Verification of concurrent systems in a model-driven engineering workflow
暂无分享,去创建一个
[1] Patrick Cousot,et al. Abstract Interpretation Frameworks , 1992, J. Log. Comput..
[2] Scott A. Smolka,et al. Incremental Model Checking in the Modal Mu-Calculus , 1994, CAV.
[3] Benjamin Hindman,et al. Atomicity via source-to-source translation , 2006, MSPC '06.
[4] Rob J. van Glabbeek,et al. Branching time and abstraction in bisimulation semantics , 1996, JACM.
[5] Bas Luttik,et al. Branching Bisimilarity with Explicit Divergence , 2009, Fundam. Informaticae.
[6] Marcelo Finger,et al. Concurrency control for perceivedly instantaneous transactions in valid-time databases , 1997, Proceedings of TIME '97: 4th International Workshop on Temporal Representation and Reasoning.
[7] Michel A. Reniers,et al. Structural Analysis of Boolean Equation Systems , 2010, TOCL.
[8] Yves Bertot,et al. Interactive Theorem Proving and Program Development: Coq'Art The Calculus of Inductive Constructions , 2010 .
[9] Mark van den Brand,et al. Reusable and Correct Endogenous Model Transformations , 2012, ICMT@TOOLS.
[10] Daniel Kroening,et al. Formalizing and Checking Thread Refinement for Data-Race-Free Execution Models , 2016, TACAS.
[11] Sebastián Uchitel,et al. Model-based verification of Web service compositions , 2003, 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings..
[12] Anton Wijs. Achieving Discrete Relative Timing with Untimed Process Algebra , 2007, 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007).
[13] Koushik Sen,et al. Sound and Complete Monitoring of Sequential Consistency for Relaxed Memory Models , 2011, TACAS.
[14] George S. Avrunin,et al. Breaking up is hard to do: An evaluation of automated assume-guarantee reasoning , 2008, TSEM.
[15] Dragan Bosnacki,et al. Many-core on-the-fly model checking of safety properties using GPUs , 2016, International Journal on Software Tools for Technology Transfer.
[16] Daniel Varro. Towards Formal Verification Of Model Transformations , 2002 .
[17] Òòòðð,et al. Shared-memory Mutual Exclusion: Major Research Trends Since 1986 , 1986 .
[18] Dennis Shasha,et al. Efficient and correct execution of parallel programs that share memory , 1988, TOPL.
[19] Yuanyuan Zhou,et al. Learning from mistakes: a comprehensive study on real world concurrency bug characteristics , 2008, ASPLOS.
[20] Gary L. Peterson,et al. Myths About the Mutual Exclusion Problem , 1981, Inf. Process. Lett..
[21] Cliff B. Jones,et al. Specification and Design of (Parallel) Programs , 1983, IFIP Congress.
[22] Christos H. Papadimitriou,et al. The Theory of Database Concurrency Control , 1986 .
[23] Jean Bézivin,et al. The ATL Transformation-based Model Management Framework , 2003 .
[24] Jeremy Manson,et al. The Java memory model , 2005, POPL '05.
[25] Anton Wijs,et al. To Compose, or Not to Compose, That Is the Question: An Analysis of Compositional State Space Generation , 2018, FM.
[26] U Ulyana Tikhonova,et al. Engineering the dynamic semantics of domain specific languages , 2017 .
[27] Elisa Costante,et al. Privacy throughout the data cycle , 2015 .
[28] Markus Roggenbach,et al. Property Preserving Refinement for Csp-Casl , 2009, WADT.
[29] A. J. van der Ploeg,et al. Efficient abstractions for visualization and interaction , 2015 .
[30] Marco A. Casanova,et al. The Concurrency Control Problem for Database Systems , 1981, Lecture Notes in Computer Science.
[31] Anna I. Esparcia-Alc. Applications of Evolutionary Computation , 2016, Lecture Notes in Computer Science.
[32] Hubert Garavel,et al. Reflections on the Future of Concurrency Theory in General and Process Calculi in Particular , 2008, LIX.
[33] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[34] Bas Luttik,et al. Computation Tree Logic with Deadlock Detection , 2009, Log. Methods Comput. Sci..
[35] T. V. Bui,et al. A software architecture for body area sensor networks : flexibility and trustworthiness , 2015 .
