callback( { "result":{ "query":":facetid:toc:\"db/journals/sosym/sosym15.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"207.27" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"53", "@dc":"53", "@oc":"53", "@id":"43471090", "text":":facetid:toc:db/journals/sosym/sosym15.bht" } }, "hits":{ "@total":"53", "@computed":"53", "@sent":"53", "@first":"0", "hit":[{ "@score":"1", "@id":"3173604", "info":{"authors":{"author":[{"@pid":"a/ElviraAlbert","text":"Elvira Albert"},{"@pid":"78/560","text":"Richard Bubel"},{"@pid":"24/2865","text":"Samir Genaim"},{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"},{"@pid":"p/GPuebla","text":"Germán Puebla"},{"@pid":"27/9116","text":"Guillermo Román-Díez"}]},"title":"A formal verification framework for static analysis - As well as its instantiation to the resource analyzer COSTA and formal verification tool KeY.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"987-1012","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/AlbertBGHPR16","doi":"10.1007/S10270-015-0476-Y","ee":"https://doi.org/10.1007/s10270-015-0476-y","url":"https://dblp.org/rec/journals/sosym/AlbertBGHPR16"}, "url":"URL#3173604" }, { "@score":"1", "@id":"3173605", "info":{"authors":{"author":[{"@pid":"38/1209","text":"Mohsen Asadi"},{"@pid":"08/7258","text":"Gerd Gröner"},{"@pid":"29/484","text":"Bardia Mohabbati"},{"@pid":"67/5716","text":"Dragan Gasevic"}]},"title":"Goal-oriented modeling and verification of feature-oriented product lines.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"257-279","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/AsadiGMG16","doi":"10.1007/S10270-014-0402-8","ee":"https://doi.org/10.1007/s10270-014-0402-8","url":"https://dblp.org/rec/journals/sosym/AsadiGMG16"}, "url":"URL#3173605" }, { "@score":"1", "@id":"3173606", "info":{"authors":{"author":[{"@pid":"68/3227","text":"Jung Ho Bae"},{"@pid":"20/4928","text":"Heung Seok Chae"}]},"title":"Systematic approach for constructing an understandable state machine from a contract-based specification: controlled experiments.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"847-879","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/BaeC16","doi":"10.1007/S10270-014-0440-2","ee":"https://doi.org/10.1007/s10270-014-0440-2","url":"https://dblp.org/rec/journals/sosym/BaeC16"}, "url":"URL#3173606" }, { "@score":"1", "@id":"3173607", "info":{"authors":{"author":[{"@pid":"77/9170","text":"Kacper Bak"},{"@pid":"18/2744","text":"Zinovy Diskin"},{"@pid":"24/6636","text":"Michal Antkiewicz"},{"@pid":"72/6806","text":"Krzysztof Czarnecki 0001"},{"@pid":"18/3339","text":"Andrzej Wasowski"}]},"title":"Clafer: unifying class and feature modeling.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"811-845","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/BakDACW16","doi":"10.1007/S10270-014-0441-1","ee":"https://doi.org/10.1007/s10270-014-0441-1","url":"https://dblp.org/rec/journals/sosym/BakDACW16"}, "url":"URL#3173607" }, { "@score":"1", "@id":"3173608", "info":{"authors":{"author":[{"@pid":"01/5624","text":"Saddek Bensalem"},{"@pid":"05/178","text":"Marius Bozga"},{"@pid":"52/579","text":"Axel Legay"},{"@pid":"14/6691","text":"Thanh-Hung Nguyen"},{"@pid":"s/JosephSifakis","text":"Joseph Sifakis"},{"@pid":"67/5345","text":"Rongjie Yan"}]},"title":"Component-based verification using incremental design and invariants.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"427-451","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/BensalemBLNSY16","doi":"10.1007/S10270-014-0410-8","ee":"https://doi.org/10.1007/s10270-014-0410-8","url":"https://dblp.org/rec/journals/sosym/BensalemBLNSY16"}, "url":"URL#3173608" }, { "@score":"1", "@id":"3173609", "info":{"authors":{"author":[{"@pid":"83/464","text":"Geoffrey Biggs"},{"@pid":"19/3662","text":"Takeshi Sakamoto"},{"@pid":"35/5675","text":"Tetsuo Kotoku"}]},"title":"A profile and tool for modelling safety information with design information in SysML.