


default search action
10th Ershov Memorial Conference 2015: Kazan and Innopolis, Russia
- Manuel Mazzara

, Andrei Voronkov:
Perspectives of System Informatics - 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9609, Springer 2016, ISBN 978-3-319-41578-9 - Jane Hillston:

Quantitative Analysis of Collective Adaptive Systems. 1-5 - Igor V. Konnov

, Helmut Veith, Josef Widder
:
What You Always Wanted to Know About Model Checking of Fault-Tolerant Distributed Algorithms. 6-21 - Darkhan Akhmed-Zaki

, Madina Mansurova
, Bazargul Matkerim
, Ekateryna Dadykina, Bolatzhan Kumalakov
:
Applying MDA to Generate Hadoop Based Scientific Computing Applications. 22-35 - Julián Alarte

, David Insa, Josep Silva
, Salvador Tamarit
:
Site-Level Web Template Extraction Based on DOM Analysis. 36-49 - Thomas Baar:

Verification Support for a State-Transition-DSL Defined with Xtext. 50-60 - Franz Brauße, Margarita V. Korovina, Norbert Th. Müller:

Towards Using Exact Real Arithmetic for Initial Value Problems. 61-74 - Hadrien Bride, Olga Kouchnarenko

, Fabien Peureux:
Constraint Solving for Verifying Modal Specifications of Workflow Nets with Data. 75-90 - Gabriel Ciobanu

, Ross Horne
:
Behavioural Analysis of Sessions Using the Calculus of Structures. 91-106 - Petr N. Devyanin, Alexey V. Khoroshilov

, Victor V. Kuliamin, Alexander K. Petrenko
, Ilya V. Shchepetkov:
Using Refinement in Formal Development of OS Security Model. 107-115 - Natalia Olegovna Garanina, Elena A. Sidorova, Stepan Anokhin:

Conflict Resolution in Multi-agent Systems with Typed Connections for Ontology Population. 116-129 - Robert Glück

:
Maximally-Polyvariant Partial Evaluation in Polynomial Time. 130-148 - Damas P. Gruska:

Dynamics Security Policies and Process Opacity for Timed Process Algebras. 149-157 - Mohamad Kassab

, Giuseppe Destefanis
:
Estimating Development Effort for Software Architectural Tactics. 158-169 - Dmitrij V. Koznov, Dmitry V. Luciv

, Hamid Abdul Basit
, Ouh Eng Lieh, Mikhail Smirnov
:
Clone Detection in Reuse of Software Technical Documentation. 170-185 - Ilham W. Kurnia, Arnd Poetzsch-Heffter:

Modeling Actor Systems Using Dynamic I/O Automata. 186-202 - Torben Ægidius Mogensen:

RSSA: A Reversible SSA Form. 203-217 - Vitaly O. Mordan, Vadim S. Mutilin

:
Checking Several Requirements at once by CEGAR. 218-232 - Alexandr Naumchev

, Bertrand Meyer, Víctor Rivera:
Unifying Requirements and Code: An Example. 233-244 - Nikolay Shilov

:
Program Schemata Technique to Solve Propositional Program Logics Revised. 245-259 - Maciej Szreter:

Automated Two-Phase Composition of Timed Web Services. 260-275 - Margus Veanes, Nikolaj S. Bjørner:

Equivalence of Finite-Valued Symbolic Finite Transducers. 276-290 - Ekaterina Verbitskaia, Semyon V. Grigorev

, Dmitry Avdyukhin:
Relaxed Parsing of Regular Approximations of String-Embedded Languages. 291-302 - Irina B. Virbitskaite, Victor Borovlyov, Louchka Popova-Zeugmann:

Branching Processes of Timed Petri Nets. 303-313 - Bruno Woltzenlogel Paleo:

Implementation and Evaluation of Contextual Natural Deduction for Minimal Logic. 314-324 - Zhengheng Yuan, Tingliang Zhou, Jing Liu, Juan Luo, Yi Zhang, Xiaohong Chen:

Hybrid Lustre. 325-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














