callback( { "result":{ "query":":facetid:toc:\"db/journals/scp/scp80.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"206.34" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"24", "@dc":"24", "@oc":"24", "@id":"43377454", "text":":facetid:toc:db/journals/scp/scp80.bht" } }, "hits":{ "@total":"24", "@computed":"24", "@sent":"24", "@first":"0", "hit":[{ "@score":"1", "@id":"3758113", "info":{"authors":{"author":[{"@pid":"67/6837","text":"Jonathan Aldrich"},{"@pid":"34/3170","text":"Ricardo Massa Ferreira Lima"}]},"title":"Brazilian Symposium on Programming Languages (SBLP 2010).","venue":"Sci. Comput. Program.","volume":"80","pages":"51","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/AldrichL14","doi":"10.1016/J.SCICO.2013.03.013","ee":"https://doi.org/10.1016/j.scico.2013.03.013","url":"https://dblp.org/rec/journals/scp/AldrichL14"}, "url":"URL#3758113" }, { "@score":"1", "@id":"3758117", "info":{"authors":{"author":[{"@pid":"a/MariaAlpuente","text":"María Alpuente"},{"@pid":"66/6512","text":"Demis Ballis"},{"@pid":"46/10043","text":"Francisco Frechina"},{"@pid":"55/4650-1","text":"Daniel Romero 0001"}]},"title":"Using conditional trace slicing for improving Maude programs.","venue":"Sci. Comput. Program.","volume":"80","pages":"385-415","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/AlpuenteBFR14","doi":"10.1016/J.SCICO.2013.09.018","ee":"https://doi.org/10.1016/j.scico.2013.09.018","url":"https://dblp.org/rec/journals/scp/AlpuenteBFR14"}, "url":"URL#3758117" }, { "@score":"1", "@id":"3758157", "info":{"authors":{"author":[{"@pid":"c/MuffyCalder","text":"Muffy Calder"},{"@pid":"85/4903","text":"Alexandros Koliousis"},{"@pid":"116/5374","text":"Michele Sevegnani"},{"@pid":"s/JSSventek","text":"Joseph S. Sventek"}]},"title":"Real-time verification of wireless home networks using bigraphs with sharing.","venue":"Sci. Comput. Program.","volume":"80","pages":"288-310","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/CalderKSS14","doi":"10.1016/J.SCICO.2013.08.004","ee":"https://doi.org/10.1016/j.scico.2013.08.004","url":"https://dblp.org/rec/journals/scp/CalderKSS14"}, "url":"URL#3758157" }, { "@score":"1", "@id":"3758160", "info":{"authors":{"author":[{"@pid":"24/4","text":"Néstor Cataño"},{"@pid":"57/10003","text":"Ijaz Ahmed"},{"@pid":"12/10595","text":"Radu I. Siminiceanu"},{"@pid":"67/6837","text":"Jonathan Aldrich"}]},"title":"A case study on the lightweight verification of a multi-threaded task server.","venue":"Sci. Comput. Program.","volume":"80","pages":"169-187","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/CatanoASA14","doi":"10.1016/J.SCICO.2013.01.004","ee":"https://doi.org/10.1016/j.scico.2013.01.004","url":"https://dblp.org/rec/journals/scp/CatanoASA14"}, "url":"URL#3758160" }, { "@score":"1", "@id":"3758164", "info":{"authors":{"author":[{"@pid":"71/3313","text":"Andreas Classen"},{"@pid":"73/10839","text":"Maxime Cordy"},{"@pid":"83/3086","text":"Patrick Heymans"},{"@pid":"52/579","text":"Axel Legay"},{"@pid":"27/3416","text":"Pierre-Yves Schobbens"}]},"title":"Formal semantics, modular specification, and symbolic verification of product-line behaviour.","venue":"Sci. Comput. Program.","volume":"80","pages":"416-439","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/ClassenCHLS14","doi":"10.1016/J.SCICO.2013.09.019","ee":"https://doi.org/10.1016/j.scico.2013.09.019","url":"https://dblp.org/rec/journals/scp/ClassenCHLS14"}, "url":"URL#3758164" }, { "@score":"1", "@id":"3758180", "info":{"authors":{"author":[{"@pid":"83/1062","text":"Khaled El-Fakih"},{"@pid":"33/658","text":"Nina Yevtushenko 0001"},{"@pid":"24/261","text":"Adenilso Simão"}]},"title":"A practical approach for testing timed deterministic finite state machines with single clock.","venue":"Sci. Comput. Program.","volume":"80","pages":"343-355","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/El-FakihYS14","doi":"10.1016/J.SCICO.2013.09.008","ee":"https://doi.org/10.1016/j.scico.2013.09.008","url":"https://dblp.org/rec/journals/scp/El-FakihYS14"}, "url":"URL#3758180" }, { "@score":"1", "@id":"3758194", "info":{"authors":{"author":[{"@pid":"14/7794","text":"Prodromos Gerakios"},{"@pid":"99/2352","text":"Nikolaos Papaspyrou"},{"@pid":"s/KonstantinosFSagonas","text":"Konstantinos Sagonas"}]},"title":"Static safety guarantees for a low-level multithreaded language with regions.","venue":"Sci. Comput. Program.","volume":"80","pages":"223-263","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/GerakiosPS14","doi":"10.1016/J.SCICO.2013.06.005","ee":"https://doi.org/10.1016/j.scico.2013.06.005","url":"https://dblp.org/rec/journals/scp/GerakiosPS14"}, "url":"URL#3758194" }, { "@score":"1", "@id":"3758221", "info":{"authors":{"author":[{"@pid":"95/6849","text":"Michaela Huhn"},{"@pid":"m/StefanMilius","text":"Stefan Milius"}]},"title":"Observations on formal safety analysis in practice.","venue":"Sci. Comput. Program.","volume":"80","pages":"150-168","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/HuhnM14","doi":"10.1016/J.SCICO.2013.01.001","ee":"https://doi.org/10.1016/j.scico.2013.01.001","url":"https://dblp.org/rec/journals/scp/HuhnM14"}, "url":"URL#3758221" }, { "@score":"1", "@id":"3758235", "info":{"authors":{"author":[{"@pid":"12/8318","text":"Maryam Kamali"},{"@pid":"73/3117","text":"Linas Laibinis"},{"@pid":"07/5484","text":"Luigia Petre"},{"@pid":"s/KaisaSere","text":"Kaisa Sere"}]},"title":"Formal development of wireless sensor-actor networks.","venue":"Sci. Comput. Program.","volume":"80","pages":"25-49","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/KamaliLPS14","doi":"10.1016/J.SCICO.2012.03.002","ee":"https://doi.org/10.1016/j.scico.2012.03.002","url":"https://dblp.org/rec/journals/scp/KamaliLPS14"}, "url":"URL#3758235" }, { "@score":"1", "@id":"3758238", "info":{"authors":{"author":[{"@pid":"44/6972","text":"Alain Ketterlin"},{"@pid":"65/1682","text":"Philippe Clauss"}]},"title":"Recovering memory access patterns of executable programs.","venue":"Sci. Comput. Program.","volume":"80","pages":"440-456","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/KetterlinC14","doi":"10.1016/J.SCICO.2012.08.002","ee":"https://doi.org/10.1016/j.scico.2012.08.002","url":"https://dblp.org/rec/journals/scp/KetterlinC14"}, "url":"URL#3758238" }, { "@score":"1", "@id":"3758241", "info":{"authors":{"author":{"@pid":"37/1189","text":"Savas Konur"}},"title":"Specifying safety-critical systems with a decidable duration logic.","venue":"Sci. Comput. Program.","volume":"80","pages":"264-287","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/Konur14","doi":"10.1016/J.SCICO.2013.07.012","ee":"https://doi.org/10.1016/j.scico.2013.07.012","url":"https://dblp.org/rec/journals/scp/Konur14"}, "url":"URL#3758241" }, { "@score":"1", "@id":"3758250", "info":{"authors":{"author":[{"@pid":"07/2035","text":"Etienne Lantreibecq"},{"@pid":"95/5951","text":"Wendelin Serwe"}]},"title":"Formal analysis of a hardware dynamic task dispatcher with CADP.","venue":"Sci. Comput. Program.","volume":"80","pages":"130-149","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/LantreibecqS14","doi":"10.1016/J.SCICO.2013.01.003","ee":"https://doi.org/10.1016/j.scico.2013.01.003","url":"https://dblp.org/rec/journals/scp/LantreibecqS14"}, "url":"URL#3758250" }, { "@score":"1", "@id":"3758270", "info":{"authors":{"author":[{"@pid":"80/191","text":"Raffaela Mirandola"},{"@pid":"49/2251","text":"Pasqualina Potena"},{"@pid":"38/5263","text":"Patrizia Scandurra"}]},"title":"Adaptation space exploration for service-oriented applications.","venue":"Sci. Comput. Program.","volume":"80","pages":"356-384","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/MirandolaPS14","doi":"10.1016/J.SCICO.2013.09.017","ee":"https://doi.org/10.1016/j.scico.2013.09.017","url":"https://dblp.org/rec/journals/scp/MirandolaPS14"}, "url":"URL#3758270" }, { "@score":"1", "@id":"3758276", "info":{"authors":{"author":[{"@pid":"15/5606-1","text":"Young-Joo Moon 0001"},{"@pid":"92/1378-1","text":"Alexandra Silva 0001"},{"@pid":"91/1504-1","text":"Christian Krause 0001"},{"@pid":"25/3518","text":"Farhad Arbab"}]},"title":"A compositional model to reason about end-to-end QoS in Stochastic Reo connectors.","venue":"Sci. Comput. Program.","volume":"80","pages":"3-24","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/MoonSKA14","doi":"10.1016/J.SCICO.2011.11.007","ee":"https://doi.org/10.1016/j.scico.2011.11.007","url":"https://dblp.org/rec/journals/scp/MoonSKA14"}, "url":"URL#3758276" }, { "@score":"1", "@id":"3758280", "info":{"authors":{"author":[{"@pid":"m/MohammadRezaMousavi","text":"Mohammad Reza Mousavi 0001"},{"@pid":"86/2766","text":"Gwen Salaün"}]},"title":"Preface: Special section on foundations of coordination languages and software architectures (selected papers from FOCLASA'10).","venue":"Sci. Comput. Program.","volume":"80","pages":"1-2","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/MousaviS14","doi":"10.1016/J.SCICO.2012.03.003","ee":"https://doi.org/10.1016/j.scico.2012.03.003","url":"https://dblp.org/rec/journals/scp/MousaviS14"}, "url":"URL#3758280" }, { "@score":"1", "@id":"3758282", "info":{"authors":{"author":[{"@pid":"91/6744","text":"Jonathan Nicholson"},{"@pid":"e/AmnonHEden","text":"Amnon H. Eden"},{"@pid":"47/5216","text":"Epameinondas Gasparis"},{"@pid":"90/3774","text":"Rick Kazman"}]},"title":"Automated verification of design patterns: A case study.","venue":"Sci. Comput. Program.","volume":"80","pages":"211-222","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/NicholsonEGK14","doi":"10.1016/J.SCICO.2013.05.007","ee":"https://doi.org/10.1016/j.scico.2013.05.007","url":"https://dblp.org/rec/journals/scp/NicholsonEGK14"}, "url":"URL#3758282" }, { "@score":"1", "@id":"3758290", "info":{"authors":{"author":[{"@pid":"138/3629","text":"Eduardo Gurgel Pinho"},{"@pid":"32/1402","text":"Francisco Heron de Carvalho Junior"}]},"title":"An object-oriented parallel programming language for distributed-memory parallel computing platforms.","venue":"Sci. Comput. Program.","volume":"80","pages":"65-90","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/PinhoJ14","doi":"10.1016/J.SCICO.2013.03.014","ee":"https://doi.org/10.1016/j.scico.2013.03.014","url":"https://dblp.org/rec/journals/scp/PinhoJ14"}, "url":"URL#3758290" }, { "@score":"1", "@id":"3758297", "info":{"authors":{"author":[{"@pid":"00/7129","text":"Thomas Reinbacher"},{"@pid":"67/734","text":"Jörg Brauer"},{"@pid":"54/417","text":"Martin Horauer"},{"@pid":"09/5562","text":"Andreas Steininger"},{"@pid":"k/StefanKowalewski","text":"Stefan Kowalewski"}]},"title":"Runtime verification of microcontroller binary code.","venue":"Sci. Comput. Program.","volume":"80","pages":"109-129","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/ReinbacherBHSK14","doi":"10.1016/J.SCICO.2012.10.015","ee":"https://doi.org/10.1016/j.scico.2012.10.015","url":"https://dblp.org/rec/journals/scp/ReinbacherBHSK14"}, "url":"URL#3758297" }, { "@score":"1", "@id":"3758302", "info":{"authors":{"author":[{"@pid":"96/3094","text":"Andrei Rimsa"},{"@pid":"16/608","text":"Marcelo d'Amorim"},{"@pid":"p/FMQPereira","text":"Fernando Magno Quintão Pereira"},{"@pid":"67/5401","text":"Roberto da Silva Bigonha"}]},"title":"Efficient static checker for tainted variable attacks.","venue":"Sci. Comput. Program.","volume":"80","pages":"91-105","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/RimsadPB14","doi":"10.1016/J.SCICO.2013.03.012","ee":"https://doi.org/10.1016/j.scico.2013.03.012","url":"https://dblp.org/rec/journals/scp/RimsadPB14"}, "url":"URL#3758302" }, { "@score":"1", "@id":"3758309", "info":{"authors":{"author":[{"@pid":"86/2766","text":"Gwen Salaün"},{"@pid":"10/5882","text":"Bernhard Schätz"}]},"title":"Preface: Special section on formal methods for industrial critical systems (Selected papers from FMICS'11).","venue":"Sci. Comput. Program.","volume":"80","pages":"107-108","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/SalaunS14","doi":"10.1016/J.SCICO.2013.01.008","ee":"https://doi.org/10.1016/j.scico.2013.01.008","url":"https://dblp.org/rec/journals/scp/SalaunS14"}, "url":"URL#3758309" }, { "@score":"1", "@id":"3758315", "info":{"authors":{"author":[{"@pid":"39/4907","text":"Christophe Scholliers"},{"@pid":"t/EricTanter","text":"Éric Tanter"},{"@pid":"18/2971","text":"Wolfgang De Meuter"}]},"title":"Parallel actor monitors: Disentangling task-level parallelism from data partitioning in the actor model.","venue":"Sci. Comput. Program.","volume":"80","pages":"52-64","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/ScholliersTM14","doi":"10.1016/J.SCICO.2013.03.011","ee":"https://doi.org/10.1016/j.scico.2013.03.011","url":"https://dblp.org/rec/journals/scp/ScholliersTM14"}, "url":"URL#3758315" }, { "@score":"1", "@id":"3758319", "info":{"authors":{"author":[{"@pid":"67/10003","text":"Marten Sijtema"},{"@pid":"70/4345","text":"Axel Belinfante"},{"@pid":"20/3901","text":"Mariëlle Stoelinga"},{"@pid":"45/10003","text":"Lawrence Marinelli"}]},"title":"Experiences with formal engineering: Model-based specification, implementation and testing of a software bus at Neopost.","venue":"Sci. Comput. Program.","volume":"80","pages":"188-209","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/SijtemaBSM14","doi":"10.1016/J.SCICO.2013.04.009","ee":"https://doi.org/10.1016/j.scico.2013.04.009","url":"https://dblp.org/rec/journals/scp/SijtemaBSM14"}, "url":"URL#3758319" }, { "@score":"1", "@id":"3758332", "info":{"authors":{"author":[{"@pid":"t/EricTanter","text":"Éric Tanter"},{"@pid":"75/9488","text":"Ismael Figueroa"},{"@pid":"56/3285","text":"Nicolas Tabareau"}]},"title":"Execution levels for aspect-oriented programming: Design, semantics, implementations and applications.","venue":"Sci. Comput. Program.","volume":"80","pages":"311-342","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/TanterFT14","doi":"10.1016/J.SCICO.2013.09.002","ee":"https://doi.org/10.1016/j.scico.2013.09.002","url":"https://dblp.org/rec/journals/scp/TanterFT14"}, "url":"URL#3758332" }, { "@score":"1", "@id":"3758335", "info":{"authors":{"author":[{"@pid":"74/9655","text":"Stephen W. Thomas"},{"@pid":"98/6356","text":"Bram Adams"},{"@pid":"h/AhmedEHassan","text":"Ahmed E. Hassan"},{"@pid":"b/DBlostein","text":"Dorothea Blostein"}]},"title":"Studying software evolution using topic models.","venue":"Sci. Comput. Program.","volume":"80","pages":"457-479","year":"2014","type":"Journal Articles","access":"open","key":"journals/scp/ThomasAHB14","doi":"10.1016/J.SCICO.2012.08.003","ee":"https://doi.org/10.1016/j.scico.2012.08.003","url":"https://dblp.org/rec/journals/scp/ThomasAHB14"}, "url":"URL#3758335" } ] } } } )