Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part IV
暂无分享,去创建一个
[1] Cliff B. Jones,et al. Specifications are not (necessarily) executable , 1989 .
[2] Moni Naor,et al. Timed Commitments , 2000, CRYPTO.
[3] David R. Cok,et al. SPEEDY: An Eclipse-based IDE for invariant inference , 2014, F-IDE.
[4] Massimo Bartoletti,et al. Financial Cryptography and Data Security , 2017, Lecture Notes in Computer Science.
[5] Reinhard Wilhelm,et al. Timing Validation of Automotive Software , 2008, ISoLA.
[6] Gang Wang,et al. Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications , 2017, AsiaCCS.
[7] Bernhard Beckert,et al. A Dynamic Logic for Deductive Verication of Concurrent Java Programs With Condition Variables , 2007 .
[8] Christof Schulte,et al. Logistik: Wege zur Optimierung der Supply Chain , 2016 .
[9] C. Cordell Green,et al. What Is Program Synthesis? , 1985, J. Autom. Reason..
[10] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[11] Tom Butler,et al. A Solution for the Problems of Translation and Transparency in Smart Contracts , 2017 .
[12] Vahid Garousi,et al. Worlds Apart: Industrial and Academic Focus Areas in Software Testing , 2017, IEEE Software.
[13] Simon L. Peyton Jones,et al. The Implementation of Functional Programming Languages , 1987 .
[14] Gordon J. Pace,et al. Comprehensive Monitor-Oriented Compensation Programming , 2014, FESCA.
[15] Nikolai Kosmatov,et al. Time to Clean Your Test Objectives , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[16] Massimo Bartoletti. Smart Contracts Contracts , 2020, Frontiers in Blockchain.
[17] Werner Esswein,et al. BPMN4CP: Design and implementation of a BPMN extension for clinical pathways , 2014, 2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).
[18] Kathleen M. Eisenhardt,et al. Theory Building From Cases: Opportunities And Challenges , 2007 .
[19] Karl Huppler,et al. The Art of Building a Good Benchmark , 2009, TPCTC.
[20] Brian Randell,et al. Reliability Issues in Computing System Design , 1978, CSUR.
[21] Bor-Yuh Evan Chang,et al. Boogie: A Modular Reusable Verifier for Object-Oriented Programs , 2005, FMCO.
[22] Daniel Kroening,et al. Model checking concurrent linux device drivers , 2007, ASE.
[23] Armin Biere,et al. Symbolic Model Checking without BDDs , 1999, TACAS.
[24] Iddo Bentov,et al. How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.
[25] Kim G. Larsen,et al. A Tutorial on Uppaal , 2004, SFM.
[26] Clément Hurlin. Specifying and checking protocols of multithreaded classes , 2009, SAC '09.
[27] Jörg Brauer,et al. Model-Based Testing for Avionics Systems , 2018, FM.
[28] Yoichi Hirai,et al. Defining the Ethereum Virtual Machine for Interactive Theorem Provers , 2017, Financial Cryptography Workshops.
[29] Yang Liu,et al. A formal model for the SPARCv8 ISA and a proof of non-interference for the LEON3 processor , 2016, Arch. Formal Proofs.
[30] Leonardo Mariani,et al. Runtime Failure Prevention and Reaction , 2018, Lectures on Runtime Verification.
[31] Gordon J. Pace,et al. Considering Academia-Industry Projects Meta-characteristics in Runtime Verification Design , 2018, ISoLA.
[32] Klaus Havelund,et al. Rule-based runtime verification revisited , 2015, International Journal on Software Tools for Technology Transfer.
[33] Luca Benini,et al. Combining Simulation and Formal Methods for System-Level Performance Analysis , 2006, Proceedings of the Design Automation & Test in Europe Conference.
[34] Bertrand Meyer,et al. Applying 'design by contract' , 1992, Computer.
[35] Christian Lidström. Verification of Functional Requirements of Embedded Automotive C Code , 2016 .
[36] Serdar Tasiran,et al. Practical Methods for Reasoning About Java 8's Functional Programming Features , 2018, VSTTE.
[37] Oliver Zendel,et al. Analyzing Computer Vision Data — The Good, the Bad and the Ugly , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Carola Wolf,et al. Strategic Planning Research: Toward a Theory-Driven Agenda , 2017 .
[39] Roger Villemaire,et al. Runtime Enforcement of Web Service Message Contracts with Data , 2012, IEEE Transactions on Services Computing.
[40] Morten Bisgaard,et al. Battery-aware scheduling in low orbit: the GomX–3 case , 2018, Formal Aspects of Computing.
[41] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[42] Alberto Griggio,et al. The MathSAT5 SMT Solver , 2013, TACAS.
[43] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[44] E. M. Novikov. Evolution of the Linux kernel , 2017 .
[45] François Bobot,et al. Why3: Shepherd Your Herd of Provers , 2011 .
[46] Akash Lal,et al. Powering the static driver verifier using corral , 2014, SIGSOFT FSE.
[47] Hardi Hungar,et al. Model Generation by Moderated Regular Extrapolation , 2002, FASE.
[48] Gábor Bergmann,et al. Towards Reliable Benchmarks of Timed Automata , 2018 .
[49] Rod M. Burstall,et al. Program Proving as Hand Simulation with a Little Induction , 1974, IFIP Congress.
[50] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[51] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[52] L. Goodman. Tezos : A Self-Amending Crypto-Ledger Position Paper , 2014 .
[53] Karama Kanoun,et al. Dependability benchmarking for computer systems , 2008 .
[54] Anand Kumar,et al. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach , 2015, WISE.
[55] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[56] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[57] Gunter Saake,et al. Feature-Oriented Software Product Lines , 2013, Springer Berlin Heidelberg.
[58] Christian Colombo,et al. Organising LTL monitors over distributed systems with a global clock , 2016, Formal Methods Syst. Des..
[59] Emin Gün Sirer,et al. Short Paper: Service-Oriented Sharding for Blockchains , 2017, Financial Cryptography.
[60] Eric Koskinen,et al. Automatic Generation of Precise and Useful Commutativity Conditions (Extended Version) , 2018, TACAS.
[61] Peter Dadam,et al. Adaptive process management with ADEPT2 , 2005, 21st International Conference on Data Engineering (ICDE'05).
[62] Oleg Sokolsky,et al. SMEDL: Combining Synchronous and Asynchronous Monitoring , 2016, RV.
[63] Burak Turhan,et al. Sharing Data and Models in Software Engineering , 2014 .
[64] Gordon J. Pace,et al. Safer asynchronous runtime monitoring using compensations , 2012, Formal Methods Syst. Des..
[65] Grigore Rosu,et al. JavaMOP: Efficient parametric runtime monitoring framework , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[66] Sebastian Fischmeister,et al. Runtime verification with minimal intrusion through parallelism , 2015, Formal Methods Syst. Des..
