Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2014
- Jonathan Aldrich, Ricardo Massa Ferreira Lima:
Brazilian Symposium on Programming Languages (SBLP 2010). Sci. Comput. Program. 80: 51 (2014) - María Alpuente, Demis Ballis, Francisco Frechina, Daniel Romero:
Using conditional trace slicing for improving Maude programs. Sci. Comput. Program. 80: 385-415 (2014) - Muffy Calder, Alexandros Koliousis, Michele Sevegnani, Joseph S. Sventek:
Real-time verification of wireless home networks using bigraphs with sharing. Sci. Comput. Program. 80: 288-310 (2014) - Néstor Cataño, Ijaz Ahmed, Radu I. Siminiceanu, Jonathan Aldrich:
A case study on the lightweight verification of a multi-threaded task server. Sci. Comput. Program. 80: 169-187 (2014) - Andreas Classen, Maxime Cordy, Patrick Heymans, Axel Legay, Pierre-Yves Schobbens:
Formal semantics, modular specification, and symbolic verification of product-line behaviour. Sci. Comput. Program. 80: 416-439 (2014) - Khaled El-Fakih, Nina Yevtushenko, Adenilso Simão:
A practical approach for testing timed deterministic finite state machines with single clock. Sci. Comput. Program. 80: 343-355 (2014) - Prodromos Gerakios, Nikolaos Papaspyrou, Konstantinos Sagonas:
Static safety guarantees for a low-level multithreaded language with regions. Sci. Comput. Program. 80: 223-263 (2014) - Michaela Huhn, Stefan Milius:
Observations on formal safety analysis in practice. Sci. Comput. Program. 80: 150-168 (2014) - Maryam Kamali, Linas Laibinis, Luigia Petre, Kaisa Sere:
Formal development of wireless sensor-actor networks. Sci. Comput. Program. 80: 25-49 (2014) - Alain Ketterlin, Philippe Clauss:
Recovering memory access patterns of executable programs. Sci. Comput. Program. 80: 440-456 (2014) - Savas Konur:
Specifying safety-critical systems with a decidable duration logic. Sci. Comput. Program. 80: 264-287 (2014) - Etienne Lantreibecq, Wendelin Serwe:
Formal analysis of a hardware dynamic task dispatcher with CADP. Sci. Comput. Program. 80: 130-149 (2014) - Raffaela Mirandola, Pasqualina Potena, Patrizia Scandurra:
Adaptation space exploration for service-oriented applications. Sci. Comput. Program. 80: 356-384 (2014) - Young-Joo Moon, Alexandra Silva, Christian Krause, Farhad Arbab:
A compositional model to reason about end-to-end QoS in Stochastic Reo connectors. Sci. Comput. Program. 80: 3-24 (2014) - Mohammad Reza Mousavi, Gwen Salaün:
Preface: Special section on foundations of coordination languages and software architectures (selected papers from FOCLASA'10). Sci. Comput. Program. 80: 1-2 (2014) - Jonathan Nicholson, Amnon H. Eden, Epameinondas Gasparis, Rick Kazman:
Automated verification of design patterns: A case study. Sci. Comput. Program. 80: 211-222 (2014) - Eduardo Gurgel Pinho, Francisco Heron de Carvalho Junior:
An object-oriented parallel programming language for distributed-memory parallel computing platforms. Sci. Comput. Program. 80: 65-90 (2014) - Thomas Reinbacher, Jörg Brauer, Martin Horauer, Andreas Steininger, Stefan Kowalewski:
Runtime verification of microcontroller binary code. Sci. Comput. Program. 80: 109-129 (2014) - Andrei Rimsa, Marcelo d'Amorim, Fernando Magno Quintão Pereira, Roberto da Silva Bigonha:
Efficient static checker for tainted variable attacks. Sci. Comput. Program. 80: 91-105 (2014) - Gwen Salaün, Bernhard Schätz:
Preface: Special section on formal methods for industrial critical systems (Selected papers from FMICS'11). Sci. Comput. Program. 80: 107-108 (2014) - Christophe Scholliers, Éric Tanter, Wolfgang De Meuter:
Parallel actor monitors: Disentangling task-level parallelism from data partitioning in the actor model. Sci. Comput. Program. 80: 52-64 (2014) - Marten Sijtema, Axel Belinfante, Mariëlle Stoelinga, Lawrence Marinelli:
Experiences with formal engineering: Model-based specification, implementation and testing of a software bus at Neopost. Sci. Comput. Program. 80: 188-209 (2014) - Éric Tanter, Ismael Figueroa, Nicolas Tabareau:
Execution levels for aspect-oriented programming: Design, semantics, implementations and applications. Sci. Comput. Program. 80: 311-342 (2014) - Stephen W. Thomas, Bram Adams, Ahmed E. Hassan, Dorothea Blostein:
Studying software evolution using topic models. Sci. Comput. Program. 80: 457-479 (2014)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-19 12:14 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint