callback( { "result":{ "query":":facetid:toc:\"db/journals/sttt/sttt14.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"197.47" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"37", "@dc":"37", "@oc":"37", "@id":"43484443", "text":":facetid:toc:db/journals/sttt/sttt14.bht" } }, "hits":{ "@total":"37", "@computed":"37", "@sent":"37", "@first":"0", "hit":[{ "@score":"1", "@id":"4351618", "info":{"authors":{"author":{"@pid":"a/PAAbdulla","text":"Parosh Aziz Abdulla"}},"title":"Regular model checking.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"2","pages":"109-118","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/Abdulla12","doi":"10.1007/S10009-011-0216-8","ee":"https://doi.org/10.1007/s10009-011-0216-8","url":"https://dblp.org/rec/journals/sttt/Abdulla12"}, "url":"URL#4351618" }, { "@score":"1", "@id":"4351619", "info":{"authors":{"author":[{"@pid":"a/PAAbdulla","text":"Parosh Aziz Abdulla"},{"@pid":"j/BengtJonsson","text":"Bengt Jonsson 0001"},{"@pid":"05/1762","text":"Marcus Nilsson"},{"@pid":"74/215","text":"Julien d'Orso"},{"@pid":"26/1444","text":"Mayank Saksena"}]},"title":"Regular model checking for LTL(MSO).","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"2","pages":"223-241","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/AbdullaJNdS12","doi":"10.1007/S10009-011-0212-Z","ee":"https://doi.org/10.1007/s10009-011-0212-z","url":"https://dblp.org/rec/journals/sttt/AbdullaJNdS12"}, "url":"URL#4351619" }, { "@score":"1", "@id":"4351620", "info":{"authors":{"author":[{"@pid":"15/1256","text":"Ananda Basu"},{"@pid":"01/5624","text":"Saddek Bensalem"},{"@pid":"05/178","text":"Marius Bozga"},{"@pid":"79/1404","text":"Benoît Delahaye"},{"@pid":"52/579","text":"Axel Legay"}]},"title":"Statistical abstraction and model-checking of large heterogeneous systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"1","pages":"53-72","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/BasuBBDL12","doi":"10.1007/S10009-011-0201-2","ee":"https://doi.org/10.1007/s10009-011-0201-2","url":"https://dblp.org/rec/journals/sttt/BasuBBDL12"}, "url":"URL#4351620" }, { "@score":"1", "@id":"4351621", "info":{"authors":{"author":[{"@pid":"94/5744","text":"Eric Bodden"},{"@pid":"h/LaurieJHendren","text":"Laurie J. Hendren"}]},"title":"The Clara framework for hybrid typestate analysis.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"3","pages":"307-326","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/BoddenH12","doi":"10.1007/S10009-010-0183-5","ee":"https://doi.org/10.1007/s10009-010-0183-5","url":"https://dblp.org/rec/journals/sttt/BoddenH12"}, "url":"URL#4351621" }, { "@score":"1", "@id":"4351622", "info":{"authors":{"author":{"@pid":"37/1275","text":"Bernard Boigelot"}},"title":"Domain-specific regular acceleration.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"2","pages":"193-206","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/Boigelot12","doi":"10.1007/S10009-011-0206-X","ee":"https://doi.org/10.1007/s10009-011-0206-x","url":"https://dblp.org/rec/journals/sttt/Boigelot12"}, "url":"URL#4351622" }, { "@score":"1", "@id":"4351623", "info":{"authors":{"author":[{"@pid":"b/AhmedBouajjani","text":"Ahmed Bouajjani"},{"@pid":"22/639","text":"Peter Habermehl"},{"@pid":"87/2946","text":"Adam Rogalewicz"},{"@pid":"51/533","text":"Tomás Vojnar"}]},"title":"Abstract regular (tree) model checking.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"2","pages":"167-191","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/BouajjaniHRV12","doi":"10.1007/S10009-011-0205-Y","ee":"https://doi.org/10.1007/s10009-011-0205-y","url":"https://dblp.org/rec/journals/sttt/BouajjaniHRV12"}, "url":"URL#4351623" }, { "@score":"1", "@id":"4351624", "info":{"authors":{"author":[{"@pid":"b/AhmedBouajjani","text":"Ahmed Bouajjani"},{"@pid":"23/6190","text":"Tayssir Touili"}]},"title":"Widening techniques for regular tree model checking.