callback( { "result":{ "query":":facetid:toc:\"db/journals/sttt/sttt22.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"188.64" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"47", "@dc":"47", "@oc":"47", "@id":"43471638", "text":":facetid:toc:db/journals/sttt/sttt22.bht" } }, "hits":{ "@total":"47", "@computed":"47", "@sent":"47", "@first":"0", "hit":[{ "@score":"1", "@id":"1656497", "info":{"authors":{"author":[{"@pid":"38/10001","text":"Dhaminda B. Abeywickrama"},{"@pid":"74/7014","text":"Nicola Bicocchi"},{"@pid":"90/6532","text":"Marco Mamei"},{"@pid":"54/3140","text":"Franco Zambonelli"}]},"title":"The SOTA approach to engineering collective adaptive systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"399-415","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/AbeywickramaBMZ20","doi":"10.1007/S10009-020-00554-3","ee":"https://doi.org/10.1007/s10009-020-00554-3","url":"https://dblp.org/rec/journals/sttt/AbeywickramaBMZ20"}, "url":"URL#1656497" }, { "@score":"1", "@id":"1656498", "info":{"authors":{"author":{"@pid":"16/756","text":"Jean-Raymond Abrial"}},"title":"The ABZ-2018 case study with Event-B.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"257-264","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/Abrial20","doi":"10.1007/S10009-019-00525-3","ee":"https://doi.org/10.1007/s10009-019-00525-3","url":"https://dblp.org/rec/journals/sttt/Abrial20"}, "url":"URL#1656498" }, { "@score":"1", "@id":"1656499", "info":{"authors":{"author":[{"@pid":"144/3770","text":"Rima Al Ali"},{"@pid":"38/1502","text":"Tomás Bures"},{"@pid":"33/6397","text":"Petr Hnetynka"},{"@pid":"269/7111","text":"Jan Matejek"},{"@pid":"02/5377","text":"Frantisek Plásil"},{"@pid":"81/1658","text":"Jirí Vinárek"}]},"title":"Toward autonomically composable and context-dependent access control specification through ensembles.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"511-522","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/AliBHMPV20","doi":"10.1007/S10009-020-00556-1","ee":"https://doi.org/10.1007/s10009-020-00556-1","url":"https://dblp.org/rec/journals/sttt/AliBHMPV20"}, "url":"URL#1656499" }, { "@score":"1", "@id":"1656500", "info":{"authors":{"author":[{"@pid":"262/1210","text":"Hamzeh M. Allawi"},{"@pid":"259/5914","text":"Waref Al Manaseer"},{"@pid":"226/1178","text":"Mohammad Aref Alshraideh"}]},"title":"A greedy particle swarm optimization (GPSO) algorithm for testing real-world smart card applications.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"183-194","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/AllawiMS20","doi":"10.1007/S10009-018-00506-Y","ee":"https://doi.org/10.1007/s10009-018-00506-y","url":"https://dblp.org/rec/journals/sttt/AllawiMS20"}, "url":"URL#1656500" }, { "@score":"1", "@id":"1656501", "info":{"authors":{"author":[{"@pid":"154/0058","text":"Yehia Abd Alrahman"},{"@pid":"218/6897","text":"Giulio Garbi"}]},"title":"A distributed API for coordinating AbC programs.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"477-496","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/AlrahmanG20","doi":"10.1007/S10009-020-00553-4","ee":"https://doi.org/10.1007/s10009-020-00553-4","url":"https://dblp.org/rec/journals/sttt/AlrahmanG20"}, "url":"URL#1656501" }, { "@score":"1", "@id":"1656502", "info":{"authors":{"author":[{"@pid":"70/8611","text":"Elvio Gilberto Amparore"},{"@pid":"d/SDonatelli","text":"Susanna Donatelli"},{"@pid":"c/GianfrancoCiardo","text":"Gianfranco Ciardo"}]},"title":"Variable order metrics for decision diagrams in system verification.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"541-562","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/AmparoreDC20","doi":"10.1007/S10009-019-00522-6","ee":"https://doi.org/10.1007/s10009-019-00522-6","url":"https://dblp.org/rec/journals/sttt/AmparoreDC20"}, "url":"URL#1656502" }, { "@score":"1", "@id":"1656503", "info":{"authors":{"author":[{"@pid":"86/7855","text":"Paolo Arcaini"},{"@pid":"05/4356","text":"Jan Kofron"},{"@pid":"89/3085","text":"Pavel Jezek"}]},"title":"Validation of the Hybrid ERTMS/ETCS Level 3 using Spin.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"265-279","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/ArcainiKJ20","doi":"10.1007/S10009-019-00539-X","ee":"https://doi.org/10.1007/s10009-019-00539-x","url":"https://dblp.org/rec/journals/sttt/ArcainiKJ20"}, "url":"URL#1656503" }, { "@score":"1", "@id":"1656504", "info":{"authors":{"author":[{"@pid":"71/3025","text":"Bernard Berthomieu"},{"@pid":"93/1403","text":"Didier Le Botlan"},{"@pid":"20/5526","text":"Silvano Dal-Zilio"}]},"title":"Counting Petri net markings from reduction equations.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"163-181","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/BerthomieuBD20","doi":"10.1007/S10009-019-00519-1","ee":"https://doi.org/10.1007/s10009-019-00519-1","url":"https://dblp.org/rec/journals/sttt/BerthomieuBD20"}, "url":"URL#1656504" }, { "@score":"1", "@id":"1656505", "info":{"authors":{"author":[{"@pid":"b/DirkBeyer1","text":"Dirk Beyer 0001"},{"@pid":"76/6612","text":"Marieke Huisman"}]},"title":"Tools for the construction and analysis of systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"685-687","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/BeyerH20","doi":"10.1007/S10009-020-00581-0","ee":"https://doi.org/10.1007/s10009-020-00581-0","url":"https://dblp.org/rec/journals/sttt/BeyerH20"}, "url":"URL#1656505" }, { "@score":"1", "@id":"1656506", "info":{"authors":{"author":[{"@pid":"124/8991","text":"Fabrizio Biondi"},{"@pid":"08/8877","text":"Thomas Given-Wilson"},{"@pid":"52/579","text":"Axel Legay"}]},"title":"Introduction to the special issue for SPIN 2019.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"563-564","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/BiondiGL20","doi":"10.1007/S10009-020-00580-1","ee":"https://doi.org/10.1007/s10009-020-00580-1","url":"https://dblp.org/rec/journals/sttt/BiondiGL20"}, "url":"URL#1656506" }, { "@score":"1", "@id":"1656507", "info":{"authors":{"author":[{"@pid":"157/8007","text":"Carlos E. Budde"},{"@pid":"61/441","text":"Pedro R. D'Argenio"},{"@pid":"89/7952","text":"Arnd Hartmanns"},{"@pid":"26/5698","text":"Sean Sedwards"}]},"title":"An efficient statistical model checker for nondeterminism and rare events.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"759-780","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/BuddeDHS20","doi":"10.1007/S10009-020-00563-2","ee":"https://doi.org/10.1007/s10009-020-00563-2","url":"https://dblp.org/rec/journals/sttt/BuddeDHS20"}, "url":"URL#1656507" }, { "@score":"1", "@id":"1656508", "info":{"authors":{"author":[{"@pid":"230/4141","text":"Fabrizio Banci Buonamici"},{"@pid":"183/6646","text":"Gina Belmonte"},{"@pid":"50/1930","text":"Vincenzo Ciancia"},{"@pid":"90/2520","text":"Diego Latella"},{"@pid":"79/1724","text":"Mieke Massink"}]},"title":"Spatial logics and model checking for medical imaging.