloso M and Bryant R (2008). State-set branching, Artificial Intelligence, 172:2-3, (103-139), Online publication date: 1-Feb-2008.
  1243. Jesser A and Hedrich L A symbolic approach for mixed-signal model checking Proceedings of the 2008 Asia and South Pacific Design Automation Conference, (404-409)
  1244. Ranzato F, Doria O and Tapparo F A forward-backward abstraction refinement algorithm Proceedings of the 9th international conference on Verification, model checking, and abstract interpretation, (248-262)
  1245. Kacprzak M, Nabiałek W, Niewiadomski A, Penczek W, Półrola A, Szreter M, Woźna B and Zbrzezny A (2008). VerICS 2007 - a Model Checker for Knowledge and Real-Time, Fundamenta Informaticae, 85:1-4, (313-328), Online publication date: 1-Jan-2008.
  1246. Zbrzezny A and Woźna B (2008). Towards Verification of Java Programs in perICS, Fundamenta Informaticae, 85:1-4, (533-548), Online publication date: 1-Jan-2008.
  1247. Zbrzezny A (2008). Improving the Translation from ECTL to SAT, Fundamenta Informaticae, 85:1-4, (513-531), Online publication date: 1-Jan-2008.
  1248. Penczek W and Szreter M (2008). SAT-based Unbounded Model Checking of Timed Automata, Fundamenta Informaticae, 85:1-4, (425-440), Online publication date: 1-Jan-2008.
  1249. Kaminski M (2008). Invariance Under Stuttering in a Temporal Logic without the "Until" Operator, Fundamenta Informaticae, 82:1-2, (127-140), Online publication date: 1-Jan-2008.
  1250. Fages F and Soliman S Model revision from temporal logic properties in computational systems biology Probabilistic inductive logic programming, (287-304)
  1251. Zhang Y and Ding Y (2008). CTL model update for system modifications, Journal of Artificial Intelligence Research, 31:1, (113-155), Online publication date: 1-Jan-2008.
  1252. Woźna B and Zbrzezny A (2007). Bounded Model Checking for the Existential Fragment of TCTL_{-G} and Diagonal Timed Automata, Fundamenta Informaticae, 79:1-2, (229-256), Online publication date: 1-Jan-2008.
  1253. Desmet L, Joosen W, Massacci F, Philippaerts P, Piessens F, Siahaan I and Vanoverberghe D (2008). Security-by-contract on the .NET platform, Information Security Tech. Report, 13:1, (25-32), Online publication date: 1-Jan-2008.
  1254. Hsiung P, Lin S, Hung C, Fu J, Lin C, Chiang C, Chiang K, Lu C and Lu P Real-time embedded software design for mobile and ubiquitous systems Proceedings of the 2007 international conference on Embedded and ubiquitous computing, (718-729)
  1255. Hsiung P, Lin S, Hung C, Fu J, Lin C, Chiang C, Chiang K, Lu C and Lu P Real-Time Embedded Software Design for Mobile and Ubiquitous Systems Embedded and Ubiquitous Computing, (718-729)
  1256. Benedikt M and Jeffrey A Efficient and Expressive Tree Filters FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, (461-472)
  1257. Bollig B, Kuske D and Meinecke I Propositional Dynamic Logic for Message-Passing Systems FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, (303-315)
  1258. Uribe T and Cheung S (2007). Automatic analysis of firewall and network intrusion detection system configurations, Journal of Computer Security, 15:6, (691-715), Online publication date: 1-Dec-2007.
  1259. ACM
    Shoham S and Grumberg O (2007). A game-based framework for CTL counterexamples and 3-valued abstraction-refinement, ACM Transactions on Computational Logic, 9:1, (1-es), Online publication date: 1-Dec-2007.
  1260. Pesic M, Schonenberg M, Sidorova N and Van Der Aalst W Constraint-based workflow models Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I, (77-94)
  1261. Adler R, Schaefer I, Schuele T and Vecchié E From model-based design to formal verification of adaptive embedded systems Proceedings of the formal engineering methods 9th international conference on Formal methods and software engineering, (76-95)
  1262. Adler R, Schaefer I, Schuele T and Vecchié E From Model-Based Design to Formal Verification of Adaptive Embedded Systems Formal Methods and Software Engineering, (76-95)
  1263. Cheng X, He N and Hsiao M Hybrid testing and verification techniques for a cognitive radio system Proceedings of the 11th IASTED International Conference on Software Engineering and Applications, (240-245)
  1264. ACM
    Pike L Model checking for the practical verificationist Proceedings of the second workshop on Automated formal methods, (21-31)
  1265. Kroening D and Seshia S Formal verification at higher levels of abstraction Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (572-578)
  1266. ACM
    Sen K Effective random testing of concurrent programs Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (323-332)
  1267. ACM
    Brunel J, Cuppens F, Cuppens N, Sans T and Bodeveix J Security policy compliance with violation management Proceedings of the 2007 ACM workshop on Formal methods in security engineering, (31-40)
  1268. Gopalakrishnan G and Kirby R (2007). Formal Methods for MPI Programs, Electronic Notes in Theoretical Computer Science (ENTCS), 193, (19-27), Online publication date: 1-Nov-2007.
  1269. Fang L and Sassa M (2007). Generating Java Compiler Optimizers Using Bidirectional CTL, Electronic Notes in Theoretical Computer Science (ENTCS), 190:4, (49-63), Online publication date: 1-Nov-2007.
  1270. Lomuscio A, Penczek W and Woźna B (2007). Bounded model checking for knowledge and real time, Artificial Intelligence, 171:16-17, (1011-1038), Online publication date: 1-Nov-2007.
  1271. Thapa D, Park C, Park S and Wang G Formal modeling and verification of shop floor controller logics Proceedings of the IASTED Asian Conference on Modelling and Simulation, (209-213)
  1272. ACM
    Stoller S, Yang P, Ramakrishnan C and Gofman M Efficient policy analysis for administrative role based access control Proceedings of the 14th ACM conference on Computer and communications security, (445-455)
  1273. Noll T and Schlich B Delayed nondeterminism in model checking embedded systems assembly code Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing, (185-201)
  1274. Bensalem S, Peled D, Qu H, Tripakis S and Zuck L Test case generation for ultimately periodic paths Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing, (120-135)
  1275. Noll T and Schlich B Delayed Nondeterminism in Model Checking Embedded Systems Assembly Code Hardware and Software: Verification and Testing, (185-201)
  1276. Bensalem S, Peled D, Qu H, Tripakis S and Zuck L Test Case Generation for Ultimately Periodic Paths Hardware and Software: Verification and Testing, (120-135)
  1277. Bošnački D, Donaldson A, Leuschel M and Massart T Efficient approximate verification of Promela models via symmetry markers Proceedings of the 5th international conference on Automated technology for verification and analysis, (300-315)
  1278. Nain S and Vardi M Branching vs. linear time Proceedings of the 5th international conference on Automated technology for verification and analysis, (19-34)
  1279. Harmon S, DeLoach S and Robby Trace-Based Specification of Law and Guidance Policies for Multi-Agent Systems Engineering Societies in the Agents World VIII, (333-349)
  1280. Nain S and Vardi M Branching vs. Linear Time: Semantical Perspective Automated Technology for Verification and Analysis, (19-34)
  1281. ACM
    Elkarablieh B, Khurshid S, Vu D and McKinley K (2007). Starc, ACM SIGPLAN Notices, 42:10, (387-404), Online publication date: 21-Oct-2007.
  1282. ACM
    Elkarablieh B, Khurshid S, Vu D and McKinley K Starc Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (387-404)
  1283. Fröschle S and Lasota S (2007). Causality versus true-concurrency, Theoretical Computer Science, 386:3, (169-187), Online publication date: 20-Oct-2007.
  1284. Ferrante A, Murano A and Parente M Enriched µ-calculus pushdown module checking Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning, (438-453)
  1285. Abate P, Goré R and Widmann F One-pass tableaux for computation tree logic Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning, (32-46)
  1286. Ferrante A, Murano A and Parente M Enriched μ–Calculus Pushdown Module Checking Logic for Programming, Artificial Intelligence, and Reasoning, (438-453)
  1287. ACM
    Guo Q and Derrick J Verification of timed erlang/OTP components using the process algebra μcrl Proceedings of the 2007 SIGPLAN workshop on ERLANG Workshop, (55-64)
  1288. Beyer D, Henzinger T, Jhala R and Majumdar R (2007). The software model checker Blast, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (505-525), Online publication date: 1-Oct-2007.
  1289. Chechik M and Gurfinkel A (2007). A framework for counterexample generation and exploration, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (429-445), Online publication date: 1-Oct-2007.
  1290. Larsen K, Nyman U and Wasowski A (2007). Modeling software product lines using color-blind transition systems, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (471-487), Online publication date: 1-Oct-2007.
  1291. ACM
    Bakhshi R, Bonnet F, Fokkink W and Haverkort B (2007). Formal analysis techniques for gossiping protocols, ACM SIGOPS Operating Systems Review, 41:5, (28-36), Online publication date: 1-Oct-2007.
  1292. ACM
    Seo S, Yang H, Yi K and Han T (2007). Goal-directed weakening of abstract interpretation results, ACM Transactions on Programming Languages and Systems, 29:6, (39-es), Online publication date: 1-Oct-2007.
  1293. Miyamoto T, Sakamoto M and Kumagai S (2007). On Reachability Analysis of Multi Agent Nets, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:10, (2257-2260), Online publication date: 1-Oct-2007.
  1294. Pervez S, Gopalakrishnan G, Kirby R, Palmer R, Thakur R and Gropp W Practical model-checking method for verifying correctness of MPI programs Proceedings of the 14th European conference on Recent Advances in Parallel Virtual Machine and Message Passing Interface, (344-353)
  1295. Siegel S and Avrunin G Verification of halting properties for MPI programs using nonblocking operations Proceedings of the 14th European conference on Recent Advances in Parallel Virtual Machine and Message Passing Interface, (326-334)
  1296. Fábregas I, Palomino M and De Frutos Escrig D Reflection and preservation of properties in coalgebraic (bi)simulations Proceedings of the 4th international conference on Theoretical aspects of computing, (231-245)
  1297. Deutch D and Milo T Querying structural and behavioral properties of business processes Proceedings of the 11th international conference on Database programming languages, (169-185)
  1298. Güdemann M, Ortmeier F and Reif W Using deductive cause-consequence analysis (DCCA) with SCADE Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (465-478)
  1299. Chen Y, Hsiung P and Chen S Modeling and automatic failure analysis of safety-critical systems using extended safecharts Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (451-464)
  1300. Hassine J, Rilling J and Dssouli R Formal verification of use case maps with real time extensions Proceedings of the 13th international SDL Forum conference on Design for dependable systems, (225-241)
  1301. Shilov N and Garanina N Combined logics of knowledge, time, and actions for reasoning about multi-agent systems Proceedings of the First international conference on Knowledge processing and data analysis, (48-58)
  1302. Wu L and Su J Symbolic model checking temporal logics of knowledge in multi-agent system via extended Mu-calculus Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications, (510-522)
  1303. Kupferman O Tightening the exchange rates between automata Proceedings of the 21st international conference, and Proceedings of the 16th annuall conference on Computer Science Logic, (7-22)
  1304. Langmead C and Jha S Predicting protein folding kinetics via temporal logic model checking Proceedings of the 7th international conference on Algorithms in Bioinformatics, (252-264)
  1305. ACM
    Hanna Y SLEDE Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (591-594)
  1306. ACM
    Pradella M, Morzenti A and San Pietro P The symmetry of the past and of the future Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (312-320)
  1307. ACM
    Tiella R, Villafiorita A and Tomasi S FSMC+, a tool for the generation of Java code from statecharts Proceedings of the 5th international symposium on Principles and practice of programming in Java, (93-102)
  1308. ACM
    Hanna Y SLEDE The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering: companion papers, (591-594)
  1309. ACM
    Sykes D, Heaven W, Magee J and Kramer J Plan-directed architectural change for autonomous systems Proceedings of the 2007 conference on Specification and verification of component-based systems: 6th Joint Meeting of the European Conference on Software Engineering and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, (15-21)
  1310. ACM
    Lomuscio A and Penczek W (2007). Symbolic model checking for temporal-epistemic logics, ACM SIGACT News, 38:3, (77-99), Online publication date: 1-Sep-2007.
  1311. Shoham S and Grumberg O Compositional verification and 3-valued abstractions join forces Proceedings of the 14th international conference on Static Analysis, (69-86)
  1312. ACM
    Viganò F and Colombetti M Symbolic model checking of institutions Proceedings of the ninth international conference on Electronic commerce, (35-44)
  1313. ACM
    Ranganath V, Amtoft T, Banerjee A, Hatcliff J and Dwyer M (2007). A new foundation for control dependence and slicing for modern program structures, ACM Transactions on Programming Languages and Systems, 29:5, (27-es), Online publication date: 2-Aug-2007.
  1314. Lomuscio A, Raimondi F and Woźna B (2007). Verification of the TESLA protocol in MCMAS-X, Fundamenta Informaticae, 79:3-4, (473-486), Online publication date: 1-Aug-2007.
  1315. ACM
    Laplante S, Lassaigne R, Magniez F, Peyronnet S and de Rougemont M (2007). Probabilistic abstraction for model checking, ACM Transactions on Computational Logic, 8:4, (20-es), Online publication date: 1-Aug-2007.
  1316. Ogata K and Futatsugi K (2007). Comparison of Maude and SAL by Conducting Case Studies Model Checking a Distributed Algorithm, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:8, (1690-1703), Online publication date: 1-Aug-2007.
  1317. Şuşu A, Magno M, Acquaviva A, Atienza D and Micheli G Reconfiguration Strategies for Environmentally Powered Devices Transactions on High-Performance Embedded Architectures and Compilers I, (341-360)
  1318. Vardi M Linear-time model checking Proceedings of the 12th international conference on Implementation and application of automata, (5-10)
  1319. Thapa D, Park S, Park C and Wang G Modeling, verification, and implementation of PLC program using timed-MPSG Proceedings of the 2007 Summer Computer Simulation Conference, (533-540)
  1320. ACM
    Cheney J and Momigliano A Mechanized metatheory model-checking Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming, (75-86)
  1321. ACM
    Krena B, Letko Z, Tzoref R, Ur S and Vojnar T Healing data races on-the-fly Proceedings of the 2007 ACM workshop on Parallel and distributed systems: testing and debugging, (54-64)
  1322. ACM
    Palmer R, Gopalakrishnan G and Kirby R Semantics driven dynamic partial-order reduction of MPI-based parallel programs Proceedings of the 2007 ACM workshop on Parallel and distributed systems: testing and debugging, (43-53)
  1323. ACM
    d'Amorim M, Lauterburg S and Marinov D Delta execution for efficient state-space exploration of object-oriented programs Proceedings of the 2007 international symposium on Software testing and analysis, (50-60)
  1324. ACM
    Alba E and Chicano F ACOhg Proceedings of the 9th annual conference on Genetic and evolutionary computation, (10-17)
  1325. Amit D, Rinetzky N, Reps T, Sagiv M and Yahav E Comparison under abstraction for verifying linearizability Proceedings of the 19th international conference on Computer aided verification, (477-490)
  1326. Barnat J, Brim L and Šimeček P I/O efficient accepting cycle detection Proceedings of the 19th international conference on Computer aided verification, (281-293)
  1327. Ezekiel J, Lüttgen G and Ciardo G Parallelising symbolic state-space generators Proceedings of the 19th international conference on Computer aided verification, (268-280)
  1328. Carotenuto D, Murano A and Peron A 2-visibly pushdown automata Proceedings of the 11th international conference on Developments in language theory, (132-144)
  1329. Platzer A Differential Dynamic Logic for Verifying Parametric Hybrid Systems Proceedings of the 16th international conference on Automated Reasoning with Analytic Tableaux and Related Methods, (216-232)
  1330. Metzler B Decomposing integrated specifications for verification Proceedings of the 6th international conference on Integrated formal methods, (459-479)
  1331. Bolton C Capturing conflict and confusion in CSP Proceedings of the 6th international conference on Integrated formal methods, (413-438)
  1332. Gheorghiu M, Gurfinkel A and Chechik M Finding state solutions to temporal logic queries Proceedings of the 6th international conference on Integrated formal methods, (273-292)
  1333. Couchot J and Dadeau F Guiding the correction of parameterized specifications Proceedings of the 6th international conference on Integrated formal methods, (176-194)
  1334. Harrison J A short survey of automated reasoning Proceedings of the 2nd international conference on Algebraic biology, (334-349)
  1335. Palmer R, DeLisi M, Gopalakrishnan G and Kirby R An approach to formalization and analysis of message passing libraries Proceedings of the 12th international conference on Formal methods for industrial critical systems, (164-181)
  1336. Schlich B, Löll J and Kowalewski S Application of static analyses for state space reduction to microcontroller assembly code Proceedings of the 12th international conference on Formal methods for industrial critical systems, (21-37)
  1337. Lafuente A Towards model checking spatial properties with SPIN Proceedings of the 14th international SPIN conference on Model checking software, (223-242)
  1338. Rozier K and Vardi M LTL satisfiability checking Proceedings of the 14th international SPIN conference on Model checking software, (149-167)
  1339. Gueta G, Flanagan C, Yahav E and Sagiv M Cartesian partial-order reduction Proceedings of the 14th international SPIN conference on Model checking software, (95-112)
  1340. Evangelista S and Pajault C Some solutions to the ignoring problem Proceedings of the 14th international SPIN conference on Model checking software, (76-94)
  1341. ACM
    Basu S and Smolka S (2007). Model checking the Java metalocking algorithm, ACM Transactions on Software Engineering and Methodology, 16:3, (12-es), Online publication date: 1-Jul-2007.
  1342. Kwiatkowska M, Norman G, Sproston J and Wang F (2007). Symbolic model checking for probabilistic timed automata, Information and Computation, 205:7, (1027-1077), Online publication date: 1-Jul-2007.
  1343. Neuhäußer M and Noll T (2007). Abstraction and Model Checking of Core Erlang Programs in Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (147-163), Online publication date: 1-Jul-2007.
  1344. Durán F, Riesco A and Verdejo A (2007). A Distributed Implementation of Mobile Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (113-131), Online publication date: 1-Jul-2007.
  1345. Ölveczky P and Meseguer J (2007). Abstraction and Completeness for Real-Time Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (5-27), Online publication date: 1-Jul-2007.
  1346. Ruys T and de Brugh N (2007). MMC, Electronic Notes in Theoretical Computer Science (ENTCS), 190:1, (149-160), Online publication date: 1-Jul-2007.
  1347. ACM
    Genevès P, Layaïda N and Schmitt A Efficient static analysis of XML paths and types Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (342-351)
  1348. ACM
    Cook B, Podelski A and Rybalchenko A Proving thread termination Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (320-330)
  1349. ACM
    Genevès P, Layaïda N and Schmitt A (2007). Efficient static analysis of XML paths and types, ACM SIGPLAN Notices, 42:6, (342-351), Online publication date: 10-Jun-2007.
  1350. ACM
    Cook B, Podelski A and Rybalchenko A (2007). Proving thread termination, ACM SIGPLAN Notices, 42:6, (320-330), Online publication date: 10-Jun-2007.
  1351. Riesco A and Verdejo A Distributed applications implemented in maude with parameterized skeletons Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems, (91-106)
  1352. Zhou C A compositional symbolic verification framework for concurrent software Proceedings of the 2nd international conference on Scalable information systems, (1-4)
  1353. ACM
    Vardi M Formal techniques for SystemC verification Proceedings of the 44th annual Design Automation Conference, (188-192)
  1354. Platzer A A Temporal Dynamic Logic for Verifying Hybrid System Invariants Proceedings of the international symposium on Logical Foundations of Computer Science, (457-471)
  1355. Gentilini R, Schneider K and Mishra B Successive Abstractions of Hybrid Automata for Monotonic CTL Model Checking Proceedings of the international symposium on Logical Foundations of Computer Science, (224-240)
  1356. ACM
    Pucella R (2007). Alternative Logics: a book review, ACM SIGACT News, 38:2, (75-86), Online publication date: 1-Jun-2007.
  1357. Ölveczky P and Meseguer J (2007). Semantics and pragmatics of Real-Time Maude, Higher-Order and Symbolic Computation, 20:1-2, (161-196), Online publication date: 1-Jun-2007.
  1358. Meseguer J and Thati P (2007). Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Higher-Order and Symbolic Computation, 20:1-2, (123-160), Online publication date: 1-Jun-2007.
  1359. Van Der Straeten R, Jonckers V and Mens T (2007). A formal approach to model refactoring and model refinement, Software and Systems Modeling (SoSyM), 6:2, (139-162), Online publication date: 1-Jun-2007.
  1360. Betin-Can A and Bultan T (2007). Highly dependable concurrent programming using design for verification, Formal Aspects of Computing, 19:2, (243-268), Online publication date: 1-Jun-2007.
  1361. Dwyer M, Hatcliff J, Robby R, Pasareanu C and Visser W Formal Software Analysis Emerging Trends in Software Model Checking 2007 Future of Software Engineering, (120-136)
  1362. Schafer W and Wehrheim H The Challenges of Building Advanced Mechatronic Systems 2007 Future of Software Engineering, (72-84)
  1363. Heimdahl M Safety and Software Intensive Systems 2007 Future of Software Engineering, (137-152)
  1364. Ma Y, Jin B, Li Y and Wu K A timing analysis model for ontology evolutions based on distributed environments Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (183-192)
  1365. Viganò F and Colombetti M Model checking norms and sanctions in institutions Proceedings of the 2007 international conference on Coordination, organizations, institutions, and norms in agent systems III, (316-329)
  1366. ACM
    Lomuscio A and Woźna B A temporal epistemic logic with a reset operation Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-8)
  1367. ACM
    Belardinelli F and Lomuscio A A quantified epistemic logic for reasoning about multiagent systems Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-3)
  1368. Wenzel I, Kirner R, Rieder B and Puschner P Cross-platform verification framework for embedded systems Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems, (137-148)
  1369. Tang C and Ternovska E (2007). Model Checking Abstract State Machines with Answer Set Programming, Fundamenta Informaticae, 77:1-2, (105-141), Online publication date: 1-May-2007.
  1370. Hsiung P, Chen Y and Lin Y (2007). Model Checking Safety-Critical Systems Using Safecharts, IEEE Transactions on Computers, 56:5, (692-705), Online publication date: 1-May-2007.
  1371. Yagi I, Takata Y and Seki H (2007). A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power, IEICE - Transactions on Information and Systems, E90-D:5, (799-807), Online publication date: 1-May-2007.
  1372. Marques-Silva J (2007). Interpolant Learning and Reuse in SAT-Based Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 174:3, (31-43), Online publication date: 1-May-2007.
  1373. Chen Z, Tao Z, Xu B and Wang L Implication-based approximating bounded model checking Proceedings of the 2007 international conference on Fundamentals of software engineering, (350-363)
  1374. Seshia S, Li W and Mitra S Verification-guided soft error resilience Proceedings of the conference on Design, automation and test in Europe, (1442-1447)
  1375. Kroening D and Sharygina N Interactive presentation: Image computation and predicate refinement for RTL verilog using word level proofs Proceedings of the conference on Design, automation and test in Europe, (1325-1330)
  1376. Große D, Kühne U and Drechsler R Estimating functional coverage in bounded model checking Proceedings of the conference on Design, automation and test in Europe, (1176-1181)
  1377. Moon I, Bjesse P and Pixley C A compositional approach to the combination of combinational and sequential equivalence checking of circuits without known reset states Proceedings of the conference on Design, automation and test in Europe, (1170-1175)
  1378. Johnson C Genetic programming with fitness based on model checking Proceedings of the 10th European conference on Genetic programming, (114-124)
  1379. Tabuada P Approximate simulation relations and finite abstractions of quantized control systems Proceedings of the 10th international conference on Hybrid systems: computation and control, (529-542)
  1380. Platzer A and Clarke E The image computation problem in hybrid systems model checking Proceedings of the 10th international conference on Hybrid systems: computation and control, (473-486)
  1381. Jha S, Krogh B, Weimer J and Clarke E Reachability for linear hybrid automata using iterative relaxation abstraction Proceedings of the 10th international conference on Hybrid systems: computation and control, (287-300)
  1382. Batt G, Belta C and Weiss R Model checking genetic regulatory networks with parameter uncertainty Proceedings of the 10th international conference on Hybrid systems: computation and control, (61-75)
  1383. Dosch W, Muenchaisri P, Ruanthong W and Stümpel A Model checking for input/output properties of a black-box model Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology, (120-127)
  1384. ACM
    Wang C, Yang Z, Ivančić F and Gupta A (2007). Disjunctive image computation for software verification, ACM Transactions on Design Automation of Electronic Systems, 12:2, (10-es), Online publication date: 1-Apr-2007.
  1385. Baier C, Cloth L, Haverkort B, Kuntz M and Siegle M (2007). Model Checking Markov Chains with Actions and State Labels, IEEE Transactions on Software Engineering, 33:4, (209-224), Online publication date: 1-Apr-2007.
  1386. Sen A and Garg V (2007). Formal Verification of Simulation Traces Using Computation Slicing, IEEE Transactions on Computers, 56:4, (511-527), Online publication date: 1-Apr-2007.
  1387. Pacholik A and Fengler W A system model for formal verification of TLM based transaction properties Proceedings of the 2007 spring simulaiton multiconference - Volume 1, (93-99)
  1388. Yu A, Ciardo G and Lüttgen G Bounded reachability checking of asynchronous systems using decision diagrams Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (648-663)
  1389. Tsay Y, Chen Y, Tsai M, Wu K and Chan W GOAL Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (466-471)
  1390. Batt G, Belta C and Weiss R Model checking liveness properties of genetic regulatory networks Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (323-338)
  1391. Goldman M and Katz S MAVEN Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (308-322)
  1392. Gheorghiu M, Giannakopoulou D and Păsăreanu C Refining interface alphabets for compositional verification Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (292-307)
  1393. Jurdziński M, Laroussinie F and Sproston J Model checking probabilistic timed automata with one or two clocks Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (170-184)
  1394. Ferrante A and Murano A Enriched µ-calculi module checking Proceedings of the 10th international conference on Foundations of software science and computational structures, (183-197)
  1395. Blech J, Schaefer I and Poetzsch-Heffter A Translation validation of system abstractions Proceedings of the 7th international conference on Runtime verification, (139-150)
  1396. ACM
    Morimoto S, Shigematsu S, Goto Y and Cheng J Formal verification of security specifications with common criteria Proceedings of the 2007 ACM symposium on Applied computing, (1506-1512)
  1397. ACM
    Oliveira E, Almeida H and Silva L Formal modelling and verification of a component model using coloured petri nets and model checking Proceedings of the 2007 ACM symposium on Applied computing, (1427-1431)
  1398. ACM
    Gentilini R, Schneider K and Dreyer A Three-valued automated reasoning on analog properties Proceedings of the 17th ACM Great Lakes symposium on VLSI, (485-488)
  1399. Karlsson D, Eles P and Peng Z (2007). Formal verification of component-based designs, Design Automation for Embedded Systems, 11:1, (49-90), Online publication date: 1-Mar-2007.
  1400. Artho C, Zweimüller B, Biere A, Shibayama E and Honiden S Efficient model checking of applications with input/output Proceedings of the 11th international conference on Computer aided systems theory, (515-522)
  1401. Choi Y Checking Interaction Consistency in MARMOT Component Refinements Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (832-843)
  1402. Henzinger T Games, Time, and Probability Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (103-110)
  1403. Revesz P The constraint database approach to software verification Proceedings of the 8th international conference on Verification, model checking, and abstract interpretation, (329-345)
  1404. Vardi M Automata-theoretic model checking revisited Proceedings of the 8th international conference on Verification, model checking, and abstract interpretation, (137-150)
  1405. Lomuscio A, Pecheur C and Raimondi F Automatic verification of knowledge and time with NuSMV Proceedings of the 20th international joint conference on Artifical intelligence, (1384-1389)
  1406. Dixon C, Fisher M and Konev B Tractable temporal reasoning Proceedings of the 20th international joint conference on Artifical intelligence, (318-323)
  1407. Woźna B and Zbrzezny A (2007). Bounded Model Checking for the Existential Fragment of TCTL$_{-G}$ and Diagonal Timed Automata, Fundamenta Informaticae, 79:1-2, (229-256), Online publication date: 1-Jan-2007.
  1408. Tang C and Ternovska E (2007). Model Checking Abstract State Machines with Answer Set Programming, Fundamenta Informaticae, 77:1-2, (105-141), Online publication date: 1-Jan-2007.
  1409. Liu D, Wu P and Lin H Symbolic test generation using a temporal logic with constrained events Formal methods and hybrid real-time systems, (467-471)
  1410. Lam V (2007). A formalism for reasoning about UML activity diagrams, Nordic Journal of Computing, 14:1, (43-64), Online publication date: 1-Jan-2007.
  1411. Bosse T, Lam D and Barber K Empirical Analysis for Agent System Comprehension and Verification Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology, (723-729)
  1412. Cambronero M, Pardo J, Díaz G and Valero V Timed automata for web services verification Proceedings of the 6th WSEAS international conference on Applied computer science, (531-536)
  1413. Fisher J and Henzinger T Executable biology Proceedings of the 38th conference on Winter simulation, (1675-1682)
  1414. Delvenne J, Kůrka P and Blondel V (2006). Decidability and Universality in Symbolic Dynamical Systems, Fundamenta Informaticae, 74:4, (463-490), Online publication date: 1-Dec-2006.
  1415. Poddar R and Bhaduri P (2006). Verification of Giotto based embedded control systems, Nordic Journal of Computing, 13:4, (266-293), Online publication date: 1-Dec-2006.
  1416. Delvenne J, Kůrka P and Blondel V (2006). Decidability and Universality in Symbolic Dynamical Systems, Fundamenta Informaticae, 74:4, (463-490), Online publication date: 1-Dec-2006.
  1417. ACM
    Kishi T and Noda N (2006). Formal verification and software product lines, Communications of the ACM, 49:12, (73-77), Online publication date: 1-Dec-2006.
  1418. Leucker M Learning meets verification Proceedings of the 5th international conference on Formal methods for components and objects, (127-151)
  1419. Sirjani M Rebeca Proceedings of the 5th international conference on Formal methods for components and objects, (102-126)
  1420. Yang J, Sar C and Engler D EXPLODE Proceedings of the 7th symposium on Operating systems design and implementation, (131-146)
  1421. ACM
    Carmona J, Cortadella J, Takada Y and Peper F From molecular interactions to gates Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (891-898)
  1422. ACM
    Cobleigh R, Avrunin G and Clarke L User guidance for creating precise and accessible property specifications Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (208-218)
  1423. ACM
    Gulavani B, Henzinger T, Kannan Y, Nori A and Rajamani S SYNERGY Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (117-127)
  1424. ACM
    Rajan A (2006). Automated requirements-based test case generation, ACM SIGSOFT Software Engineering Notes, 31:6, (1-2), Online publication date: 1-Nov-2006.
  1425. ACM
    Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F (2006). Temporal search, ACM SIGPLAN Notices, 41:11, (25-36), Online publication date: 1-Nov-2006.
  1426. Suhaib S, Mathaikutty D, Berner D and Shukla S (2006). Validating Families of Latency Insensitive Protocols, IEEE Transactions on Computers, 55:11, (1391-1401), Online publication date: 1-Nov-2006.
  1427. Fine S, Freund A, Jaeger I, Mansour Y, Naveh Y and Ziv A (2006). Harnessing Machine Learning to Improve the Success Rate of Stimuli Generation, IEEE Transactions on Computers, 55:11, (1344-1355), Online publication date: 1-Nov-2006.
  1428. Brichau J, Chitchyan R, Clarke S, D'Hondt E, Garcia A, Haupt M, Joosen W, Katz S, Noye J, Rashid A and Sudholt M (2006). A Model Curriculum for Aspect-Oriented Software Development, IEEE Software, 23:6, (53-61), Online publication date: 1-Nov-2006.
  1429. Kristensen L, Schmidt K and Valmari A (2006). Question-guided stubborn set methods for state properties, Formal Methods in System Design, 29:3, (215-251), Online publication date: 1-Nov-2006.
  1430. Bauer A, Leucker M and Streit J SALT—structured assertion language for temporal logic Proceedings of the 8th international conference on Formal Methods and Software Engineering, (757-775)
  1431. Derrick J, North S and Simons T Issues in implementing a model checker for z Proceedings of the 8th international conference on Formal Methods and Software Engineering, (678-696)
  1432. McComb T and Wildman L Verifying abstract information flow properties in fault tolerant security devices Proceedings of the 8th international conference on Formal Methods and Software Engineering, (621-638)
  1433. Wehrheim H Incremental slicing Proceedings of the 8th international conference on Formal Methods and Software Engineering, (514-528)
  1434. Zhao X, Long Q and Qiu Z Model checking dynamic UML consistency Proceedings of the 8th international conference on Formal Methods and Software Engineering, (440-459)
  1435. ACM
    Kruger L, Jha S, Goh E and Boneh D Secure function evaluation with ordered binary decision diagrams Proceedings of the 13th ACM conference on Computer and communications security, (410-420)
  1436. Barner S, Eisner C, Glazberg Z, Kroening D and Rabinovitz I ExpliSAT Proceedings of the 2nd international Haifa verification conference on Hardware and software, verification and testing, (138-154)
  1437. ACM
    Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F Temporal search Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, (25-36)
  1438. ACM
    Darga P and Boyapati C Efficient software model checking of data structure properties Proceedings of the 21st annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, (363-382)
  1439. Abdulla P, Ben Henda N, Mayr R and Sandberg S Eager markov chains Proceedings of the 4th international conference on Automated Technology for Verification and Analysis, (24-38)
  1440. ACM
    Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F (2006). Temporal search, ACM SIGARCH Computer Architecture News, 34:5, (25-36), Online publication date: 20-Oct-2006.
  1441. ACM
    Crandall J, Wassermann G, de Oliveira D, Su Z, Wu S and Chong F (2006). Temporal search, ACM SIGOPS Operating Systems Review, 40:5, (25-36), Online publication date: 20-Oct-2006.
  1442. Bela G and Ignat I A typed specification for security protocols Proceedings of the 5th WSEAS international conference on Data networks, communications and computers, (113-118)
  1443. ACM
    Darga P and Boyapati C (2006). Efficient software model checking of data structure properties, ACM SIGPLAN Notices, 41:10, (363-382), Online publication date: 16-Oct-2006.
  1444. Knapp A and Wuttke J Model checking of UML 2.0 interactions Proceedings of the 2006 international conference on Models in software engineering, (42-51)
  1445. ACM
    Avrunin G, Clarke L, Henneman E and Osterweil L (2006). Complex medical processes as context for embedded systems, ACM SIGBED Review, 3:4, (9-14), Online publication date: 1-Oct-2006.