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"2","pages":"145-165","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/BouajjaniT12","doi":"10.1007/S10009-011-0208-8","ee":"https://doi.org/10.1007/s10009-011-0208-8","url":"https://dblp.org/rec/journals/sttt/BouajjaniT12"}, "url":"URL#4351624" }, { "@score":"1", "@id":"4351625", "info":{"authors":{"author":[{"@pid":"91/5512","text":"Chunqing Chen"},{"@pid":"s/JunSun1","text":"Jun Sun 0001"},{"@pid":"51/3710-3","text":"Yang Liu 0003"},{"@pid":"33/6517","text":"Jin Song Dong"},{"@pid":"92/10310","text":"Manchun Zheng"}]},"title":"Formal modeling and validation of Stateflow diagrams.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"6","pages":"653-671","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/Chen0LDZ12","doi":"10.1007/S10009-012-0235-0","ee":"https://doi.org/10.1007/s10009-012-0235-0","url":"https://dblp.org/rec/journals/sttt/Chen0LDZ12"}, "url":"URL#4351625" }, { "@score":"1", "@id":"4351626", "info":{"authors":{"author":[{"@pid":"71/3313","text":"Andreas Classen"},{"@pid":"73/10839","text":"Maxime Cordy"},{"@pid":"83/3086","text":"Patrick Heymans"},{"@pid":"52/579","text":"Axel Legay"},{"@pid":"27/3416","text":"Pierre-Yves Schobbens"}]},"title":"Model checking software product lines with SNIP.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"589-612","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/ClassenCHLS12","doi":"10.1007/S10009-012-0234-1","ee":"https://doi.org/10.1007/s10009-012-0234-1","url":"https://dblp.org/rec/journals/sttt/ClassenCHLS12"}, "url":"URL#4351626" }, { "@score":"1", "@id":"4351627", "info":{"authors":{"author":[{"@pid":"06/5602","text":"Alexandre David"},{"@pid":"l/KimGuldstrandLarsen","text":"Kim Guldstrand Larsen"},{"@pid":"52/579","text":"Axel Legay"},{"@pid":"40/8401","text":"Mikael H. Møller"},{"@pid":"80/441","text":"Ulrik Nyman"},{"@pid":"51/1502","text":"Anders P. Ravn"},{"@pid":"34/2824","text":"Arne Skou"},{"@pid":"18/3339","text":"Andrzej Wasowski"}]},"title":"Compositional verification of real-time systems using Ecdar.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"6","pages":"703-720","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/DavidLLMNRSW12","doi":"10.1007/S10009-012-0237-Y","ee":"https://doi.org/10.1007/s10009-012-0237-y","url":"https://dblp.org/rec/journals/sttt/DavidLLMNRSW12"}, "url":"URL#4351627" }, { "@score":"1", "@id":"4351628", "info":{"authors":{"author":[{"@pid":"d/GDelzanno","text":"Giorgio Delzanno"},{"@pid":"06/0","text":"Ahmed Rezine"}]},"title":"A lightweight regular model checking approach for parameterized systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"2","pages":"207-222","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/DelzannoR12","doi":"10.1007/S10009-011-0213-Y","ee":"https://doi.org/10.1007/s10009-011-0213-y","url":"https://dblp.org/rec/journals/sttt/DelzannoR12"}, "url":"URL#4351628" }, { "@score":"1", "@id":"4351629", "info":{"authors":{"author":[{"@pid":"d/AlainDenise","text":"Alain Denise"},{"@pid":"74/4866","text":"Marie-Claude Gaudel"},{"@pid":"21/3772","text":"Sandrine-Dominique Gouraud"},{"@pid":"18/4669","text":"Richard Lassaigne"},{"@pid":"56/2690","text":"Johan Oudinet"},{"@pid":"57/4467","text":"Sylvain Peyronnet"}]},"title":"Coverage-biased random exploration of large models and application to testing.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"1","pages":"73-93","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/DeniseGGLOP12","doi":"10.1007/S10009-011-0190-1","ee":"https://doi.org/10.1007/s10009-011-0190-1","url":"https://dblp.org/rec/journals/sttt/DeniseGGLOP12"}, "url":"URL#4351629" }, { "@score":"1", "@id":"4351630", "info":{"authors":{"author":[{"@pid":"11/5986","text":"Yliès Falcone"},{"@pid":"f/JeanClaudeFernandez","text":"Jean-Claude Fernandez"},{"@pid":"50/6556","text":"Thierry Jéron"},{"@pid":"44/4811","text":"Hervé Marchand"},{"@pid":"07/2632","text":"Laurent Mounier"}]},"title":"More testable properties.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"4","pages":"407-437","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/FalconeFJMM12","doi":"10.1007/S10009-011-0220-Z","ee":"https://doi.org/10.1007/s10009-011-0220-z","url":"https://dblp.org/rec/journals/sttt/FalconeFJMM12"}, "url":"URL#4351630" }, { "@score":"1", "@id":"4351631", "info":{"authors":{"author":[{"@pid":"11/5986","text":"Yliès Falcone"},{"@pid":"f/JeanClaudeFernandez","text":"Jean-Claude Fernandez"},{"@pid":"07/2632","text":"Laurent Mounier"}]},"title":"What can you verify and enforce at runtime?","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"3","pages":"349-382","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/FalconeFM12","doi":"10.1007/S10009-011-0196-8","ee":"https://doi.org/10.1007/s10009-011-0196-8","url":"https://dblp.org/rec/journals/sttt/FalconeFM12"}, "url":"URL#4351631" }, { "@score":"1", "@id":"4351632", "info":{"authors":{"author":[{"@pid":"48/1691","text":"Amir Hossein Ghamarian"},{"@pid":"55/101","text":"Maarten de Mol"},{"@pid":"r/ArendRensink","text":"Arend Rensink"},{"@pid":"62/7079","text":"Eduardo Zambon"},{"@pid":"19/10779","text":"Maria Zimakova"}]},"title":"Modelling and analysis using GROOVE.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"1","pages":"15-40","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/GhamarianMRZZ12","doi":"10.1007/S10009-011-0186-X","ee":"https://doi.org/10.1007/s10009-011-0186-x","url":"https://dblp.org/rec/journals/sttt/GhamarianMRZZ12"}, "url":"URL#4351632" }, { "@score":"1", "@id":"4351633", "info":{"authors":{"author":{"@pid":"70/5816","text":"Christoph David Gladisch"}},"title":"Model generation for quantified formulas with application to test data generation.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"4","pages":"439-459","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/Gladisch12","doi":"10.1007/S10009-012-0227-0","ee":"https://doi.org/10.1007/s10009-012-0227-0","url":"https://dblp.org/rec/journals/sttt/Gladisch12"}, "url":"URL#4351633" }, { "@score":"1", "@id":"4351634", "info":{"authors":{"author":[{"@pid":"45/8339","text":"Adriano Gomes"},{"@pid":"m/AlexandreMota","text":"Alexandre Mota 0001"},{"@pid":"s/AugustoSampaio","text":"Augusto Sampaio"},{"@pid":"54/8339","text":"Felipe Ferri"},{"@pid":"08/6952","text":"Edson H. Watanabe"}]},"title":"Constructive model-based analysis for safety assessment.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"6","pages":"673-702","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/GomesMSFW12","doi":"10.1007/S10009-012-0238-X","ee":"https://doi.org/10.1007/s10009-012-0238-x","url":"https://dblp.org/rec/journals/sttt/GomesMSFW12"}, "url":"URL#4351634" }, { "@score":"1", "@id":"4351635", "info":{"authors":{"author":[{"@pid":"37/7630","text":"Wolfgang Heider"},{"@pid":"r/RickRabister","text":"Rick Rabiser"},{"@pid":"g/PGrunbacher","text":"Paul Grünbacher"}]},"title":"Facilitating the evolution of products in product line engineering by capturing and replaying configuration decisions.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"613-630","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/HeiderRG12","doi":"10.1007/S10009-012-0229-Y","ee":"https://doi.org/10.1007/s10009-012-0229-y","url":"https://dblp.org/rec/journals/sttt/HeiderRG12"}, "url":"URL#4351635" }, { "@score":"1", "@id":"4351636", "info":{"authors":{"author":[{"@pid":"83/3086","text":"Patrick Heymans"},{"@pid":"07/7966","text":"Quentin Boucher"},{"@pid":"71/3313","text":"Andreas Classen"},{"@pid":"14/8523","text":"Arnaud Bourdoux"},{"@pid":"26/8523","text":"Laurent Demonceau"}]},"title":"A code tagging approach to software product line development - An application to satellite communication libraries.