


default search action
International Journal on Software Tools for Technology Transfer, Volume 24
Volume 24, Number 1, February 2022
- Lukás Charvát, Ales Smrcka, Tomás Vojnar:

Utilizing parametric systems for detection of pipeline hazards. 1-28 - Tomás Vojnar

, Lijun Zhang
:
Tools and algorithms for the construction and analysis of systems: a special issue for TACAS 2019. 29-31 - Ilina Stoilkovska

, Igor Konnov, Josef Widder, Florian Zuleger
:
Verifying safety of synchronous fault-tolerant algorithms by bounded model checking. 33-48 - Søren Enevoldsen, Kim Guldstrand Larsen

, Jirí Srba
:
Extended abstract dependency graphs. 49-65 - Petar Vukmirovic, Jasmin Blanchette

, Simon Cruanes, Stephan Schulz:
Extending a brainiac prover to lambda-free higher-order logic. 67-87 - Junaid Babar, Gianfranco Ciardo

, Andrew S. Miner
:
CESRBDDs: binary decision diagrams with complemented edges and edge-specified reductions. 89-109 - Martin Blicha

, Antti E. J. Hyvärinen, Jan Kofron
, Natasha Sharygina
:
Using linear algebra in decomposition of Farkas interpolants. 111-125
Volume 24, Number 2, April 2022
- Alexandre Vernotte

, Aymeric Cretin, Bruno Legeard, Fabien Peureux:
A domain-specific language to design false data injection tests for air traffic control systems. 127-158 - Antoine El-Hokayem, Yliès Falcone:

Bringing runtime verification home: a case study on the hierarchical monitoring of smart homes using decentralized specifications. 159-181 - Marlon Dumas

, Luciano García-Bañuelos
, Joosep Jääger, Peeter Laud
, Raimundas Matulevicius
, Alisa Pankova, Martin Pettai, Pille Pullonen-Raudvere
, Aivo Toots, Reedik Tuuling, Maksym Yerokhin
:
Multi-level privacy analysis of business processes: the Pleak toolset. 183-203 - Paul-Antoine Arras, Anastasios Andronidis, Luís Pina, Karolis Mituzas, Qianyi Shu, Daniel Grumberg, Cristian Cadar

:
SaBRe: load-time selective binary rewriting. 205-223 - Hassna Louadah

, Yvan Labiche:
Interface control document modeling with Citrus (avionics systems interfaces). 225-245 - Lorenzo Bettini, Davide Di Ruscio

, Ludovico Iovino
, Alfonso Pierantonio:
Supporting safe metamodel evolution with edelta. 247-260 - Per Erik Strandberg, Wasif Afzal

, Daniel Sundmark:
Software test results exploration and visualization with continuous integration and nightly testing. 261-285 - Gavin Lowe:

Parameterized verification of systems with component identities, using view abstraction. 287-324
Volume 24, Number 3, June 2022
- Maurice H. ter Beek, Kim G. Larsen

, Dejan Nickovic
, Tim A. C. Willemse:
Formal methods and tools for industrial critical systems. 325-330 - Norman Weik

, Matthias Volk, Joost-Pieter Katoen, Nils Nießen
:
DFT modeling approach for operational risk assessment of railway infrastructure. 331-350 - Davide Basile, Maurice H. ter Beek, Alessio Ferrari, Axel Legay:

Exploring the ERTMS/ETCS full moving block specification: an experience with formal methods. 351-370 - Yanni Kouskoulas, Thyago J. Machado, Daniel Genin, Aurora C. Schmidt, Ivan Papusha, Joshua Brulé:

Envelopes and waves: safe multivehicle collision avoidance for horizontal non-deterministic turns. 371-394 - Rong Gu, Peter Gjøl Jensen

, Danny Bøgsted Poulsen
, Cristina Seceleanu
, Eduard Enoiu, Kristina Lundqvist:
Verifiable strategy synthesis for multiple autonomous agents: a scalable approach. 395-414 - Benjamin Binder, Mihail Asavoae, Florian Brandner, Belgacem Ben Hedia

, Mathieu Jan:
Formal modeling and verification for amplification timing anomalies in the superscalar TriCore architecture. 415-440 - Olav Bunte, Louis C. M. van Gool, Tim A. C. Willemse:

Formal verification of OIL component specifications using mCRL2. 441-472 - Samuel Huang

, Rance Cleaveland
:
Temporal-logic query checking over finite data streams. 473-492 - Petr Rockai, Jiri Barnat:

DivSIM , an interactive simulator for LLVM bitcode. 493-510
Volume 24, Number 4, August 2022
- Elahe Habibi

, Seyed-Hassan Mirian-Hosseinabadi:
Generating test as a web service (TaaWS) through a method-based attribute grammar. 511-527 - Sébastien Salva, Elliott Blot:

Learning of behavioural models and dependency graphs for communicating systems with CkTailv2. 529-548 - H. M. W. Verbeek

:
The Log Skeleton Visualizer in ProM 6.9. 549-561 - Christoffer Olling Back

, Tijs Slaats
, Thomas Troels Hildebrandt
, Morten Marquard:
DisCoveR: accurate and efficient discovery of declarative process models. 563-587 - Christian Hensel, Sebastian Junges

, Joost-Pieter Katoen, Tim Quatmann, Matthias Volk
:
The probabilistic model checker Storm. 589-610 - Axel Legay, Tiziana Margaria:

Tools and algorithms for the construction and analysis of systems: a special issue for TACAS 2017. 611-612 - Pedro Antonino

, Thomas Gibson-Robinson, A. W. Roscoe:
Approximate verification of concurrent systems using token structures and invariants. 613-633 - Javier Esparza, Jan Kretínský, Jean-François Raskin, Salomon Sickert:

From linear temporal logic and limit-deterministic Büchi automata to deterministic parity automata. 635-659 - Dirk Beyer

, Stefan Löwe, Philipp Wendler:
Correction to: Reliable benchmarking: requirements and solutions. 661
Volume 24, Number 5, October 2022
- Armin Biere, David Parker:

Tools and algorithms for the construction and analysis of systems: a special issue for TACAS 2020. 663-665 - Hadar Frenkel, Orna Grumberg, Corina S. Pasareanu, Sarai Sheinvald:

Assume, guarantee or repair: a regular framework for non regular properties. 667-689 - Florian Frohn

, Carsten Fuhs:
A calculus for modular loop acceleration and non-termination proofs. 691-715 - Benedikt F. H. Becker

, Nicolas Jeannerod
, Claude Marché
, Yann Régis-Gianas
, Mihaela Sighireanu
, Ralf Treinen:
The CoLiS platform for the analysis of maintainer scripts in Debian software packages. 717-733 - Thomas Neele

, Tim A. C. Willemse, Wieger Wesselink, Antti Valmari
:
Partial-order reduction for parity games and parameterised Boolean equation systems. 735-756 - Ruben Hamers, Erik Horlings, Sung-Shik Jongmans:

The Discourje project: run-time verification of communication protocols in Clojure. 757-782 - Hans-Dieter A. Hiep

, Olaf Maathuis, Jinting Bian
, Frank S. de Boer, Stijn de Gouw:
Verifying OpenJDK's LinkedList using KeY (extended paper). 783-802 - Thom Badings

, Murat Cubuktepe, Nils Jansen
, Sebastian Junges
, Joost-Pieter Katoen, Ufuk Topcu:
Scenario-based verification of uncertain parametric MDPs. 803-819 - Carlos E. Budde

, Pedro R. D'Argenio, Raúl E. Monti, Mariëlle Stoelinga
:
Analysis of non-Markovian repairable fault trees through rare event simulation. 821-841 - Supratik Chakraborty, Ashutosh Gupta, Divyesh Unadkat:

Full-program induction: verifying array programs sans loop invariants. 843-888
Volume 24, Number 6, December 2022
- Mawal A. Mohammed

, Jameleddine Hassine, Mohammad R. Alshayeb:
GSDetector: a tool for automatic detection of bad smells in GRL goal models. 889-910 - Jaehun Lee, Kyungmin Bae, Peter Csaba Ölveczky, Sharon Kim, Minseok Kang:

Modeling and formal analysis of virtually synchronous cyber-physical systems in AADL. 911-948 - Ramsay G. Taylor, Michael Foster

, Siobhán North:
An automated framework for verifying or refuting trace properties of extended finite state machines. 949-972 - Alberto Lluch-Lafuente

, Anastasia Mavridou:
Formal methods and tools for industrial critical systems. 973-976 - Cláudio Belo Lourenço, Denis Cousineau, Florian Faissole, Claude Marché, David Mentré, Hiroaki Inoue:

Automated formal analysis of temporal properties of Ladder programs. 977-997 - Simon Thrane Hansen, Casper Thule, Cláudio Gomes

, Jaco van de Pol, Maurizio Palmieri
, Emin Oguz Inci
, Frederik Palludan Madsen, Jesus Alfonso, José Ángel Castellanos, José Manuel Rodriguez-Fortun:
Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps. 999-1024 - Andrej Kiviriga

, Kim Guldstrand Larsen
, Ulrik Nyman:
Randomized reachability analysis in UPPAAL: fast error detection in timed systems. 1025-1042 - Joshua Schmidt

, Michael Leuschel
:
SMT solving for the validation of B and Event-B models. 1043-1077

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