  1446. Liu C, Fei L, Yan X, Han J and Midkiff S (2006). Statistical Debugging, IEEE Transactions on Software Engineering, 32:10, (831-848), Online publication date: 1-Oct-2006.
  1447. Duarte L, Kramer J and Uchitel S Model extraction using context information Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems, (380-394)
  1448. ACM
    Miller A, Donaldson A and Calder M (2006). Symmetry in temporal logic model checking, ACM Computing Surveys, 38:3, (8-es), Online publication date: 30-Sep-2006.
  1449. Peikenkamp T, Cavallo A, Valacca L, Böde E, Pretzer M and Hahn E Towards a unified model-based safety assessment Proceedings of the 25th international conference on Computer Safety, Reliability, and Security, (275-288)
  1450. Maler O, Nickovic D and Pnueli A From MITL to timed automata Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (274-289)
  1451. Laroussinie F, Markey N and Oreiby G Model-checking timed ATL for durational concurrent game structures Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (245-259)
  1452. Fainekos G, Girard A and Pappas G Temporal logic verification using simulation Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (171-186)
  1453. Mehta V, Bartzis C, Zhu H, Clarke E and Wing J Ranking attack graphs Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, (127-144)
  1454. Giffin J, Jha S and Miller B Automated discovery of mimicry attacks Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, (41-60)
  1455. Edelkamp S, Jabbar S and Lafuente A Heuristic search for the analysis of graph transition systems Proceedings of the Third international conference on Graph Transformations, (414-429)
  1456. ACM
    Roy C, Noll T, Roy B and Cordy J Towards automatic verification of Erlang programs by π-calculus translation Proceedings of the 2006 ACM SIGPLAN workshop on Erlang, (38-50)
  1457. Kacprzak M, Lomuscio A, Niewiadomski A, Penczek W, Raimondi F and Szreter M (2006). Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol, Fundamenta Informaticae, 72:1-3, (215-234), Online publication date: 15-Sep-2006.
  1458. Eiter T, Erdem E, Fink M and Senko J Comparing action descriptions based on semantic preferences Proceedings of the 10th European conference on Logics in Artificial Intelligence, (124-137)
  1459. Franceschet M and Zimuel E A logic-based approach to cache answerability for XPath queries Proceedings of the 4th international conference on Database and XML Technologies, (46-60)
  1460. Lamborn P and Jones M January: A Parallel Algorithm for Bug Hunting Based on Insect Behavior Parallel Problem Solving from Nature - PPSN IX, (731-740)
  1461. Bordini R, Dastani M and Winikoff M Current issues in multi-agent systems development Proceedings of the 7th international conference on Engineering societies in the agents world VII, (38-61)
  1462. Hammond K, Grov G, Michaelson G and Ireland A Low-level programming in Hume Proceedings of the 18th international conference on Implementation and application of functional languages, (91-107)
  1463. Pesic M and van der Aalst W A declarative approach for flexible business processes management Proceedings of the 2006 international conference on Business Process Management Workshops, (169-180)
  1464. Barnat J and Černá I (2006). Distributed breadth-first search LTL model checking, Formal Methods in System Design, 29:2, (117-134), Online publication date: 1-Sep-2006.
  1465. Smith G and Derrick J (2006). Verifying data refinements using a model checker, Formal Aspects of Computing, 18:3, (264-287), Online publication date: 1-Sep-2006.
  1466. Endriss U Temporal Logics for Representing Agent Communication Protocols Agent Communication II, (15-29)
  1467. Schmidt D Underapproximating predicate transformers Proceedings of the 13th international conference on Static Analysis, (127-143)
  1468. Grinchtein O, Jonsson B and Pettersson P Inference of event-recording automata using timed decision trees Proceedings of the 17th international conference on Concurrency Theory, (435-449)
  1469. Ezekiel J, Lüttgen G and Siminiceanu R Can saturation be parallelised? Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (331-346)
  1470. Barnat J and Moravec P Parallel algorithms for finding SCCs in implicitly given graphs Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (316-330)
  1471. Mühlberg J and Lüttgen G Blasting Linux code Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (211-226)
  1472. Brim L, Černá I, Moravec P and Šimša J On combining partial order reduction with fairness assumptions Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (84-99)
  1473. Juvekar S and Piterman N Minimizing generalized büchi automata Proceedings of the 18th international conference on Computer Aided Verification, (45-58)
  1474. Kupferman O, Piterman N and Vardi M Safraless compositional synthesis Proceedings of the 18th international conference on Computer Aided Verification, (31-44)
  1475. Kroening D and Weissenbacher G Counterexamples with loops for predicate abstraction Proceedings of the 18th international conference on Computer Aided Verification, (152-165)
  1476. Grell S, Schaub T and Selbig J Modelling biological networks by action languages via answer set programming Proceedings of the 22nd international conference on Logic Programming, (285-299)
  1477. Li C and Dang Z Decompositional algorithms for safety verification and testing of aspect-oriented systems Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (100-114)
  1478. Ernits J, Kull A, Raiend K and Vain J Generating tests from EFSM models using guided model checking and iterated search refinement Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (85-99)
  1479. Fainekos G and Pappas G Robustness of temporal logic specifications Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (178-192)
  1480. Armoni R, Korchemny D, Tiemeyer A, Vardi M and Zbar Y Deterministic dynamic monitors for linear-time assertions Proceedings of the First combined international conference on Formal Approaches to Software Testing and Runtime Verification, (163-177)
  1481. Cao Z Model checking for epistemic and temporal properties of uncertain agents Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems, (46-58)
  1482. Ding Y and Zhang Y A case study for CTL model update Proceedings of the First international conference on Knowledge Science, Engineering and Management, (88-101)
  1483. Chockler H, Kupferman O and Vardi M (2006). Coverage metrics for formal verification, International Journal on Software Tools for Technology Transfer (STTT), 8:4-5, (373-386), Online publication date: 1-Aug-2006.
  1484. Ganai M, Gupta A, Yang Z and Ashar P (2006). Efficient distributed SAT and SAT-based distributed Bounded Model Checking, International Journal on Software Tools for Technology Transfer (STTT), 8:4-5, (387-396), Online publication date: 1-Aug-2006.
  1485. Tronci E (2006). Introductory Paper, International Journal on Software Tools for Technology Transfer (STTT), 8:4-5, (355-358), Online publication date: 1-Aug-2006.
  1486. Miner A (2006). Saturation for a General Class of Models, IEEE Transactions on Software Engineering, 32:8, (559-570), Online publication date: 1-Aug-2006.
  1487. Sproston J and Donatelli S (2006). Backward Bisimulation in Markov Chain Model Checking, IEEE Transactions on Software Engineering, 32:8, (531-546), Online publication date: 1-Aug-2006.
  1488. ACM
    Peranandam P, Nalla P, Ruf J, Weiss R, Kropf T and Rosenstiel W Fast falsification based on symbolic bounded property checking Proceedings of the 43rd annual Design Automation Conference, (1077-1082)
  1489. ACM
    Nanshi K and Somenzi F Guiding simulation with increasingly refined abstract traces Proceedings of the 43rd annual Design Automation Conference, (737-742)
  1490. ACM
    Vimjam V and Hsiao M Fast illegal state identification for improving SAT-based induction Proceedings of the 43rd annual Design Automation Conference, (241-246)
  1491. ACM
    Whalen M, Rajan A, Heimdahl M and Miller S Coverage metrics for requirements-based testing Proceedings of the 2006 international symposium on Software testing and analysis, (25-36)
  1492. ACM
    Owen D, Desovski D and Cukic B Random testing of formal software models and induced coverage Proceedings of the 1st international workshop on Random testing, (20-27)
  1493. Lin S Reasoning about discrete event sources Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (868-873)
  1494. Wang F, Huang G and Yu F (2006). TCTL Inevitability Analysis of Dense-Time Systems, IEEE Transactions on Software Engineering, 32:7, (510-526), Online publication date: 1-Jul-2006.
  1495. Mongiello M (2006). Finite-state verification of the ebXML protocol, Electronic Commerce Research and Applications, 5:2, (147-169), Online publication date: 1-Jul-2006.
  1496. Fokkink W, Pang J and De Pol J (2006). Cones and foci, Formal Methods in System Design, 29:1, (1-31), Online publication date: 1-Jul-2006.
  1497. Carloni L, Passerone R, Pinto A and Sangiovanni-Vincentelli A (2006). Languages and Tools for Hybrid Systems Design, Foundations and Trends in Electronic Design Automation, 1:1-2, (1-193), Online publication date: 30-Jun-2006.
  1498. Xie F and Browne J Verification of component-based software application families Proceedings of the 9th international conference on Component-Based Software Engineering, (50-66)
  1499. Shilov N and Garanina N Well-structured model checking of multiagent systems Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics, (363-376)
  1500. Kouchnarenko O and Lanoix A How to verify and exploit a refinement of component-based systems Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics, (297-309)
  1501. Letichevsky A Basic protocols Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics, (21-25)
  1502. ACM
    Deutsch A, Sui L, Vianu V and Zhou D Verification of communicating data-driven web services Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (90-99)
  1503. Evangelista S and Pradat-Peyre J On the computation of stubborn sets of colored petri nets Proceedings of the 27th international conference on Applications and Theory of Petri Nets and Other Models of Concurrency, (146-165)
  1504. Merayo M, Núñez M and Rodríguez I Implementation relations for stochastic finite state machines Proceedings of the Third European conference on Formal Methods and Stochastic Models for Performance Evaluation, (123-137)
  1505. Hoffmann J, Sabharwal A and Domshlak C Friends or foes? an AI planning perspective on abstraction and search Proceedings of the Sixteenth International Conference on International Conference on Automated Planning and Scheduling, (294-303)
  1506. Behrmann G, Bouyer P, Larsen K and Pelánek R (2006). Lower and upper bounds in zone-based abstractions of timed automata, International Journal on Software Tools for Technology Transfer (STTT), 8:3, (204-215), Online publication date: 1-Jun-2006.
  1507. Brückner I, Metzler B and Wehrheim H (2006). Optimizing slicing of formal specifications by deductive verification, Nordic Journal of Computing, 13:1, (22-45), Online publication date: 1-Jun-2006.
  1508. Demri S, Laroussinie F and Schnoebelen P (2006). A parametric analysis of the state-explosion problem in model checking, Journal of Computer and System Sciences, 72:4, (547-575), Online publication date: 1-Jun-2006.
  1509. ACM
    Liu C, Ye E and Richardson D LtRules Proceedings of the 28th international conference on Software engineering, (823-826)
  1510. ACM
    Furusawa H, Choi E and Watanabe H Efficiency analysis of model-based review in actual software design Proceedings of the 28th international conference on Software engineering, (604-607)
  1511. Du D, He K, Cao H and Ma Y Toward an integratred verification environment for embedded systems Proceedings of the 17th IASTED international conference on Modelling and simulation, (280-285)
  1512. ACM
    Artho C and Biere A Advanced unit testing Proceedings of the 2006 international workshop on Automation of software test, (92-98)
  1513. ACM
    Jørgensen J Addressing problem frame concerns via coloured petri nets and graphical animation Proceedings of the 2006 international workshop on Advances and applications of problem frames, (49-58)
  1514. Ding Y and Zhang Y CTL Model Update Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (362-366)
  1515. Sharpanskykh A and Treur J Verifying Interlevel Relations within Multi-Agent Systems Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (290-294)
  1516. Chopinaud C, El Fallah Seghrouchni A and Taillibert P Prevention of harmful behaviors within cognitive and autonomous agents Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (205-209)
  1517. Cheng K and Yap R Maintaining Generalized Arc Consistency on Ad-hoc n-ary Boolean Constraints Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (78-82)
  1518. Manolios P Refinement and theorem proving Proceedings of the 6th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems, (176-210)
  1519. Gupta A, Ganai M and Wang C SAT-Based verification methods and applications in hardware verification Proceedings of the 6th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems, (108-143)
  1520. ACM
    Schneider K, Schuele T and Trapp M Verifying the adaptation behavior of embedded systems Proceedings of the 2006 international workshop on Self-adaptation and self-managing systems, (16-22)
  1521. Rodríguez I, Merayo M and Núñez M A logic for assessing sets of heterogeneous testing hypotheses Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems, (39-54)
  1522. Zhou C and Ding D Improved SAT based bounded model checking Proceedings of the Third international conference on Theory and Applications of Models of Computation, (611-620)
  1523. Botía J, Hernansáez J and Gómez-Skarmeta A On the application of clustering techniques to support debugging large-scale multi-agent systems Proceedings of the 4th international conference on Programming multi-agent systems, (217-227)
  1524. Cao Z Representing and verifying temporal epistemic properties in multi-agent systems Proceedings of the 7th international conference on Computational logic in multi-agent systems, (134-150)
  1525. ACM
    Bosse T, Lam D and Barber K Automated analysis and verification of agent behavior Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (1317-1319)
  1526. ACM
    Lomuscio A and Raimondi F The complexity of model checking concurrent programs against CTLK specifications Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (548-550)
  1527. ACM
    Konikowska B and Penczek W Model checking for multivalued logic of knowledge and time Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (169-176)
  1528. ACM
    Lomuscio A and Raimondi F Model checking knowledge, strategies, and games in multi-agent systems Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (161-168)
  1529. Lomuscio A and Raimondi F The complexity of model checking concurrent programs against CTLK specifications Proceedings of the 4th international conference on Declarative Agent Languages and Technologies, (29-42)
  1530. Park S and Kwon G Avoidance of state explosion using dependency analysis in model checking control flow model Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (905-911)
  1531. Lee T, Kwon G and Han H CTL model checking for boolean program Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV, (1081-1089)
  1532. Deng S, Wu W and Bian J Bounded model checking combining symbolic trajectory evaluation abstraction with hybrid three-valued SAT solving Proceedings of the 10th international conference on Computer supported cooperative work in design III, (297-307)
  1533. Xu K, Wang Y and Wu C Ensuring secure and robust grid applications – from a formal method point of view Proceedings of the First international conference on Advances in Grid and Pervasive Computing, (537-546)
  1534. Hoffmann J, Edelkamp S, Thiébaux S, Englert R, dos Santos Liporace F and Trüg S (2006). Engineering benchmarks for planning, Journal of Artificial Intelligence Research, 26:1, (453-541), Online publication date: 1-May-2006.
  1535. Stokely M, Chaki S and Ouaknine J (2006). Parallel Assignments in Software Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 157:1, (77-94), Online publication date: 1-May-2006.
  1536. Castelluccia D, Mongiello M, Ruta M and Totaro R (2006). WAVer, Electronic Notes in Theoretical Computer Science (ENTCS), 157:1, (61-76), Online publication date: 1-May-2006.
  1537. Chen D and Wu J (2006). Model Checking Temporal Aspects of Inconsistent Concurrent Systems Based on Paraconsistent Logic, Electronic Notes in Theoretical Computer Science (ENTCS), 157:1, (23-38), Online publication date: 1-May-2006.
  1538. Amato G, Coppola M, Gnesi S, Scozzari F and Semini L (2006). Modeling Web Applications by the Multiple Levels of Integrity Policy, Electronic Notes in Theoretical Computer Science (ENTCS), 157:2, (167-185), Online publication date: 1-May-2006.
  1539. Brookes S (2006). A Grainless Semantics for Parallel Programs with Shared Mutable Data, Electronic Notes in Theoretical Computer Science (ENTCS), 155, (277-307), Online publication date: 1-May-2006.
  1540. Stoller S and Cohen E (2006). Optimistic synchronization-based state-space reduction, Formal Methods in System Design, 28:3, (263-289), Online publication date: 1-May-2006.
  1541. Chockler H, Kupferman O and Vardi M (2006). Coverage metrics for temporal logic model checking, Formal Methods in System Design, 28:3, (189-212), Online publication date: 1-May-2006.
  1542. ACM
    Koo H and Mishra P Test generation using SAT-based bounded model checking for validation of pipelined processors Proceedings of the 16th ACM Great Lakes symposium on VLSI, (362-365)
  1543. Chung M and Ciardo G A dynamic firing speculation to speedup distributed symbolic state-space generation Proceedings of the 20th international conference on Parallel and distributed processing, (136-136)
  1544. Miner A and Basu S Verification of software via integration of design and implementation Proceedings of the 20th international conference on Parallel and distributed processing, (286-286)
  1545. Gopalakrishnan G and Kirby R Toward reliable and efficient message passing software through formal analysis Proceedings of the 20th international conference on Parallel and distributed processing, (284-284)
  1546. ACM
    Jaghoori M, Movaghar A and Sirjani M Modere Proceedings of the 2006 ACM symposium on Applied computing, (1810-1815)
  1547. Bigot C, Faivre A, Gaston C and Simon J Automatic test generation on a (U)SIM smart card Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (345-358)
  1548. Tauriainen H (2006). Nested Emptiness Search for Generalized Büchi Automata, Fundamenta Informaticae, 70:1,2, (127-154), Online publication date: 1-Apr-2006.
  1549. Winter K, Johnston W, Robinson P, Strooper P and van den Berg L Tool support for checking railway interlocking designs Proceedings of the 10th Australian workshop on Safety critical systems and software - Volume 55, (101-107)
  1550. Tauriainen H (2005). Nested emptiness search for generalized Büchi automata, Fundamenta Informaticae, 70:1, (127-154), Online publication date: 1-Apr-2006.
  1551. Fecher H, Leucker M and Wolf V Don’t know in probabilistic systems Proceedings of the 13th international conference on Model Checking Software, (71-88)
  1552. Bhattacharya R, German S and Gopalakrishnan G Exploiting symmetry and transactions for partial order reduction of rule based specifications Proceedings of the 13th international conference on Model Checking Software, (252-270)
  1553. Edelkamp S and Jabbar S Large-Scale directed model checking LTL Proceedings of the 13th international conference on Model Checking Software, (1-18)
  1554. Alur R and Bernadsky M Bounded model checking for GSMP models of stochastic real-time systems Proceedings of the 9th international conference on Hybrid Systems: computation and control, (19-33)
  1555. Ghosh I and Prasad M A Technique for Estimating the Difficulty of a Formal Verification Problem Proceedings of the 7th International Symposium on Quality Electronic Design, (63-70)
  1556. Köb D and Wotawa F Fundamentals of debugging using a resolution calculus Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering, (278-292)
  1557. Devereux B and Chechik M Automated support for building behavioral models of event-driven systems Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering, (122-138)
  1558. Lomuscio A and Raimondi F MCMAS Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (450-454)
  1559. Ghica D and Murawski A Compositional model extraction for higher-order concurrent programs Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (303-317)
  1560. Kroening D and Sharygina N Approximating predicate images for bit-vector logic Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (242-256)
  1561. Gurfinkel A and Chechik M Why waste a perfectly good abstraction? Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (212-226)
  1562. Chaki S SAT-Based software certification Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (151-166)
  1563. Koo H and Mishra P Functional test generation using property decompositions for validation of pipelined processors Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1240-1245)
  1564. Karlsson D, Eles P and Peng Z Formal verification of systemc designs using a petri-net based representation Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1228-1233)
  1565. Das S, Basu P, Dasgupta P and Chakrabarti P What lies between design intent coverage and model checking? Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1217-1222)
  1566. ACM
    Thang N and Katayama T (2005). Specification and verification of inter-component constraints in CTL, ACM SIGSOFT Software Engineering Notes, 31:2, (8-es), Online publication date: 1-Mar-2006.
  1567. ACM
    Brim L, Černá I, Vařeková P and Zimmerova B (2005). Component-interaction automata as a verification-oriented component-based system specification, ACM SIGSOFT Software Engineering Notes, 31:2, (4-es), Online publication date: 1-Mar-2006.
  1568. ACM
    Ciobanu G and Lucanu D (2005). A specification language for coordinated objects, ACM SIGSOFT Software Engineering Notes, 31:2, (3-es), Online publication date: 1-Mar-2006.
  1569. Ossowski J and Baier C (2006). Symbolic Reasoning with Weighted and Normalized Decision Diagrams, Electronic Notes in Theoretical Computer Science (ENTCS), 151:1, (39-56), Online publication date: 1-Mar-2006.
  1570. Schuppan V and Biere A (2006). Liveness Checking as Safety Checking for Infinite State Spaces, Electronic Notes in Theoretical Computer Science (ENTCS), 149:1, (79-96), Online publication date: 1-Feb-2006.
  1571. Chung M and Ciardo G (2006). A Pattern Recognition Approach for Speculative Firing Prediction in Distributed Saturation State-Space Generation, Electronic Notes in Theoretical Computer Science (ENTCS), 135:2, (65-80), Online publication date: 1-Feb-2006.
  1572. Nalla P, Weiss R, Peranandam P, Ruf J, Kropf T and Rosenstiel W (2006). Distributed Symbolic Bounded Property Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 135:2, (47-63), Online publication date: 1-Feb-2006.
  1573. Qian K and Nymeyer A (2006). Language-Emptiness Checking of Alternating Tree Automata Using Symbolic Reachability Analysis, Electronic Notes in Theoretical Computer Science (ENTCS), 149:2, (33-49), Online publication date: 1-Feb-2006.
  1574. Kwon G (2006). Relay Reachability Algorithm for Exploring Huge State Space, Electronic Notes in Theoretical Computer Science (ENTCS), 149:2, (19-31), Online publication date: 1-Feb-2006.
  1575. Edelkamp S and Jabbar S (2006). Action Planning for Directed Model Checking of Petri Nets, Electronic Notes in Theoretical Computer Science (ENTCS), 149:2, (3-18), Online publication date: 1-Feb-2006.
  1576. Basu P, Das S, Dasgupta P and Chakrabarti P Discovering the input assumptions in specification refinement coverage Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (13-18)
  1577. Xu X, Kimura S, Horikawa K and Tsuchiya T Transition-based coverage estimation for symbolic model checking Proceedings of the 2006 Asia and South Pacific Design Automation Conference, (1-6)
  1578. Jurdziński M, Paterson M and Zwick U A deterministic subexponential algorithm for solving parity games Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (117-123)
  1579. Wang B Automatic verification of a model checker by reflection Proceedings of the 8th international conference on Practical Aspects of Declarative Languages, (45-59)
  1580. Ranzato F and Tapparo F Strong preservation of temporal fixpoint-based operators by abstract interpretation Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (332-347)
  1581. Hristova K and Liu Y Improved algorithm complexities for linear temporal logic model checking of pushdown systems Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (190-206)
  1582. Analyzing tabular requirements specifications using infinite state model checking Proceedings of the Fourth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (7-16)
  1583. Kacprzak M, Lomuscio A, Niewiadomski A, Penczek W, Raimondi F and Szreter M (2006). Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol, Fundamenta Informaticae, 72:1-3, (215-234), Online publication date: 1-Jan-2006.
  1584. Jha S and Shyamasundar R Adapting biochemical kripke structures for distributed model checking Transactions on Computational Systems Biology VII, (107-122)
  1585. Katz S Aspect categories and classes of temporal properties Transactions on Aspect-Oriented Software Development I, (106-134)
  1586. Fages F From syntax to semantics in systems biology towards automated reasoning tools Transactions on Computational Systems Biology IV, (68-70)
  1587. Katz S Rigorous fault tolerance using aspects and formal methods Rigorous Development of Complex Fault-Tolerant Systems, (226-240)
  1588. Fantechi A, Gnesi S and Semini L Achieving fault tolerance by a formally validated interaction policy Rigorous Development of Complex Fault-Tolerant Systems, (133-152)
  1589. Meyer B Dependable software Dependable Systems, (1-33)
  1590. Combi C and Rossato R Temporal constraints with multiple granularities in smart homes Designing Smart Homes, (35-56)
  1591. Calzone L, Chabrier-Rivier N, Fages F and Soliman S Machine learning biochemical networks from temporal logic properties Transactions on Computational Systems Biology VI, (68-94)
  1592. Hinze A, Malik P and Malik R Interaction design for a mobile context-aware system using discrete event modelling Proceedings of the 29th Australasian Computer Science Conference - Volume 48, (257-266)
  1593. Bultan T, Su J and Fu X (2006). Analyzing Conversations of Web Services, IEEE Internet Computing, 10:1, (18-25), Online publication date: 1-Jan-2006.
  1594. Component-based hardware/software co-verification Proceedings of the Fourth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (27-36)
  1595. Mixed symbolic representations for model checking software programs Proceedings of the Fourth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (17-26)
  1596. Peischl B and Wotawa F (2006). Automated Source-Level Error Localization in Hardware Designs, IEEE Design & Test, 23:1, (8-19), Online publication date: 1-Jan-2006.
  1597. Amjad H (2006). Verification of AMBA Using a Combination of Model Checking and Theorem Proving, Electronic Notes in Theoretical Computer Science (ENTCS), 145, (45-61), Online publication date: 1-Jan-2006.
  1598. Kroening D (2006). Computing Over-Approximations with Bounded Model Checking, Electronic Notes in Theoretical Computer Science (ENTCS), 144:1, (79-92), Online publication date: 1-Jan-2006.
  1599. Bloem R, Gabow H and Somenzi F (2006). An Algorithm for Strongly Connected Component Analysis in n log n Symbolic Steps, Formal Methods in System Design, 28:1, (37-56), Online publication date: 1-Jan-2006.
  1600. Jaghoori M, Sirjani M, Mousavi M and Movaghar A Efficient symmetry reduction for an actor-based model Proceedings of the Second international conference on Distributed Computing and Internet Technology, (494-507)
  1601. Mutsuda Y, Kato T and Yamane S Specification and verification techniques of embedded systems using probabilistic linear hybrid automata Proceedings of the Second international conference on Embedded Software and Systems, (346-360)
  1602. Wu L, Su K and Chen Q Model checking temporal logics of knowledge and its application in security verification Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I, (349-354)
  1603. Sivathanu M, Arpaci-Dusseau A, Arpaci-Dusseau R and Jha S A logic of file systems Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4, (1-1)
  1604. Lü Y, Chen X, Fang L and Wang H Towards a symbolic bisimulation for the spi calculus Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (1095-1102)
  1605. Jarnjak F, Kim J, Jing Y, In H, Jeong D and Baik D TS-U Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (161-170)
  1606. Chen R and Wotawa F An object store model for diagnosing java programs Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (865-870)
  1607. Ding Y and Zhang Y Model updating CTL systems Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (5-16)
  1608. Fu X, Bultan T and Su J (2005). Synchronizability of Conversations among Web Services, IEEE Transactions on Software Engineering, 31:12, (1042-1055), Online publication date: 1-Dec-2005.
  1609. Sinha R, Roop P and Khoussainov B (2005). Adaptive Verification using Forced Simulation, Electronic Notes in Theoretical Computer Science (ENTCS), 141:3, (171-197), Online publication date: 1-Dec-2005.
  1610. Grunske L, Lindsay P, Yatapanage N and Winter K An automated failure mode and effect analysis based on high-level design specification with behavior trees Proceedings of the 5th international conference on Integrated Formal Methods, (129-149)
  1611. Lluch-Lafuente A and Montanari U (2005). Quantitative μ-calculus and CTL defined over constraint semirings, Theoretical Computer Science, 346:1, (135-160), Online publication date: 23-Nov-2005.
  1612. de Alfaro L, Faella M, Henzinger T, Majumdar R and Stoelinga M (2005). Model checking discounted temporal properties, Theoretical Computer Science, 345:1, (139-170), Online publication date: 21-Nov-2005.
  1613. Li T, Guo Y, Li S and Zhu D Applying constraint logic programming to predicate abstraction of RTL verilog descriptions Proceedings of the 4th Mexican international conference on Advances in Artificial Intelligence, (175-184)
  1614. Khasidashvili Z, Nadel A, Palti A and Hanna Z Simultaneous SAT-Based model checking of safety properties Proceedings of the First Haifa international conference on Hardware and Software Verification and Testing, (56-75)
  1615. ACM
    Grov G Verifying the correctness of hume programs Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (444-447)
  1616. ACM
    Haydar M, Boroday S, Petrenko A and Sahraoui H Properties and scopes in web model checking Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (400-404)
  1617. ACM
    Vardhan A and Viswanathan M Learning to verify branching time properties Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (325-328)
  1618. Ankolekar A, Paolucci M and Sycara K Towards a formal verification of OWL-S process models Proceedings of the 4th international conference on The Semantic Web, (37-51)
  1619. Huang Z and Stuckenschmidt H Reasoning with multi-version ontologies Proceedings of the 4th international conference on The Semantic Web, (398-412)
  1620. Reps T, Balakrishnan G, Lim J and Teitelbaum T A next-generation platform for analyzing executables Proceedings of the Third Asian conference on Programming Languages and Systems, (212-229)
  1621. Groesser M and Baier C Partial order reduction for markov decision processes Proceedings of the 4th international conference on Formal Methods for Components and Objects, (408-427)
  1622. Barnat J, Brim L and Černá I Cluster-Based LTL model checking of large systems Proceedings of the 4th international conference on Formal Methods for Components and Objects, (259-279)
  1623. Clarke E, Sharygina N and Sinha N Program compatibility approaches Proceedings of the 4th international conference on Formal Methods for Components and Objects, (243-258)
  1624. Grumberg O Abstraction and refinement in model checking Proceedings of the 4th international conference on Formal Methods for Components and Objects, (219-242)
  1625. Brückner I and Wehrheim H Slicing an integrated formal method for verification Proceedings of the 7th international conference on Formal Methods and Software Engineering, (360-374)
  1626. Leuschel M and Butler M Automatic refinement checking for b Proceedings of the 7th international conference on Formal Methods and Software Engineering, (345-359)
  1627. Sobeih A, Viswanathan M, Marinov D and Hou J Finding bugs in network protocols using simulation code and protocol-specific heuristics Proceedings of the 7th international conference on Formal Methods and Software Engineering, (235-250)
  1628. Wehrheim H (2005). Slicing techniques for verification re-use, Theoretical Computer Science, 343:3, (509-528), Online publication date: 17-Oct-2005.
  1629. Bardin S, Finkel A, Leroux J and Schnoebelen P Flat acceleration in symbolic model checking Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (474-488)
  1630. Kim M and Kang K Formal construction and verification of home service robots Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (429-443)
  1631. Lin S, Hsiung P, Huang C and Chen Y Model checking prioritized timed automata Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (370-384)
  1632. Shoham S and Grumberg O Multi-valued model checking games Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (354-369)
  1633. Yagi I, Takata Y and Seki H A static analysis using tree automata for XML access control Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (234-247)
  1634. Li T, Guo Y, Li S and Liu G Predicate abstraction of RTL verilog descriptions using constraint logic programming Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (174-186)
  1635. Damm W, Pinto G and Ratschan S Guaranteed termination in the verification of LTL properties of non-linear robust discrete time hybrid systems Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (99-113)
  1636. Gurfinkel A and Chechik M How thorough is thorough enough? Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (65-80)
  1637. Chakrabarti A, Chatterjee K, Henzinger T, Kupferman O and Majumdar R Verifying quantitative properties using bound functions Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (50-64)
  1638. Staber S, Jobstmann B and Bloem R Finding and fixing faults Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (35-49)
  1639. Kapschitz T and Ginosar R Formal verification of synchronizers Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (359-362)
  1640. Bhattacharya R, German S and Gopalakrishnan G Symbolic partial order reduction for rule based transition systems Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (332-335)
  1641. Wei O, Gurfinkel A and Chechik M Identification and counter abstraction for full virtual symmetry Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (285-300)
  1642. Bustan D, Flaisher A, Grumberg O, Kupferman O and Vardi M Regular vacuity Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (191-206)
  1643. Ciardo G and Yu A Saturation-based symbolic reachability analysis using conjunctive and disjunctive partitioning Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (146-161)
  1644. Grumberg O, Heyman T, Ifergan N and Schuster A Achieving speedups in distributed symbolic reachability analysis through asynchronous computation Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (129-145)
  1645. Dang Z, Ibarra O, Li C and Xie G On model-checking of p systems Proceedings of the 4th international conference on Unconventional Computation, (82-93)
  1646. Chandrasekar K and Hsiao M State Set Management for SAT-based Unbounded Model Checking Proceedings of the 2005 International Conference on Computer Design, (585-590)
  1647. Ivančić F, Shlyakhter I, Gupta A and Ganai M Model Checking C Programs Using F-SOFT Proceedings of the 2005 International Conference on Computer Design, (297-308)
  1648. Rasse A, Perronne J, Muller P and Thirion B Using process algebra to validate behavioral aspects of object-oriented models Proceedings of the 2005 international conference on Satellite Events at the MoDELS, (39-47)
  1649. Zhang D and Cleaveland R Fast generic model-checking for data-based systems Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (83-97)
  1650. Hsiung P and Lin Y Modeling and verification of safety-critical systems using safecharts Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (290-304)
  1651. Qian K, Nymeyer A and Susanto S Abstraction-Guided model checking using symbolic IDA* and heuristic synthesis Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (275-289)
  1652. Wang B Proving ∀µ-calculus properties with SAT-based model checking Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (113-127)
  1653. Monniaux D (2005). Abstract interpretation of programs as Markov decision processes, Science of Computer Programming, 58:1-2, (179-205), Online publication date: 1-Oct-2005.
  1654. Field J, Goyal D, Ramalingam G and Yahav E (2005). Typestate verification, Science of Computer Programming, 58:1-2, (57-82), Online publication date: 1-Oct-2005.
  1655. Pan G and Vardi M (2005). Symbolic Techniques in Satisfiability Solving, Journal of Automated Reasoning, 35:1-3, (25-50), Online publication date: 1-Oct-2005.