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"195-217","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/BuonamiciBCLM20","doi":"10.1007/S10009-019-00511-9","ee":"https://doi.org/10.1007/s10009-019-00511-9","url":"https://dblp.org/rec/journals/sttt/BuonamiciBCLM20"}, "url":"URL#1656508" }, { "@score":"1", "@id":"1656509", "info":{"authors":{"author":[{"@pid":"166/0117","text":"Márton Búr"},{"@pid":"221/1803","text":"Gábor S. Szilágyi"},{"@pid":"145/5877","text":"András Vörös 0001"},{"@pid":"53/1883","text":"Dániel Varró"}]},"title":"Distributed graph queries over models@run.time for runtime monitoring of cyber-physical systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"1","pages":"79-102","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/BurSVV20","doi":"10.1007/S10009-019-00531-5","ee":"https://doi.org/10.1007/s10009-019-00531-5","url":"https://dblp.org/rec/journals/sttt/BurSVV20"}, "url":"URL#1656509" }, { "@score":"1", "@id":"1656510", "info":{"authors":{"author":[{"@pid":"38/1502","text":"Tomás Bures"},{"@pid":"130/4959","text":"Ilias Gerostathopoulos"},{"@pid":"33/6397","text":"Petr Hnetynka"},{"@pid":"02/5377","text":"Frantisek Plásil"},{"@pid":"166/4595","text":"Filip Krijt"},{"@pid":"81/1658","text":"Jirí Vinárek"},{"@pid":"05/4356","text":"Jan Kofron"}]},"title":"A language and framework for dynamic component ensembles in smart systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"497-509","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/BuresGHPKVK20","doi":"10.1007/S10009-020-00558-Z","ee":"https://doi.org/10.1007/s10009-020-00558-z","url":"https://dblp.org/rec/journals/sttt/BuresGHPKVK20"}, "url":"URL#1656510" }, { "@score":"1", "@id":"1656511", "info":{"authors":{"author":[{"@pid":"b/MichaelJButler","text":"Michael J. Butler"},{"@pid":"38/3500","text":"Thai Son Hoang"},{"@pid":"68/4311","text":"Alexander Raschke"},{"@pid":"181/7309","text":"Klaus Reichl"}]},"title":"Introduction to special section on the ABZ 2018 case study: Hybrid ERTMS/ETCS Level 3.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"249-255","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/ButlerHRR20","doi":"10.1007/S10009-020-00562-3","ee":"https://doi.org/10.1007/s10009-020-00562-3","url":"https://dblp.org/rec/journals/sttt/ButlerHRR20"}, "url":"URL#1656511" }, { "@score":"1", "@id":"1656512", "info":{"authors":{"author":[{"@pid":"213/3728","text":"Milan Ceska 0002"},{"@pid":"175/3898","text":"Vojtech Havlena"},{"@pid":"64/6177","text":"Lukás Holík"},{"@pid":"47/7646","text":"Ondrej Lengál"},{"@pid":"51/533","text":"Tomás Vojnar"}]},"title":"Approximate reduction of finite automata for high-speed network intrusion detection.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"523-539","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/CeskaHHLV20","doi":"10.1007/S10009-019-00520-8","ee":"https://doi.org/10.1007/s10009-019-00520-8","url":"https://dblp.org/rec/journals/sttt/CeskaHHLV20"}, "url":"URL#1656512" }, { "@score":"1", "@id":"1656513", "info":{"authors":{"author":[{"@pid":"178/3862","text":"Marek Chalupa"},{"@pid":"37/1716","text":"Jan Strejcek"},{"@pid":"178/3812","text":"Martina Vitovská"}]},"title":"Joint forces for memory safety checking revisited.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"115-133","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/ChalupaSV20","doi":"10.1007/S10009-019-00526-2","ee":"https://doi.org/10.1007/s10009-019-00526-2","url":"https://dblp.org/rec/journals/sttt/ChalupaSV20"}, "url":"URL#1656513" }, { "@score":"1", "@id":"1656514", "info":{"authors":{"author":[{"@pid":"144/7661","text":"Luís Diogo Couto"},{"@pid":"145/2703","text":"Peter W. V. Tran-Jørgensen"},{"@pid":"236/3023","text":"René S. Nilsson"},{"@pid":"40/6670","text":"Peter Gorm Larsen"}]},"title":"Enabling continuous integration in a formal methods setting.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"667-683","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/CoutoTNL20","doi":"10.1007/S10009-019-00546-Y","ee":"https://doi.org/10.1007/s10009-019-00546-y","url":"https://dblp.org/rec/journals/sttt/CoutoTNL20"}, "url":"URL#1656514" }, { "@score":"1", "@id":"1656515", "info":{"authors":{"author":[{"@pid":"65/603","text":"Alcino Cunha"},{"@pid":"118/5967","text":"Nuno Macedo"}]},"title":"Validating the Hybrid ERTMS/ETCS Level 3 concept with Electrum.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"281-296","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/CunhaM20","doi":"10.1007/S10009-019-00540-4","ee":"https://doi.org/10.1007/s10009-019-00540-4","url":"https://dblp.org/rec/journals/sttt/CunhaM20"}, "url":"URL#1656515" }, { "@score":"1", "@id":"1656516", "info":{"authors":{"author":[{"@pid":"148/1295","text":"Richard DeFrancisco"},{"@pid":"214/9818","text":"Shenghsun Cho"},{"@pid":"46/4377","text":"Michael Ferdman"},{"@pid":"s/ScottASmolka","text":"Scott A. Smolka"}]},"title":"Swarm model checking on the GPU.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"583-599","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/DeFranciscoCFS20","doi":"10.1007/S10009-020-00576-X","ee":"https://doi.org/10.1007/s10009-020-00576-x","url":"https://dblp.org/rec/journals/sttt/DeFranciscoCFS20"}, "url":"URL#1656516" }, { "@score":"1", "@id":"1656517", "info":{"authors":{"author":[{"@pid":"143/4037","text":"Dana Dghaym"},{"@pid":"168/4853","text":"Mohammadsadegh Dalvandi"},{"@pid":"p/MichaelPoppleton","text":"Michael Poppleton"},{"@pid":"78/613","text":"Colin F. Snook"}]},"title":"Formalising the Hybrid ERTMS Level 3 specification in iUML-B and Event-B.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"297-313","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/DghaymDPS20","doi":"10.1007/S10009-019-00548-W","ee":"https://doi.org/10.1007/s10009-019-00548-w","url":"https://dblp.org/rec/journals/sttt/DghaymDPS20"}, "url":"URL#1656517" }, { "@score":"1", "@id":"1656518", "info":{"authors":{"author":{"@pid":"47/2013","text":"Aleksandar S. Dimovski"}},"title":"$\\hbox {CTL}{\\star }$ family-based model checking using variability abstractions and modal transition systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"1","pages":"35-55","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/Dimovski20","doi":"10.1007/S10009-019-00528-0","ee":"https://doi.org/10.1007/s10009-019-00528-0","url":"https://dblp.org/rec/journals/sttt/Dimovski20"}, "url":"URL#1656518" }, { "@score":"1", "@id":"1656519", "info":{"authors":{"author":[{"@pid":"40/8656","text":"Iulia Dragomir"},{"@pid":"p/ViorelPreoteasa","text":"Viorel Preoteasa"},{"@pid":"85/6852","text":"Stavros Tripakis"}]},"title":"The Refinement Calculus of Reactive Systems Toolset.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"689-708","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/DragomirPT20","doi":"10.1007/S10009-020-00561-4","ee":"https://doi.org/10.1007/s10009-020-00561-4","url":"https://dblp.org/rec/journals/sttt/DragomirPT20"}, "url":"URL#1656519" }, { "@score":"1", "@id":"1656520", "info":{"authors":{"author":[{"@pid":"169/1188","text":"Søren Enevoldsen"},{"@pid":"l/KimGuldstrandLarsen","text":"Kim G. Larsen"},{"@pid":"172/2833","text":"Anders Mariegaard"},{"@pid":"s/JiriSrba","text":"Jirí Srba"}]},"title":"Dependency graphs with applications to verification.