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"147-178","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/BiggsSK16","doi":"10.1007/S10270-014-0400-X","ee":"https://doi.org/10.1007/s10270-014-0400-x","url":"https://dblp.org/rec/journals/sosym/BiggsSK16"}, "url":"URL#3173609" }, { "@score":"1", "@id":"3173610", "info":{"authors":{"author":[{"@pid":"64/4877","text":"Pontus Boström"},{"@pid":"152/5494","text":"Jonatan Wiik"}]},"title":"Contract-based verification of discrete-time multi-rate Simulink models.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1141-1161","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/BostromW16","doi":"10.1007/S10270-015-0477-X","ee":"https://doi.org/10.1007/s10270-015-0477-x","url":"https://dblp.org/rec/journals/sosym/BostromW16"}, "url":"URL#3173610" }, { "@score":"1", "@id":"3173611", "info":{"authors":{"author":[{"@pid":"41/7963","text":"Erik Burger"},{"@pid":"62/7737","text":"Jörg Henss"},{"@pid":"122/5030","text":"Martin Küster"},{"@pid":"76/936","text":"Steffen Kruse"},{"@pid":"42/7630","text":"Lucia Happe"}]},"title":"View-based model-driven software development with ModelJoin.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"473-496","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/BurgerHKKH16","doi":"10.1007/S10270-014-0413-5","ee":"https://doi.org/10.1007/s10270-014-0413-5","url":"https://dblp.org/rec/journals/sosym/BurgerHKKH16"}, "url":"URL#3173611" }, { "@score":"1", "@id":"3173612", "info":{"authors":{"author":[{"@pid":"120/7320","text":"Corentin Burnay"},{"@pid":"44/746","text":"Ivan J. Jureta"},{"@pid":"33/749","text":"Isabelle Linden"},{"@pid":"69/1511","text":"Stéphane Faulkner"}]},"title":"A framework for the operationalization of monitoring in business intelligence requirements engineering.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"531-552","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/BurnayJLF16","doi":"10.1007/S10270-014-0417-1","ee":"https://doi.org/10.1007/s10270-014-0417-1","url":"https://dblp.org/rec/journals/sosym/BurnayJLF16"}, "url":"URL#3173612" }, { "@score":"1", "@id":"3173613", "info":{"authors":{"author":[{"@pid":"05/10166","text":"Mario Cortes Cornax"},{"@pid":"d/SophieDupuyChessa","text":"Sophie Dupuy-Chessa"},{"@pid":"54/5215","text":"Dominique Rieu"},{"@pid":"41/7337","text":"Nadine Mandran"}]},"title":"Evaluating the appropriateness of the BPMN 2.0 standard for modeling service choreographies: using an extended quality framework.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"219-255","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/CornaxDRM16","doi":"10.1007/S10270-014-0398-0","ee":"https://doi.org/10.1007/s10270-014-0398-0","url":"https://dblp.org/rec/journals/sosym/CornaxDRM16"}, "url":"URL#3173613" }, { "@score":"1", "@id":"3173614", "info":{"authors":{"author":[{"@pid":"133/4056","text":"Cédric Eichler"},{"@pid":"74/2587","text":"Thierry Monteil 0001"},{"@pid":"49/3338","text":"Patricia Stolf"},{"@pid":"23/4819","text":"Luigi Alfredo Grieco"},{"@pid":"08/1934","text":"Khalil Drira"}]},"title":"Enhanced graph rewriting systems for complex software domains - Dynamic software architecture, non-functional requirements, and correctness by construction.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"685-705","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/EichlerMSGD16","doi":"10.1007/S10270-014-0433-1","ee":"https://doi.org/10.1007/s10270-014-0433-1","url":"https://dblp.org/rec/journals/sosym/EichlerMSGD16"}, "url":"URL#3173614" }, { "@score":"1", "@id":"3173615", "info":{"authors":{"author":[{"@pid":"49/8689","text":"Amal Elgammal"},{"@pid":"20/5750","text":"Oktay Türetken"},{"@pid":"85/22","text":"Willem-Jan van den Heuvel"},{"@pid":"p/MPPapazoglou","text":"Mike P. Papazoglou"}]},"title":"Formalizing and appling compliance patterns for business process compliance.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"119-146","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/ElgammalTHP16","doi":"10.1007/S10270-014-0395-3","ee":"https://doi.org/10.1007/s10270-014-0395-3","url":"https://dblp.org/rec/journals/sosym/ElgammalTHP16"}, "url":"URL#3173615" }, { "@score":"1", "@id":"3173616", "info":{"authors":{"author":[{"@pid":"e/RikEshuis","text":"Rik Eshuis"},{"@pid":"38/2725","text":"Pieter Van Gorp"}]},"title":"Synthesizing object life cycles from business process models.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"281-302","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/EshuisG16","doi":"10.1007/S10270-014-0406-4","ee":"https://doi.org/10.1007/s10270-014-0406-4","url":"https://dblp.org/rec/journals/sosym/EshuisG16"}, "url":"URL#3173616" }, { "@score":"1", "@id":"3173617", "info":{"authors":{"author":[{"@pid":"51/2761","text":"Johan Fabry"},{"@pid":"40/1980","text":"Arturo Zambrano"},{"@pid":"g/SilviaEGordillo","text":"Silvia E. Gordillo"}]},"title":"Expressing aspectual interactions in design: evaluating three AOM approaches in the slot machine domain.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"881-905","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/FabryZG16","doi":"10.1007/S10270-014-0442-0","ee":"https://doi.org/10.1007/s10270-014-0442-0","url":"https://dblp.org/rec/journals/sosym/FabryZG16"}, "url":"URL#3173617" }, { "@score":"1", "@id":"3173618", "info":{"authors":{"author":[{"@pid":"78/7670","text":"Zhiqiang Fan"},{"@pid":"40/7423-2","text":"Tao Yue 0002"},{"@pid":"89/5992-29","text":"Li Zhang 0029"}]},"title":"SAMM: an architecture modeling methodology for ship command and control systems.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"71-118","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/FanYZ16","doi":"10.1007/S10270-013-0393-X","ee":"https://doi.org/10.1007/s10270-013-0393-x","url":"https://dblp.org/rec/journals/sosym/FanYZ16"}, "url":"URL#3173618" }, { "@score":"1", "@id":"3173619", "info":{"authors":{"author":[{"@pid":"06/7638","text":"Matthias Farwick"},{"@pid":"90/3095","text":"Christian M. Schweda"},{"@pid":"b/RuthBreu","text":"Ruth Breu"},{"@pid":"48/3520","text":"Inge Hanschke"}]},"title":"A situational method for semi-automated Enterprise Architecture Documentation.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"397-426","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/FarwickSBH16","doi":"10.1007/S10270-014-0407-3","ee":"https://doi.org/10.1007/s10270-014-0407-3","url":"https://dblp.org/rec/journals/sosym/FarwickSBH16"}, "url":"URL#3173619" }, { "@score":"1", "@id":"3173620", "info":{"authors":{"author":[{"@pid":"39/4073","text":"Nicoletta De Francesco"},{"@pid":"27/4222","text":"Giuseppe Lettieri"},{"@pid":"98/670","text":"Antonella Santone"},{"@pid":"69/6885","text":"Gigliola Vaglini"}]},"title":"Heuristic search for equivalence checking.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"513-530","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/FrancescoLSV16","doi":"10.1007/S10270-014-0416-2","ee":"https://doi.org/10.1007/s10270-014-0416-2","url":"https://dblp.org/rec/journals/sosym/FrancescoLSV16"}, "url":"URL#3173620" }, { "@score":"1", "@id":"3173621", "info":{"authors":{"author":[{"@pid":"66/1355","text":"Geri Georg"},{"@pid":"g/JeffreyGGray","text":"Jeff Gray 0001"},{"@pid":"r/BernhardRumpe","text":"Bernhard Rumpe"},{"@pid":"03/7000","text":"Martin Schindler"}]},"title":"The 2015 "State of the Journal" report.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"1-4","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/GeorgGRS16","doi":"10.1007/S10270-016-0515-3","ee":"https://doi.org/10.1007/s10270-016-0515-3","url":"https://dblp.org/rec/journals/sosym/GeorgGRS16"}, "url":"URL#3173621" }, { "@score":"1", "@id":"3173622", "info":{"authors":{"author":[{"@pid":"16/1532","text":"Elena Giachino"},{"@pid":"l/CosimoLaneve","text":"Cosimo Laneve"},{"@pid":"38/2487","text":"Michael Lienhardt"}]},"title":"A framework for deadlock detection in core ABS.