[67] Karsten Rexroth,et al. SIAS – Konzeption eines planungsunterstützenden Werkzeuges für die Zielplanung , 2012 .
[68] Jan Peleska,et al. Complete model-based equivalence class testing for nondeterministic systems , 2016, Formal Aspects of Computing.
[69] Felix Klaedtke,et al. Monitoring Metric First-Order Temporal Properties , 2015, J. ACM.
[70] Michael D. Ernst,et al. An overview of JML tools and applications , 2003, International Journal on Software Tools for Technology Transfer.
[71] Grigore Rosu,et al. Semantics-based program verifiers for all languages , 2016, OOPSLA.
[72] Walter Binder,et al. Flexible and Extensible Runtime Verification for Java (Extended Version) , 2015, Int. J. Softw. Eng. Knowl. Eng..
[73] Bernhard Steffen,et al. Archimedean Points: The Essence for Mastering Change , 2016, LNCS Trans. Found. Mastering Chang..
[74] Sagar Chaki,et al. Automatic Abstraction in SMT-Based Unbounded Software Model Checking , 2013, CAV.
[75] Clark W. Barrett,et al. The SMT-LIB Standard Version 2.0 , 2010 .
[76] Yliès Falcone,et al. What can you verify and enforce at runtime? , 2012, International Journal on Software Tools for Technology Transfer.
[77] Alberto Trombetta,et al. BPMN: An introduction to the standard , 2012, Comput. Stand. Interfaces.
[78] Gary T. Leavens,et al. Behavioral interface specification languages , 2012, CSUR.
[79] Yu Guo,et al. Deep Specifications and Certified Abstraction Layers , 2015, POPL.
[80] Rainer Böhme,et al. In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum , 2017, DPM/CBT@ESORICS.
[81] Sriram Sankaranarayanan,et al. S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems , 2011, TACAS.
[82] Bernhard Beckert,et al. Lessons Learned From Microkernel Verification -- Specification is the New Bottleneck , 2012, SSV.
[83] Manfred Reichert,et al. The ADEPT project: a decade of research and development for robust and flexible process support , 2009, Computer Science - Research and Development.
[84] Marlon Dumas,et al. Business process variability modeling : A survey , 2017 .
[85] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .
[86] Rajeev Alur,et al. Syntax-guided synthesis , 2013, 2013 Formal Methods in Computer-Aided Design.
[87] Sungwon Kang,et al. A survey on software product line testing , 2012, SPLC '12.
[88] Martin Glinz,et al. Statecharts For Requirements Specification - As Simple As Possible, As Rich As Needed , 2002 .
[89] Jozef Hooman,et al. Refactoring of Legacy Software Using Model Learning and Equivalence Checking: An Industrial Experience Report , 2016, IFM.
[90] Tsun S. Chow,et al. Testing Software Design Modeled by Finite-State Machines , 1978, IEEE Transactions on Software Engineering.
[91] Karsten Rexroth,et al. Methodology of target and requirements management for complex systems concerning the application field of an energy-efficient city , 2009 .
[92] Koushik Sen,et al. Efficient decentralized monitoring of safety in distributed systems , 2004, Proceedings. 26th International Conference on Software Engineering.
[93] K. Mani Chandy,et al. How processes learn , 1985, PODC '85.
[94] Manfred Reichert,et al. Capturing variability in business process models: the Provop approach , 2010, J. Softw. Maintenance Res. Pract..
[95] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[96] Bernhard Beckert,et al. Deductive Software Verification – The KeY Book , 2016, Lecture Notes in Computer Science.
[97] Gary T. Leavens,et al. Modular invariants for layered object structures , 2006, Sci. Comput. Program..
[98] Jan Recker,et al. How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation , 2008, CAiSE.
[99] Bernd Finkbeiner,et al. LOLA: runtime monitoring of synchronous systems , 2005, 12th International Symposium on Temporal Representation and Reasoning (TIME'05).
[100] Stéphane Lescuyer. ProvenCore: Towards a Verified Isolation Micro-Kernel , 2015, MILS@HiPEAC.
[101] Pedro Peris-López,et al. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks , 2014, Sensors.
[102] John Barnes,et al. Spark: The Proven Approach to High Integrity Software , 2012 .
[103] Atif Mashkoor. The Hemodialysis Machine Case Study , 2016, ABZ.
[104] Kim G. Larsen,et al. Statistical Model Checking for Networks of Priced Timed Automata , 2011, FORMATS.
[105] John C. Mankins,et al. Technology Readiness Levels-A White Paper , 1995 .
[106] Mohammad Reza Mousavi,et al. Towards Model-Based Testing of Electronic Funds Transfer Systems , 2011, FSEN.
[107] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[108] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[109] Haiyang Sun,et al. ADRENALIN-RV: Android Runtime Verification Using Load-Time Weaving , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).
[110] Mark S. Miller,et al. The digital path: smart contracts and the Third World , 2013 .
[111] Niklaus Wirth,et al. Program development by stepwise refinement , 1971, CACM.
[112] Angelos D. Keromytis,et al. Dynamic Trust Management , 2009, Computer.
[113] Jonathan P. Bowen,et al. The use of industrial-strength formal methods , 1997, Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97).
[114] Ezio Bartocci,et al. Monitoring mobile and spatially distributed cyber-physical systems , 2017, MEMOCODE.
[115] James Coplien,et al. Symmetry Breaking in Software Patterns , 2000, GCSE.
[116] Tevfik Bultan,et al. Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines , 2010, ASE '10.
[117] Wolfram Schulte,et al. VCC: Contract-based modular verification of concurrent C , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.
[118] Bernd Finkbeiner,et al. Runtime Verification for HyperLTL , 2016, RV.
[119] Borzoo Bonakdarpour,et al. Runtime Verification of k-Safety Hyperproperties in HyperLTL , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[120] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[121] Simon L. Peyton Jones,et al. Composing contracts: an adventure in financial engineering (functional pearl) , 2000, ICFP '00.
[122] Carlos Garcia - Santos carlos. garcia - santos. Industry 4 . 0-The Capgemini Consulting View Sharpening the Picture beyond the Hype , .
[123] Vaughan R. Pratt. Anatomy of the Pentium Bug , 1995, TAPSOFT.
[124] George S. Avrunin,et al. Patterns in property specifications for finite-state verification , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[125] Grigore Rosu,et al. An overview of the K semantic framework , 2010, J. Log. Algebraic Methods Program..
[126] Nishant Rodrigues,et al. KEVM: A Complete Semantics of the Ethereum Virtual Machine , 2017 .
[127] Douglas R. Smith,et al. Planware-domain-specific synthesis of high-performance schedulers , 1998, Proceedings 13th IEEE International Conference on Automated Software Engineering (Cat. No.98EX239).