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"635-654","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/EnevoldsenLMS20","doi":"10.1007/S10009-020-00578-9","ee":"https://doi.org/10.1007/s10009-020-00578-9","url":"https://dblp.org/rec/journals/sttt/EnevoldsenLMS20"}, "url":"URL#1656520" }, { "@score":"1", "@id":"1656521", "info":{"authors":{"author":[{"@pid":"73/4443","text":"Bernd Finkbeiner"},{"@pid":"91/9661","text":"Christopher Hahn"},{"@pid":"189/1078","text":"Marvin Stenger"},{"@pid":"143/2715","text":"Leander Tentrup"}]},"title":"Efficient monitoring of hyperproperties using prefix trees.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"729-740","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/FinkbeinerHST20","doi":"10.1007/S10009-020-00552-5","ee":"https://doi.org/10.1007/s10009-020-00552-5","url":"https://dblp.org/rec/journals/sttt/FinkbeinerHST20"}, "url":"URL#1656521" }, { "@score":"1", "@id":"1656522", "info":{"authors":{"author":[{"@pid":"207/4032","text":"Steve Jeffrey Tueno Fotso"},{"@pid":"90/5433","text":"Marc Frappier"},{"@pid":"l/RegineLaleau","text":"Régine Laleau"},{"@pid":"m/AmelMammar","text":"Amel Mammar"}]},"title":"Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"349-363","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/FotsoFLM20","doi":"10.1007/S10009-019-00542-2","ee":"https://doi.org/10.1007/s10009-019-00542-2","url":"https://dblp.org/rec/journals/sttt/FotsoFLM20"}, "url":"URL#1656522" }, { "@score":"1", "@id":"1656523", "info":{"authors":{"author":[{"@pid":"166/5806","text":"Thomas Gabor"},{"@pid":"131/0927","text":"Andreas Sedlmeier"},{"@pid":"218/6646","text":"Thomy Phan"},{"@pid":"220/3783","text":"Fabian Ritz"},{"@pid":"186/1209","text":"Marie Kiermeier"},{"@pid":"136/1485","text":"Lenz Belzner"},{"@pid":"67/4429","text":"Bernhard Kempter"},{"@pid":"k/CornelKlein","text":"Cornel Klein"},{"@pid":"175/4083","text":"Horst Sauer"},{"@pid":"18/3405","text":"Reiner N. Schmid"},{"@pid":"84/5097","text":"Jan Wieghardt"},{"@pid":"35/7128","text":"Marc Zeller"},{"@pid":"l/ClaudiaLinnhoffPopien","text":"Claudia Linnhoff-Popien"}]},"title":"The scenario coevolution paradigm: adaptive quality assurance for adaptive systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"457-476","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/GaborSPRKBKKSSW20","doi":"10.1007/S10009-020-00560-5","ee":"https://doi.org/10.1007/s10009-020-00560-5","url":"https://dblp.org/rec/journals/sttt/GaborSPRKBKKSSW20"}, "url":"URL#1656523" }, { "@score":"1", "@id":"1656524", "info":{"authors":{"author":[{"@pid":"15/4377","text":"María-del-Mar Gallardo"},{"@pid":"95/1885","text":"Pedro Merino 0001"}]},"title":"Introduction to the Special Issue devoted to SPIN 2018.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"103-104","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/GallardoM20","doi":"10.1007/S10009-020-00550-7","ee":"https://doi.org/10.1007/s10009-020-00550-7","url":"https://dblp.org/rec/journals/sttt/GallardoM20"}, "url":"URL#1656524" }, { "@score":"1", "@id":"1656525", "info":{"authors":{"author":[{"@pid":"89/2313","text":"Fotios Gioulekas"},{"@pid":"61/965","text":"Peter Poplavko"},{"@pid":"20/2927","text":"Panagiotis Katsaros"},{"@pid":"01/5624","text":"Saddek Bensalem"},{"@pid":"204/9441","text":"Pedro Palomo"}]},"title":"Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"1","pages":"3-32","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/GioulekasPKBP20","doi":"10.1007/S10009-019-00521-7","ee":"https://doi.org/10.1007/s10009-019-00521-7","url":"https://dblp.org/rec/journals/sttt/GioulekasPKBP20"}, "url":"URL#1656525" }, { "@score":"1", "@id":"1656526", "info":{"authors":{"author":[{"@pid":"89/2313","text":"Fotios Gioulekas"},{"@pid":"61/965","text":"Peter Poplavko"},{"@pid":"20/2927","text":"Panagiotis Katsaros"},{"@pid":"01/5624","text":"Saddek Bensalem"},{"@pid":"204/9441","text":"Pedro