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"553-566","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/HeymansBCBD12","doi":"10.1007/S10009-012-0242-1","ee":"https://doi.org/10.1007/s10009-012-0242-1","url":"https://dblp.org/rec/journals/sttt/HeymansBCBD12"}, "url":"URL#4351636" }, { "@score":"1", "@id":"4351637", "info":{"authors":{"author":[{"@pid":"18/1664","text":"Xiaowan Huang"},{"@pid":"36/3229","text":"Justin Seyster"},{"@pid":"59/5552","text":"Sean Callanan"},{"@pid":"56/8730","text":"Ketan Dixit"},{"@pid":"94/5421","text":"Radu Grosu"},{"@pid":"s/ScottASmolka","text":"Scott A. Smolka"},{"@pid":"09/6787","text":"Scott D. Stoller"},{"@pid":"71/1341","text":"Erez Zadok"}]},"title":"Software monitoring with controllable overhead.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"3","pages":"327-347","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/HuangSCDGSSZ12","doi":"10.1007/S10009-010-0184-4","ee":"https://doi.org/10.1007/s10009-010-0184-4","url":"https://dblp.org/rec/journals/sttt/HuangSCDGSSZ12"}, "url":"URL#4351637" }, { "@score":"1", "@id":"4351638", "info":{"authors":{"author":[{"@pid":"07/3868","text":"Sven Jörges"},{"@pid":"94/6795","text":"Anna-Lena Lamprecht"},{"@pid":"m/TizianaMargaria","text":"Tiziana Margaria"},{"@pid":"03/4484","text":"Ina Schaefer"},{"@pid":"s/BernhardSteffen","text":"Bernhard Steffen"}]},"title":"A constraint-based variability modeling framework.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"511-530","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/JorgesLMSS12","doi":"10.1007/S10009-012-0254-X","ee":"https://doi.org/10.1007/s10009-012-0254-x","url":"https://dblp.org/rec/journals/sttt/JorgesLMSS12"}, "url":"URL#4351638" }, { "@score":"1", "@id":"4351639", "info":{"authors":{"author":[{"@pid":"k/ShmuelKatz","text":"Shmuel Katz"},{"@pid":"85/5649","text":"David Faitelson"}]},"title":"The common aspect proof environment.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"1","pages":"41-52","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/KatzF12","doi":"10.1007/S10009-011-0191-0","ee":"https://doi.org/10.1007/s10009-011-0191-0","url":"https://dblp.org/rec/journals/sttt/KatzF12"}, "url":"URL#4351639" }, { "@score":"1", "@id":"4351640", "info":{"authors":{"author":{"@pid":"52/579","text":"Axel Legay"}},"title":"Extrapolating (omega-)regular model checking.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"2","pages":"119-143","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/Legay12","doi":"10.1007/S10009-011-0209-7","ee":"https://doi.org/10.1007/s10009-011-0209-7","url":"https://dblp.org/rec/journals/sttt/Legay12"}, "url":"URL#4351640" }, { "@score":"1", "@id":"4351641", "info":{"authors":{"author":[{"@pid":"l/ZhimingLiu1","text":"Zhiming Liu 0001"},{"@pid":"04/5884","text":"Abhik Roychoudhury"}]},"title":"Relating software validation to technology trends.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"6","pages":"631-638","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/LiuR12","doi":"10.1007/S10009-012-0259-5","ee":"https://doi.org/10.1007/s10009-012-0259-5","url":"https://dblp.org/rec/journals/sttt/LiuR12"}, "url":"URL#4351641" }, { "@score":"1", "@id":"4351642", "info":{"authors":{"author":[{"@pid":"29/1064","text":"Patrick O'Neil Meredith"},{"@pid":"40/5278","text":"Dongyun Jin"},{"@pid":"40/9698","text":"Dennis Griffith"},{"@pid":"21/3047-6","text":"Feng Chen 0006"},{"@pid":"r/GrigoreRosu","text":"Grigore Rosu"}]},"title":"An overview of the MOP runtime verification framework.