[128] Jakob Rehof,et al. A Methodology for Combinatory Process Synthesis: Process Variability in Clinical Pathways , 2018, ISoLA.
[129] Tore Dybå,et al. Evidence-based software engineering , 2004, Proceedings. 26th International Conference on Software Engineering.
[130] Claude Michel. Exact Projection Functions for Floating Point Number Constraints , 2002, ISAIM.
[131] Richard Jüllig,et al. Specware: Formal Support for Composing Software , 1995, MPC.
[132] Michael Huth,et al. Centrally Governed Blockchains: Optimizing Security, Cost, and Availability , 2017, Models, Algorithms, Logics and Tools.
[133] Michael Felderer,et al. Estimating the Cost and Benefit of Model-Based Testing: A Decision Support Procedure for the Application of Model-Based Testing in Industry , 2015, 2015 41st Euromicro Conference on Software Engineering and Advanced Applications.
[134] Guilherme Horta Travassos,et al. A Picture from the Model-Based Testing Area: Concepts, Techniques, and Challenges , 2010, Adv. Comput..
[135] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[136] Dirk van Dalen,et al. Logic and structure , 1980 .
[137] Kim G. Larsen,et al. Testing real-time embedded software using UPPAAL-TRON: an industrial case study , 2005, EMSOFT.
[138] Massimo Bartoletti,et al. Constant-Deposit Multiparty Lotteries on Bitcoin , 2017, Financial Cryptography Workshops.
[139] Koen Claessen,et al. QuickCheck: a lightweight tool for random testing of Haskell programs , 2000, ICFP.
[140] В. С. Мутилин,et al. Архитектура Linux Driver Verification , 2011 .
[141] Nikolai Kosmatov,et al. Efficient Leveraging of Symbolic Execution to Advanced Coverage Criteria , 2014, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation.
[142] Matthias Radestock,et al. A Reflective Higher-order Calculus , 2005, FInCo@ETAPS.
[143] Dogan Ulus,et al. First-order temporal logic monitoring with BDDs , 2017, Formal Methods in System Design.
[144] Ruth Sara Aguilar-Savén,et al. Business process modelling: Review and framework , 2004 .
[145] Gernot Heiser,et al. Comprehensive formal verification of an OS microkernel , 2014, TOCS.
[146] Viktor Schuppan,et al. Linear Encodings of Bounded LTL Model Checking , 2006, Log. Methods Comput. Sci..
[147] Richard Baskerville,et al. Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..
[148] Kim G. Larsen,et al. Formal Verification of a Power Controller Using the Real-Time Model Checker UPPAAL , 1999, ARTS.
[149] Karl Meinke,et al. Learning-Based Testing for Safety Critical Automotive Applications , 2017, IMBSA.
[150] Bernhard Steffen,et al. Automata Learning with Automated Alphabet Abstraction Refinement , 2011, VMCAI.
[151] Christian Nielsen,et al. Value Proposition Design: How to create products and services customers want , 2015 .
[152] Glenford J. Myers,et al. Art of Software Testing , 1979 .
[153] Guido Governatori,et al. Evaluation of Logic-Based Smart Contracts for Blockchain Systems , 2016, RuleML.
[154] Masami Hagiya,et al. AN INTUITIONISTIC EPISTEMIC LOGIC FOR ASYNCHRONOUS , 2010 .
[155] Ankur Taly,et al. Privacy, Discovery, and Authentication for the Internet of Things , 2016, ESORICS.
[156] David L. Kaplan. How to fix peer review , 2005 .
[157] Massimo Bartoletti,et al. SoK: unraveling Bitcoin smart contracts , 2018, IACR Cryptol. ePrint Arch..
[158] Gordon J. Pace,et al. Distributed system contract monitoring , 2011, J. Log. Algebraic Methods Program..
[159] Kim G. Larsen,et al. Time-Optimal Test Cases for Real-Time Systems , 2003, FORMATS.
[160] Kim G. Larsen,et al. Timed Control with Observation Based and Stuttering Invariant Strategies , 2007, ATVA.
[161] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[162] Gordon J. Pace,et al. Runtime Verification using VALOUR , 2017, RV-CuBES.
[163] Nikolai Kosmatov,et al. An All-in-One Toolkit for Automated White-Box Testing , 2014, TAP@STAF.
[164] Hana Chockler,et al. HiFrog: SMT-based Function Summarization for Software Verification , 2017, TACAS.
[165] Jay Ligatti,et al. Modeling runtime enforcement with mandatory results automata , 2014, International Journal of Information Security.
[166] John Mylopoulos,et al. On the Frame Problem in Procedure Specifications , 1995, IEEE Trans. Software Eng..
[167] Nikolai Kosmatov,et al. Automating structural testing of C programs: Experience with PathCrawler , 2009, 2009 ICSE Workshop on Automation of Software Test.
[168] Isil Dillig,et al. Maximal specification synthesis , 2016, POPL.
[169] Philippe Herrmann,et al. Structural Testing of Executables , 2008, 2008 1st International Conference on Software Testing, Verification, and Validation.
[170] Christopher D. Clack,et al. Smart Contract Templates: essential requirements and design options , 2016, ArXiv.
[171] Xavier Leroy,et al. Formal certification of a compiler back-end or: programming a compiler with a proof assistant , 2006, POPL '06.
[172] Kim G. Larsen,et al. UPPAAL-Tiga: Time for Playing Games! , 2007, CAV.
[173] Bart Jacobs,et al. Java Program Verification Challenges , 2002, FMCO.
[174] Ezio Bartocci,et al. First International Competition on Software for Runtime Verification , 2014, RV.
[175] Bruno Marre,et al. Improving the Floating Point Addition and Subtraction Constraints , 2010, CP.
[176] Somesh Jha,et al. Smart Contracts and Opportunities for Formal Methods , 2018, ISoLA.
[177] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[178] Yu Lei,et al. Introduction to Combinatorial Testing , 2013 .
[179] Conal Elliott. Compiling to categories , 2017, Proc. ACM Program. Lang..
[180] Marco Vieira,et al. The OLAP and data warehousing approaches for analysis and sharing of results from dependability evaluation experiments , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[181] Volker G. Hildebrand. Individualisierung als strategische Option der Marktbearbeitung , 1997 .
[182] Prateek Saxena,et al. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.
[183] John M. Bryson,et al. Strategic Planning in the Military , 2000 .
[184] Kim G. Larsen,et al. T-UPPAAL: online model-based testing of real-time systems , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[185] Wolfgang Ahrendt,et al. A system for compositional verification of asynchronous objects , 2012, Sci. Comput. Program..
[186] Arun Sharma,et al. Are pricing policies an impediment to the success of customer solutions , 2011 .
[187] Akihito Iwai,et al. RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial , 2015, RV.
[188] Kim G. Larsen,et al. Formal Analysis and Testing of Real-Time Automotive Systems Using UPPAAL Tools , 2015, FMICS.