Palomo"}]},"title":"Correction to: Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"1","pages":"33-34","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/GioulekasPKBP20a","doi":"10.1007/S10009-019-00523-5","ee":"https://doi.org/10.1007/s10009-019-00523-5","url":"https://dblp.org/rec/journals/sttt/GioulekasPKBP20a"}, "url":"URL#1656526" }, { "@score":"1", "@id":"1656527", "info":{"authors":{"author":[{"@pid":"116/5372","text":"Dominik Hansen"},{"@pid":"l/MLeuschel","text":"Michael Leuschel"},{"@pid":"177/8786","text":"Philipp Körner"},{"@pid":"135/0166","text":"Sebastian Krings"},{"@pid":"219/2174","text":"Thomas Naulin"},{"@pid":"219/2209","text":"Nader Nayeri"},{"@pid":"16/49-1","text":"David Schneider 0001"},{"@pid":"219/2219","text":"Frank Skowron"}]},"title":"Validation and real-life demonstration of ETCS hybrid level 3 principles using a formal B model.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"315-332","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/HansenLKKNNSS20","doi":"10.1007/S10009-020-00551-6","ee":"https://doi.org/10.1007/s10009-020-00551-6","url":"https://dblp.org/rec/journals/sttt/HansenLKKNNSS20"}, "url":"URL#1656527" }, { "@score":"1", "@id":"1656528", "info":{"authors":{"author":[{"@pid":"121/2860-1","text":"Tim Lange 0001"},{"@pid":"08/4077","text":"Martin R. Neuhäußer"},{"@pid":"31/248-1","text":"Thomas Noll 0001"},{"@pid":"k/JoostPieterKatoen","text":"Joost-Pieter Katoen"}]},"title":"IC3 software model checking.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"135-161","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/LangeNNK20","doi":"10.1007/S10009-019-00547-X","ee":"https://doi.org/10.1007/s10009-019-00547-x","url":"https://dblp.org/rec/journals/sttt/LangeNNK20"}, "url":"URL#1656528" }, { "@score":"1", "@id":"1656529", "info":{"authors":{"author":[{"@pid":"59/871","text":"Yi Li"},{"@pid":"28/2300","text":"Wenyuan Wu"},{"@pid":"64/4429","text":"Yong Feng"}]},"title":"On ranking functions for single-path linear-constraint loops.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"655-666","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/LiWF20","doi":"10.1007/S10009-019-00549-9","ee":"https://doi.org/10.1007/s10009-019-00549-9","url":"https://dblp.org/rec/journals/sttt/LiWF20"}, "url":"URL#1656529" }, { "@score":"1", "@id":"1656530", "info":{"authors":{"author":[{"@pid":"210/4354","text":"Houssem Ben Mahfoudh"},{"@pid":"s/GDMSerugendo","text":"Giovanna Di Marzo Serugendo"},{"@pid":"269/7411","text":"Nabil Naja"},{"@pid":"56/3348","text":"Nabil Abdennadher"}]},"title":"Learning-based coordination model for spontaneous self-composition of reliable services in a distributed system.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"417-436","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/MahfoudhSNA20","doi":"10.1007/S10009-020-00557-0","ee":"https://doi.org/10.1007/s10009-020-00557-0","url":"https://dblp.org/rec/journals/sttt/MahfoudhSNA20"}, "url":"URL#1656530" }, { "@score":"1", "@id":"1656531", "info":{"authors":{"author":[{"@pid":"m/AmelMammar","text":"Amel Mammar"},{"@pid":"90/5433","text":"Marc Frappier"},{"@pid":"207/4032","text":"Steve Jeffrey Tueno Fotso"},{"@pid":"l/RegineLaleau","text":"Régine Laleau"}]},"title":"A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"3","pages":"333-347","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/MammarFFL20","doi":"10.1007/S10009-019-00543-1","ee":"https://doi.org/10.1007/s10009-019-00543-1","url":"https://dblp.org/rec/journals/sttt/MammarFFL20"}, "url":"URL#1656531" }, { "@score":"1", "@id":"1656532", "info":{"authors":{"author":[{"@pid":"180/8234","text":"Patrick Metzler"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"},{"@pid":"15/3636","text":"Georg Weissenbacher"}]},"title":"Extracting safe thread schedules from incomplete model checking results.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"565-581","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/MetzlerSW20","doi":"10.1007/S10009-020-00575-Y","ee":"https://doi.org/10.1007/s10009-020-00575-y","url":"https://dblp.org/rec/journals/sttt/MetzlerSW20"}, "url":"URL#1656532" }, { "@score":"1", "@id":"1656533", "info":{"authors":{"author":[{"@pid":"163/4522","text":"Hana Mkaouar"},{"@pid":"91/3351","text":"Bechir Zalila"},{"@pid":"88/1216","text":"Jérôme Hugues"},{"@pid":"58/6741","text":"Mohamed Jmaiel"}]},"title":"A formal approach to AADL model-based software engineering.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"219-247","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/MkaouarZHJ20","doi":"10.1007/S10009-019-00513-7","ee":"https://doi.org/10.1007/s10009-019-00513-7","url":"https://dblp.org/rec/journals/sttt/MkaouarZHJ20"}, "url":"URL#1656533" }, { "@score":"1", "@id":"1656534", "info":{"authors":{"author":[{"@pid":"60/1425","text":"Dejan Nickovic"},{"@pid":"95/4356","text":"Olivier Lebeltel"},{"@pid":"m/OdedMaler","text":"Oded Maler"},{"@pid":"132/1855","text":"Thomas Ferrère"},{"@pid":"137/4307","text":"Dogan Ulus"}]},"title":"AMT 2.0: qualitative and quantitative trace analysis with extended signal temporal logic.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"741-758","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/NickovicLMFU20","doi":"10.1007/S10009-020-00582-Z","ee":"https://doi.org/10.1007/s10009-020-00582-z","url":"https://dblp.org/rec/journals/sttt/NickovicLMFU20"}, "url":"URL#1656534" }, { "@score":"1", "@id":"1656535", "info":{"authors":{"author":[{"@pid":"n/RDNicola","text":"Rocco De Nicola"},{"@pid":"j/StefanJahnichen","text":"Stefan Jähnichen"},{"@pid":"w/MartinWirsing","text":"Martin Wirsing"}]},"title":"Rigorous engineering of collective adaptive systems: special section.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"389-397","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/NicolaJW20","doi":"10.1007/S10009-020-00565-0","ee":"https://doi.org/10.1007/s10009-020-00565-0","url":"https://dblp.org/rec/journals/sttt/NicolaJW20"}, "url":"URL#1656535" }, { "@score":"1", "@id":"1656536", "info":{"authors":{"author":[{"@pid":"n/RDNicola","text":"Rocco De Nicola"},{"@pid":"167/1520","text":"Alessandro Maggi"},{"@pid":"s/JosephSifakis","text":"Joseph Sifakis"}]},"title":"The DReAM framework for dynamic reconfigurable architecture modelling: theory and applications.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"437-455","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/NicolaMS20","doi":"10.1007/S10009-020-00555-2","ee":"https://doi.org/10.1007/s10009-020-00555-2","url":"https://dblp.org/rec/journals/sttt/NicolaMS20"}, "url":"URL#1656536" }, { "@score":"1", "@id":"1656537", "info":{"authors":{"author":[{"@pid":"13/4540","text":"Laura Panizo"},{"@pid":"09/6796","text":"Almudena Díaz"},{"@pid":"221/1937","text":"Bruno García"}]},"title":"Model-based testing of apps in real network scenarios.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"2","pages":"105-114","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/PanizoDG20","doi":"10.1007/S10009-019-00518-2","ee":"https://doi.org/10.1007/s10009-019-00518-2","url":"https://dblp.org/rec/journals/sttt/PanizoDG20"}, "url":"URL#1656537" }, { "@score":"1", "@id":"1656538", "info":{"authors":{"author":[{"@pid":"155/2795","text":"Ali Parsai"},{"@pid":"d/SDemeyer","text":"Serge Demeyer"}]},"title":"Comparing mutation coverage against branch coverage in an industrial setting.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"4","pages":"365-388","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/ParsaiD20","doi":"10.1007/S10009-020-00567-Y","ee":"https://doi.org/10.1007/s10009-020-00567-y","url":"https://dblp.org/rec/journals/sttt/ParsaiD20"}, "url":"URL#1656538" }, { "@score":"1", "@id":"1656539", "info":{"authors":{"author":[{"@pid":"79/683","text":"Alessandra Russo"},{"@pid":"s/AndySchurr","text":"Andy Schürr"}]},"title":"Model-based software quality assurance tools and techniques presented at FASE 2018.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"1","pages":"1-2","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/RussoS20","doi":"10.1007/S10009-019-00541-3","ee":"https://doi.org/10.1007/s10009-019-00541-3","url":"https://dblp.org/rec/journals/sttt/RussoS20"}, "url":"URL#1656539" }, { "@score":"1", "@id":"1656540", "info":{"authors":{"author":[{"@pid":"134/9441","text":"Oszkár Semeráth"},{"@pid":"235/9723","text":"Rebeka Farkas"},{"@pid":"76/4726","text":"Gábor Bergmann"},{"@pid":"53/1883","text":"Dániel Varró"}]},"title":"Diversity of graph models and graph generators in mutation testing.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"1","pages":"57-78","year":"2020","type":"Journal Articles","access":"open","key":"journals/sttt/SemerathFBV20","doi":"10.1007/S10009-019-00530-6","ee":"https://doi.org/10.1007/s10009-019-00530-6","url":"https://dblp.org/rec/journals/sttt/SemerathFBV20"}, "url":"URL#1656540" }, { "@score":"1", "@id":"1656541", "info":{"authors":{"author":[{"@pid":"76/5160","text":"Alexander J. Summers"},{"@pid":"m/PMuller1","text":"Peter Müller 0001"}]},"title":"Automating deductive verification for weak-memory programs (extended version).","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"6","pages":"709-728","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/SummersM20","doi":"10.1007/S10009-020-00559-Y","ee":"https://doi.org/10.1007/s10009-020-00559-y","url":"https://dblp.org/rec/journals/sttt/SummersM20"}, "url":"URL#1656541" }, { "@score":"1", "@id":"1656542", "info":{"authors":{"author":[{"@pid":"20/241-24","text":"Muhammad Usman 0024"},{"@pid":"179/7420","text":"Wenxi Wang"},{"@pid":"193/4231","text":"Kaiyuan Wang"},{"@pid":"204/3692","text":"Cagdas Yelen"},{"@pid":"191/3114","text":"Nima Dini"},{"@pid":"k/SarfrazKhurshid","text":"Sarfraz Khurshid"}]},"title":"A study of learning likely data structure properties using machine learning models.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"601-615","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/UsmanWWYDK20","doi":"10.1007/S10009-020-00577-W","ee":"https://doi.org/10.1007/s10009-020-00577-w","url":"https://dblp.org/rec/journals/sttt/UsmanWWYDK20"}, "url":"URL#1656542" }, { "@score":"1", "@id":"1656543", "info":{"authors":{"author":[{"@pid":"241/5200","text":"Farnaz Yousefi"},{"@pid":"99/7840","text":"Ehsan Khamespanah"},{"@pid":"72/9834","text":"Mohammed Gharib"},{"@pid":"33/781","text":"Marjan Sirjani"},{"@pid":"m/AliMovagharRahimabadi","text":"Ali Movaghar 0001"}]},"title":"VeriVANca framework: verification of VANETs by property-based message passing of actors in Rebeca with inheritance.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"22","number":"5","pages":"617-633","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sttt/YousefiKGSM20","doi":"10.1007/S10009-020-00579-8","ee":"https://doi.org/10.1007/s10009-020-00579-8","url":"https://dblp.org/rec/journals/sttt/YousefiKGSM20"}, "url":"URL#1656543" } ] } } } )