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"3","pages":"249-289","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/MeredithJGCR12","doi":"10.1007/S10009-011-0198-6","ee":"https://doi.org/10.1007/s10009-011-0198-6","url":"https://dblp.org/rec/journals/sttt/MeredithJGCR12"}, "url":"URL#4351642" }, { "@score":"1", "@id":"4351643", "info":{"authors":{"author":[{"@pid":"42/7085","text":"Minxue Pan"},{"@pid":"76/5446","text":"Xuandong Li"}]},"title":"Timing analysis of MSC specifications with asynchronous concatenation.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"6","pages":"639-651","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/PanL12","doi":"10.1007/S10009-012-0239-9","ee":"https://doi.org/10.1007/s10009-012-0239-9","url":"https://dblp.org/rec/journals/sttt/PanL12"}, "url":"URL#4351643" }, { "@score":"1", "@id":"4351644", "info":{"authors":{"author":[{"@pid":"72/1508","text":"Alexandre Petrenko"},{"@pid":"24/261","text":"Adenilso da Silva Simão"},{"@pid":"28/2292","text":"José Carlos Maldonado"}]},"title":"Model-based testing of software and systems: recent advances and challenges.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"4","pages":"383-386","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/PetrenkoSM12","doi":"10.1007/S10009-012-0240-3","ee":"https://doi.org/10.1007/s10009-012-0240-3","url":"https://dblp.org/rec/journals/sttt/PetrenkoSM12"}, "url":"URL#4351644" }, { "@score":"1", "@id":"4351645", "info":{"authors":{"author":[{"@pid":"p/AndreasPleuss","text":"Andreas Pleuss"},{"@pid":"60/2897","text":"Goetz Botterweck"}]},"title":"Visualization of variability and configuration options.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"497-510","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/PleussB12","doi":"10.1007/S10009-012-0252-Z","ee":"https://doi.org/10.1007/s10009-012-0252-z","url":"https://dblp.org/rec/journals/sttt/PleussB12"}, "url":"URL#4351645" }, { "@score":"1", "@id":"4351646", "info":{"authors":{"author":[{"@pid":"q/ShazQadeer","text":"Shaz Qadeer"},{"@pid":"88/1444","text":"Serdar Tasiran"}]},"title":"Runtime verification of concurrency-specific correctness criteria.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"3","pages":"291-305","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/QadeerT12","doi":"10.1007/S10009-011-0210-1","ee":"https://doi.org/10.1007/s10009-011-0210-1","url":"https://dblp.org/rec/journals/sttt/QadeerT12"}, "url":"URL#4351646" }, { "@score":"1", "@id":"4351647", "info":{"authors":{"author":[{"@pid":"73/10777","text":"Georgia Penido Safe"},{"@pid":"c/ClaudionorJNCoelhoJr","text":"Claudionor Coelho"},{"@pid":"41/3075","text":"Luiz Filipe M. Vieira"},{"@pid":"74/10778","text":"Celina Gomes Do Val"},{"@pid":"81/1449","text":"José Augusto Miranda Nacif"},{"@pid":"11/5552","text":"Antônio Otávio Fernandes"}]},"title":"Selection of formal verification heuristics for parallel execution.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"1","pages":"95-108","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/SafeCVVNF12","doi":"10.1007/S10009-011-0204-Z","ee":"https://doi.org/10.1007/s10009-011-0204-z","url":"https://dblp.org/rec/journals/sttt/SafeCVVNF12"}, "url":"URL#4351647" }, { "@score":"1", "@id":"4351648", "info":{"authors":{"author":[{"@pid":"03/4484","text":"Ina Schaefer"},{"@pid":"r/RickRabister","text":"Rick Rabiser"},{"@pid":"29/7042-1","text":"Dave Clarke 0001"},{"@pid":"88/4522","text":"Lorenzo Bettini"},{"@pid":"b/DBenavides","text":"David Benavides 0001"},{"@pid":"60/2897","text":"Goetz Botterweck"},{"@pid":"38/70","text":"Animesh Pathak"},{"@pid":"09/4140","text":"Salvador Trujillo"},{"@pid":"62/5188","text":"Karina Villela"}]},"title":"Software diversity: state of the art and perspectives.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"477-495","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/SchaeferRCBBBPTV12","doi":"10.1007/S10009-012-0253-Y","ee":"https://doi.org/10.1007/s10009-012-0253-y","url":"https://dblp.org/rec/journals/sttt/SchaeferRCBBBPTV12"}, "url":"URL#4351648" }, { "@score":"1", "@id":"4351649", "info":{"authors":{"author":[{"@pid":"12/2269","text":"Natasha Sharygina"},{"@pid":"t/StefanoTonetta","text":"Stefano Tonetta"},{"@pid":"05/2330","text":"Aliaksei Tsitovich"}]},"title":"An abstraction refinement approach combining precise and approximated techniques.