Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tosem/tosem9.bht:"
@article{DBLP:journals/tosem/BultanGL00, author = {Tevfik Bultan and Richard Gerber and Christopher League}, title = {Composite model-checking: verification with type-specific symbolic representations}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {1}, pages = {3--50}, year = {2000}, url = {https://doi.org/10.1145/332740.332746}, doi = {10.1145/332740.332746}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/BultanGL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/CiancariniFM00, author = {Paolo Ciancarini and Francesco Franz{\`{e}} and Cecilia Mascolo}, title = {Using a coordination language to specify and analyze systems containing mobile components}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {2}, pages = {167--198}, year = {2000}, url = {https://doi.org/10.1145/350887.350893}, doi = {10.1145/350887.350893}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/CiancariniFM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ClarkeJM00, author = {Edmund M. Clarke and Somesh Jha and Wilfredo R. Marrero}, title = {Verifying security protocols with Brutus}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {443--487}, year = {2000}, url = {https://doi.org/10.1145/363516.363528}, doi = {10.1145/363516.363528}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/ClarkeJM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/Corbett00, author = {James C. Corbett}, title = {Using shape analysis to reduce finite-state models of concurrent Java programs}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {1}, pages = {51--93}, year = {2000}, url = {https://doi.org/10.1145/332740.332741}, doi = {10.1145/332740.332741}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/Corbett00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/DuranteFG00, author = {Antonio Durante and Riccardo Focardi and Roberto Gorrieri}, title = {A compiler for analyzing cryptographic protocols using noninterference}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {488--528}, year = {2000}, url = {https://doi.org/10.1145/363516.363532}, doi = {10.1145/363516.363532}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/DuranteFG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/FongC00, author = {Philip W. L. Fong and Robert D. Cameron}, title = {Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {379--409}, year = {2000}, url = {https://doi.org/10.1145/363516.363523}, doi = {10.1145/363516.363523}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/FongC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/Gunter00, author = {Carl A. Gunter}, title = {Abstracting dependencies between software configuration items}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {1}, pages = {94--131}, year = {2000}, url = {https://doi.org/10.1145/332740.332743}, doi = {10.1145/332740.332743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/Gunter00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/InverardiWY00, author = {Paola Inverardi and Alexander L. Wolf and Daniel Yankelevich}, title = {Static checking of system behaviors using derived component assumptions}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {3}, pages = {239--272}, year = {2000}, url = {https://doi.org/10.1145/352591.352593}, doi = {10.1145/352591.352593}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/InverardiWY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/LouridasL00, author = {Panagiotis Louridas and Pericles Loucopoulos}, title = {A generic model for reflective design}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {2}, pages = {199--237}, year = {2000}, url = {https://doi.org/10.1145/350887.350895}, doi = {10.1145/350887.350895}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/LouridasL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/MillsG00, author = {Kevin L. Mills and Hassan Gomaa}, title = {A knowledge-based method for inferring semantic concepts from visual models of system behavior}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {3}, pages = {306--337}, year = {2000}, url = {https://doi.org/10.1145/352591.352594}, doi = {10.1145/352591.352594}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/MillsG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/MinskyU00, author = {Naftaly H. Minsky and Victoria Ungureanu}, title = {Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {3}, pages = {273--305}, year = {2000}, url = {https://doi.org/10.1145/352591.352592}, doi = {10.1145/352591.352592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/MinskyU00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/MyersL00, author = {Andrew C. Myers and Barbara Liskov}, title = {Protecting privacy using the decentralized label model}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {410--442}, year = {2000}, url = {https://doi.org/10.1145/363516.363526}, doi = {10.1145/363516.363526}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/MyersL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/SistlaGE00, author = {A. Prasad Sistla and Viktor Gyuris and E. Allen Emerson}, title = {{SMC:} a symmetry-based model checker for verification of safety and liveness properties}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {2}, pages = {133--166}, year = {2000}, url = {https://doi.org/10.1145/350887.350891}, doi = {10.1145/350887.350891}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/SistlaGE00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/WallachAF00, author = {Dan S. Wallach and Andrew W. Appel and Edward W. Felten}, title = {{SAFKASI:} a security mechanism for language-based systems}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {341--378}, year = {2000}, url = {https://doi.org/10.1145/363516.363520}, doi = {10.1145/363516.363520}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/WallachAF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.