  1656. ACM
    Noll T and Roy C Modeling Erlang in the pi-calculus Proceedings of the 2005 ACM SIGPLAN workshop on Erlang, (72-77)
  1657. ACM
    Lindig C Random testing of C calling conventions Proceedings of the sixth international symposium on Automated analysis-driven debugging, (3-12)
  1658. Wu P and Lin H Model-Based Testing of Concurrent Programs with Predicate Sequencing Constraints Proceedings of the Fifth International Conference on Quality Software, (3-10)
  1659. Ding Y and Zhang Y Algorithms for CTL system modification Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II, (1000-1006)
  1660. Loer K and Harrison M Analysing user confusion in context aware mobile applications Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction, (184-197)
  1661. Pu F, Zhang W and Wang S An improved case-based approach to LTL model checking Proceedings of the Second international conference on Rapid Integration of Software Engineering Techniques, (190-202)
  1662. Subramaniam M and Shi J Using Dominators to Extract Observable Protocol Contexts Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (96-105)
  1663. Nejati S, Gurfinkel A and Chechik M Stuttering Abstraction for Model Checkin Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (311-320)
  1664. Blech J, Gesellensetter L and Glesner S Formal Verification of Dead Code Elimination in Isabelle/HOL Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (200-209)
  1665. Cerone A, Lindsay P and Connelly S Formal Analysis of Human-computer Interaction using Model-checking Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (352-362)
  1666. Simon L, Mallya A and Gupta G Design and Implementation of A Proceedings of the 15th international conference on Logic Based Program Synthesis and Transformation, (44-60)
  1667. Pettorossi A, Proietti M and Senni V Transformational verification of parameterized protocols using array formulas Proceedings of the 15th international conference on Logic Based Program Synthesis and Transformation, (23-43)
  1668. Fages F Temporal logic constraints in the biochemical abstract machine BIOCHAM Proceedings of the 15th international conference on Logic Based Program Synthesis and Transformation, (1-5)
  1669. Cook B, Podelski A and Rybalchenko A Abstraction refinement for termination Proceedings of the 12th international conference on Static Analysis, (87-101)
  1670. ACM
    Thang N and Katayama T Specification and verification of inter-component constraints in CTL Proceedings of the 2005 conference on Specification and verification of component-based systems, (8-es)
  1671. ACM
    Brim L, Černá I, Vařeková P and Zimmerova B Component-interaction automata as a verification-oriented component-based system specification Proceedings of the 2005 conference on Specification and verification of component-based systems, (4-es)
  1672. ACM
    Ciobanu G and Lucanu D A specification language for coordinated objects Proceedings of the 2005 conference on Specification and verification of component-based systems, (3-es)
  1673. ACM
    Liu C, Yan X, Fei L, Han J and Midkiff S SOBER Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, (286-295)
  1674. Palomino M, Meseguer J and Martí-Oliet N A categorical approach to simulations Proceedings of the First international conference on Algebra and Coalgebra in Computer Science, (313-330)
  1675. ACM
    Liu C, Yan X, Fei L, Han J and Midkiff S (2005). SOBER, ACM SIGSOFT Software Engineering Notes, 30:5, (286-295), Online publication date: 1-Sep-2005.
  1676. Barner S and Grumberg O (2005). Combining symmetry reduction and under-approximation for symbolic model checking, Formal Methods in System Design, 27:1-2, (29-66), Online publication date: 1-Sep-2005.
  1677. Diaz G, Pardo J, Cambronero M, Valero V and Cuartero F Automatic translation of WS-CDL choreographies to timed automata Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes, (230-242)
  1678. Tobarra L, Cazorla D, Cuartero F and Díaz G Application of formal methods to the analysis of web services security Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes, (215-229)
  1679. Ortner V and Schirmer N Verification of BDD normalization Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics, (261-277)
  1680. Cook B, Kroening D and Sharygina N Symbolic model checking for asynchronous boolean programs Proceedings of the 12th international conference on Model Checking Software, (75-90)
  1681. Luttik B and Trčka N Stuttering congruence for χ Proceedings of the 12th international conference on Model Checking Software, (185-199)
  1682. Levin V, Palmer R, Qadeer S and Rajamani S Sound transaction-based reduction without cycle detection Proceedings of the 12th international conference on Model Checking Software, (106-122)
  1683. Wilson D and Philipose M Maximum a posteriori path estimation with input trace perturbation Proceedings of the 19th international joint conference on Artificial intelligence, (895-901)
  1684. Batt G, Ropers D, De Jong H, Geiselmann J, Mateescu R, Page M and Schneider D Analysis and verification of qualitative models of genetic regulatory networks Proceedings of the 19th international joint conference on Artificial intelligence, (370-375)
  1685. Di Sciascio E, Donini F, Mongiello M, Totaro R and Castelluccia D Design verification of web applications using symbolic model checking Proceedings of the 5th international conference on Web Engineering, (69-74)
  1686. Chopinaud C, El Fallah Seghrouchni A and Taillibert P Dynamic self-control of autonomous agents Proceedings of the Third international conference on Programming Multi-Agent Systems, (41-56)
  1687. Qian K, Nymeyer A and Susanto S Experiments with multiple abstraction heuristics in symbolic verification Proceedings of the 6th international conference on Abstraction, Reformulation and Approximation, (290-304)
  1688. Anderson S and Revesz P Verifying the incorrectness of programs and automata Proceedings of the 6th international conference on Abstraction, Reformulation and Approximation, (1-13)
  1689. ACM
    Woźna B, Lomuscio A and Penczek W Bounded model checking for knowledge and real time Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (165-172)
  1690. ACM
    Mao W and Wu J Application of Wu's method to symbolic model checking Proceedings of the 2005 international symposium on Symbolic and algebraic computation, (237-244)
  1691. Sharygina N, Chaki S, Clarke E and Sinha N Dynamic component substitutability analysis Proceedings of the 2005 international conference on Formal Methods, (512-528)
  1692. Donaldson A and Miller A Automatic symmetry detection for model checking using computational group theory Proceedings of the 2005 international conference on Formal Methods, (481-496)
  1693. Butler M and Leuschel M Combining CSP and b for specification and property verification Proceedings of the 2005 international conference on Formal Methods, (221-236)
  1694. Bolton C Adding conflict and confusion to CSP Proceedings of the 2005 international conference on Formal Methods, (205-220)
  1695. ter Beek M, Massink M and Latella D Towards model checking stochastic aspects of the thinkteam user interface Proceedings of the 12th international conference on Interactive Systems: design, specification, and verification, (39-50)
  1696. Gow J, Thimbleby H and Cairns P Automatic critiques of interface modes Proceedings of the 12th international conference on Interactive Systems: design, specification, and verification, (201-212)
  1697. Libkin L Logics for unranked trees Proceedings of the 32nd international conference on Automata, Languages and Programming, (35-50)
  1698. Li C, Dang Z, Ibarra O and Yen H Signaling p systems and verification problems Proceedings of the 32nd international conference on Automata, Languages and Programming, (1462-1473)
  1699. Kinder J, Katzenbeisser S, Schallhart C and Veith H Detecting malicious code by model checking Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, (174-187)
  1700. Rabinovitz I and Grumberg O Bounded model checking of concurrent programs Proceedings of the 17th international conference on Computer Aided Verification, (82-97)
  1701. Chaki S, Clarke E, Sinha N and Thati P Automated assume-guarantee reasoning for simulation conformance Proceedings of the 17th international conference on Computer Aided Verification, (534-547)
  1702. d'Amorim M and Roşu G Efficient monitoring of ω-languages Proceedings of the 17th international conference on Computer Aided Verification, (364-378)
  1703. Jobstmann B, Griesmayer A and Bloem R Program repair as a game Proceedings of the 17th international conference on Computer Aided Verification, (226-238)
  1704. Vecchié E and de Simone R Syntax-driven reachable state space construction of synchronous reactive programs Proceedings of the 17th international conference on Computer Aided Verification, (213-225)
  1705. Kaivola R Formal verification of pentium ® 4 components with symbolic simulation and inductive invariants Proceedings of the 17th international conference on Computer Aided Verification, (170-184)
  1706. Barner S, Glazberg Z and Rabinovitz I Wolf Proceedings of the 17th international conference on Computer Aided Verification, (153-157)
  1707. Dwyer M, Hatcliff J, Hoosier M and Robby Building your own software model checker using the bogor extensible model checking framework Proceedings of the 17th international conference on Computer Aided Verification, (148-152)
  1708. Tang D, Malik S, Gupta A and Ip C Symmetry reduction in SAT-based model checking Proceedings of the 17th international conference on Computer Aided Verification, (125-138)
  1709. ACM
    d'Amorim M and Havelund K (2005). Event-based runtime verification of java programs, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  1710. ACM
    Boroday S, Petrenko A, Singh J and Hallal H (2005). Dynamic analysis of java applications for multithreaded antipatterns, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  1711. Kacprzak M and Penczek W (2005). Fully Symbolic Unbounded Model Checking for Alternating-time Temporal Logic1, Autonomous Agents and Multi-Agent Systems, 11:1, (69-89), Online publication date: 1-Jul-2005.
  1712. Fisher M Implementing temporal logics Proceedings of the 6th international conference on Computational Logic in Multi-Agent Systems, (129-142)
  1713. Belli F and Güldali B A holistic approach to test-driven model checking Proceedings of the 18th international conference on Innovations in Applied Artificial Intelligence, (321-331)
  1714. Griesmayer A, Bloem R, Hautzendorfer M and Wotawa F Formal verification of control software Proceedings of the 18th international conference on Innovations in Applied Artificial Intelligence, (783-788)
  1715. ACM
    Shacham O, Sagiv M and Schuster A Scaling model checking of dataraces using dynamic information Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of parallel programming, (107-118)
  1716. ACM
    Siegel S and Avrunin G Modeling wildcard-free MPI programs for verification Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of parallel programming, (95-106)
  1717. ACM
    Ganai M, Gupta A and Ashar P Beyond safety Proceedings of the 42nd annual Design Automation Conference, (738-743)
  1718. ACM
    Jain H, Kroening D, Sharygina N and Clarke E Word level predicate abstraction and refinement for verifying RTL verilog Proceedings of the 42nd annual Design Automation Conference, (445-450)
  1719. Palacios H, Bonet B, Darwiche A and Geffner H Pruning conformant plans by counting models on compiled d-DNNF representations Proceedings of the Fifteenth International Conference on International Conference on Automated Planning and Scheduling, (141-150)
  1720. Bayse E, Cavalli A, Núñez M and Zaïdi F (2005). A passive testing approach based on invariants, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:2, (247-266), Online publication date: 1-Jun-2005.
  1721. Armoni R, Egorov S, Fraer R, Korchemny D and Vardi M Efficient LTL compilation for SAT-based model checking Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (877-884)
  1722. Manolios P and Srinivasan S A complete compositional reasoning framework for the efficient verification of pipelined machines Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, (863-870)
  1723. Ding Y and Zhang Y A logic approach for LTL system modification Proceedings of the 15th international conference on Foundations of Intelligent Systems, (435-444)
  1724. ACM
    d'Amorim M and Havelund K Event-based runtime verification of java programs Proceedings of the third international workshop on Dynamic analysis, (1-7)
  1725. ACM
    Boroday S, Petrenko A, Singh J and Hallal H Dynamic analysis of java applications for multithreaded antipatterns Proceedings of the third international workshop on Dynamic analysis, (1-7)
  1726. Acquaviva A, Aldini A, Bernardo M, Bogliolo A, Bontà E and Lattanzi E A methodology based on formal methods for predicting the impact of dynamic power management Proceedings of the 5th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems: mobile computing, (155-189)
  1727. Holmén F, Leucker M and Lindström M (2005). UppDMC, Electronic Notes in Theoretical Computer Science (ENTCS), 128:3, (91-105), Online publication date: 19-Apr-2005.
  1728. Brim L, Černá I, Moravec P and Šimša J (2005). Distributed Partial Order Reduction of State Spaces, Electronic Notes in Theoretical Computer Science (ENTCS), 128:3, (63-74), Online publication date: 19-Apr-2005.
  1729. Brückner I and Wehrheim H Slicing object-z specifications for verification Proceedings of the 4th international conference on Formal Specification and Development in Z and B, (414-433)
  1730. Leuschel M and Turner E Visualising larger state spaces in ProB Proceedings of the 4th international conference on Formal Specification and Development in Z and B, (6-23)
  1731. Ranganath V, Amtoft T, Banerjee A, Dwyer M and Hatcliff J A new foundation for control-dependence and slicing for modern program structures Proceedings of the 14th European conference on Programming Languages and Systems, (77-93)
  1732. Chechik M and Gurfinkel A A framework for counterexample generation and exploration Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (220-236)
  1733. Larsen K, Larsen U and Wasowski A Color-Blind specifications for transformations of reactive synchronous programs Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (160-174)
  1734. ACM
    Eiter T, Fink M, Sabbatini G and Tompits H (2005). Reasoning about evolving nonmonotonic knowledge bases, ACM Transactions on Computational Logic, 6:2, (389-440), Online publication date: 1-Apr-2005.
  1735. ACM
    Kupferman O and Vardi M (2005). From linear time to branching time, ACM Transactions on Computational Logic, 6:2, (273-294), Online publication date: 1-Apr-2005.
  1736. Tsukada Y (2005). Interactive and Probabilistic Proof of Mobile Code Safety, Automated Software Engineering, 12:2, (237-257), Online publication date: 1-Apr-2005.
  1737. Clarke E, Kroening D, Ouaknine J and Strichman O (2005). Computational challenges in bounded model checking, International Journal on Software Tools for Technology Transfer (STTT), 7:2, (174-183), Online publication date: 1-Apr-2005.
  1738. Li B, Wang C and Somenzi F (2005). Abstraction refinement in symbolic model checking using satisfiability as the only decision procedure, International Journal on Software Tools for Technology Transfer (STTT), 7:2, (143-155), Online publication date: 1-Apr-2005.
  1739. Hong H and Ural H Dependence testing Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems, (23-39)
  1740. ACM
    Byun Y and Sanders B A pattern-based development methodology for communication protocols Proceedings of the 2005 ACM symposium on Applied computing, (1524-1528)
  1741. ACM
    Wieringa R and Gordijn J Value-oriented design of service coordination processes Proceedings of the 2005 ACM symposium on Applied computing, (1320-1327)
  1742. ACM
    Fisteus J, Fernández L and Kloos C Applying model checking to BPEL4WS business collaborations Proceedings of the 2005 ACM symposium on Applied computing, (826-830)
  1743. ACM
    De Nicola R, Latella D and Massink M Formal modeling and quantitative analysis of KLAIM-based mobile systems Proceedings of the 2005 ACM symposium on Applied computing, (428-435)
  1744. Ratschan S and She Z Safety verification of hybrid systems by constraint propagation based abstraction refinement Proceedings of the 8th international conference on Hybrid Systems: computation and control, (573-589)
  1745. Ganai M, Gupta A and Ashar P Verification of Embedded Memory Systems using Efficient Memory Modeling Proceedings of the conference on Design, Automation and Test in Europe - Volume 2, (1096-1101)
  1746. ACM
    Baier C, Ciesinski F and Größer M (2005). ProbMela and verification of Markov decision processes, ACM SIGMETRICS Performance Evaluation Review, 32:4, (22-27), Online publication date: 1-Mar-2005.
  1747. ACM
    Baier C, Haverkort B, Hermanns H and Katoen J (2005). Model checking meets performance evaluation, ACM SIGMETRICS Performance Evaluation Review, 32:4, (10-15), Online publication date: 1-Mar-2005.
  1748. ACM
    Pucella R (2005). The finite and the infinite in temporal logic, ACM SIGACT News, 36:1, (86-99), Online publication date: 1-Mar-2005.
  1749. Damm W and Westphal B (2005). Live and let die, Science of Computer Programming, 55:1-3, (117-159), Online publication date: 1-Mar-2005.
  1750. Grumberg O, Heyman T and Schuster A (2005). Distributed Symbolic Model Checking for μ-Calculus, Formal Methods in System Design, 26:2, (197-219), Online publication date: 1-Mar-2005.
  1751. Ruanthong W and Muenchaisri P Model checking for aspect-oriented software evolution Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems, (1-6)
  1752. Attie P and Chockler H Efficiently verifiable conditions for deadlock-freedom of large concurrent programs Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (465-481)
  1753. Siegel S Efficient verification of halting properties for MPI programs with wildcard receives Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (413-429)
  1754. Jabbar S and Edelkamp S I/O efficient directed model checking Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (313-329)
  1755. Grumberg O, Lange M, Leucker M and Shoham S Don't know in the µ-calculus Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (233-249)
  1756. ACM
    Grumberg O, Lerda F, Strichman O and Theobald M (2005). Proof-guided underapproximation-widening for multi-process systems, ACM SIGPLAN Notices, 40:1, (122-131), Online publication date: 12-Jan-2005.
  1757. ACM
    Flanagan C and Godefroid P (2005). Dynamic partial-order reduction for model checking software, ACM SIGPLAN Notices, 40:1, (110-121), Online publication date: 12-Jan-2005.
  1758. ACM
    Grumberg O, Lerda F, Strichman O and Theobald M Proof-guided underapproximation-widening for multi-process systems Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (122-131)
  1759. ACM
    Flanagan C and Godefroid P Dynamic partial-order reduction for model checking software Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (110-121)
  1760. Zhu D and Xi H Safe programming with pointers through stateful views Proceedings of the 7th international conference on Practical Aspects of Declarative Languages, (83-97)
  1761. Vardi M Model checking for database theoreticians Proceedings of the 10th international conference on Database Theory, (1-16)
  1762. Lenders W and Baier C Genetic algorithms for the variable ordering problem of binary decision diagrams Proceedings of the 8th international conference on Foundations of Genetic Algorithms, (1-20)
  1763. Maydl W and Grunske L Behavioral types for embedded software Component-Based Software Development for Embedded Systems, (82-106)
  1764. da Silva L and Perkusich A A model-based approach to formal specification and verification of embedded systems using colored petri nets Component-Based Software Development for Embedded Systems, (35-58)
  1765. Oliveira de Almeida H, Dias da Silva L, Perkusich A and de Barros Costa E A formal approach for the modelling and verification of multiagent plans based on model checking and petri nets Software Engineering for Multi-Agent Systems III, (162-179)
  1766. Bagherzadeh M and Arun-Kumar S A multi-agent framework based on communication and concurrency Proceedings of the 6th international conference on Distributed Computing, (114-125)
  1767. Chatterjee K, Dasgupta P and Chakrabarti P Complexity of compositional model checking of computation tree logic on simple structures Proceedings of the 6th international conference on Distributed Computing, (102-113)
  1768. Lee D, Liu C and Yannakakis M Protocol system integration, interface and interoperability Proceedings of the 8th international conference on Principles of Distributed Systems, (1-19)
  1769. Chockler H and Kupferman O (2004). ω-Regular languages are testable with a constant number of queries, Theoretical Computer Science, 329:1-3, (71-92), Online publication date: 13-Dec-2004.
  1770. Glesner S and Blech J Coalgebraic semantics for component systems Proceedings of the 2004 international conference on Architecting Systems with Trustworthy Components, (245-261)
  1771. Zhu M, Bian J and Wu W Model optimization techniques in a verification platform for classified properties Proceedings of the First international conference on Embedded Software and Systems, (542-548)
  1772. Zhan J, Sang N and Xiong G Formal co-verification for soc design with colored petri net Proceedings of the First international conference on Embedded Software and Systems, (188-195)
  1773. Yang J, Twohey P, Engler D and Musuvathi M Using model checking to find serious file system errors Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (19-19)
  1774. Sirjani M, Movaghar A, Shali A and de Boer F (2004). Modeling and Verification of Reactive Systems using Rebeca, Fundamenta Informaticae, 63:4, (385-410), Online publication date: 1-Dec-2004.
  1775. Alpuente M, Falaschi M and Villanueva A A symbolic model checker for tccp programs Proceedings of the First international conference on Rapid Integration of Software Engineering Techniques, (45-56)
  1776. ACM
    Gerede Ç, Hull R, Ibarra O and Su J Automated composition of e-services Proceedings of the 2nd international conference on Service oriented computing, (252-262)
  1777. Li B and Somenzi F Efficient computation of small abstraction refinements Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (518-525)
  1778. Ganai M, Gupta A and Ashar P Efficient SAT-based unbounded symbolic model checking using circuit cofactoring Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (510-517)
  1779. Zhang L, Prasad M and Hsiao M Incremental deductive & inductive reasoning for SAT-based bounded model checking Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (502-509)
  1780. Gupta S, Krogh B and Rutenbar R Towards formal verification of analog designs Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (210-217)
  1781. Das A, Basu P, Banerjee A, Dasgupta P, Chakrabarti P, Rama Mohan C, Fix L and Armoni R Formal verification coverage Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (198-203)
  1782. Khasidashvili Z, Skaba M, Kaiss D and Hanna Z Theoretical framework for compositional sequential hardware equivalence verification in presence of design constraints Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (58-65)
  1783. ACM
    Krishnamurthi S, Fisler K and Greenberg M (2004). Verifying aspect advice modularly, ACM SIGSOFT Software Engineering Notes, 29:6, (137-146), Online publication date: 1-Nov-2004.
  1784. ACM
    Chaki S, Groce A and Strichman O (2004). Explaining abstract counterexamples, ACM SIGSOFT Software Engineering Notes, 29:6, (73-82), Online publication date: 1-Nov-2004.
  1785. ACM
    Krishnamurthi S, Fisler K and Greenberg M Verifying aspect advice modularly Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (137-146)
  1786. ACM
    Chaki S, Groce A and Strichman O Explaining abstract counterexamples Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (73-82)
  1787. Clarke D, Costa D and Arbab F Modelling coordination in biological systems Proceedings of the First international conference on Leveraging Applications of Formal Methods, (9-25)
  1788. Hoosier M, Dwyer M, Robby and Hatcliff J A case study in domain-customized model checking for real-time component software Proceedings of the First international conference on Leveraging Applications of Formal Methods, (161-180)
  1789. ACM
    Uribe T and Cheung S Automatic analysis of firewall and network intrusion detection system configurations Proceedings of the 2004 ACM workshop on Formal methods in security engineering, (66-74)
  1790. ACM
    Dwyer M, Robby J and Hoosier M Supporting model checking education using BOGOR/Eclipse Proceedings of the 2004 OOPSLA workshop on eclipse technology eXchange, (88-92)
  1791. Madan B and Trivedi K (2004). Security modeling and quantification of intrusion tolerant systems using attack-response graph, Journal of High Speed Networks, 13:4, (297-308), Online publication date: 1-Oct-2004.
  1792. ACM
    Dwyer M, Clarke L, Cobleigh J and Naumovich G (2004). Flow analysis for verifying properties of concurrent software systems, ACM Transactions on Software Engineering and Methodology, 13:4, (359-430), Online publication date: 1-Oct-2004.
  1793. Hsiung P, Lin S, Tseng C, Lee T, Fu J and See W (2004). VERTAF, IEEE Transactions on Software Engineering, 30:10, (656-674), Online publication date: 1-Oct-2004.
  1794. Brylow D and Palsberg J (2004). Deadline Analysis of Interrupt-Driven Software, IEEE Transactions on Software Engineering, 30:10, (634-655), Online publication date: 1-Oct-2004.
  1795. Beng Kuan Tan H and Lar Thein N (2004). Recovery of PTUIE Handling from Source Codes through Recognizing Its Probable Properties, IEEE Transactions on Knowledge and Data Engineering, 16:10, (1217-1231), Online publication date: 1-Oct-2004.
  1796. Arts T, Claessen K and Svensson H Semi-formal development of a fault-tolerant leader election protocol in erlang Proceedings of the 4th international conference on Formal Approaches to Software Testing, (140-154)
  1797. Licata D and Krishnamurthi S Verifying Interactive Web Programs Proceedings of the 19th IEEE international conference on Automated software engineering, (164-173)
  1798. Choi Y and Heimdahl M Combination Model Checking Proceedings of the 19th IEEE international conference on Automated software engineering, (354-357)
  1799. Heimdahl M and George D Test-Suite Reduction for Model Based Tests Proceedings of the 19th IEEE international conference on Automated software engineering, (176-185)
  1800. Thai P and Van Hung D Verifying linear duration constraints of timed automata Proceedings of the First international conference on Theoretical Aspects of Computing, (295-309)
  1801. Wen Y, Wang J and Qi Z Reverse observation equivalence between labelled state transition systems Proceedings of the First international conference on Theoretical Aspects of Computing, (204-219)
  1802. Cai K and Wang X Towards a Control-Theoretical Approach to Software Fault-Tolerance Proceedings of the Quality Software, Fourth International Conference, (198-205)
  1803. Drouineaud M, Bortin M, Torrini P and Sohr K A First Step Towards Formal Verification of Security Policy Properties for RBAC Proceedings of the Quality Software, Fourth International Conference, (60-67)
  1804. Harel D, Kugler H and Pnueli A Smart Play-Out Extended Proceedings of the Quality Software, Fourth International Conference, (2-10)
  1805. ACM
    Koshkina M and van Breugel F (2004). Modelling and verifying web service orchestration by means of the concurrency workbench, ACM SIGSOFT Software Engineering Notes, 29:5, (1-10), Online publication date: 1-Sep-2004.
  1806. Riemenschneider R, Saidi H and Dutertre B (2004). Using Model Checking to Assess the Dependability of Agent-Based Systems, IEEE Intelligent Systems, 19:5, (62-70), Online publication date: 1-Sep-2004.
  1807. Bordini R, Fisher M, Visser W and Wooldridge M (2004). Model Checking Rational Agents, IEEE Intelligent Systems, 19:5, (46-52), Online publication date: 1-Sep-2004.
  1808. Sharygina N, Browne J, Xie F, Kurshan R and Levin V (2004). Lessons Learned from Model Checking a NASA Robot Controller, Formal Methods in System Design, 25:2-3, (241-270), Online publication date: 1-Sep-2004.
  1809. Dwyer M, Hatcliff J, Robby and Ranganath V (2004). Exploiting Object Escape and Locking Information in Partial-Order Reductions for Concurrent Object-Oriented Programs, Formal Methods in System Design, 25:2-3, (199-240), Online publication date: 1-Sep-2004.
  1810. Chaki S, Clarke E, Groce A, Ouaknine J, Strichman O and Yorav K (2004). Efficient Verification of Sequential and Concurrent C Programs, Formal Methods in System Design, 25:2-3, (129-166), Online publication date: 1-Sep-2004.
  1811. Clarke E, Kroening D, Sharygina N and Yorav K (2004). Predicate Abstraction of ANSI-C Programs Using SAT, Formal Methods in System Design, 25:2-3, (105-127), Online publication date: 1-Sep-2004.
  1812. Dwyer M and Leue S (2004). Introductory paper, International Journal on Software Tools for Technology Transfer (STTT), 6:4, (257-259), Online publication date: 1-Aug-2004.
  1813. Edelkamp S, Leue S and Lluch-Lafuente A (2004). Partial-order reduction and trail improvement in directed model checking, International Journal on Software Tools for Technology Transfer (STTT), 6:4, (277-301), Online publication date: 1-Aug-2004.
  1814. Xie G, Li C and Dang Z Testability of oracle automata Proceedings of the 9th international conference on Implementation and Application of Automata, (331-332)
  1815. Seow K, Ma C and Yokoo M Multiagent Planning as Control Synthesis Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2, (972-979)
  1816. ACM
    Wasowski A (2004). Flattening statecharts without explosions, ACM SIGPLAN Notices, 39:7, (257-266), Online publication date: 11-Jul-2004.
  1817. ACM
    Edwards J, Jackson D, Torlak E and Yeung V Faster constraint solving with subtypes Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (232-242)
  1818. ACM
    Visser W, Pǎsǎreanu C and Khurshid S Test input generation with java PathFinder Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (97-107)
  1819. ACM
    Edwards J, Jackson D, Torlak E and Yeung V (2004). Faster constraint solving with subtypes, ACM SIGSOFT Software Engineering Notes, 29:4, (232-242), Online publication date: 1-Jul-2004.
  1820. ACM
    Visser W, Pǎsǎreanu C and Khurshid S (2004). Test input generation with java PathFinder, ACM SIGSOFT Software Engineering Notes, 29:4, (97-107), Online publication date: 1-Jul-2004.
  1821. Eshuis R and Wieringa R (2004). Tool Support for Verifying UML Activity Diagrams, IEEE Transactions on Software Engineering, 30:7, (437-447), Online publication date: 1-Jul-2004.
  1822. Iacono M, Marrone S, Mazzocca N, Moscato F and Vittorini V A model analysis of a distributed monitoring system using a multi-formalism approach Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing, (499-508)
  1823. ACM
    Hull R and Su J Tools for design of composite Web services Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (958-961)
  1824. ACM
    Wasowski A Flattening statecharts without explosions Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems, (257-266)
  1825. ACM
    Henzinger T, Jhala R and Majumdar R (2004). Race checking by context inference, ACM SIGPLAN Notices, 39:6, (1-13), Online publication date: 9-Jun-2004.
  1826. ACM
    Henzinger T, Jhala R and Majumdar R Race checking by context inference Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, (1-13)
  1827. ACM
    Chauhan P, Clarke E and Kroening D A SAT-based algorithm for reparameterization in symbolic simulation Proceedings of the 41st annual Design Automation Conference, (524-529)
  1828. ACM
    Lu Y and Jorda M Verifying a gigabit ethernet switch using SMV Proceedings of the 41st annual Design Automation Conference, (230-233)
  1829. ACM
    Behm M, Ludden J, Lichtenstein Y, Rimon M and Vinov M Industrial experience with test generation languages for processor verification Proceedings of the 41st annual Design Automation Conference, (36-40)
  1830. Sirjani M, Movaghar A, Shali A and de Boer F (2004). Modeling and Verification of Reactive Systems using Rebeca, Fundamenta Informaticae, 63:4, (385-410), Online publication date: 1-Jun-2004.
  1831. ACM
    Huth M (2004). Mathematics for the exploration of requirements, ACM SIGCSE Bulletin, 36:2, (34-39), Online publication date: 1-Jun-2004.
  1832. Chaki S, Clarke E, Groce A, Jha S and Veith H (2004). Modular Verification of Software Components in C, IEEE Transactions on Software Engineering, 30:6, (388-402), Online publication date: 1-Jun-2004.
  1833. Franceschet M, Montanari A and De Rijke M (2004). Model Checking for Combined Logics with an Application to Mobile Systems, Automated Software Engineering, 11:3, (289-321), Online publication date: 1-Jun-2004.
  1834. Fisher J, Harel D, Hubbard E, Piterman N, Stern M and Swerdlin N Combining state-based and scenario-based approaches in modeling biological systems Proceedings of the 20 international conference on Computational Methods in Systems Biology, (236-241)
  1835. Chabrier-Rivier N, Fages F and Soliman S The biochemical abstract machine BIOCHAM Proceedings of the 20 international conference on Computational Methods in Systems Biology, (172-191)
  1836. Pan G and Vardi M Search vs. symbolic techniques in satisfiability solving Proceedings of the 7th international conference on Theory and Applications of Satisfiability Testing, (235-250)
  1837. Jha S and Reps T (2004). Model checking SPKI/SDSI, Journal of Computer Security, 12:3,4, (317-353), Online publication date: 1-May-2004.
  1838. Kacprzak M, Lomuscio A and Penczek W (2004). From Bounded to Unbounded Model Checking for Temporal Epistemic Logic, Fundamenta Informaticae, 63:2-3, (221-240), Online publication date: 1-May-2004.
  1839. ACM
    Roychoudhury A, Kumar K, Ramakrishnan C and Ramakrishnan I (2004). An unfold/fold transformation framework for definite logic programs, ACM Transactions on Programming Languages and Systems, 26:3, (464-509), Online publication date: 1-May-2004.
  1840. ACM
    Leuschel M (2004). A framework for the integration of partial evaluation and abstract interpretation of logic programs, ACM Transactions on Programming Languages and Systems, 26:3, (413-463), Online publication date: 1-May-2004.
  1841. Bouyer P (2004). Forward Analysis of Updatable Timed Automata, Formal Methods in System Design, 24:3, (281-320), Online publication date: 1-May-2004.
  1842. Kacprzak M, Lomuscio A and Penczek W (2004). From Bounded to Unbounded Model Checking for Temporal Epistemic Logic, Fundamenta Informaticae, 63:2-3, (221-240), Online publication date: 1-Apr-2004.
  1843. Woźna B (2004). ACTLS properties and Bounded Model Checking, Fundamenta Informaticae, 63:1, (65-87), Online publication date: 1-Apr-2004.
  1844. Martí-Oliet N, Meseguer J and Palomino M Theoroidal maps as algebraic simulations Proceedings of the 17th international conference on Recent Trends in Algebraic Development Techniques, (126-143)
  1845. Edelkamp S, Leue S and Lluch-Lafuente A (2004). Directed explicit-state model checking in the validation of communication protocols, International Journal on Software Tools for Technology Transfer (STTT), 5:2-3, (247-267), Online publication date: 1-Mar-2004.
  1846. Parthasarathy G, Iyer M, Cheng K and Wang L (2004). Safety Property Verification Using Sequential SAT and Bounded Model Checking, IEEE Design & Test, 21:2, (132-143), Online publication date: 1-Mar-2004.
  1847. Adir A, Almog E, Fournier L, Marcus E, Rimon M, Vinov M and Ziv A (2004). Genesys-Pro, IEEE Design & Test, 21:2, (84-93), Online publication date: 1-Mar-2004.
  1848. Basu P, Das S, Dasgupta P, Chakrabarti P, Mohan C and Fix L Formal Verification Coverage Proceedings of the conference on Design, automation and test in Europe - Volume 1
  1849. Parthasarathy G, Iyer M, Cheng K and Wang L Efficient reachability checking using sequential SAT Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (418-423)
  1850. Das B, Sarkar D and Chattopadhyay S Model checking on state transition diagram Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (412-417)
  1851. Abdi S and Gajski D On deriving equivalent architecture model from system specification Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (322-327)
  1852. Dovier A, Piazza C and Policriti A (2004). An efficient algorithm for computing bisimulation equivalence, Theoretical Computer Science, 311:1-3, (221-256), Online publication date: 23-Jan-2004.
  1853. Williams K and Esser R Verification of the Futurebus+ cache coherence protocol Proceedings of the 27th Australasian conference on Computer science - Volume 26, (65-71)
  1854. Woźna B (2004). ACTLS properties and Bounded Model Checking, Fundamenta Informaticae, 63:1, (65-87), Online publication date: 1-Jan-2004.
  1855. Konikowka B and Penczek W (2004). On Designated Values in Multi-valued CTL^* Model Checking, Fundamenta Informaticae, 60:1-4, (211-224), Online publication date: 1-Jan-2004.
  1856. Börger E Linking architectural and component system views by abstract state machines Languages for system specification, (247-269)
  1857. Petrenko A, Boroday S and Groz R (2004). Confirming Configurations in EFSM Testing, IEEE Transactions on Software Engineering, 30:1, (29-42), Online publication date: 1-Jan-2004.
  1858. Nicol D, Sanders W and Trivedi K (2004). Model-Based Evaluation, IEEE Transactions on Dependable and Secure Computing, 1:1, (48-65), Online publication date: 1-Jan-2004.
  1859. Automated, compositional and iterative deadlock detection Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (201-210)
  1860. Check and simulate Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (27-36)
  1861. Bounded model checking of infinite state systems Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (17-26)
  1862. Verification of SpecC using predicate abstraction Proceedings of the Second ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (7-16)
  1863. ACM
    Engler D and Ashcraft K (2003). RacerX, ACM SIGOPS Operating Systems Review, 37:5, (237-252), Online publication date: 1-Dec-2003.
  1864. Cortés L, Eles P and Peng Z (2003). Modeling and formal verification of embedded systems based on a Petri net representation, Journal of Systems Architecture: the EUROMICRO Journal, 49:12-15, (571-598), Online publication date: 1-Dec-2003.