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"1","pages":"1-14","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/SharyginaTT12","doi":"10.1007/S10009-011-0185-Y","ee":"https://doi.org/10.1007/s10009-011-0185-y","url":"https://dblp.org/rec/journals/sttt/SharyginaTT12"}, "url":"URL#4351649" }, { "@score":"1", "@id":"4351650", "info":{"authors":{"author":[{"@pid":"31/4030","text":"Oleg Sokolsky"},{"@pid":"84/3029","text":"Klaus Havelund"},{"@pid":"l/InsupLee","text":"Insup Lee 0001"}]},"title":"Introduction to the special section on runtime verification.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"3","pages":"243-247","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/SokolskyHL12","doi":"10.1007/S10009-011-0218-6","ee":"https://doi.org/10.1007/s10009-011-0218-6","url":"https://dblp.org/rec/journals/sttt/SokolskyHL12"}, "url":"URL#4351650" }, { "@score":"1", "@id":"4351651", "info":{"authors":{"author":[{"@pid":"40/5243","text":"Reinhard Tartler"},{"@pid":"48/5404","text":"Julio Sincero"},{"@pid":"30/5956-1","text":"Christian Dietrich 0001"},{"@pid":"26/6488","text":"Wolfgang Schröder-Preikschat"},{"@pid":"57/863","text":"Daniel Lohmann"}]},"title":"Revealing and repairing configuration inconsistencies in large-scale system software.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"531-551","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/TartlerSDSL12","doi":"10.1007/S10009-012-0225-2","ee":"https://doi.org/10.1007/s10009-012-0225-2","url":"https://dblp.org/rec/journals/sttt/TartlerSDSL12"}, "url":"URL#4351651" }, { "@score":"1", "@id":"4351652", "info":{"authors":{"author":[{"@pid":"42/6841","text":"Margus Veanes"},{"@pid":"51/912","text":"Nikolaj S. Bjørner"}]},"title":"Alternating simulation and IOCO.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"4","pages":"387-405","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/VeanesB12","doi":"10.1007/S10009-011-0215-9","ee":"https://doi.org/10.1007/s10009-011-0215-9","url":"https://dblp.org/rec/journals/sttt/VeanesB12"}, "url":"URL#4351652" }, { "@score":"1", "@id":"4351653", "info":{"authors":{"author":[{"@pid":"99/4290","text":"Silvia Regina Vergilio"},{"@pid":"p/AuroraPozo","text":"Aurora T. R. Pozo"},{"@pid":"116/7854","text":"João Carlos G. Árias"},{"@pid":"31/8688","text":"Rafael da Veiga Cabral"},{"@pid":"116/7688","text":"Tiago Nobre"}]},"title":"Multi-objective optimization algorithms applied to the class integration and test order problem.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"4","pages":"461-475","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/VergilioPACN12","doi":"10.1007/S10009-012-0226-1","ee":"https://doi.org/10.1007/s10009-012-0226-1","url":"https://dblp.org/rec/journals/sttt/VergilioPACN12"}, "url":"URL#4351653" }, { "@score":"1", "@id":"4351654", "info":{"authors":{"author":[{"@pid":"62/2289","text":"Peter Y. H. Wong"},{"@pid":"a/ElviraAlbert","text":"Elvira Albert"},{"@pid":"24/1050","text":"Radu Muschevici"},{"@pid":"40/5853","text":"José Proença"},{"@pid":"49/4495-2","text":"Jan Schäfer 0002"},{"@pid":"76/5637","text":"Rudolf Schlatte"}]},"title":"The ABS tool suite: modelling, executing and analysing distributed adaptable object-oriented systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"14","number":"5","pages":"567-588","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sttt/WongAMPSS12","doi":"10.1007/S10009-012-0250-1","ee":"https://doi.org/10.1007/s10009-012-0250-1","url":"https://dblp.org/rec/journals/sttt/WongAMPSS12"}, "url":"URL#4351654" } ] } } } )