callback( { "result":{ "query":":facetid:toc:\"db/journals/fmsd/fmsd41.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"189.34" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"16", "@dc":"16", "@oc":"16", "@id":"43438500", "text":":facetid:toc:db/journals/fmsd/fmsd41.bht" } }, "hits":{ "@total":"16", "@computed":"16", "@sent":"16", "@first":"0", "hit":[{ "@score":"1", "@id":"4297395", "info":{"authors":{"author":{"@pid":"89/6370","text":"Jade Alglave"}},"title":"A formal hierarchy of weak memory models.","venue":"Formal Methods Syst. Des.","volume":"41","number":"2","pages":"178-210","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/Alglave12","doi":"10.1007/S10703-012-0161-5","ee":"https://doi.org/10.1007/s10703-012-0161-5","url":"https://dblp.org/rec/journals/fmsd/Alglave12"}, "url":"URL#4297395" }, { "@score":"1", "@id":"4297397", "info":{"authors":{"author":[{"@pid":"60/3666","text":"Domagoj Babic"},{"@pid":"04/9862","text":"Daniel Reynaud"},{"@pid":"s/DXSong","text":"Dawn Song"}]},"title":"Recognizing malicious software behaviors with tree automata inference.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"107-128","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/BabicRS12","doi":"10.1007/S10703-012-0149-1","ee":"https://doi.org/10.1007/s10703-012-0149-1","url":"https://dblp.org/rec/journals/fmsd/BabicRS12"}, "url":"URL#4297397" }, { "@score":"1", "@id":"4297398", "info":{"authors":{"author":[{"@pid":"01/9862","text":"Valeriy Balabanov"},{"@pid":"13/2622","text":"Jie-Hong R. Jiang"}]},"title":"Unified QBF certification and its applications.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"45-65","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/BalabanovJ12","doi":"10.1007/S10703-012-0152-6","ee":"https://doi.org/10.1007/s10703-012-0152-6","url":"https://dblp.org/rec/journals/fmsd/BalabanovJ12"}, "url":"URL#4297398" }, { "@score":"1", "@id":"4297404", "info":{"authors":{"author":[{"@pid":"39/7271","text":"Christian Colombo 0001"},{"@pid":"52/776","text":"Gordon J. Pace"},{"@pid":"16/2891","text":"Patrick Abela"}]},"title":"Safer asynchronous runtime monitoring using compensations.","venue":"Formal Methods Syst. Des.","volume":"41","number":"3","pages":"269-294","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/ColomboPA12","doi":"10.1007/S10703-012-0142-8","ee":"https://doi.org/10.1007/s10703-012-0142-8","url":"https://dblp.org/rec/journals/fmsd/ColomboPA12"}, "url":"URL#4297404" }, { "@score":"1", "@id":"4297405", "info":{"authors":{"author":[{"@pid":"36/113","text":"Byron Cook"},{"@pid":"38/5902","text":"Eric Koskinen"},{"@pid":"v/MosheYVardi","text":"Moshe Y. Vardi"}]},"title":"Temporal property verification as a program analysis task - Extended Version.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"66-82","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/CookKV12","doi":"10.1007/S10703-012-0153-5","ee":"https://doi.org/10.1007/s10703-012-0153-5","url":"https://dblp.org/rec/journals/fmsd/CookKV12"}, "url":"URL#4297405" }, { "@score":"1", "@id":"4297407", "info":{"authors":{"author":[{"@pid":"11/5933","text":"Alastair F. Donaldson"},{"@pid":"73/4541-1","text":"Alexander Kaiser 0001"},{"@pid":"k/DanielKroening","text":"Daniel Kroening"},{"@pid":"18/1323","text":"Michael Tautschnig"},{"@pid":"72/5272","text":"Thomas Wahl"}]},"title":"Counterexample-guided abstraction refinement for symmetric concurrent programs.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"25-44","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/DonaldsonKKTW12","doi":"10.1007/S10703-012-0155-3","ee":"https://doi.org/10.1007/s10703-012-0155-3","url":"https://dblp.org/rec/journals/fmsd/DonaldsonKKTW12"}, "url":"URL#4297407" }, { "@score":"1", "@id":"4297410", "info":{"authors":{"author":[{"@pid":"g/GGopalakrishnan","text":"Ganesh Gopalakrishnan"},{"@pid":"q/ShazQadeer","text":"Shaz Qadeer"}]},"title":"Preface.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"3","year":"2012","type":"Journal Articles","access":"open","key":"journals/fmsd/GopalakrishnanQ12","doi":"10.1007/S10703-012-0148-2","ee":"https://doi.org/10.1007/s10703-012-0148-2","url":"https://dblp.org/rec/journals/fmsd/GopalakrishnanQ12"}, "url":"URL#4297410" }, { "@score":"1", "@id":"4297411", "info":{"authors":{"author":[{"@pid":"29/777","text":"Gregor Gößler"},{"@pid":"x/DanaNXu","text":"Dana N. Xu"},{"@pid":"23/6352","text":"Alain Girault"}]},"title":"Probabilistic contracts for component-based design.","venue":"Formal Methods Syst. Des.","volume":"41","number":"2","pages":"211-231","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/GosslerXG12","doi":"10.1007/S10703-012-0162-4","ee":"https://doi.org/10.1007/s10703-012-0162-4","url":"https://dblp.org/rec/journals/fmsd/GosslerXG12"}, "url":"URL#4297411" }, { "@score":"1", "@id":"4297414", "info":{"authors":{"author":[{"@pid":"22/639","text":"Peter Habermehl"},{"@pid":"64/6177","text":"Lukás Holík"},{"@pid":"87/2946","text":"Adam Rogalewicz"},{"@pid":"10/9861","text":"Jirí Simácek"},{"@pid":"51/533","text":"Tomás Vojnar"}]},"title":"Forest automata for verification of heap manipulation.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"83-106","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/HabermehlHRSV12","doi":"10.1007/S10703-012-0150-8","ee":"https://doi.org/10.1007/s10703-012-0150-8","url":"https://dblp.org/rec/journals/fmsd/HabermehlHRSV12"}, "url":"URL#4297414" }, { "@score":"1", "@id":"4297416", "info":{"authors":{"author":[{"@pid":"70/4196","text":"Oukseh Lee"},{"@pid":"82/5808","text":"Hongseok Yang"},{"@pid":"07/9862","text":"Rasmus Petersen"}]},"title":"A divide-and-conquer approach for analysing overlaid data structures.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"4-24","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/LeeYP12","doi":"10.1007/S10703-012-0151-7","ee":"https://doi.org/10.1007/s10703-012-0151-7","url":"https://dblp.org/rec/journals/fmsd/LeeYP12"}, "url":"URL#4297416" }, { "@score":"1", "@id":"4297417", "info":{"authors":{"author":[{"@pid":"85/4821","text":"Moritz Martens"},{"@pid":"70/3602","text":"Mila E. Majster-Cederbaum"}]},"title":"Deadlock-freedom in component systems with architectural constraints.","venue":"Formal Methods Syst. Des.","volume":"41","number":"2","pages":"129-177","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/MartensM12","doi":"10.1007/S10703-012-0160-6","ee":"https://doi.org/10.1007/s10703-012-0160-6","url":"https://dblp.org/rec/journals/fmsd/MartensM12"}, "url":"URL#4297417" }, { "@score":"1", "@id":"4297419", "info":{"authors":{"author":[{"@pid":"89/7437","text":"Raghavan Raman"},{"@pid":"04/6893","text":"Jisheng Zhao"},{"@pid":"s/VivekSarkar","text":"Vivek Sarkar"},{"@pid":"93/2189","text":"Martin T. Vechev"},{"@pid":"54/5133","text":"Eran Yahav"}]},"title":"Efficient data race detection for async-finish parallelism.","venue":"Formal Methods Syst. Des.","volume":"41","number":"3","pages":"321-347","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/RamanZSVY12","doi":"10.1007/S10703-012-0143-7","ee":"https://doi.org/10.1007/s10703-012-0143-7","url":"https://dblp.org/rec/journals/fmsd/RamanZSVY12"}, "url":"URL#4297419" }, { "@score":"1", "@id":"4297420", "info":{"authors":{"author":[{"@pid":"36/3229","text":"Justin Seyster"},{"@pid":"56/8730","text":"Ketan Dixit"},{"@pid":"18/1664","text":"Xiaowan Huang"},{"@pid":"94/5421","text":"Radu Grosu"},{"@pid":"84/3029","text":"Klaus Havelund"},{"@pid":"s/ScottASmolka","text":"Scott A. Smolka"},{"@pid":"09/6787","text":"Scott D. Stoller"},{"@pid":"71/1341","text":"Erez Zadok"}]},"title":"InterAspect: aspect-oriented instrumentation with GCC.","venue":"Formal Methods Syst. Des.","volume":"41","number":"3","pages":"295-320","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/SeysterDHGHSSZ12","doi":"10.1007/S10703-012-0171-3","ee":"https://doi.org/10.1007/s10703-012-0171-3","url":"https://dblp.org/rec/journals/fmsd/SeysterDHGHSSZ12"}, "url":"URL#4297420" }, { "@score":"1", "@id":"4297422", "info":{"authors":{"author":[{"@pid":"31/4030","text":"Oleg Sokolsky"},{"@pid":"r/GrigoreRosu","text":"Grigore Rosu"}]},"title":"Introduction to the special issue on runtime verification.","venue":"Formal Methods Syst. Des.","volume":"41","number":"3","pages":"233-235","year":"2012","type":"Journal Articles","access":"open","key":"journals/fmsd/SokolskyR12","doi":"10.1007/S10703-012-0174-0","ee":"https://doi.org/10.1007/s10703-012-0174-0","url":"https://dblp.org/rec/journals/fmsd/SokolskyR12"}, "url":"URL#4297422" }, { "@score":"1", "@id":"4297423", "info":{"authors":{"author":[{"@pid":"96/3530","text":"Deian Tabakov"},{"@pid":"67/519","text":"Kristin Y. Rozier"},{"@pid":"v/MosheYVardi","text":"Moshe Y. Vardi"}]},"title":"Optimized temporal monitors for SystemC.","venue":"Formal Methods Syst. Des.","volume":"41","number":"3","pages":"236-268","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/TabakovRV12","doi":"10.1007/S10703-011-0139-8","ee":"https://doi.org/10.1007/s10703-011-0139-8","url":"https://dblp.org/rec/journals/fmsd/TabakovRV12"}, "url":"URL#4297423" }, { "@score":"1", "@id":"4297425", "info":{"authors":{"author":[{"@pid":"v/MosheYVardi","text":"Moshe Y. Vardi"},{"@pid":"h/ThomasAHenzinger","text":"Thomas A. Henzinger"},{"@pid":"a/RAlur","text":"Rajeev Alur"},{"@pid":"k/MartaZKwiatkowska","text":"Marta Z. Kwiatkowska"}]},"title":"2011 CAV award announcement.","venue":"Formal Methods Syst. Des.","volume":"41","number":"1","pages":"1-2","year":"2012","type":"Journal Articles","access":"closed","key":"journals/fmsd/VardiHAK12","doi":"10.1007/S10703-012-0154-4","ee":"https://doi.org/10.1007/s10703-012-0154-4","url":"https://dblp.org/rec/journals/fmsd/VardiHAK12"}, "url":"URL#4297425" } ] } } } )