  1865. Gupta A, Ganai M, Yang Z and Ashar P Iterative Abstraction using SAT-based BMC with Proof Analysis Proceedings of the 2003 IEEE/ACM international conference on Computer-aided design
  1866. ACM
    Saïdi H, Dutertre B, Levy J and Valdes A Self-regenerative software components Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security, (115-120)
  1867. ACM
    Harel D, Kugler H, Marelly R and Pnueli A Smart play-out Companion of the 18th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (68-69)
  1868. ACM
    Engler D and Ashcraft K RacerX Proceedings of the nineteenth ACM symposium on Operating systems principles, (237-252)
  1869. Barnat J, Brim L and Chaloupka J Parallel breadth-first search LTL model-checking Proceedings of the 18th IEEE International Conference on Automated Software Engineering, (106-115)
  1870. Gentilini R, Piazza C and Policriti A (2003). From Bisimulation to Simulation, Journal of Automated Reasoning, 31:1, (73-103), Online publication date: 6-Oct-2003.
  1871. ACM
    Miller T and Strooper P (2003). A framework and tool support for the systematic testing of model-based specifications, ACM Transactions on Software Engineering and Methodology, 12:4, (409-439), Online publication date: 1-Oct-2003.
  1872. ACM
    Chechik M, Devereux B, Easterbrook S and Gurfinkel A (2003). Multi-valued symbolic model-checking, ACM Transactions on Software Engineering and Methodology, 12:4, (371-408), Online publication date: 1-Oct-2003.
  1873. Konikowka B and Penczek W (2003). On Designated Values in Multi-valued CTL^* Model Checking, Fundamenta Informaticae, 60:1-4, (211-224), Online publication date: 1-Sep-2003.
  1874. ACM
    Sen K, Rosu G and Agha G (2003). Runtime safety analysis of multithreaded programs, ACM SIGSOFT Software Engineering Notes, 28:5, (337-346), Online publication date: 1-Sep-2003.
  1875. ACM
    Xie F and Browne J (2003). Verified systems by composition from verified components, ACM SIGSOFT Software Engineering Notes, 28:5, (277-286), Online publication date: 1-Sep-2003.
  1876. ACM
    Robby , Dwyer M and Hatcliff J (2003). Bogor, ACM SIGSOFT Software Engineering Notes, 28:5, (267-276), Online publication date: 1-Sep-2003.
  1877. ACM
    Brylow D and Palsberg J (2003). Deadline analysis of interrupt-driven software, ACM SIGSOFT Software Engineering Notes, 28:5, (198-207), Online publication date: 1-Sep-2003.
  1878. ACM
    Jeffords R and Heitmeyer C (2003). A strategy for efficiently verifying requirements, ACM SIGSOFT Software Engineering Notes, 28:5, (28-37), Online publication date: 1-Sep-2003.
  1879. ACM
    Sen K, Rosu G and Agha G Runtime safety analysis of multithreaded programs Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (337-346)
  1880. ACM
    Xie F and Browne J Verified systems by composition from verified components Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (277-286)
  1881. ACM
    Robby , Dwyer M and Hatcliff J Bogor Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (267-276)
  1882. ACM
    Brylow D and Palsberg J Deadline analysis of interrupt-driven software Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (198-207)
  1883. ACM
    Jeffords R and Heitmeyer C A strategy for efficiently verifying requirements Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (28-37)
  1884. ACM
    Henderson P (2003). Mathematical reasoning in software engineering education, Communications of the ACM, 46:9, (45-50), Online publication date: 1-Sep-2003.
  1885. ACM
    Liu Y and Stoller S From datalog rules to efficient programs with time and space guarantees Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming, (172-183)
  1886. ACM
    Ray A Security check Proceedings of the 2003 workshop on New security paradigms, (59-65)
  1887. Vardi M Automated verification Proceedings of the 18th international joint conference on Artificial intelligence, (1603-1606)
  1888. Cimatti A, Pecheur C and Cavada R Formal verification of diagnosability via symbolic model checking Proceedings of the 18th international joint conference on Artificial intelligence, (363-369)
  1889. Anderson P, Reps T and Teitelbaum T (2003). Design and Implementation of a Fine-Grained Software Inspection Tool, IEEE Transactions on Software Engineering, 29:8, (721-733), Online publication date: 1-Aug-2003.
  1890. Tozawa A and Hagiya M XML schema containment checking based on semi-implicit techniques Proceedings of the 8th international conference on Implementation and application of automata, (213-225)
  1891. Fu X, Bultan T and Su J Conversation protocols Proceedings of the 8th international conference on Implementation and application of automata, (188-200)
  1892. Wallmeier N, Hütten P and Thomas W Symbolic synthesis of finite-state controllers for request-response specifications Proceedings of the 8th international conference on Implementation and application of automata, (11-22)
  1893. ACM
    Lomuscio A, Raimondi F and Sergot M Towards model checking interpreted systems Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (1054-1055)
  1894. ACM
    Penczek W and Lomuscio A Verifying epistemic properties of multi-agent systems via bounded model checking Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (209-216)
  1895. Cimatti A, Pistore M, Roveri M and Traverso P (2003). Weak, strong, and strong cyclic planning via symbolic model checking, Artificial Intelligence, 147:1-2, (35-84), Online publication date: 1-Jul-2003.
  1896. Schnoebelen P Oracle circuits for branching-time model checking Proceedings of the 30th international conference on Automata, languages and programming, (790-801)
  1897. Dekhtyar M, Dikovsky A and Valiev M (2003). On feasible cases of checking multi-agent systems behavior, Theoretical Computer Science, 303:1, (63-81), Online publication date: 28-Jun-2003.
  1898. Backes M, Pfitzmann B and Waidner M Security in business process engineering Proceedings of the 2003 international conference on Business process management, (168-183)
  1899. Brinksma E Compositional theories of qualitative and quantitative behaviour Proceedings of the 24th international conference on Applications and theory of Petri nets, (37-42)
  1900. Field J, Goyal D, Ramalingam G and Yahav E Typestate verification Proceedings of the 10th international conference on Static analysis, (439-462)
  1901. Monniaux D Abstract interpretation of programs as Markov decision processes Proceedings of the 10th international conference on Static analysis, (237-254)
  1902. Lazic R and Nowak D On a semantic definition of data independence Proceedings of the 6th international conference on Typed lambda calculi and applications, (226-240)
  1903. Jensen R, Veloso M and Bryant R Guided symbolic universal planning Proceedings of the Thirteenth International Conference on International Conference on Automated Planning and Scheduling, (123-132)
  1904. ACM
    Hull R, Benedikt M, Christophides V and Su J E-services Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (1-14)
  1905. ACM
    Revesz P A retrospective on constraint databases Proceedings of the Paris C. Kanellakis memorial workshop on Principles of computing & knowledge: Paris C. Kanellakis memorial workshop on the occasion of his 50th birthday, (12-27)
  1906. Smith G and Winter K Proving temporal properties of Z specifications using abstraction Proceedings of the 3rd international conference on Formal specification and development in Z and B, (260-279)
  1907. ACM
    Kang H and Park I SAT-based unbounded symbolic model checking Proceedings of the 40th annual Design Automation Conference, (840-843)
  1908. ACM
    Gupta A, Ganai M, Wang C, Yang Z and Ashar P Learning from BDDs in SAT-based bounded model checking Proceedings of the 40th annual Design Automation Conference, (824-829)
  1909. ACM
    Jayakumar N, Purandare M and Somenzi F Dos and don'ts of CTL state coverage estimation Proceedings of the 40th annual Design Automation Conference, (292-295)
  1910. ACM
    Robinson W, Pawlowski S and Volkov V (2003). Requirements interaction management, ACM Computing Surveys, 35:2, (132-190), Online publication date: 1-Jun-2003.
  1911. Edelkamp S Promela planning Proceedings of the 10th international conference on Model checking software, (197-213)
  1912. Groce A and Visser W What went wrong Proceedings of the 10th international conference on Model checking software, (121-136)
  1913. Černá I and Pelánek R Distributed explicit fair cycle detection Proceedings of the 10th international conference on Model checking software, (49-73)
  1914. Chaki S, Clarke E, Groce A, Jha S and Veith H Modular verification of software components in C Proceedings of the 25th International Conference on Software Engineering, (385-395)
  1915. Hatcliff J, Deng X, Dwyer M, Jung G and Ranganath V Cadena Proceedings of the 25th International Conference on Software Engineering, (160-173)
  1916. ACM
    Wang F and Tahar S Language emptiness checking using MDGs Proceedings of the 13th ACM Great Lakes symposium on VLSI, (88-91)
  1917. Stoller S and Cohen E Optimistic synchronization-based state-space reduction Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (489-504)
  1918. Khomenko V and Koutny M Branching processes of high-level Petri nets Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (458-472)
  1919. Cobleigh J, Giannakopoulou D and Păsăreanu C Learning assumptions for compositional verification Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (331-346)
  1920. Behrmann G, Bouyer P, Fleury E and Larsen K Static guard analysis in timed automata verification Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (254-270)
  1921. Clarke E, Fehnker A, Han Z, Krogh B, Stursberg O and Theobald M Verification of hybrid systems based on counterexample-guided abstraction refinement Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (192-207)
  1922. Glusman M, Kamhi G, Mador-Haim S, Fraer R and Vardi M Multiple-counterexample guided iterative abstraction refinement Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (176-191)
  1923. Gurfinkel A and Chechik M Proof-like counter-examples Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (160-175)
  1924. Henzinger T, Kupferman O and Majumdar R On the universal and existential fragments of the µ-calculus Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (49-64)
  1925. Danos V and Laneve C Core formal molecular biology Proceedings of the 12th European conference on Programming, (302-318)
  1926. Yahav E, Reps T, Sagiv M and Wilhelm R Verifying temporal heap properties specified via evolution logic Proceedings of the 12th European conference on Programming, (204-222)
  1927. Fokkink W and Pang J Cones and foci for protocol verification revisited Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software, (267-281)
  1928. Tabuada P and Pappas G Model checking LTL over controllable linear systems is decidable Proceedings of the 6th international conference on Hybrid systems: computation and control, (498-513)
  1929. Penczek W and Lomuscio A (2003). Verifying Epistemic Properties of Multi-agent Systems via Bounded Model Checking, Fundamenta Informaticae, 55:2, (167-185), Online publication date: 1-Apr-2003.
  1930. ACM
    Bustan D and Grumberg O (2003). Simulation-based minimization, ACM Transactions on Computational Logic, 4:2, (181-206), Online publication date: 1-Apr-2003.
  1931. Laroussinie F, Schnoebelen P and Turuani M (2003). On the expressivity and complexity of quantitative branching-time temporal logics, Theoretical Computer Science, 297:1-3, (297-315), Online publication date: 17-Mar-2003.
  1932. Hissam S, Moreno G, Stafford J and Wallnau K (2003). Enabling predictable assembly, Journal of Systems and Software, 65:3, (185-198), Online publication date: 15-Mar-2003.
  1933. Roychoudhury A, Mitra T and Karri S Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
  1934. Doucet F, Shukla S and Gupta R Introspection in System-Level Language Frameworks Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
  1935. Déharbe D A tutorial introduction to symbolic model checking Logic for concurrency and synchronisation, (215-237)
  1936. Hähnle R Complexity of many-valued logics Beyond two, (211-233)
  1937. Konikowska B and Penczek W Model checking for multi-valued computation tree logics Beyond two, (193-210)
  1938. Baumgartner P First-order logic Davis-Putnam-Logemann-Loveland procedure Exploring artificial intelligence in the new millennium, (289-329)
  1939. Wolter F and Zakharyaschev M Qualitative spatiotemporal representation and reasoning Exploring artificial intelligence in the new millennium, (175-215)
  1940. Bernardo M and Bravetti M (2003). Performance measure sensitive congruences for Markovian process algebras, Theoretical Computer Science, 290:1, (117-160), Online publication date: 1-Jan-2003.
  1941. ACM
    Musuvathi M, Park D, Chou A, Engler D and Dill D (2002). CMC, ACM SIGOPS Operating Systems Review, 36:SI, (75-88), Online publication date: 31-Dec-2003.
  1942. Musuvathi M, Park D, Chou A, Engler D and Dill D CMC Proceedings of the 5th symposium on Operating systems design and implementation (Copyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading), (75-88)
  1943. ACM
    Hornos M and Capel M (2002). On-the-fly model checking from interval logic specifications, ACM SIGPLAN Notices, 37:12, (108-119), Online publication date: 1-Dec-2002.
  1944. ACM
    Gurfinkel A, Devereux B and Chechik M Model exploration with temporal logic query checking Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, (139-148)
  1945. ACM
    Li H, Krishnamurthi S and Fisler K Verifying cross-cutting features as open systems Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, (89-98)
  1946. ACM
    Biere A and Kunz W SAT and ATPG Proceedings of the 2002 IEEE/ACM international conference on Computer-aided design, (782-785)
  1947. ACM
    Yang J and Goel A GSTE through a case study Proceedings of the 2002 IEEE/ACM international conference on Computer-aided design, (534-541)
  1948. ACM
    Milicia G and Sassone V Jeeg Proceedings of the 2002 joint ACM-ISCOPE conference on Java Grande, (212-221)
  1949. ACM
    Gurfinkel A, Devereux B and Chechik M (2002). Model exploration with temporal logic query checking, ACM SIGSOFT Software Engineering Notes, 27:6, (139-148), Online publication date: 1-Nov-2002.
  1950. ACM
    Li H, Krishnamurthi S and Fisler K (2002). Verifying cross-cutting features as open systems, ACM SIGSOFT Software Engineering Notes, 27:6, (89-98), Online publication date: 1-Nov-2002.
  1951. ACM
    Karlsson D, Eles P and Peng Z Formal verification in a component-based reuse methodology Proceedings of the 15th international symposium on System Synthesis, (156-161)
  1952. Serafini L and Giunchiglia F (2002). ML Systems, Journal of Logic, Language and Information, 11:4, (471-518), Online publication date: 1-Sep-2002.
  1953. Castro J, Kolp M and Mylopoulos J (2002). Towards requirements-driven information systems engineering, Information Systems, 27:6, (365-389), Online publication date: 1-Sep-2002.
  1954. Penczek W and Lomuscio A (2002). Verifying epistemic properties of multi-agent systems via bounded model checking, Fundamenta Informaticae, 55:2, (167-185), Online publication date: 1-Aug-2002.
  1955. Kalantari L and Ternovska E A model checker for verifying ConGolog programs Eighteenth national conference on Artificial intelligence, (953-954)
  1956. Jensen R, Bryant R and Veloso M SetA* Eighteenth national conference on Artificial intelligence, (668-673)
  1957. ACM
    Balsamo S, Bernardo M and Simeoni M Combining stochastic process algebras and queueing networks for software architecture analysis Proceedings of the 3rd international workshop on Software and performance, (190-202)
  1958. ACM
    Grieskamp W, Gurevich Y, Schulte W and Veanes M Generating finite state machines from abstract state machines Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis, (112-122)
  1959. ACM
    Groce A and Visser W Model checking Java programs using structural heuristics Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis, (12-21)
  1960. ACM
    Di Sciascio E, Donini F, Mongiello M and Piscitelli G AnWeb Proceedings of the 14th international conference on Software engineering and knowledge engineering, (609-616)
  1961. ACM
    van der Hoek W and Wooldridge M Tractable multiagent planning for epistemic goals Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3, (1167-1174)
  1962. ACM
    Grieskamp W, Gurevich Y, Schulte W and Veanes M (2002). Generating finite state machines from abstract state machines, ACM SIGSOFT Software Engineering Notes, 27:4, (112-122), Online publication date: 1-Jul-2002.
  1963. ACM
    Groce A and Visser W (2002). Model checking Java programs using structural heuristics, ACM SIGSOFT Software Engineering Notes, 27:4, (12-21), Online publication date: 1-Jul-2002.
  1964. ACM
    Musuvathi M, Chou A, Dill D and Engler D Model checking system software with CMC Proceedings of the 10th workshop on ACM SIGOPS European workshop, (219-222)
  1965. Pucella R and Weissman V A Logic for Reasoning about Digital Rights Proceedings of the 15th IEEE workshop on Computer Security Foundations
  1966. Jha S and Reps T Analysis of SPKI/SDSI Certificates Using Model Checking Proceedings of the 15th IEEE workshop on Computer Security Foundations
  1967. Jha S, Sheyner O and Wing J Two Formal Analys s of Attack Graphs Proceedings of the 15th IEEE workshop on Computer Security Foundations
  1968. Boroday S, Groz R, Petrenko A and Quemener Y Techniques for abstracting SDL specifications Proceedings of the 3rd international conference on Telecommunications and beyond: the broader applicability of SDL and MSC, (141-157)
  1969. ACM
    Hallem S, Chelf B, Xie Y and Engler D A system and language for building system-specific, static analyses Proceedings of the ACM SIGPLAN 2002 conference on Programming language design and implementation, (69-82)
  1970. Larus J and Parkes M Using Cohort-Scheduling to Enhance Server Performance Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference, (103-114)
  1971. ACM
    Chakrabarti A, Dasgupta P, Chakrabarti P and Banerjee A Formal verification of module interfaces against real time specifications Proceedings of the 39th annual Design Automation Conference, (141-145)
  1972. ACM
    Eder K and Barrett G Achieving maximum performance Proceedings of the 39th annual Design Automation Conference, (135-140)
  1973. ACM
    Thimbleby H Reflections on symmetry Proceedings of the Working Conference on Advanced Visual Interfaces, (28-33)
  1974. ACM
    Chandra S, Godefroid P and Palm C Software model checking in practice Proceedings of the 24th International Conference on Software Engineering, (431-441)
  1975. ACM
    Eshuis R and Wieringa R Verification support for workflow design with UML activity graphs Proceedings of the 24th International Conference on Software Engineering, (166-176)
  1976. ACM
    Smith R, Avrunin G, Clarke L and Osterweil L PROPEL Proceedings of the 24th International Conference on Software Engineering, (11-21)
  1977. ACM
    Hallem S, Chelf B, Xie Y and Engler D (2002). A system and language for building system-specific, static analyses, ACM SIGPLAN Notices, 37:5, (69-82), Online publication date: 17-May-2002.
