Search dblp for Publications

export results for "toc:db/journals/tosem/tosem9.bht:"

 download as .bib file

@article{DBLP:journals/tosem/BultanGL00,
  author       = {Tevfik Bultan and
                  Richard Gerber and
                  Christopher League},
  title        = {Composite model-checking: verification with type-specific symbolic
                  representations},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {1},
  pages        = {3--50},
  year         = {2000},
  url          = {https://doi.org/10.1145/332740.332746},
  doi          = {10.1145/332740.332746},
  timestamp    = {Tue, 26 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/BultanGL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/CiancariniFM00,
  author       = {Paolo Ciancarini and
                  Francesco Franz{\`{e}} and
                  Cecilia Mascolo},
  title        = {Using a coordination language to specify and analyze systems containing
                  mobile components},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {2},
  pages        = {167--198},
  year         = {2000},
  url          = {https://doi.org/10.1145/350887.350893},
  doi          = {10.1145/350887.350893},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/CiancariniFM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/ClarkeJM00,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Wilfredo R. Marrero},
  title        = {Verifying security protocols with Brutus},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {443--487},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363528},
  doi          = {10.1145/363516.363528},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/ClarkeJM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/Corbett00,
  author       = {James C. Corbett},
  title        = {Using shape analysis to reduce finite-state models of concurrent Java
                  programs},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {1},
  pages        = {51--93},
  year         = {2000},
  url          = {https://doi.org/10.1145/332740.332741},
  doi          = {10.1145/332740.332741},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/Corbett00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/DuranteFG00,
  author       = {Antonio Durante and
                  Riccardo Focardi and
                  Roberto Gorrieri},
  title        = {A compiler for analyzing cryptographic protocols using noninterference},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {488--528},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363532},
  doi          = {10.1145/363516.363532},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/DuranteFG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/FongC00,
  author       = {Philip W. L. Fong and
                  Robert D. Cameron},
  title        = {Proof linking: modular verification of mobile programs in the presence
                  of lazy, dynamic linking},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {379--409},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363523},
  doi          = {10.1145/363516.363523},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/FongC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/Gunter00,
  author       = {Carl A. Gunter},
  title        = {Abstracting dependencies between software configuration items},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {1},
  pages        = {94--131},
  year         = {2000},
  url          = {https://doi.org/10.1145/332740.332743},
  doi          = {10.1145/332740.332743},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/Gunter00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/InverardiWY00,
  author       = {Paola Inverardi and
                  Alexander L. Wolf and
                  Daniel Yankelevich},
  title        = {Static checking of system behaviors using derived component assumptions},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {3},
  pages        = {239--272},
  year         = {2000},
  url          = {https://doi.org/10.1145/352591.352593},
  doi          = {10.1145/352591.352593},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/InverardiWY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/LouridasL00,
  author       = {Panagiotis Louridas and
                  Pericles Loucopoulos},
  title        = {A generic model for reflective design},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {2},
  pages        = {199--237},
  year         = {2000},
  url          = {https://doi.org/10.1145/350887.350895},
  doi          = {10.1145/350887.350895},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/LouridasL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/MillsG00,
  author       = {Kevin L. Mills and
                  Hassan Gomaa},
  title        = {A knowledge-based method for inferring semantic concepts from visual
                  models of system behavior},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {3},
  pages        = {306--337},
  year         = {2000},
  url          = {https://doi.org/10.1145/352591.352594},
  doi          = {10.1145/352591.352594},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/MillsG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/MinskyU00,
  author       = {Naftaly H. Minsky and
                  Victoria Ungureanu},
  title        = {Law-governed interaction: a coordination and control mechanism for
                  heterogeneous distributed systems},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {3},
  pages        = {273--305},
  year         = {2000},
  url          = {https://doi.org/10.1145/352591.352592},
  doi          = {10.1145/352591.352592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/MinskyU00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/MyersL00,
  author       = {Andrew C. Myers and
                  Barbara Liskov},
  title        = {Protecting privacy using the decentralized label model},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {410--442},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363526},
  doi          = {10.1145/363516.363526},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/MyersL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/SistlaGE00,
  author       = {A. Prasad Sistla and
                  Viktor Gyuris and
                  E. Allen Emerson},
  title        = {{SMC:} a symmetry-based model checker for verification of safety and
                  liveness properties},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {2},
  pages        = {133--166},
  year         = {2000},
  url          = {https://doi.org/10.1145/350887.350891},
  doi          = {10.1145/350887.350891},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/SistlaGE00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/WallachAF00,
  author       = {Dan S. Wallach and
                  Andrew W. Appel and
                  Edward W. Felten},
  title        = {{SAFKASI:} a security mechanism for language-based systems},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {341--378},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363520},
  doi          = {10.1145/363516.363520},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/WallachAF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics