callback( { "result":{ "query":":facetid:toc:\"db/conf/concur/concur2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.82" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"40", "@dc":"40", "@oc":"40", "@id":"43373585", "text":":facetid:toc:db/conf/concur/concur2015.bht" } }, "hits":{ "@total":"40", "@computed":"40", "@sent":"40", "@first":"0", "hit":[{ "@score":"1", "@id":"3534997", "info":{"authors":{"author":{"@pid":"92/1378-1","text":"Alexandra Silva 0001"}},"title":"Applications of Automata and Concurrency Theory in Networks (Invited Paper).","venue":"CONCUR","pages":"42-43","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/000115","doi":"10.4230/LIPICS.CONCUR.2015.42","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.42","url":"https://dblp.org/rec/conf/concur/000115"}, "url":"URL#3534997" }, { "@score":"1", "@id":"3534998", "info":{"authors":{"author":[{"@pid":"90/6616","text":"C. Aiswarya"},{"@pid":"b/BenediktBollig","text":"Benedikt Bollig"},{"@pid":"g/PaulGastin","text":"Paul Gastin"}]},"title":"An Automata-Theoretic Approach to the Verification of Distributed Algorithms.","venue":"CONCUR","pages":"340-353","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/AiswaryaBG15","doi":"10.4230/LIPICS.CONCUR.2015.340","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.340","url":"https://dblp.org/rec/conf/concur/AiswaryaBG15"}, "url":"URL#3534998" }, { "@score":"1", "@id":"3534999", "info":{"authors":{"author":[{"@pid":"88/8556","text":"Shaull Almagor"},{"@pid":"07/10110","text":"Guy Avni"},{"@pid":"k/OrnaKupferman","text":"Orna Kupferman"}]},"title":"Repairing Multi-Player Games.","venue":"CONCUR","pages":"325-339","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/AlmagorAK15","doi":"10.4230/LIPICS.CONCUR.2015.325","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.325","url":"https://dblp.org/rec/conf/concur/AlmagorAK15"}, "url":"URL#3534999" }, { "@score":"1", "@id":"3535000", "info":{"authors":{"author":[{"@pid":"58/5271","text":"David Baelde"},{"@pid":"67/5099","text":"Stéphanie Delaune"},{"@pid":"140/7281","text":"Lucca Hirschi"}]},"title":"Partial Order Reduction for Security Protocols.","venue":"CONCUR","pages":"497-510","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BaeldeDH15","doi":"10.4230/LIPICS.CONCUR.2015.497","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.497","url":"https://dblp.org/rec/conf/concur/BaeldeDH15"}, "url":"URL#3535000" }, { "@score":"1", "@id":"3535001", "info":{"authors":{"author":[{"@pid":"b/NathalieBertrand1","text":"Nathalie Bertrand 0001"},{"@pid":"138/2468","text":"Paulin Fournier"},{"@pid":"45/2701","text":"Arnaud Sangnier"}]},"title":"Distributed Local Strategies in Broadcast Networks.","venue":"CONCUR","pages":"44-57","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BertrandFS15","doi":"10.4230/LIPICS.CONCUR.2015.44","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.44","url":"https://dblp.org/rec/conf/concur/BertrandFS15"}, "url":"URL#3535001" }, { "@score":"1", "@id":"3535002", "info":{"authors":{"author":[{"@pid":"b/EikeBest","text":"Eike Best"},{"@pid":"45/6781","text":"Raymond R. Devillers"}]},"title":"Synthesis of Bounded Choice-Free Petri Nets.","venue":"CONCUR","pages":"128-141","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BestD15","doi":"10.4230/LIPICS.CONCUR.2015.128","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.128","url":"https://dblp.org/rec/conf/concur/BestD15"}, "url":"URL#3535002" }, { "@score":"1", "@id":"3535003", "info":{"authors":{"author":[{"@pid":"34/1918","text":"Laura Bocchi"},{"@pid":"96/7159","text":"Julien Lange"},{"@pid":"29/3650","text":"Nobuko Yoshida"}]},"title":"Meeting Deadlines Together.","venue":"CONCUR","pages":"283-296","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BocchiLY15","doi":"10.4230/LIPICS.CONCUR.2015.283","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.283","url":"https://dblp.org/rec/conf/concur/BocchiLY15"}, "url":"URL#3535003" }, { "@score":"1", "@id":"3535004", "info":{"authors":{"author":[{"@pid":"25/5989","text":"Filippo Bonchi"},{"@pid":"72/3703","text":"Daniela Petrisan"},{"@pid":"47/1298","text":"Damien Pous"},{"@pid":"116/4873","text":"Jurriaan Rot"}]},"title":"Lax Bialgebras and Up-To Techniques for Weak Bisimulations.","venue":"CONCUR","pages":"240-253","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BonchiPPR15","doi":"10.4230/LIPICS.CONCUR.2015.240","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.240","url":"https://dblp.org/rec/conf/concur/BonchiPPR15"}, "url":"URL#3535004" }, { "@score":"1", "@id":"3535005", "info":{"authors":{"author":[{"@pid":"b/PatriciaBouyer","text":"Patricia Bouyer"},{"@pid":"153/3139","text":"Samy Jaziri"},{"@pid":"m/NicolasMarkey","text":"Nicolas Markey"}]},"title":"On the Value Problem in Weighted Timed Games.","venue":"CONCUR","pages":"311-324","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BouyerJM15","doi":"10.4230/LIPICS.CONCUR.2015.311","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.311","url":"https://dblp.org/rec/conf/concur/BouyerJM15"}, "url":"URL#3535005" }, { "@score":"1", "@id":"3535006", "info":{"authors":{"author":[{"@pid":"87/8371","text":"Romain Brenguier"},{"@pid":"05/4174","text":"Jean-François Raskin"},{"@pid":"11/7805","text":"Ocan Sankur"}]},"title":"Assume-Admissible Synthesis.","venue":"CONCUR","pages":"100-113","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BrenguierRS15","doi":"10.4230/LIPICS.CONCUR.2015.100","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.100","url":"https://dblp.org/rec/conf/concur/BrenguierRS15"}, "url":"URL#3535006" }, { "@score":"1", "@id":"3535007", "info":{"authors":{"author":[{"@pid":"68/5725","text":"Thomas Brihaye"},{"@pid":"95/422","text":"Gilles Geeraerts"},{"@pid":"97/10256","text":"Axel Haddad"},{"@pid":"85/733","text":"Benjamin Monmege"}]},"title":"To Reach or not to Reach? Efficient Algorithms for Total-Payoff Games.","venue":"CONCUR","pages":"297-310","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/BrihayeGHM15","doi":"10.4230/LIPICS.CONCUR.2015.297","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.297","url":"https://dblp.org/rec/conf/concur/BrihayeGHM15"}, "url":"URL#3535007" }, { "@score":"1", "@id":"3535008", "info":{"authors":{"author":[{"@pid":"41/1366","text":"Marco Carbone"},{"@pid":"65/3603","text":"Fabrizio Montesi"},{"@pid":"07/4034-1","text":"Carsten Schürmann 0001"},{"@pid":"29/3650","text":"Nobuko Yoshida"}]},"title":"Multiparty Session Types as Coherence Proofs.","venue":"CONCUR","pages":"412-426","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/CarboneMSY15","doi":"10.4230/LIPICS.CONCUR.2015.412","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.412","url":"https://dblp.org/rec/conf/concur/CarboneMSY15"}, "url":"URL#3535008" }, { "@score":"1", "@id":"3535009", "info":{"authors":{"author":[{"@pid":"c/LucaCardelli","text":"Luca Cardelli"},{"@pid":"71/5436","text":"Mirco Tribastone"},{"@pid":"117/9987","text":"Max Tschaikowski"},{"@pid":"23/8526","text":"Andrea Vandin"}]},"title":"Forward and Backward Bisimulations for Chemical Reaction Networks.","venue":"CONCUR","pages":"226-239","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/CardelliTTV15","doi":"10.4230/LIPICS.CONCUR.2015.226","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.226","url":"https://dblp.org/rec/conf/concur/CardelliTTV15"}, "url":"URL#3535009" }, { "@score":"1", "@id":"3535010", "info":{"authors":{"author":[{"@pid":"54/8773","text":"Andrea Cerone"},{"@pid":"82/7673","text":"Giovanni Bernardi 0001"},{"@pid":"59/1754","text":"Alexey Gotsman"}]},"title":"A Framework for Transactional Consistency Models with Atomic Visibility.","venue":"CONCUR","pages":"58-71","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/Cerone0G15","doi":"10.4230/LIPICS.CONCUR.2015.58","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.58","url":"https://dblp.org/rec/conf/concur/Cerone0G15"}, "url":"URL#3535010" }, { "@score":"1", "@id":"3535011", "info":{"authors":{"author":[{"@pid":"28/4743","text":"Taolue Chen"},{"@pid":"09/10016","text":"Fu Song"},{"@pid":"71/3710","text":"Zhilin Wu"}]},"title":"On the Satisfiability of Indexed Linear Temporal Logics.","venue":"CONCUR","pages":"254-267","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/ChenSW15","doi":"10.4230/LIPICS.CONCUR.2015.254","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.254","url":"https://dblp.org/rec/conf/concur/ChenSW15"}, "url":"URL#3535011" }, { "@score":"1", "@id":"3535012", "info":{"authors":{"author":[{"@pid":"34/6390","text":"Roberto