  1978. ACM
    Varea M, Al-Hashimi B, Cortés L, Eles P and Peng Z Symbolic model checking of Dual Transition Petri Nets Proceedings of the tenth international symposium on Hardware/software codesign, (43-48)
  1979. ACM
    Ubayashi N and Tamai T Aspect-oriented programming with model checking Proceedings of the 1st international conference on Aspect-oriented software development, (148-154)
  1980. ACM
    Sihman M and Katz S A calculus of superimpositions for distributed systems Proceedings of the 1st international conference on Aspect-oriented software development, (28-40)
  1981. Penczek W, Wozna B and Zbrzezny A (2002). Bounded model checking for the universal fragment of CTL, Fundamenta Informaticae, 51:1, (135-156), Online publication date: 15-Mar-2002.
  1982. Dembiński P, Penczek W and Pólrola A (2002). Verification of timed automata based on similarity, Fundamenta Informaticae, 51:1, (59-89), Online publication date: 15-Mar-2002.
  1983. Harel D, Kupferman O and Vardi M (2002). On the complexity of verifying concurrent transition systems, Information and Computation, 173:2, (143-161), Online publication date: 15-Mar-2002.
  1984. ACM
    Gallardo M, Martínez J, Merino P and Rosales E Using XML to implement abstraction for Model Checking Proceedings of the 2002 ACM symposium on Applied computing, (1021-1025)
  1985. Seigel S and Avrunin G (2002). Improving the Precision of INCA by Eliminating Solutions with Spurious Cycles, IEEE Transactions on Software Engineering, 28:2, (115-128), Online publication date: 1-Feb-2002.
  1986. Ciardo G Distributed and structured analysis approaches to study large and complex systems Lectures on formal methods and performance analysis, (344-374)
  1987. Haverkort B Markovian models for performance and dependability evaluation Lectures on formal methods and performance analysis, (38-83)
  1988. ACM
    Henzinger T, Jhala R, Majumdar R and Sutre G Lazy abstraction Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (58-70)
  1989. ACM
    Chaki S, Rajamani S and Rehof J Types as models Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (45-57)
  1990. Dasgupta P, Chakrabarti A and Chakrabarti P Open Computation Tree Logic for Formal Verification of Modules Proceedings of the 2002 Asia and South Pacific Design Automation Conference
  1991. Gupta A, Casavant A, Ashar P, Mukaiyama A, Wakabayashi K and Liu X Property-Specific Testbench Generation for Guided Simulation Proceedings of the 2002 Asia and South Pacific Design Automation Conference
  1992. Schmidt D Structure-preserving binary relations for program abstraction The essence of computation, (245-265)
  1993. Lindsay P and Connelly S (2002). Modelling erroneous operator behaviours for an air-traffic control task, Australian Computer Science Communications, 24:4, (43-54), Online publication date: 1-Jan-2002.
  1994. Lindsay P and Connelly S Modelling erroneous operator behaviours for an air-traffic control task Proceedings of the Third Australasian conference on User interfaces - Volume 7, (43-54)
  1995. Penczek W, Woźna B and Zbrzezny A (2002). Bounded Model Checking for the Universal Fragment of CTL, Fundamenta Informaticae, 51:1-2, (135-156), Online publication date: 1-Jan-2002.
  1996. Dembiński P and Półrola A (2002). Verification of Timed Automata Based on Similarity, Fundamenta Informaticae, 51:1-2, (59-89), Online publication date: 1-Jan-2002.
  1997. ACM
    Henzinger T, Jhala R, Majumdar R and Sutre G (2002). Lazy abstraction, ACM SIGPLAN Notices, 37:1, (58-70), Online publication date: 1-Jan-2002.
  1998. ACM
    Chaki S, Rajamani S and Rehof J (2002). Types as models, ACM SIGPLAN Notices, 37:1, (45-57), Online publication date: 1-Jan-2002.
  1999. ACM
    Gottlob G, Grädel E and Veith H (2002). Datalog LITE, ACM Transactions on Computational Logic, 3:1, (42-79), Online publication date: 1-Jan-2002.
  2000. ACM
    Pucella R (2001). Review of Dynamic Logic (Foundations of Computing), ACM SIGACT News, 32:4, (9-17), Online publication date: 1-Dec-2001.
  2001. Brat G and Visser W Combining Static Analysis and Model Checking for Software Analysis Proceedings of the 16th IEEE international conference on Automated software engineering
  2002. Giannakopoulou D and Havelund K Automata-Based Verification of Temporal Properties on Running Programs Proceedings of the 16th IEEE international conference on Automated software engineering
  2003. Bultan T and Yavuz-Kahveci T Action Language Verifier Proceedings of the 16th IEEE international conference on Automated software engineering
  2004. ACM
    Nitta N, Takata Y and Seki H An efficient security verification method for programs with stack inspection Proceedings of the 8th ACM conference on Computer and Communications Security, (68-77)
  2005. Chauhan P, Clarke E, Jha S, Kukula J, Shiple T, Veith H and Wang D Non-linear quantification scheduling in image computation Proceedings of the 2001 IEEE/ACM international conference on Computer-aided design, (293-298)
  2006. Gupta A, Yang Z, Ashar P, Zhang L and Malik S Partition-based decision heuristics for image computation using SAT and BDDs Proceedings of the 2001 IEEE/ACM international conference on Computer-aided design, (286-292)
  2007. Peled D, Vardi M and Yannakakis M (2001). Black box checking, Journal of Automata, Languages and Combinatorics, 7:2, (225-246), Online publication date: 1-Nov-2001.
  2008. Bouyer P and Petit A (2001). A Kleene/Büchi-like theorem for clock languages, Journal of Automata, Languages and Combinatorics, 7:2, (167-186), Online publication date: 1-Nov-2001.
  2009. ACM
    Fuxman A, Giorgini P, Kolp M and Mylopoulos J Information systems as social structures Proceedings of the international conference on Formal Ontology in Information Systems - Volume 2001, (10-21)
  2010. ACM
    Choi Y, Rayadurgam S and Heimdahl M Automatic abstraction for model checking software systems with interrelated numeric constraints Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (164-174)
  2011. ACM
    Fisler K and Krishnamurthi S Modular verification of collaboration-based software designs Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (152-163)
  2012. ACM
    Choi Y, Rayadurgam S and Heimdahl M (2001). Automatic abstraction for model checking software systems with interrelated numeric constraints, ACM SIGSOFT Software Engineering Notes, 26:5, (164-174), Online publication date: 1-Sep-2001.
  2013. ACM
    Fisler K and Krishnamurthi S (2001). Modular verification of collaboration-based software designs, ACM SIGSOFT Software Engineering Notes, 26:5, (152-163), Online publication date: 1-Sep-2001.
  2014. Campos J and Harrison M (2001). Model Checking Interactor Specifications, Automated Software Engineering, 8:3-4, (275-310), Online publication date: 1-Aug-2001.
  2015. Alur R, de Alfaro L, Grosu R, Henzinger T, Kang M, Kirsch C, Majumdar R, Mang F and Wang B JMOCHA Proceedings of the 23rd International Conference on Software Engineering, (835-836)
  2016. Campailla A, Chaki S, Clarke E, Jha S and Veith H Efficient filtering in publish-subscribe systems using binary decision diagrams Proceedings of the 23rd International Conference on Software Engineering, (443-452)
  2017. Jha S and Wing J Survivability analysis of networked systems Proceedings of the 23rd International Conference on Software Engineering, (307-317)
  2018. ACM
    Hunt H, Marathe M and Stearns R Strongly-local reductions and the complexity/efficient approximability of algebra and optimization on abstract algebraic structures Proceedings of the 2001 international symposium on Symbolic and algebraic computation, (183-191)
  2019. Bening L and Foster H (2001). Optimizing Multiple EDA Tools within the ASIC Design Flow, IEEE Design & Test, 18:4, (46-55), Online publication date: 1-Jul-2001.
  2020. Clarke E, Biere A, Raimi R and Zhu Y (2001). Bounded Model Checking Using Satisfiability Solving, Formal Methods in System Design, 19:1, (7-34), Online publication date: 1-Jul-2001.
  2021. Hiraishi K (2001). Synthesis of Supervisors Using Learning Algorithm of RegularLanguages, Discrete Event Dynamic Systems, 11:3, (211-234), Online publication date: 1-Jul-2001.
  2022. Garavel H, Mateescu R and Smarandache I Parallel state space construction for model-checking Proceedings of the 8th international SPIN workshop on Model checking of software, (217-234)
  2023. Jia G and Graf S Verification experiments on the MASCARA protocol Proceedings of the 8th international SPIN workshop on Model checking of software, (123-142)
  2024. Edelkamp S, Lafuente A and Leue S Directed explicit model checking with HSF-SPIN Proceedings of the 8th international SPIN workshop on Model checking of software, (57-79)
  2025. Peled D and Zuck L From model checking to a temporal proof Proceedings of the 8th international SPIN workshop on Model checking of software, (1-14)
  2026. ACM
    Nitta N, Seki H and Takata Y Security verification of programs with stack inspection Proceedings of the sixth ACM symposium on Access control models and technologies, (31-40)
  2027. Concrete Impact of Formal Verification on Quality in IP Design and Implementation Proceedings of the 2nd International Symposium on Quality Electronic Design
  2028. ACM
    Yahav E (2001). Verifying safety properties of concurrent Java programs using 3-valued logic, ACM SIGPLAN Notices, 36:3, (27-40), Online publication date: 1-Mar-2001.
  2029. Beer I, Ben-David S, Eisner C and Rodeh Y (2001). Efficient Detection of Vacuity in Temporal Model Checking, Formal Methods in System Design, 18:2, (141-163), Online publication date: 1-Mar-2001.
  2030. Clarke E and Schlingloff B Model checking Handbook of automated reasoning, (1635-1790)
  2031. Merz S Model checking Modeling and verification of parallel processes, (3-38)
  2032. ACM
    Yahav E Verifying safety properties of concurrent Java programs using 3-valued logic Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (27-40)
  2033. Tsuchiya T, Nagano S, Paidi R and Kikuno T (2001). Symbolic Model Checking for Self-Stabilizing Algorithms, IEEE Transactions on Parallel and Distributed Systems, 12:1, (81-95), Online publication date: 1-Jan-2001.
  2034. Gottlob G, Grädel E and Veith H Linear time datalog and branching time logic Logic-based artificial intelligence, (443-467)
  2035. ACM
    Lev-Ami T, Reps T, Sagiv M and Wilhelm R (2000). Putting static analysis to work for verification, ACM SIGSOFT Software Engineering Notes, 25:5, (26-38), Online publication date: 1-Sep-2000.
  2036. ACM
    Lev-Ami T, Reps T, Sagiv M and Wilhelm R Putting static analysis to work for verification Proceedings of the 2000 ACM SIGSOFT international symposium on Software testing and analysis, (26-38)
  2037. Ciardo G, Lüttgen G and Siminiceanu R Efficient symbolic state-space construction for asynchronous systems Proceedings of the 21st international conference on Application and theory of petri nets, (103-122)
  2038. ACM
    Velev M and Bryant R Formal verification of superscale microprocessors with multicycle functional units, exception, and branch prediction Proceedings of the 37th Annual Design Automation Conference, (112-117)
  2039. ACM
    Yang J and Tiemeyer A Lazy symbolic model checking Proceedings of the 37th Annual Design Automation Conference, (35-38)
  2040. ACM
    van Lamsweerde A Requirements engineering in the year 00 Proceedings of the 22nd international conference on Software engineering, (5-19)
  2041. ACM
    Lamsweerde A Formal specification Proceedings of the Conference on The Future of Software Engineering, (147-159)
  2042. Varpaaniemi K (2000). Stable Models for Stubborn Sets, Fundamenta Informaticae, 43:1-4, (355-375), Online publication date: 1-Jan-2000.
  2043. Song D Athena Proceedings of the 12th IEEE workshop on Computer Security Foundations
  2044. Jensen R and Veloso M OBDD-based universal planning Artificial intelligence today, (213-248)
  2045. Ulewicz S, Ulbrich M, Weigl A, Kirsten M, Wiebe F, Beckert B and Vogel-Heuser B A verification-supported evolution approach to assist software application engineers in industrial factory automation 2016 IEEE International Symposium on Assembly and Manufacturing (ISAM), (19-25)
  2046. Golnari A, Vizel Y and Malik S Error-tolerant processors: Formal specification and verification 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (286-293)
  2047. Zhang S and Li Y Expressive power of linear-temporal logic based on generalized possibility measures 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (431-436)
  2048. Cochard T, Gouyon D and Pétin J Generation of safe operation sequences using iterative refinements and abstractions of timed automata 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), (1-8)
  2049. Kerber F and Haendel G A UML-based approach to manage product variability in automated production lines 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), (1-5)
  2050. Bin Lin , Zhenkun Yang , Kai Cong and Fei Xie Generating high coverage tests for SystemC designs using symbolic execution 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), (166-171)
  2051. Lyu Y and Mishra P Automated Test Generation for Activation of Assertions in RTL Models 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), (223-228)
  2052. Askarpour M, Ghezzi C, Mandrioli D, Rossi M and Tsigkanos C Formal Methods in Designing Critical Cyber-Physical Systems From Software Engineering to Formal Methods and Tools, and Back, (110-130)
  2053. Tegeler T, Murtovi A, Frohme M and Steffen B Product Line Verification via Modal Meta Model Checking From Software Engineering to Formal Methods and Tools, and Back, (313-337)
Contributors
  • Carnegie Mellon University
  • Technion - Israel Institute of Technology
  • Bar-Ilan University

Recommendations

Simon John Thompson

Since the inception of computing, and indeed even before computers were first built, there has been interest in using computers to decide mathematical or logical questions. Of course, Go¨dels pioneering work showed that most mathematical theories are undecidable, meaning that no algorithm can decide whether a formula is a theorem of the theory. Simpler logics such as propositional logic are decidable, and it has been a topic of active mathematical research to determine which logics are decidable, and with what complexity. Computer science has had a profound effect on logic, not least in this area. Evolution over time is a characteristic of most computing systems, and thus temporal logics that allow expression of statements like “P will hold eventually” and “Q will hold until P holds” have been valuable for expressing properties of reactive systems of various kinds. Of course, properties like this can be expressed in first-order logic (FOL) with a distinguished variable for time—“P will hold eventually” can be rendered by “for some time t, P(t) holds”—but a temporal logic has two advantages over this explicit representation: Formulas in temporal logic are easier to read, and thus more likely to be used appropriately. Satisfaction for propositional temporal logic is decidable, while full first-order logics are undecidable. Indeed, one can see the enterprise of defining temporal logics as one of describing decidable subsets of FOL. Of particular interest to logically minded computer scientists is the problem of model checking: this is the question of deciding whether a particular structure, representing a system of some sort, has a property, expressed in a temporal logic. Model checking is not only decidable, but for many temporal logics it is also tractable, with systems with more than 10 100 states being amenable to verification. Model checking can thus be seen as fully automated, symbolic testing of systems for properties expressed in temporal logic. The attraction of model checkers is twofold. First, a correct system can have its correctness certified. Second, equally if not more usefully, if a system fails to have a particular property, the model checker will produce a system trace that witnesses this failure. This evidence gives precisely the diagnostic information needed to fix the system, or at least to remedy the problem diagnosed. The witnessing property has provided much of the impetus for model checking, since existing protocols and systems have been shown to be incorrect in precisely this way. Model checking was invented in the early 1980s, and has proven an abundant source of research challenges over the last two decades. Until now, the research literature has been the only source for an introduction to the topic, but this text now provides an excellent alternative. Clarke is one of the pioneers of the subject, and Grumberg and Peled have been central to some later refinements of the topic. Their book provides both a comprehensive introduction to the basics of the field and an overview of the state-of-the-art techniques that have pushed the technology to its current maturity. It also contains a number of useful case studies as well as descriptions of a number of tools for automated model checking. The book contains an exhaustive bibliography and a serviceable index; its only drawback from a teaching or self-study point of view is the lack of exercises. A reader wanting exercises and a slower-paced introduction might therefore want to refer to Huth and Ryan [1], but otherwise this book is to be highly recommended. The authors give a clear introduction in chapter 1, which sets the scene for most of the chapters (apart from a brief treatment of chapters 16 and 17), while chapter 18 reviews further work and gives a timely set of references. Beyond the basic techniques, which are based on semantic tableaus, automata, and fixed-point theory, there are two important questions: How can model checking be implemented efficiently and How can the scope of model checking be extended The most important innovation for efficient model checking was the introduction of binary decision diagrams (BDDs) for symbolic model checking. BDDs give compact, canonical representations of Boolean functions and relations and thus make it easier to implement many operations of model checking more effectively. A model checker will check a single property of a single finite state system. The book examines various ways that this can be extended to handle—albeit partially—systems with infinite data domains, parameterized systems, and infinite state models. What are the prospects for model checking and verification in general A related technology is theorem proving: there are computer systems to build or at least to assist in building proofs that systems have particular properties. A proof is positive evidence that a system has a property, whereas a model checker produces no such evidence when it is successful. It is possible to construct proofs for (examples of) properties that are not amenable to decision procedures. Thus these two technologies complement each other, and currently one of the most fruitful lines of inquiry in logical verification is how to integrate model checking and theorem proving. This book can only promote this and other model checking research and development by providing such a thorough introduction to this burgeoning field.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.