[189] Gordon J. Pace,et al. LARVA --- Safer Monitoring of Real-Time Java Programs (Tool Paper) , 2009, 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods.
[190] Jorge A. Navas,et al. The SeaHorn Verification Framework , 2015, CAV.
[191] Surajit Chaudhuri,et al. An overview of data warehousing and OLAP technology , 1997, SGMD.
[192] Jan-Christoph Küster,et al. From Propositional to First-Order Monitoring , 2013, RV.
[193] Arnaud Gotlieb,et al. INKA: TEN YEARS AFTER THE FIRST IDEAS , 2006 .
[194] Jonas Westman,et al. Providing tool support for specifying safety-critical systems by enforcing syntactic contract conditions , 2017, Requirements Engineering.
[195] Amr Sabry,et al. Reasoning about programs in continuation-passing style , 1992, LFP '92.
[196] John Eriksson. Formal Requirement Models for Automotive Embedded Systems , 2016 .
[197] DR. Gavin Wood. POLKADOT: VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK , 2016 .
[198] William A. Howard,et al. The formulae-as-types notion of construction , 1969 .
[199] Marco Muñiz,et al. Uppaal Stratego for Intelligent Traffic Lights , 2017 .
[200] Russell O'Connor,et al. Simplicity: A New Language for Blockchains , 2017, PLAS@CCS.
[201] Xiapu Luo,et al. Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[202] Sylvie Boldo. Deductive Formal Verification: How To Make Your Floating-Point Programs Behave , 2014 .
[203] David E. Rydeheard,et al. MarQ: Monitoring at Runtime with QEA , 2015, TACAS.
[204] A. Gotlieb,et al. Constraint solving on modular integers , 2010 .
[205] Ian Wilson,et al. Strategic planning isn't dead— it changed , 1994 .
[206] Julien Schmaltz,et al. Timed Model-Based Conformance Testing A Case Study Using Tron , 2010 .
[207] Bernhard Steffen,et al. LearnLib Tutorial: From Finite Automata to Register Interface Programs , 2012, ISoLA.
[208] Steve Boßelmann,et al. GOLD: Global Organization aLignment and Decision - Towards the Hierarchical Integration of Heterogeneous Business Models , 2018, ISoLA.
[209] 簡聰富,et al. 物件導向軟體之架構(Object-Oriented Software Construction)探討 , 1989 .
[210] Yoichi Hirai,et al. An Intuitionistic Epistemic Logic for Sequential Consistency on Shared Memory , 2010, LPAR.
[211] Ilya Sergey,et al. Scilla: a Smart Contract Intermediate-Level LAnguage , 2018, ArXiv.
[212] Manfred Reichert,et al. Semantically-Driven Workflow Generation Using Declarative Modeling for Processes in Software Engineering , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops.
[213] Daniel Kroening,et al. An Interpolating Sequent Calculus for Quantifier-Free Presburger Arithmetic , 2010, Journal of Automated Reasoning.
[214] Jörg Brauer,et al. Efficient and Trustworthy Tool Qualification for Model-Based Testing Tools , 2012, ICTSS.
[215] Pierre-Louis Curien,et al. The Categorical Abstract Machine , 1987, Sci. Comput. Program..
[216] Andrej Dudenhefner,et al. Combinatory Logic Synthesizer , 2014, ISoLA.
[217] Kim G. Larsen,et al. Timed I/O automata: a complete specification theory for real-time systems , 2010, HSCC '10.
[218] Yuguang Fang,et al. A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.
[219] Koushik Sen,et al. Rule-Based Runtime Verification , 2004, VMCAI.
[220] Gordon J. Pace,et al. Runtime Verification of Ethereum Smart Contracts , 2018, 2018 14th European Dependable Computing Conference (EDCC).
[221] Gerald Stieglbauer,et al. Objecting to the Revolution: Model-Based Engineering and the Industry - Root Causes Beyond Classical Research Topics , 2017, MODELSWARD.
[222] Andrew Miller,et al. Zero-Collateral Lotteries in Bitcoin and Ethereum , 2016, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[223] Vahid Garousi,et al. What industry wants from academia in software testing?: Hearing practitioners' opinions , 2017, EASE.
[224] Tiziana Margaria,et al. Domain-Specific Business Modeling with the Business Model Developer , 2014, ISoLA.
[225] Jan Tretmans,et al. On-the-fly conformance testing using SPIN , 2000, International Journal on Software Tools for Technology Transfer.
[226] ReichertManfred,et al. Adept _flex Supporting Dynamic Changes of Workflows Without Losing Control , 1998 .
[227] Jan Peleska,et al. Automated Test Case Generation with SMT-Solving and Abstract Interpretation , 2011, NASA Formal Methods.
[228] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[229] Haiyang Sun,et al. Multi-Process Runtime Verification for Android , 2017, 2017 24th Asia-Pacific Software Engineering Conference (APSEC).
[230] Manfred Reichert,et al. Refactoring large process model repositories , 2011, Comput. Ind..
[231] Tiziana Margaria,et al. Dynamic Testing Via Automata Learning , 2007, Haifa Verification Conference.
[232] Stefania Gnesi,et al. Model Driven Development and Code Generation: An Automotive Case Study , 2007, SDL Forum.
[233] Nikolai Kosmatov,et al. Program slicing enhances a verification technique combining static and dynamic analysis , 2012, SAC '12.
[234] Judi Romijn. A Timed Verification of the IEEE 1394 Leader Election Protocol , 2001, Formal Methods Syst. Des..
[235] Jan Peleska,et al. Complete model-based equivalence class testing , 2014, International Journal on Software Tools for Technology Transfer.
[236] David R. Cok,et al. OpenJML: JML for Java 7 by Extending OpenJDK , 2011, NASA Formal Methods.
[237] Heinrich Daembkes,et al. Automated Driving Safer and More Efficient Future Driving Foreword , 2017 .
[238] Yliès Falcone,et al. Runtime Verification and Enforcement for Android Applications with RV-Droid , 2012, RV.
[239] Jan Peleska,et al. Model-Based Testing Strategies and Their (In)dependence on Syntactic Model Representations , 2016, FMICS-AVoCS.
[240] Paul F. Syverson,et al. Temporarily hidden bit commitment and lottery applications , 2010, International Journal of Information Security.
[241] Dana Angluin,et al. Learning Regular Sets from Queries and Counterexamples , 1987, Inf. Comput..
[242] Nikolai Kosmatov,et al. Structural Unit Testing as a Service with PathCrawler-online.com , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[243] Gregor Kiczales,et al. Using aspectC to improve the modularity of path-specific customization in operating system code , 2001, ESEC/FSE-9.
[244] Miroslav Pajic,et al. Opportunities and Challenges in Monitoring Cyber-Physical Systems Security , 2018, ISoLA.