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1013-1048","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/GiachinoLL16","doi":"10.1007/S10270-014-0444-Y","ee":"https://doi.org/10.1007/s10270-014-0444-y","url":"https://dblp.org/rec/journals/sosym/GiachinoLL16"}, "url":"URL#3173622" }, { "@score":"1", "@id":"3173623", "info":{"authors":{"author":[{"@pid":"24/7077","text":"Rui C. Gonçalves"},{"@pid":"b/DSBatory","text":"Don S. Batory"},{"@pid":"32/5923","text":"João Luís Sobral"}]},"title":"ReFlO: an interactive tool for pipe-and-filter domain specification and program generation.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"377-395","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/GoncalvesBS16","doi":"10.1007/S10270-014-0403-7","ee":"https://doi.org/10.1007/s10270-014-0403-7","url":"https://dblp.org/rec/journals/sosym/GoncalvesBS16"}, "url":"URL#3173623" }, { "@score":"1", "@id":"3173624", "info":{"authors":{"author":[{"@pid":"34/11095","text":"Stijn de Gouw"},{"@pid":"b/DSsBoer","text":"Frank S. de Boer"},{"@pid":"91/1275","text":"Wolfgang Ahrendt"},{"@pid":"78/560","text":"Richard Bubel"}]},"title":"Integrating deductive verification and symbolic execution for abstract object creation in dynamic logic.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1117-1140","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/GouwBAB16","doi":"10.1007/S10270-014-0446-9","ee":"https://doi.org/10.1007/s10270-014-0446-9","url":"https://dblp.org/rec/journals/sosym/GouwBAB16"}, "url":"URL#3173624" }, { "@score":"1", "@id":"3173625", "info":{"authors":{"author":[{"@pid":"g/SusanneGraf","text":"Susanne Graf"},{"@pid":"68/3657","text":"Sophie Quinton"}]},"title":"Knowledge-based construction of distributed constrained systems.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1163-1180","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/GrafQ16","doi":"10.1007/S10270-014-0451-Z","ee":"https://doi.org/10.1007/s10270-014-0451-z","url":"https://dblp.org/rec/journals/sosym/GrafQ16"}, "url":"URL#3173625" }, { "@score":"1", "@id":"3173626", "info":{"authors":{"author":[{"@pid":"g/JeffreyGGray","text":"Jeff Gray 0001"},{"@pid":"r/BernhardRumpe","text":"Bernhard Rumpe"}]},"title":"The evolution of model editors: browser- and cloud-based solutions.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"303-305","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/GrayR16","doi":"10.1007/S10270-016-0524-2","ee":"https://doi.org/10.1007/s10270-016-0524-2","url":"https://dblp.org/rec/journals/sosym/GrayR16"}, "url":"URL#3173626" }, { "@score":"1", "@id":"3173627", "info":{"authors":{"author":[{"@pid":"g/JeffreyGGray","text":"Jeff Gray 0001"},{"@pid":"r/BernhardRumpe","text":"Bernhard Rumpe"}]},"title":"Models in simulation.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"605-607","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/GrayR16a","doi":"10.1007/S10270-016-0544-Y","ee":"https://doi.org/10.1007/s10270-016-0544-y","url":"https://dblp.org/rec/journals/sosym/GrayR16a"}, "url":"URL#3173627" }, { "@score":"1", "@id":"3173628", "info":{"authors":{"author":[{"@pid":"g/JeffreyGGray","text":"Jeff Gray 0001"},{"@pid":"r/BernhardRumpe","text":"Bernhard Rumpe"}]},"title":"How to write a successful SoSyM submission.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"929-931","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/GrayR16b","doi":"10.1007/S10270-016-0558-5","ee":"https://doi.org/10.1007/s10270-016-0558-5","url":"https://dblp.org/rec/journals/sosym/GrayR16b"}, "url":"URL#3173628" }, { "@score":"1", "@id":"3173629", "info":{"authors":{"author":[{"@pid":"131/3668","text":"Cornelia Haisjackl"},{"@pid":"06/8171-1","text":"Irene Barba 0001"},{"@pid":"65/2932","text":"Stefan Zugal"},{"@pid":"79/2229","text":"Pnina Soffer"},{"@pid":"85/1401","text":"Irit Hadar"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"},{"@pid":"64/3860","text":"Jakob Pinggera"},{"@pid":"96/2864","text":"Barbara Weber"}]},"title":"Understanding Declare models: strategies, pitfalls, empirical results.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"325-352","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/Haisjackl0ZSHRP16","doi":"10.1007/S10270-014-0435-Z","ee":"https://doi.org/10.1007/s10270-014-0435-z","url":"https://dblp.org/rec/journals/sosym/Haisjackl0ZSHRP16"}, "url":"URL#3173629" }, { "@score":"1", "@id":"3173630", "info":{"authors":{"author":[{"@pid":"05/9522","text":"Ábel Hegedüs"},{"@pid":"17/531-1","text":"Ákos Horváth 0001"},{"@pid":"07/4090","text":"István Ráth"},{"@pid":"28/10001","text":"Rodrigo Rizzi Starr"},{"@pid":"53/1883","text":"Dániel Varró"}]},"title":"Query-driven soft traceability links for models.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"733-756","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/HegedusHRSV16","doi":"10.1007/S10270-014-0436-Y","ee":"https://doi.org/10.1007/s10270-014-0436-y","url":"https://dblp.org/rec/journals/sosym/HegedusHRSV16"}, "url":"URL#3173630" }, { "@score":"1", "@id":"3173631", "info":{"authors":{"author":[{"@pid":"56/1483","text":"Soichiro Hidaka"},{"@pid":"16/5025","text":"Massimo Tisi"},{"@pid":"18/948","text":"Jordi Cabot"},{"@pid":"24/5199","text":"Zhenjiang Hu"}]},"title":"Feature-based classification of bidirectional transformation approaches.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"907-928","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/HidakaTCH16","doi":"10.1007/S10270-014-0450-0","ee":"https://doi.org/10.1007/s10270-014-0450-0","url":"https://dblp.org/rec/journals/sosym/HidakaTCH16"}, "url":"URL#3173631" }, { "@score":"1", "@id":"3173632", "info":{"authors":{"author":[{"@pid":"01/11343","text":"Simon Hudon"},{"@pid":"38/3500","text":"Thai Son Hoang"},{"@pid":"39/1187","text":"Jonathan S. Ostroff"}]},"title":"The Unit-B method: refinement guided by progress concerns.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1091-1116","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/HudonHO16","doi":"10.1007/S10270-015-0456-2","ee":"https://doi.org/10.1007/s10270-015-0456-2","url":"https://dblp.org/rec/journals/sosym/HudonHO16"}, "url":"URL#3173632" }, { "@score":"1", "@id":"3173633", "info":{"authors":{"author":[{"@pid":"j/EinarBrochJohnsen","text":"Einar Broch Johnsen"},{"@pid":"07/5484","text":"Luigia Petre"}]},"title":"Theme issue on Integrated Formal Methods.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"933-935","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/JohnsenP16","doi":"10.1007/S10270-015-0510-0","ee":"https://doi.org/10.1007/s10270-015-0510-0","url":"https://dblp.org/rec/journals/sosym/JohnsenP16"}, "url":"URL#3173633" }, { "@score":"1", "@id":"3173634", "info":{"authors":{"author":[{"@pid":"05/2176","text":"Jochen Malte Küster"},{"@pid":"10/3990","text":"Hagen Völzer"},{"@pid":"56/7420","text":"Cédric Favre"},{"@pid":"63/10471","text":"Moisés Castelo Branco"},{"@pid":"72/6806","text":"Krzysztof Czarnecki 0001"}]},"title":"Supporting different process views through a Shared Process Model.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1207-1233","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/KusterVFBC16","doi":"10.1007/S10270-015-0453-5","ee":"https://doi.org/10.1007/s10270-015-0453-5","url":"https://dblp.org/rec/journals/sosym/KusterVFBC16"}, "url":"URL#3173634" }, { "@score":"1", "@id":"3173635", "info":{"authors":{"author":[{"@pid":"63/5900","text":"Massimiliano de Leoni"},{"@pid":"73/3463","text":"Suriadi Suriadi"},{"@pid":"h/AHMterHofstede","text":"Arthur H. M. ter Hofstede"},{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}]},"title":"Turning event logs into process movies: animating what has really happened.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"707-732","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/LeoniSHA16","doi":"10.1007/S10270-014-0432-2","ee":"https://doi.org/10.1007/s10270-014-0432-2","url":"https://dblp.org/rec/journals/sosym/LeoniSHA16"}, "url":"URL#3173635" }, { "@score":"1", "@id":"3173636", "info":{"authors":{"author":[{"@pid":"26/11356","text":"Matthias Lohrmann"},{"@pid":"r/ManfredReichert","text":"Manfred Reichert"}]},"title":"Effective application of process improvement patterns to business processes.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"353-375","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/LohrmannR16","doi":"10.1007/S10270-014-0443-Z","ee":"https://doi.org/10.1007/s10270-014-0443-z","url":"https://dblp.org/rec/journals/sosym/LohrmannR16"}, "url":"URL#3173636" }, { "@score":"1", "@id":"3173637", "info":{"authors":{"author":[{"@pid":"21/6900","text":"Levi Lúcio"},{"@pid":"01/11466","text":"Moussa Amrani"},{"@pid":"20/3440","text":"Juergen Dingel"},{"@pid":"20/472","text":"Leen Lambers"},{"@pid":"00/1125","text":"Rick Salay"},{"@pid":"80/8767","text":"Gehan M. K. Selim"},{"@pid":"84/1730","text":"Eugene Syriani"},{"@pid":"20/4565","text":"Manuel Wimmer"}]},"title":"Model transformation intents and their properties.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"647-684","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/LucioADLSSSW16","doi":"10.1007/S10270-014-0429-X","ee":"https://doi.org/10.1007/s10270-014-0429-x","url":"https://dblp.org/rec/journals/sosym/LucioADLSSSW16"}, "url":"URL#3173637" }, { "@score":"1", "@id":"3173638", "info":{"authors":{"author":[{"@pid":"118/5967","text":"Nuno Macedo"},{"@pid":"65/603","text":"Alcino Cunha"}]},"title":"Least-change bidirectional model transformation with QVT-R and ATL.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"783-810","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/MacedoC16","doi":"10.1007/S10270-014-0437-X","ee":"https://doi.org/10.1007/s10270-014-0437-x","url":"https://dblp.org/rec/journals/sosym/MacedoC16"}, "url":"URL#3173638" }, { "@score":"1", "@id":"3173639", "info":{"authors":{"author":[{"@pid":"129/9131","text":"Murat Moran"},{"@pid":"36/3662","text":"James Heather"},{"@pid":"s/SASchneider","text":"Steve A. Schneider"}]},"title":"Automated anonymity verification of the ThreeBallot and VAV voting systems.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1049-1062","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/MoranHS16","doi":"10.1007/S10270-014-0445-X","ee":"https://doi.org/10.1007/s10270-014-0445-x","url":"https://dblp.org/rec/journals/sosym/MoranHS16"}, "url":"URL#3173639" }, { "@score":"1", "@id":"3173640", "info":{"authors":{"author":[{"@pid":"78/1737","text":"Pieter J. Mosterman"},{"@pid":"43/4709","text":"Justyna Zander"}]},"title":"Cyber-physical systems challenges: a needs analysis for collaborating embedded software systems.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"5-16","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/MostermanZ16","doi":"10.1007/S10270-015-0469-X","ee":"https://doi.org/10.1007/s10270-015-0469-x","url":"https://dblp.org/rec/journals/sosym/MostermanZ16"}, "url":"URL#3173640" }, { "@score":"1", "@id":"3173641", "info":{"authors":{"author":[{"@pid":"78/1737","text":"Pieter J. Mosterman"},{"@pid":"43/4709","text":"Justyna Zander"}]},"title":"Industry 4.0 as a Cyber-Physical System study.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"17-29","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/MostermanZ16a","doi":"10.1007/S10270-015-0493-X","ee":"https://doi.org/10.1007/s10270-015-0493-x","url":"https://dblp.org/rec/journals/sosym/MostermanZ16a"}, "url":"URL#3173641" }, { "@score":"1", "@id":"3173642", "info":{"authors":{"author":[{"@pid":"24/1050","text":"Radu Muschevici"},{"@pid":"40/5853","text":"José Proença"},{"@pid":"29/7042-1","text":"Dave Clarke 0001"}]},"title":"Feature Nets: behavioural modelling of software product lines.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1181-1206","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/MuscheviciPC16","doi":"10.1007/S10270-015-0475-Z","ee":"https://doi.org/10.1007/s10270-015-0475-z","url":"https://dblp.org/rec/journals/sosym/MuscheviciPC16"}, "url":"URL#3173642" }, { "@score":"1", "@id":"3173643", "info":{"authors":{"author":[{"@pid":"n/SelminNurcan","text":"Selmin Nurcan"},{"@pid":"50/6445-1","text":"Rainer Schmidt 0001"}]},"title":"Special section of BPMDS'2013: coping with complexity in business processes.