[36] Gabriele Taentzer,et al. Henshin: advanced concepts and tools for in-place EMF model transformations , 2010, MODELS'10.
[37] Ivan Lanese,et al. Towards a Unifying Theory for Web Services Composition , 2006, WS-FM.
[38] Igor Walukiewicz,et al. The mu-calculus and Model Checking , 2018, Handbook of Model Checking.
[39] C. J. Koomen. Algebraic specification and verification of communication protocols , 1985 .
[40] Anton Wijs. GPU Accelerated Strong and Branching Bisimilarity Checking , 2015, TACAS.
[41] Christel Baier,et al. Principles of model checking , 2008 .
[42] Anton Wijs,et al. The SLCO Framework for Verified, Model-Driven Construction of Component Software , 2018, FACS.
[43] Jan Friso Groote,et al. Parameterised boolean equation systems , 2005, Theor. Comput. Sci..
[44] Hans-Juergen Boehm,et al. Foundations of the C++ concurrency memory model , 2008, PLDI '08.
[45] Gudula Rünger. Parallel Programming Models for Irregular Algorithms , 2006 .
[46] Anton Wijs,et al. Compositional Model Checking Is Lively , 2017, FACS.
[47] Richard F. Paige,et al. The Epsilon Transformation Language , 2008, ICMT@TOOLS.
[48] David Luckham,et al. Debugging Ada Tasking Programs , 1985, IEEE Software.
[49] Kuo-Chung Tai,et al. Hierarchy-based incremental analysis of communication protocols , 1993, 1993 International Conference on Network Protocols.
[50] Manuel Silva. 50 years after the PhD thesis of Carl Adam Petri: A perspective , 2012, WODES.
[51] José Antonio Lozano,et al. Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[52] Mihaela Sighireanu,et al. A Graphical Parallel Composition Operator for Process Algebras , 1999, FORTE.
[53] Am Ana Sutii. Modularity and reuse of domain-specific languages : an exploration with MetaMod , 2017 .
[54] Joseph Y. Halpern,et al. “Sometimes” and “not never” revisited: on branching versus linear time temporal logic , 1986, JACM.
[55] Jean-Claude Fernandez. ALDEBARAN : un système de vérification par réduction de processus communicants. (Aldebaran : a system of verification of communicating processes by using reduction) , 1988 .
[56] Gordana Milosavljevic,et al. TextX: A Python tool for Domain-Specific Languages implementation , 2017, Knowl. Based Syst..
[57] Amir Pnueli,et al. In Transition From Global to Modular Temporal Reasoning about Programs , 1989, Logics and Models of Concurrent Systems.
[58] Corina S. Pasareanu,et al. Automated Assume-Guarantee Reasoning by Abstraction Refinement , 2008, CAV.
[59] Farhad Arbab,et al. A Channel-based Coordination Model for Components , 2003, FOCLASA.
[60] Robert K. Brayton,et al. Incremental Methods for Formal Verification and Logic Synthesis , 1996 .
[61] Dragan Bosnacki,et al. GPUexplore 2.0: Unleashing GPU Explicit-State Model Checking , 2016, FM.
[62] David Eppstein,et al. Dynamic graph algorithms , 2010 .
[63] James H. Anderson,et al. Shared-memory mutual exclusion: major research trends since 1986 , 2003, Distributed Computing.
[64] Gordon D. Plotkin,et al. The origins of structural operational semantics , 2004, J. Log. Algebraic Methods Program..
[65] Anton Wijs,et al. From Χt to μCRL : Combining performance and functional analysis , 2004 .
[66] Gérard Le Lann,et al. Distributed Systems - Towards a Formal Approach , 1977, IFIP Congress.
[67] Anton Wijs,et al. Define, Verify, Refine: Correct Composition and Transformation of Concurrent System Semantics , 2013, FACS.
[68] Sérgio Vale Aguiar Campos,et al. Symbolic Model Checking , 1993, CAV.
[69] Robbert Krebbers,et al. The C standard formalized in Coq , 2015 .
[70] Guy H. Broadfoot,et al. ASD Case Notes: Costs and Benefits of Applying Formal Methods to Industrial Control Software , 2005, FM.
[71] Radu Mateescu,et al. Partial Model Checking Using Networks of Labelled Transition Systems and Boolean Equation Systems , 2012, TACAS.
[72] Kunihiko Miyazaki,et al. Code Generation for Event-B , 2014, IFM.
[73] Dongxi Liu,et al. Towards automatic model synchronization from model transformations , 2007, ASE.
[74] W. Cleveland,et al. Locally Weighted Regression: An Approach to Regression Analysis by Local Fitting , 1988 .
[75] S. P. Luttik. Description and formal specification of the Link Layer of P1394 , 1997, FME 1997.
[76] J. R. Salamanca Tellez,et al. Coequations and Eilenberg–type Correspondences , 2018 .
[77] Kevin Lano. The B language and method - a guide to practical formal development , 1996, FACIT: Formal approaches to computing and information technology.
[78] Brian Armstrong,et al. Challenges in the automatic parallelization of large-scale computational applications , 2001, SPIE ITCom.
[79] Anton Wijs,et al. Efficient Property Preservation Checking of Model Refinements , 2013, TACAS.
[80] Timothy Bourke,et al. A formally verified compiler for Lustre , 2017, PLDI.
[81] Douglas C. Schmidt,et al. Guest Editor's Introduction: Model-Driven Engineering , 2006, Computer.
[82] Joeri de Ruiter,et al. Lessons learned in the analysis of the EMV and TLS security protocols , 2015 .
[83] Cuiting Chen,et al. Automated Fault Localization for Service-Oriented Software Systems , 2015 .
[84] Jeroen Bransen,et al. On the Incremental Evaluation of Higher-Order Attribute Grammars , 2015 .
[85] Dragan Bosnacki,et al. GPU-PRISM: An Extension of PRISM for General Purpose Graphics Processing Units , 2010, 2010 Ninth International Workshop on Parallel and Distributed Methods in Verification, and Second International Workshop on High Performance Computational Systems Biology.
[86] Patrice Godefroid,et al. Partial-Order Methods for the Verification of Concurrent Systems , 1996, Lecture Notes in Computer Science.
[87] Andy Schürr,et al. Specification of Graph Translators with Triple Graph Grammars , 1994, WG.
[88] Arend Rensink,et al. Showing Full Semantics Preservation in Model Transformation - A Comparison of Techniques , 2010, IFM.
[89] Alastair F. Donaldson,et al. Asynchronous programming, analysis and testing with state machines , 2015, PLDI.
[90] Saeed Darabi,et al. Verification of Program Parallelization , 2018 .
[91] Thai Son Hoang,et al. Rodin: an open toolset for modelling and reasoning in Event-B , 2010, International Journal on Software Tools for Technology Transfer.
[92] Jan Friso Groote,et al. An O(mlogn) Algorithm for Computing Stuttering Equivalence and Branching Bisimulation , 2017, ACM Trans. Comput. Log..
[93] Alastair F. Donaldson,et al. Software Model Checking , 2014, Computing Handbook, 3rd ed..
[94] Stefan Dietzel,et al. Resilient in-network aggregation for vehicular networks , 2015 .
[95] Sorin Lerner,et al. Automated refinement checking of concurrent systems , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.
[96] Anton Wijs,et al. REFINER: Towards Formal Verification of Model Transformations , 2014, NASA Formal Methods.
[97] Rjm Rolf Theunissen. Supervisory control in health care systems , 2015 .
[98] Gerard J. Holzmann,et al. Formal Methods for Early Fault Detection , 1996, FTRTFT.
[99] Diptikalyan Saha. An Incremental Bisimulation Algorithm , 2007, FSTTCS.
[100] César Viho,et al. An Industrial Experiment in Automatic Generation of Executable Test Suites for a Cache Coherency Protocol , 1998, IWTCS.
[101] C. Petri. Kommunikation mit Automaten , 1962 .
[102] Benoît Combemale,et al. Essay on Semantics Definition in MDE - An Instrumented Approach for Model Verification , 2009, J. Softw..
[103] Richard N. Taylor,et al. User interface development and software environments: the Chiron-1 system , 1991, [1991 Proceedings] 13th International Conference on Software Engineering.
[104] Dan Zhang,et al. From concurrent state machines to reliable multi-threaded Java code , 2018 .
[105] Martín Abadi,et al. The existence of refinement mappings , 1988, [1988] Proceedings. Third Annual Information Symposium on Logic in Computer Science.
[106] Jim Steel,et al. MOF QVT final adopted specification: meta object facility (MOF) 2.0 query/view/transformation specification. , 2005 .
[107] P. Fiterau-Brostean. Active Model Learning for the Analysis of Network Protocols , 2018 .
[108] Sarita V. Adve,et al. Designing memory consistency models for shared-memory multiprocessors , 1993 .
[109] Holger Giese,et al. Towards Automatic Verification of Behavior Preservation for Model Transformation via Invariant Checking , 2012, ICGT.
[110] Gabor Karsai,et al. Towards Verifying Model Transformations , 2008, GT-VMT@ETAPS.
[111] L. Spaninks. An axiomatisation for rooted branching bisimulation with explicit divergence , 2013 .
[112] Kuo-Chung Tai,et al. An incremental approach to reachability analysis of distributed programs , 1993, Proceedings of 1993 IEEE 7th International Workshop on Software Specification and Design.
[113] Dragan Bosnacki,et al. Verification of atomicity preservation in model-to-code transformations using generic Java code , 2016, 2016 4th International Conference on Model-Driven Engineering and Software Development (MODELSWARD).
[114] Somesh Jha,et al. Exploiting symmetry in temporal logic model checking , 1993, Formal Methods Syst. Des..
[115] Dexter Kozen,et al. Results on the Propositional µ-Calculus , 1982, ICALP.
[116] Helmar Burkhart,et al. PATUS: A Code Generation and Auto-Tuning Framework For Parallel Stencil Computations , 2011 .
[117] Holger Hermanns,et al. Aggregation Ordering for Massively Compositional Models , 2010, 2010 10th International Conference on Application of Concurrency to System Design.
[118] Philip A. Bernstein,et al. Concurrency Control in Distributed Database Systems , 1986, CSUR.
[119] Marieke Huisman,et al. The VerCors Tool Set: Verification of Parallel and Concurrent Software , 2017, IFM.
[120] Marina Zaharieva-Stojanovski,et al. Closer to Reliable Software: Verifying Functional Behaviour of Concurrent Programs , 2015 .
[121] Radek Pelánek,et al. BEEM: Benchmarks for Explicit Model Checkers , 2007, SPIN.
[122] Jade Alglave,et al. Fences in Weak Memory Models , 2010, CAV.
[123] Holger Giese,et al. Incremental model synchronization with triple graph grammars , 2006, MoDELS'06.
[124] E. Gebler,et al. Robust SOS Specifications of Probabilistic Processes , 2015 .
[125] Ljp Luc Engelen. From napkin sketches to reliable software , 2012 .
[126] M. Kendall,et al. Rank Correlation Methods (5th ed.). , 1992 .
[127] Edmund M. Clarke,et al. Compositional model checking , 1989, [1989] Proceedings. Fourth Annual Symposium on Logic in Computer Science.
[128] Martin Odersky,et al. Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs , 2010, GPCE '10.
[129] Frédéric Lang,et al. Smart Reduction , 2011, FASE.
[130] Radu Mateescu,et al. CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes , 2011, TACAS.
[131] Marta Z. Kwiatkowska,et al. PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.
[132] A. Weale. The Essential Guide to Doing Research , 2005 .
[133] Nir Shavit,et al. Software transactional memory , 1995, PODC '95.
[134] M. Alizadeh. Auditing of user behavior: identification, analysis and understanding of deviations , 2018 .
[135] Wilhelm Schäfer,et al. Towards Verified Model Transformations , 2006 .
[136] Howard Barringer,et al. Learning to divide and conquer: applying the L* algorithm to automate assume-guarantee reasoning , 2008, Formal Methods Syst. Des..
[137] Anton Wijs,et al. A formal verification technique for behavioural model-to-model transformations , 2017, Formal Aspects of Computing.
[138] P. A. Inostroza Valdera. Structuring languages as object-oriented libraries , 2018 .
[139] Mahmoud Talebi,et al. Scalable performance analysis of wireless sensor networks , 2018 .
[140] Orna Grumberg,et al. Automated Circular Assume-Guarantee Reasoning with N-way Decomposition and Alphabet Refinement , 2016, CAV.
[141] Mark Rouncefield,et al. The State of Practice in Model-Driven Engineering , 2014, IEEE Software.
[142] Miguel A. Fernández,et al. Where does model-driven engineering help? Experiences from three industrial cases , 2011, Software & Systems Modeling.
[143] Judi Romijn. Model checking the HAVi leader election protocol , 1999 .
[144] Anton Wijs,et al. Compositional Model Checking with Incremental Counter-Example Construction , 2017, CAV.
[145] Milosh Stolikj,et al. Building blocks for the internet of things , 2015 .
[146] ROBIN MILNER,et al. Edinburgh Research Explorer A Calculus of Mobile Processes, I , 2003 .
[147] Edmund M. Clarke,et al. Model Checking and the State Explosion Problem , 2011, LASER Summer School.
[148] Thorsten Dickhaus,et al. Simultaneous Statistical Inference , 2014, Springer Berlin Heidelberg.
[149] Frédéric Lang,et al. Exp.Open 2.0: A Flexible Tool Integrating Partial Order, Compositional, and On-The-Fly Verification Methods , 2005, IFM.
[150] Kurt Stenzel,et al. Formal verification of QVT transformations for code generation , 2011, MODELS'11.
[151] Dragan Bosnacki,et al. Towards Modular Verification of Threaded Concurrent Executable Code Generated from DSL Models , 2015, FACS.
[152] Bard Bloom,et al. Structural Operational Semantics for Weak Bisimulations , 1995, Theor. Comput. Sci..
[153] Eduardo Tovar. Embedded Multi-Core systems for Mixed Criticality applications in dynamic and changeable real-time environments , 2015 .
[154] Michael Huth,et al. Assume-Guarantee Model Checking of Software: A Comparative Case Study , 1999, SPIN.
[155] Doron A. Peled,et al. Ten Years of Partial Order Reduction , 1998, CAV.
[156] Harald Ruess,et al. Bounded Model Checking and Induction: From Refutation to Verification (Extended Abstract, Category A) , 2003, CAV.
[157] Jon Whittle,et al. A survey of approaches for verifying model transformations , 2013, Software & Systems Modeling.
[158] Iain C. C. Phillips,et al. Ordered SOS Process Languages for Branching and Eager Bisimulations , 2002, Inf. Comput..
[159] Radu Mateescu,et al. CADP 2011: a toolbox for the construction and analysis of distributed processes , 2012, International Journal on Software Tools for Technology Transfer.
[160] Muralidhar Talupur. Hardware model checking: Status, challenges, and opportunities , 2011, 2011 Formal Methods in Computer-Aided Design (FMCAD).
[161] Joseph Sifakis,et al. The Algebra of Connectors—Structuring Interaction in BIP , 2007, IEEE Transactions on Computers.
[162] Anja Guzzi,et al. Supporting Developers' Teamwork from within the IDE , 2015 .
[163] Kenneth L. McMillan,et al. Automated assumption generation for compositional verification , 2007, Formal Methods Syst. Des..
[164] Glynn Winskel,et al. A Compositional Proof System on a Category of Labelled Transition Systems , 1989, Inf. Comput..
[165] Patrick Cousot,et al. Refining Model Checking by Abstract Interpretation , 2004, Automated Software Engineering.
[166] Krishan K. Sabnani,et al. An algorithmic procedure for checking safety properties of protocols , 1989, IEEE Trans. Commun..
[167] Erik P. de Vink,et al. An Overview of the mCRL2 Toolset and Its Recent Advances , 2013, TACAS.
[168] M. Mehr,et al. Faster algorithms for geometric clustering and competitive facility-location problems , 2018 .
[169] Laurent Mounier,et al. Compositional State Space Generation from Lotos Programs , 1997, TACAS.
[170] S Sjoerd Cranen,et al. Getting the point : obtaining and understanding fixpoints in model checking , 2015 .
[171] Frédéric Lang,et al. Refined Interfaces for Compositional Verification , 2006, FORTE.
[172] Sabine Glesner,et al. Formal Verification of Java Code Generation from UML Models , 2005 .
[173] Barry W. Boehm,et al. Software Defect Reduction Top 10 List , 2001, Computer.
[174] François-Xavier Dormoy,et al. SCADE 6 A Model Based Solution For Safety Critical Software Development , 2007 .
[175] Henrik Reif Andersen,et al. Partial model checking of modal equations: A survey , 1999, International Journal on Software Tools for Technology Transfer.
[176] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[177] Florence Maraninchi,et al. Operational and Compositional Semantics of Synchronous Automaton Compositions , 1992, CONCUR.
[178] Colin O'Halloran. Automated verification of code automatically generated from Simulink® , 2012, Automated Software Engineering.
[179] Cees T. A. M. de Laat,et al. A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term , 2016, Computer.
[180] Gabor Karsai,et al. On the Correctness of Model Transformations in the Development of Embedded Systems , 2006, Monterey Workshop.
[181] A. Amighi,et al. Specification and verification of synchronisation classes in Java : A practical approach , 2018 .
[182] Max Kuhn,et al. Applied Predictive Modeling , 2013 .
[183] Antti Valmari,et al. Compositional State Space Generation , 1991, Applications and Theory of Petri Nets.
[184] Anneke Kleppe,et al. MDA explained - the Model Driven Architecture: practice and promise , 2003, Addison Wesley object technology series.
[185] Radu Mateescu,et al. Compositional verification of asynchronous concurrent systems using CADP , 2015, Acta Informatica.
[186] Frank Piessens,et al. VeriFast: A Powerful, Sound, Predictable, Fast Verifier for C and Java , 2011, NASA Formal Methods.
[187] R. Forthofer,et al. Rank Correlation Methods , 1981 .
[188] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[189] Chris Verhoef,et al. A Congruence Theorem for Structured Operational Semantics with Predicates and Negative Premises , 1994, Nord. J. Comput..
[190] Matthew Hennessy,et al. Semantics of programming languages - an elementary introduction using structural operational semantics , 1990 .
[191] Rocco De Nicola,et al. Action versus State based Logics for Transition Systems , 1990, Semantics of Systems of Concurrent Processes.
[192] Eran Yahav,et al. Automatic inference of memory fences , 2010, Formal Methods in Computer Aided Design.
[193] Jan Friso Groote,et al. Specification guidelines to avoid the state space explosion problem , 2011, Softw. Test. Verification Reliab..
[194] Edmund M. Clarke,et al. Model checking, abstraction, and compositional verification , 1993 .
[195] Armin Biere,et al. Symbolic Model Checking without BDDs , 1999, TACAS.
[196] Radek Pelánek,et al. Properties of state spaces and their applications , 2008, International Journal on Software Tools for Technology Transfer.
[197] Doron A. Peled,et al. Partial-Order Reduction , 2018, Handbook of Model Checking.
[198] J. Hintze,et al. Violin plots : A box plot-density trace synergism , 1998 .
[199] Henrik Reif Andersen,et al. Partial model checking , 1995, Proceedings of Tenth Annual IEEE Symposium on Logic in Computer Science.
[200] Detlef Plump,et al. Graph Transformation in Constant Time , 2006, ICGT.
[201] R.W.J. Kersten,et al. Software analysis methods for resource-sensitive systems , 2015 .
[202] Azadeh Farzan,et al. Monitoring Atomicity in Concurrent Programs , 2008, CAV.
[203] Wan Fokkink,et al. Is Timed Branching Bisimilarity an Equivalence Indeed? , 2005, FORMATS.
[204] Nir Shavit,et al. Understanding Tradeoffs in Software Transactional Memory , 2007, International Symposium on Code Generation and Optimization (CGO'07).
[205] David A. Wood,et al. Performance Pathologies in Hardware Transactional Memory , 2007, IEEE Micro.
[206] Eduard Babkin,et al. Automated Formal Verification of Model Transformations Using the Invariants Mechanism , 2019, BIR.
[207] Jürgen Dingel,et al. Formal Verification Techniques for Model Transformations: A Tridimensional Classification , 2015, J. Object Technol..
[208] Trevor Hastie,et al. An Introduction to Statistical Learning , 2013, Springer Texts in Statistics.
[209] Hai Jin,et al. Understanding and identifying latent data races cross-thread interleaving , 2015, Frontiers of Computer Science.
[210] Anton Wijs,et al. Verifying a Verifier: On the Formal Correctness of an LTS Transformation Verification Technique , 2016, FASE.
[211] Anton Wijs,et al. Property-dependent reductions adequate with divergence-sensitive branching bisimilarity , 2014, Sci. Comput. Program..
[212] Thomas W. Reps,et al. On the Computational Complexity of Dynamic Graph Problems , 1996, Theor. Comput. Sci..
[213] David Toman,et al. Time in Database Systems , 2014 .
[214] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[215] Frédéric Lang,et al. SVL: A Scripting Language for Compositional Verification , 2001, FORTE.
[216] Gergely Alpár,et al. Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world] , 2015 .
[217] Doron A. Peled,et al. All from One, One for All: on Model Checking Using Representatives , 1993, CAV.
[218] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[219] Enno Jozef Johannes Ruijters. Zen and the Art of Railway Maintenance: Analysis and Optimization of Maintenance via Fault Trees and Statistical Model Checking , 2018 .
[220] Jürgen Dingel,et al. Specification and Verification of Graph-Based Model Transformation Properties , 2014, ICGT.
[221] Nikolaos Bezirgiannis. Abstract behavioral specification: unifying modeling and programming , 2018 .
[222] Jan Friso Groote,et al. Solving Parameterised Boolean Equation Systems with Infinite Data Through Quotienting , 2018, FACS.
[223] Antti Valmari,et al. Stubborn sets for reduced state space generation , 1991, Applications and Theory of Petri Nets.
[224] Henri E. Bal,et al. Cashmere: Heterogeneous Many-Core Computing , 2015, 2015 IEEE International Parallel and Distributed Processing Symposium.
[225] Robert M. Keller,et al. Formal verification of parallel programs , 1976, CACM.
[226] Scw Bas Ploeger,et al. Analysis of ACS using mCRL2 , 2009 .
[227] Sarmen Keshishzadeh,et al. Formalizing and testing the consistency of DSL transformations , 2016, Formal Aspects of Computing.
[228] Rob J. van Glabbeek,et al. The Linear Time - Branching Time Spectrum II , 1993, CONCUR.
[229] Lauretta O. Osho,et al. Axiomatic Basis for Computer Programming , 2013 .
[230] Emmanuelle Encrenaz-Tiphène,et al. CTL-property Transformations along an Incremental Design Process , 2004, International Journal on Software Tools for Technology Transfer.
[231] Kenneth L. McMillan,et al. Interpolation and SAT-Based Model Checking , 2003, CAV.
[232] Leslie Lamport,et al. How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs , 2016, IEEE Transactions on Computers.
[233] Jean-Raymond Abrial,et al. The B-book - assigning programs to meanings , 1996 .
[234] Anton Wijs. Confluence Detection for Transformations of Labelled Transition Systems , 2015, GaM.
[235] Moritz Marc Beller,et al. An Empirical Evaluation of Feedback-Driven Software Development , 2018 .
[236] W. Lueks,et al. Security and Privacy via Cryptography Having your cake and eating it too , 2017 .
[237] Roel Verdult,et al. The (in)security of proprietary cryptography , 2015 .
[238] Hubert Garavel,et al. Specification and Verification of Various Distributed Leader Election Algorithms for Unidirectional Ring Networks , 1997, Sci. Comput. Program..
[239] Dragan Bosnacki,et al. Efficient GPU algorithms for parallel decomposition of graphs into strongly connected and maximal end components , 2016, Formal Methods Syst. Des..
[240] Jacob Cohen,et al. Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. , 1968 .
[241] Dragan Bosnacki,et al. Verifying Atomicity Preservation and Deadlock Freedom of a Generic Shared Variable Mechanism Used in Model-To-Code Transformations , 2016, MODELSWARD.
[242] Bernhard Steffen,et al. Compositional Minimization of Finite State Systems , 1990, CAV.
[243] Marcus Gerhold,et al. Choice and chance : model-based testing of stochastic behaviour , 2018 .
[244] George S. Avrunin,et al. Comparing Finite-State Verification Techniques for Concurrent Software , 1999 .
[245] Reiko Heckel,et al. Bisimilarity and Behaviour-Preserving Reconfigurations of Open Petri Nets , 2007, Log. Methods Comput. Sci..
[246] Shing-Chi Cheung,et al. Context constraints for compositional reachability analysis , 1996, TSEM.
[247] A. Prasad Sistla. Symmetry Reductions in Model-Checking , 2003, VMCAI.