[245] K. Rustan M. Leino,et al. Specification and verification , 2011, Commun. ACM.
[246] César Sánchez,et al. Runtime Verification for Decentralised and Distributed Systems , 2018, Lectures on Runtime Verification.
[247] Grigore Rosu,et al. Java-MOP: A Monitoring Oriented Programming Environment for Java , 2005, TACAS.
[248] David R. Cok,et al. OpenJML: Software verification for Java 7 using JML, OpenJDK, and Eclipse , 2014, F-IDE.
[249] Jeffrey D. Uuman. Principles of database and knowledge- base systems , 1989 .
[250] Tiziana Margaria,et al. Simplicity as a Driver for Agile Innovation , 2010, Computer.
[251] Ezio Bartocci,et al. A Temporal Logic Approach to Modular Design of Synthetic Biological Circuits , 2013, CMSB.
[252] Bryan Ford,et al. Parsing expression grammars: a recognition-based syntactic foundation , 2004, POPL '04.
[253] Alex Biryukov,et al. Findel: Secure Derivative Contracts for Ethereum , 2017, Financial Cryptography Workshops.
[254] Brian Nielsen,et al. Test generation for time critical systems: Tool and case study , 2001, Proceedings 13th Euromicro Conference on Real-Time Systems.
[255] Kim G. Larsen,et al. Efficient On-the-Fly Algorithms for the Analysis of Timed Games , 2005, CONCUR.
[256] Gary T. Leavens,et al. Poster: An Algorithm and Tool to Infer Practical Postconditions , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion).
[257] Andreas Rausch,et al. Learning Systems: Machine-Learning in Software Products and Learning-Based Analysis of Software Systems - Special Track at ISoLA 2016 , 2016, ISoLA.
[258] Fabio Massacci,et al. Do you really mean what you actually enforced? , 2011, International Journal of Information Security.
[259] Natasha Sharygina,et al. OpenSMT2: An SMT Solver for Multi-core and Cloud Computing , 2016, SAT.
[260] Gary T. Leavens,et al. Extensions of the theory of observational purity and a practical design for JML , 2008 .
[261] Kim G. Larsen,et al. On Time with Minimal Expected Cost! , 2014, ATVA.
[262] Runtime Verification , 2010, Lecture Notes in Computer Science.
[263] Tiziana Margaria,et al. Synthesis-Based Loose Programming , 2010, 2010 Seventh International Conference on the Quality of Information and Communications Technology.
[264] Theo C. Ruys,et al. The Bounded Retransmission Protocol Must Be on Time! , 1997, TACAS.
[265] Bernhard Steffen,et al. DIME: A Programming-Less Modeling Environment for Web Applications , 2016, ISoLA.
[266] Philippe Herrmann,et al. An Alternative to SAT-Based Approaches for Bit-Vectors , 2010, TACAS.
[267] Grigore Rosu,et al. Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation , 2003, RV@CAV.
[268] Wolfgang Küchlin,et al. Towards automatic software model checking of thousands of Linux modules—a case study with Avinux , 2009, Softw. Test. Verification Reliab..
[269] Mahesh Viswanathan,et al. Java-MaC: a Run-time Assurance Tool for Java Programs , 2001, RV@CAV.
[270] Darren D. Cofer,et al. Study on the Barriers to the Industrial Adoption of Formal Methods , 2013, FMICS.
[271] Frank S. de Boer,et al. Integrating deductive verification and symbolic execution for abstract object creation in dynamic logic , 2014, Software & Systems Modeling.
[272] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[273] Thomas A. Gutzwiller,et al. Das CC RIM-Referenzmodell für den Entwurf von betrieblichen, transaktionsorientierten Informationssystemen , 1994 .
[274] Yoonsik Cheon,et al. Specifying and checking method call sequences of Java programs , 2006, Software Quality Journal.
[275] Mehrdad Sabetzadeh,et al. The Case for Context-Driven Software Engineering Research: Generalizability Is Overrated , 2017, IEEE Softw..
[276] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[277] Bäckström Sophia. Learning-based testing of automotive ECUs , 2016 .
[278] Leslie Lamport,et al. "Sometime" is sometimes "not never": on the temporal logic of programs , 1980, POPL '80.
[279] Oliver Niese,et al. An integrated approach to testing complex systems , 2003 .
[280] Marcin Andrychowicz,et al. Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.
[281] Ilya Sergey,et al. A Concurrent Perspective on Smart Contracts , 2017, Financial Cryptography Workshops.
[282] H. Hricak,et al. Evidence-based medicine. , 1997, Singapore medical journal.
[283] Grigore Rosu,et al. Program Verification by Coinduction , 2018, ESOP.
[284] David A. Naumann,et al. Observational purity and encapsulation , 2005, Theor. Comput. Sci..
[285] Jonathan P. Bowen,et al. Ten Commandments of Formal Methods ...Ten Years Later , 2006, Computer.
[286] Peter Müller,et al. Modular Specification and Verification of Delegation with SMT Solvers , 2011 .
[287] Gordon J. Pace,et al. Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties , 2009, FMICS.
[288] Stefan Dziembowski,et al. Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts , 2016, ESORICS.
[289] Fabio Massacci,et al. Iterative enforcement by suppression: Towards practical enforcement theories , 2012, J. Comput. Secur..
[290] Kim G. Larsen,et al. Uppaal Stratego , 2015, TACAS.
[291] Christian Colombo,et al. First International Summer School on Runtime Verification - As Part of the ArVi COST Action 1402 , 2016, RV.
[292] Jan Peleska. Model-based avionic systems testing for the airbus family , 2018, 2018 IEEE 23rd European Test Symposium (ETS).
[293] Aron Laszka,et al. Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach , 2017, Financial Cryptography.
[294] Ahmed E. Hassan,et al. Think locally, act globally: Improving defect and effort prediction models , 2012, 2012 9th IEEE Working Conference on Mining Software Repositories (MSR).
[295] Nikolai Kosmatov,et al. Frama-C: A software analysis perspective , 2015, Formal Aspects of Computing.
[296] Stefan Hrastinski,et al. Socio-technical IS design science research: developing design theory for IS integration management , 2011, Inf. Syst. E Bus. Manag..
[297] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[298] Bernhard Steffen,et al. Reusing System States by Active Learning Algorithms , 2011, EternalS@FET.
[299] Luciano Baresi,et al. An Introduction to Software Testing , 2006, FoVMT.
[300] Christopher D. Clack,et al. Smart Contract Templates: foundations, design landscape and research directions , 2016, ArXiv.
[301] Brian Nielsen,et al. Automated test generation from timed automata , 2001, International Journal on Software Tools for Technology Transfer.
[302] Jan Peleska,et al. A Real-World Benchmark Model for Testing Concurrent Real-Time Systems in the Automotive Domain , 2011, ICTSS.