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"307-308","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/NurcanS16","doi":"10.1007/S10270-015-0468-Y","ee":"https://doi.org/10.1007/s10270-015-0468-y","url":"https://dblp.org/rec/journals/sosym/NurcanS16"}, "url":"URL#3173643" }, { "@score":"1", "@id":"3173644", "info":{"authors":{"author":[{"@pid":"125/0386","text":"Nesi Outmazgin"},{"@pid":"79/2229","text":"Pnina Soffer"}]},"title":"A process mining-based analysis of business process work-arounds.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"309-323","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/OutmazginS16","doi":"10.1007/S10270-014-0420-6","ee":"https://doi.org/10.1007/s10270-014-0420-6","url":"https://dblp.org/rec/journals/sosym/OutmazginS16"}, "url":"URL#3173644" }, { "@score":"1", "@id":"3173645", "info":{"authors":{"author":[{"@pid":"20/8933","text":"Tolga Ovatman"},{"@pid":"57/7657","text":"Atakan Aral"},{"@pid":"158/0451","text":"Davut Polat"},{"@pid":"186/0246","text":"Ali Osman Ünver"}]},"title":"An overview of model checking practices on verification of PLC software.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"937-960","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/OvatmanAPU16","doi":"10.1007/S10270-014-0448-7","ee":"https://doi.org/10.1007/s10270-014-0448-7","url":"https://dblp.org/rec/journals/sosym/OvatmanAPU16"}, "url":"URL#3173645" }, { "@score":"1", "@id":"3173646", "info":{"authors":{"author":[{"@pid":"92/3769","text":"Ernesto Posse"},{"@pid":"20/3440","text":"Juergen Dingel"}]},"title":"An executable formal semantics for UML-RT.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"179-217","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/PosseD16","doi":"10.1007/S10270-014-0399-Z","ee":"https://doi.org/10.1007/s10270-014-0399-z","url":"https://dblp.org/rec/journals/sosym/PosseD16"}, "url":"URL#3173646" }, { "@score":"1", "@id":"3173647", "info":{"authors":{"author":[{"@pid":"125/8244","text":"Alejandro Rago"},{"@pid":"32/7432","text":"Claudia A. Marcos"},{"@pid":"90/1313","text":"J. Andres Diaz-Pace"}]},"title":"Identifying duplicate functionality in textual use cases by aligning semantic actions.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"579-603","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/RagoMD16","doi":"10.1007/S10270-014-0431-3","ee":"https://doi.org/10.1007/s10270-014-0431-3","url":"https://dblp.org/rec/journals/sosym/RagoMD16"}, "url":"URL#3173647" }, { "@score":"1", "@id":"3173648", "info":{"authors":{"author":[{"@pid":"178/9392","text":"Tamal Sen"},{"@pid":"83/954","text":"Rajib Mall"}]},"title":"Extracting finite state representation of Java programs.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"497-511","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/SenM16","doi":"10.1007/S10270-014-0415-3","ee":"https://doi.org/10.1007/s10270-014-0415-3","url":"https://dblp.org/rec/journals/sosym/SenM16"}, "url":"URL#3173648" }, { "@score":"1", "@id":"3173649", "info":{"authors":{"author":[{"@pid":"118/8296","text":"Donghwan Shin 0001"},{"@pid":"62/176","text":"Eunkyoung Jee"},{"@pid":"32/5432","text":"Doo-Hwan Bae"}]},"title":"Comprehensive analysis of FBD test coverage criteria using mutants.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"631-645","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/ShinJB16","doi":"10.1007/S10270-014-0428-Y","ee":"https://doi.org/10.1007/s10270-014-0428-y","url":"https://dblp.org/rec/journals/sosym/ShinJB16"}, "url":"URL#3173649" }, { "@score":"1", "@id":"3173650", "info":{"authors":{"author":[{"@pid":"09/10016","text":"Fu Song"},{"@pid":"23/6190","text":"Tayssir Touili"}]},"title":"Model-checking software library API usage rules.