[303] Klaus-Dieter Schewe,et al. ABZ 2014: The Landing Gear Case Study , 2014, Communications in Computer and Information Science.
[304] Howard Barringer,et al. Rule Systems for Run-time Monitoring: from Eagle to RuleR , 2010, J. Log. Comput..
[305] Yves Le Traon,et al. Sound and Quasi-Complete Detection of Infeasible Test Requirements , 2015, 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST).
[306] Loizos Heracleous,et al. Strategizing through playful design , 2007 .
[307] Jan Bosch,et al. On the notion of variability in software product lines , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.
[308] Sumit Gulwani,et al. FlashExtract: a framework for data extraction by examples , 2014, PLDI.
[309] Martin Leucker,et al. Monitoring modulo theories , 2016, International Journal on Software Tools for Technology Transfer.
[310] Paul F. Syverson,et al. Weakly secret bit commitment: applications to lotteries and fair exchange , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[311] Ittai Abraham,et al. Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..
[312] David R. Cok,et al. Improved usability and performance of SMT solvers for debugging specifications , 2010, International Journal on Software Tools for Technology Transfer.
[313] Lin Li,et al. Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers' Newsgroup Discussions , 2011, 2011 IEEE 19th International Conference on Program Comprehension.
[314] Andrew Miller,et al. Sprites: Payment Channels that Go Faster than Lightning , 2017, ArXiv.
[315] Simon J. Thompson,et al. Scripting smart contracts for distributed ledger technology , 2016, IACR Cryptol. ePrint Arch..
[316] Joseph Y. Halpern,et al. A Knowledge-Based Analysis of the Blockchain Protocol , 2017, TARK.
[317] Kim G. Larsen,et al. Formal modeling and analysis of an audio/video protocol: an industrial case study using UPPAAL , 1997, Proceedings Real-Time Systems Symposium.
[318] César Viho,et al. Formal Test Automation: The Conference Protocol with TGV/TORX , 2000, TestCom.
[319] Frits W. Vaandrager,et al. Model learning , 2017, Commun. ACM.
[320] Fred Kröger,et al. Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.
[321] Ezio Bartocci,et al. First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014 , 2017, International Journal on Software Tools for Technology Transfer.
[322] Bertrand Meyer. Design By Contract. The Eiffel Method , 1998, Proceedings. Technology of Object-Oriented Languages. TOOLS 26 (Cat. No.98EX176).
[323] Massimo Bartoletti,et al. A formal model of Bitcoin transactions , 2018, IACR Cryptol. ePrint Arch..
[324] Bernhard Steffen,et al. CINCO: a simplicity-driven approach to full generation of domain-specific graphical modeling tools , 2018, International Journal on Software Tools for Technology Transfer.
[325] Dilian Gurov,et al. Deductive Functional Verification of Safety-Critical Embedded C-Code: An Experience Report , 2017, FMICS-AVoCS.
[326] M. Leucker,et al. Model-based runtime analysis of distributed reactive systems , 2006, Australian Software Engineering Conference (ASWEC'06).
[327] Hector Garcia-Molina,et al. Modeling long-running activities as nested sagas , 1991 .
[328] Jan Peleska,et al. Experimental evaluation of a novel equivalence class partition testing strategy , 2017, Software & Systems Modeling.
[329] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[330] Howard Barringer,et al. TraceContract: A Scala DSL for Trace Analysis , 2011, FM.
[331] Augusto Sampaio,et al. Sound conformance testing for cyber-physical systems: Theory and implementation , 2017, Sci. Comput. Program..
[332] Insup Lee,et al. Scalable Verification of Linear Controller Software , 2016, TACAS.
[333] Joseph Y. Halpern,et al. Knowledge and common knowledge in a distributed environment , 1984, JACM.
[334] Jakob Rehof,et al. Automatic Composition of Rough Solution Possibilities in the Target Planning of Factory Planning Projects by Means of Combinatory Logic , 2018, ISoLA.
[335] David Lorge Parnas,et al. Tabular Representation of Relations , 1992 .
[336] David R. Cok,et al. ESC/Java2: Uniting ESC/Java and JML , 2004, CASSIS.
[337] Peter Øhrstrøm,et al. Temporal Logic , 1994, Lecture Notes in Computer Science.
[338] Nick Szabo,et al. Smart Contracts: Building Blocks for Digital Markets , 2018 .
[339] Arne Skou,et al. Modelling and analysis of a collision avoidance protocol using Spin and Uppaal , 1996, The Spin Verification System.
[340] Nikolai Kosmatov,et al. How Test Generation Helps Software Specification and Deductive Verification in Frama-C , 2014, TAP@STAF.
[341] Chris Newcombe. Why Amazon Chose TLA + , 2014, ABZ.
[342] H. Scheuerlein,et al. New methods for clinical pathways—Business Process Modeling Notation (BPMN) and Tangible Business Process Modeling (t.BPM) , 2012, Langenbeck's Archives of Surgery.
[343] Kim G. Larsen,et al. Real-time specifications , 2013, International Journal on Software Tools for Technology Transfer.
[344] Ricardo J. Dias,et al. Verifying Concurrent Programs Using Contracts , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).
[345] Claudia Reuter. Modellierung und dynamische Adaption klinischer Pfade auf Basis semantischer Prozessfragmente , 2011 .
[346] Wang Yi,et al. Verification of an Audio Protocol with Bus Collision Using UPPAAL , 1996, CAV.
[347] E. James,et al. What is a clinical pathway? Development of a definition to inform the debate , 2010, BMC medicine.
[348] Grigore Rosu,et al. Synthesizing Monitors for Safety Properties , 2002, TACAS.
[349] Ahmed Awad,et al. An Iterative Approach for Business Process Template Synthesis from Compliance Rules , 2011, CAiSE.
[350] Michael Henke,et al. Intelligente Orchestrierung von Planungsprozessen , 2017 .
[351] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[352] Peter B. Galvin,et al. Operating System Concepts, 4th Ed. , 1993 .
[353] Tiziana Margaria,et al. Library-Based Design and Consistency Checking of System-Level Industrial Test Cases , 2001, FASE.
[354] Tiziana Margaria,et al. Meta-Level Reuse for Mastering Domain Specialization , 2016, ISoLA.
[355] Kim G. Larsen,et al. ECDAR: An Environment for Compositional Design and Analysis of Real Time Systems , 2010, ATVA.
[356] Ash Maurya,et al. Running Lean - Iterate from Plan A to a Plan That Works, 2nd Edition , 2012, The Lean Series.
[357] S. Rajamani,et al. A decade of software model checking with SLAM , 2011, Commun. ACM.
[358] Andrej Dudenhefner,et al. Combinatory Process Synthesis , 2016, ISoLA.
[359] Massimo Bartoletti,et al. BitML: A Calculus for Bitcoin Smart Contracts , 2018, IACR Cryptol. ePrint Arch..
[360] Daniel Kroening,et al. Making Software Verification Tools Really Work , 2011, ATVA.
[361] Jan Friso Groote,et al. Pitfalls in Applying Model Learning to Industrial Legacy Software , 2018, ISoLA.
[362] Aron Laszka,et al. Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts , 2018, POST.
[363] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[364] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[365] Shahid Ali,et al. Applying Model Checking for Verifying the Functional Requirements of a Scania’s Vehicle Control System , 2012 .
[366] F. Cots,et al. Diagnosis related groups in Europe: moving towards transparency, efficiency, and quality in hospitals? , 2013, BMJ.
[367] Thai Son Hoang,et al. The Hybrid ERTMS/ETCS Level 3 Case Study , 2018, ABZ.
[368] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[369] Claude Marché,et al. The Why/Krakatoa/Caduceus Platform for Deductive Program Verification , 2007, CAV.
[370] Grigory Fedyukovich,et al. Symbolic Detection of Assertion Dependencies for Bounded Model Checking , 2015, FASE.
[371] Karl Meinke,et al. Automated black-box testing of functional correctness using function approximation , 2004, ISSTA '04.
[372] Andrey Rybalchenko,et al. An Epistemic Perspective on Consistency of Concurrent Computations , 2013, CONCUR.
[373] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[374] Karl Meinke,et al. LBTest: A Learning-Based Testing Tool for Reactive Systems , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation.
[375] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[376] Brent Waters,et al. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.
[377] Jameela Al-Jaroodi,et al. e-Health Cloud: Opportunities and Challenges , 2012, Future Internet.
[378] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[379] Paul E. Black,et al. SATE V Ockham Sound Analysis Criteria , 2016 .
[380] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[381] Yi Zhang,et al. A formal verification tool for Ethereum VM bytecode , 2018, ESEC/SIGSOFT FSE.
[382] Kim G. Larsen,et al. Time for Statistical Model Checking of Real-Time Systems , 2011, CAV.
[383] Peter McBurney,et al. Validation and Verification of Smart Contracts: A Research Agenda , 2017, Computer.
[384] Gary T. Leavens,et al. Specification and verification challenges for sequential object-oriented programs , 2007, Formal Aspects of Computing.
[385] Thomas J. Ostrand,et al. \{PROMISE\} Repository of empirical software engineering data , 2007 .
[386] Michael Backes,et al. AppGuard - Enforcing User Requirements on Android Apps , 2013, TACAS.
[387] E. M. Novikov. Static verification of operating system monolithic kernels , 2017 .
[388] David M. Woisetschläger,et al. Service & solution innovation: Overview and research agenda☆ , 2011 .
[389] Jim Woodcock,et al. The verified software repository: a step towards the verifying compiler , 2006, Formal Aspects of Computing.
[390] Manfred Broy,et al. From Actions, Transactions, and Processes to Services , 2016, Petri Nets.
[391] VytiniotisDimitrios,et al. Simple unification-based type inference for GADTs , 2006 .
[392] Nikolai Kosmatov,et al. Generic and Effective Specification of Structural Test Objectives , 2016, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).
[393] N. Mazzocca,et al. Dynamic state machines for modelling railway control systems , 2017, Sci. Comput. Program..
[394] Jacques-Henri Jourdan,et al. Implementing and Reasoning About Hash-consed Data Structures in Coq , 2013, Journal of Automated Reasoning.
[395] Yuanyuan Zhou,et al. Learning from mistakes: a comprehensive study on real world concurrency bug characteristics , 2008, ASPLOS.
[396] C. A. R. Hoare,et al. Verified Software: Theories, Tools, Experiments Vision of a Grand Challenge Project , 2005, VSTTE.
[397] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[398] Stephan Roser,et al. Generation of Workflow Code from DSMs , 2007 .
[399] Edmund M. Clarke,et al. Using Branching Time Temporal Logic to Synthesize Synchronization Skeletons , 1982, Sci. Comput. Program..
[400] Günther Schuh,et al. Typenorientiertes Lösungsraum-Management in der Fabrikplanung , 2012 .
[401] Frits W. Vaandrager,et al. Applying Automata Learning to Embedded Control Software , 2015, ICFEM.
[402] Jan Bosch,et al. Data-Driven Continuous Evolution of Smart Systems , 2016, 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).
[403] Dirk Beyer,et al. CPAchecker: A Tool for Configurable Software Verification , 2009, CAV.
[404] F. Jacob,et al. Leistungsindividualisierung und -standardisierung , 2015 .
[405] Ondrej Lhoták,et al. Adding trace matching with free variables to AspectJ , 2005, OOPSLA '05.
[406] Daniel Kroening,et al. Software Verification Using k-Induction , 2011, SAS.
[407] Alan R. Hevner,et al. Design Science in Information Systems Research , 2004, MIS Q..
[408] Ezio Bartocci,et al. Runtime Verification and Enforcement, the (Industrial) Application Perspective (Track Introduction) , 2016, ISoLA.
[409] W. M. P. V. D. Aalsta,et al. YAWL : yet another workflow language , 2015 .
[410] Dirk Beyer,et al. Reliable benchmarking: requirements and solutions , 2017, International Journal on Software Tools for Technology Transfer.
[411] Christine Paulin-Mohring,et al. The coq proof assistant reference manual , 2000 .
[412] Bernhard Steffen,et al. The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning , 2014, RV.
[413] Sanjit A. Seshia,et al. Combinatorial sketching for finite programs , 2006, ASPLOS XII.
[414] Gordon J. Pace,et al. Recovery within long-running transactions , 2013, CSUR.
[415] Sumit Gulwani,et al. Dimensions in program synthesis , 2010, Formal Methods in Computer Aided Design.
[416] Akhil Kumar,et al. Design and management of flexible process variants using templates and rules , 2012, Comput. Ind..
[417] Grigore Rosu,et al. An overview of the MOP runtime verification framework , 2012, International Journal on Software Tools for Technology Transfer.
[418] Kim G. Larsen,et al. Schedulability of Herschel revisited using statistical model checking , 2014, International Journal on Software Tools for Technology Transfer.
[419] Insup Lee,et al. Introduction to the special section on runtime verification , 2012, International Journal on Software Tools for Technology Transfer.
[420] Jim Woodcock,et al. An Electronic Purse: Specification, Refinement and Proof , 2000 .
[421] Joeri de Ruiter,et al. Formal Models of Bank Cards for Free , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops.
[422] Wil M. P. van der Aalst,et al. Process mining: a research agenda , 2004, Comput. Ind..
[423] Karl Crary,et al. Peer-to-peer affine commitment using bitcoin , 2015, PLDI.
[424] Stephen J. Garland,et al. A Guide to LP, The Larch Prover , 1991 .
[425] Malte Brettel,et al. How Virtualization, Decentralization and Network Building Change the Manufacturing Landscape: An Industry 4.0 Perspective , 2014 .