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"961-985","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/SongT16","doi":"10.1007/S10270-015-0473-1","ee":"https://doi.org/10.1007/s10270-015-0473-1","url":"https://dblp.org/rec/journals/sosym/SongT16"}, "url":"URL#3173650" }, { "@score":"1", "@id":"3173651", "info":{"authors":{"author":[{"@pid":"61/8725","text":"Songzheng Song"},{"@pid":"86/3523-2","text":"Jiexin Zhang 0002"},{"@pid":"51/3710-3","text":"Yang Liu 0003"},{"@pid":"a/MAuguston","text":"Mikhail Auguston"},{"@pid":"s/JunSun1","text":"Jun Sun 0001"},{"@pid":"33/6517","text":"Jin Song Dong"},{"@pid":"66/6179","text":"Tieming Chen"}]},"title":"Formalizing and verifying stochastic system architectures using Monterey Phoenix.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"453-471","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/SongZLASDC16","doi":"10.1007/S10270-014-0411-7","ee":"https://doi.org/10.1007/s10270-014-0411-7","url":"https://dblp.org/rec/journals/sosym/SongZLASDC16"}, "url":"URL#3173651" }, { "@score":"1", "@id":"3173652", "info":{"authors":{"author":[{"@pid":"143/4042","text":"Efstathios Stathakidis"},{"@pid":"00/4041","text":"David M. Williams"},{"@pid":"36/3662","text":"James Heather"}]},"title":"Constructing and verifying a robust Mix Net using CSP.","venue":"Softw. Syst. Model.","volume":"15","number":"4","pages":"1063-1089","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/StathakidisWH16","doi":"10.1007/S10270-015-0474-0","ee":"https://doi.org/10.1007/s10270-015-0474-0","url":"https://dblp.org/rec/journals/sosym/StathakidisWH16"}, "url":"URL#3173652" }, { "@score":"1", "@id":"3173653", "info":{"authors":{"author":[{"@pid":"138/0550","text":"Michael Szvetits"},{"@pid":"00/6127","text":"Uwe Zdun"}]},"title":"Systematic literature review of the objectives, techniques, kinds, and architectures of models at runtime.","venue":"Softw. Syst. Model.","volume":"15","number":"1","pages":"31-69","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/SzvetitsZ16","doi":"10.1007/S10270-013-0394-9","ee":"https://doi.org/10.1007/s10270-013-0394-9","url":"https://dblp.org/rec/journals/sosym/SzvetitsZ16"}, "url":"URL#3173653" }, { "@score":"1", "@id":"3173654", "info":{"authors":{"author":[{"@pid":"53/1883","text":"Dániel Varró"},{"@pid":"76/4726","text":"Gábor Bergmann"},{"@pid":"05/9522","text":"Ábel Hegedüs"},{"@pid":"17/531-1","text":"Ákos Horváth 0001"},{"@pid":"07/4090","text":"István Ráth"},{"@pid":"93/8528","text":"Zoltán Ujhelyi"}]},"title":"Road to a reactive and incremental model transformation platform: three generations of the VIATRA framework.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"609-629","year":"2016","type":"Journal Articles","access":"open","key":"journals/sosym/VarroBHHRU16","doi":"10.1007/S10270-016-0530-4","ee":"https://doi.org/10.1007/s10270-016-0530-4","url":"https://dblp.org/rec/journals/sosym/VarroBHHRU16"}, "url":"URL#3173654" }, { "@score":"1", "@id":"3173655", "info":{"authors":{"author":[{"@pid":"21/10311","text":"Erik Wittern"},{"@pid":"32/69","text":"Christian Zirpins"}]},"title":"Service feature modeling: modeling and participatory ranking of service design alternatives.","venue":"Softw. Syst. Model.","volume":"15","number":"2","pages":"553-578","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/WitternZ16","doi":"10.1007/S10270-014-0414-4","ee":"https://doi.org/10.1007/s10270-014-0414-4","url":"https://dblp.org/rec/journals/sosym/WitternZ16"}, "url":"URL#3173655" }, { "@score":"1", "@id":"3173656", "info":{"authors":{"author":[{"@pid":"40/7423-2","text":"Tao Yue 0002"},{"@pid":"25/5352-1","text":"Shaukat Ali 0001"}]},"title":"Empirically evaluating OCL and Java for specifying constraints on UML models.","venue":"Softw. Syst. Model.","volume":"15","number":"3","pages":"757-781","year":"2016","type":"Journal Articles","access":"closed","key":"journals/sosym/YueA16","doi":"10.1007/S10270-014-0438-9","ee":"https://doi.org/10.1007/s10270-014-0438-9","url":"https://dblp.org/rec/journals/sosym/YueA16"}, "url":"URL#3173656" } ] } } } )