[426] Matteo Maffei,et al. A Semantic Framework for the Security Analysis of Ethereum smart contracts , 2018, POST.
[427] Bernd Finkbeiner,et al. Model Checking the FlexRay Physical Layer Protocol , 2010, FMICS.
[428] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[429] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[430] Walter Binder,et al. DiSL: a domain-specific language for bytecode instrumentation , 2012, AOSD.
[431] Ezio Bartocci,et al. Introduction to Runtime Verification , 2018, Lectures on Runtime Verification.
[432] Yliès Falcone,et al. Decentralised LTL monitoring , 2011, Formal Methods in System Design.
[433] Clemens Faller,et al. Industry 4.0 Learning Factory for regional SMEs , 2015 .
[434] François Bobot,et al. Sharpening Constraint Programming Approaches for Bit-Vector Theory , 2017, CPAIOR.
[435] H B Curry,et al. Functionality in Combinatory Logic. , 1934, Proceedings of the National Academy of Sciences of the United States of America.
[436] Kyo Chul Kang,et al. Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .
[437] Alexander K. Petrenko,et al. Configurable toolset for static verification of operating systems kernel modules , 2015, Programming and Computer Software.
[438] Vladimir Klebanov,et al. Verification of Software Product Lines with Delta-Oriented Slicing , 2010, FoVeOOS.
[439] Alessandra Cavarra,et al. Data Flow Analysis and Testing of Abstract State Machines , 2008, ABZ.
[440] Manfred Reichert,et al. Flexible Support of Healthcare Processes , 2017 .
[441] Bruno Marre,et al. Test Selection Strategies for Lustre Descriptions in GATeL , 2005, Electron. Notes Theor. Comput. Sci..
[442] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[443] Jean Goubault-Larrecq,et al. A Smell of Orchids , 2008, RV.
[444] Thomas Leich,et al. FeatureIDE: An extensible framework for feature-oriented software development , 2014, Sci. Comput. Program..
[445] Isil Dillig,et al. Synthesizing data structure transformations from input-output examples , 2015, PLDI.
[446] Dániel Varró,et al. The Train Benchmark: cross-technology performance evaluation of continuous model queries , 2017, Software & Systems Modeling.
[447] Tiziana Margaria,et al. Test-based model generation for legacy systems , 2003, International Test Conference, 2003. Proceedings. ITC 2003..
[448] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[449] Arthur Charguéraud,et al. Characteristic formulae for the verification of imperative programs , 2011, ICFP.
[450] Jing Li,et al. The Qualitas Corpus: A Curated Collection of Java Code for Empirical Studies , 2010, 2010 Asia Pacific Software Engineering Conference.
[451] Jan-Christoph Küster,et al. Monitoring Real Android Malware , 2015, RV.
[452] Ying Wang,et al. An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks , 2017, ISPEC.
[453] Mark A. Hillebrand,et al. VCC: A Practical System for Verifying Concurrent C , 2009, TPHOLs.
[454] Norbert E. Fuchs. Specifications are (preferably) executable , 1992, Softw. Eng. J..
[455] Jakob Rehof,et al. Bounded Combinatory Logic , 2012, CSL.
[456] Thierry Coquand,et al. The Calculus of Constructions , 1988, Inf. Comput..
[457] K. Rustan M. Leino,et al. Dafny: An Automatic Program Verifier for Functional Correctness , 2010, LPAR.
[458] Mario M. Alvarez. Formal Verification of Ethereum Smart Contracts , 2019 .
[459] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[460] A. Jefferson Offutt,et al. Coverage criteria for logical expressions , 2003, 14th International Symposium on Software Reliability Engineering, 2003. ISSRE 2003..
[461] Jan Peleska,et al. Industrial-Strength Model-Based Testing - State of the Art and Current Challenges , 2013, MBT.
[462] George Danezis,et al. Centrally Banked Cryptocurrencies , 2015, NDSS.
[463] Philip Wadler,et al. Monads for functional programming , 1995, NATO ASI PDC.
[464] Bernhard Beckert,et al. How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers , 2014, UITP.
[465] Michael Felderer,et al. A Case Study on the Efficiency of Model-Based Testing at the European Space Agency , 2015, 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST).
[466] Paolo Falcarin,et al. Synthesizing Service Composition Models on the Basis of Temporal Business Rules , 2008, Journal of Computer Science and Technology.
[467] Karl Meinke,et al. Incremental Learning-Based Testing for Reactive Systems , 2011, TAP@TOOLS.
[468] Tiziana Margaria,et al. Efficient test-based model generation for legacy reactive systems , 2004, Proceedings. Ninth IEEE International High-Level Design Validation and Test Workshop (IEEE Cat. No.04EX940).
[469] Jan Peleska,et al. A Novel Approach to HW/SW Integration Testing of Route-Based Interlocking System Controllers , 2016, RSSRail.
[470] Ronald M. Lee,et al. A logic model for electronic contracting , 1988, Decis. Support Syst..
[471] Kim G. Larsen,et al. Testing Real-Time Systems Using UPPAAL , 2008, Formal Methods and Testing.
[472] Dejan Nickovic,et al. Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications , 2018, Lectures on Runtime Verification.
[473] Jean-Raymond Abrial,et al. The B-book - assigning programs to meanings , 1996 .
[474] Frank S. de Boer,et al. OpenJDK's Java.utils.Collection.sort() Is Broken: The Good, the Bad and the Worst Case , 2015, CAV.
[475] Pierre Fraigniaud,et al. Challenges in Fault-Tolerant Distributed Runtime Verification , 2016, ISoLA.
[476] Gunther Reinhart,et al. Klassifizierung unscharfer Planungsdaten in der Fabrikplanung , 2015 .
[477] Hai Jiang,et al. Survey of attribute based encryption , 2014, 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[478] John Krogstie,et al. BPMN 2.0 for Modeling Business Processes , 2015, Handbook on Business Process Management.
[479] Randal E. Bryant,et al. Symbolic Boolean manipulation with ordered binary-decision diagrams , 1992, CSUR.
[480] Tiziana Margaria,et al. Automated Learning Setups in Automata Learning , 2012, ISoLA.
[481] Thomas Rotter,et al. Clinical pathways: effects on professional practice, patient outcomes, length of stay and hospital costs. , 2010, The Cochrane database of systematic reviews.
[482] Stefan Mangard,et al. ARMageddon: Cache Attacks on Mobile Devices , 2015, USENIX Security Symposium.
[483] Dana Nau,et al. A General Approach to Synthesize Problem-Specific Planners , 2003 .
[484] B. Flyvbjerg. Five Misunderstandings About Case-Study Research , 2006, 1304.1186.
[485] Natasha Sharygina,et al. Clause Sharing and Partitioning for Cloud-Based SMT Solving , 2016, ATVA.