Di Cosmo"},{"@pid":"38/2487","text":"Michael Lienhardt"},{"@pid":"53/1605","text":"Jacopo Mauro"},{"@pid":"53/2641","text":"Stefano Zacchiroli"},{"@pid":"32/1979","text":"Gianluigi Zavattaro"},{"@pid":"133/5378","text":"Jakub Zwolakowski"}]},"title":"Automatic Application Deployment in the Cloud: from Practice to Theory and Back (Invited Paper).","venue":"CONCUR","pages":"1-16","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/CosmoLMZZZ15","doi":"10.4230/LIPICS.CONCUR.2015.1","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.1","url":"https://dblp.org/rec/conf/concur/CosmoLMZZZ15"}, "url":"URL#3535012" }, { "@score":"1", "@id":"3535013", "info":{"authors":{"author":[{"@pid":"25/1197","text":"Yuxin Deng"},{"@pid":"14/6701-1","text":"Yuan Feng 0001"},{"@pid":"44/3105","text":"Ugo Dal Lago"}]},"title":"On Coinduction and Quantum Lambda Calculi.","venue":"CONCUR","pages":"427-440","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/DengFL15","doi":"10.4230/LIPICS.CONCUR.2015.427","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.427","url":"https://dblp.org/rec/conf/concur/DengFL15"}, "url":"URL#3535013" }, { "@score":"1", "@id":"3535014", "info":{"authors":{"author":[{"@pid":"e/JEsparza","text":"Javier Esparza"},{"@pid":"16/5983","text":"Pierre Ganty"},{"@pid":"50/3164","text":"Jérôme Leroux"},{"@pid":"71/1981","text":"Rupak Majumdar"}]},"title":"Verification of Population Protocols.","venue":"CONCUR","pages":"470-482","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/EsparzaGLM15","doi":"10.4230/LIPICS.CONCUR.2015.470","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.470","url":"https://dblp.org/rec/conf/concur/EsparzaGLM15"}, "url":"URL#3535014" }, { "@score":"1", "@id":"3535015", "info":{"authors":{"author":[{"@pid":"14/6701-1","text":"Yuan Feng 0001"},{"@pid":"13/6525","text":"Mingsheng Ying"}]},"title":"Toward Automatic Verification of Quantum Cryptographic Protocols.","venue":"CONCUR","pages":"441-455","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/FengY15","doi":"10.4230/LIPICS.CONCUR.2015.441","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.441","url":"https://dblp.org/rec/conf/concur/FengY15"}, "url":"URL#3535015" }, { "@score":"1", "@id":"3535016", "info":{"authors":{"author":[{"@pid":"94/5088","text":"Dana Fisman"},{"@pid":"22/1826","text":"Yoad Lustig"}]},"title":"A Modular Approach for Büchi Determinization.","venue":"CONCUR","pages":"368-382","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/FismanL15","doi":"10.4230/LIPICS.CONCUR.2015.368","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.368","url":"https://dblp.org/rec/conf/concur/FismanL15"}, "url":"URL#3535016" }, { "@score":"1", "@id":"3535017", "info":{"authors":{"author":[{"@pid":"01/2980","text":"Vojtech Forejt"},{"@pid":"43/8180","text":"Jan Krcál"}]},"title":"On Frequency LTL in Probabilistic Systems.","venue":"CONCUR","pages":"184-197","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/ForejtK15","doi":"10.4230/LIPICS.CONCUR.2015.184","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.184","url":"https://dblp.org/rec/conf/concur/ForejtK15"}, "url":"URL#3535017" }, { "@score":"1", "@id":"3535018", "info":{"authors":{"author":[{"@pid":"167/4597","text":"Ivan Gavran"},{"@pid":"125/2180","text":"Filip Niksic"},{"@pid":"61/2636","text":"Aditya Kanade"},{"@pid":"71/1981","text":"Rupak Majumdar"},{"@pid":"69/1549","text":"Viktor Vafeiadis"}]},"title":"Rely/Guarantee Reasoning for Asynchronous Programs.","venue":"CONCUR","pages":"483-496","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/GavranNKMV15","doi":"10.4230/LIPICS.CONCUR.2015.483","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.483","url":"https://dblp.org/rec/conf/concur/GavranNKMV15"}, "url":"URL#3535018" }, { "@score":"1", "@id":"3535019", "info":{"authors":{"author":[{"@pid":"117/9238","text":"Daniel Gebler"},{"@pid":"40/840","text":"Simone Tini"}]},"title":"SOS Specifications of Probabilistic Systems by Uniformly Continuous Operators.","venue":"CONCUR","pages":"155-168","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/GeblerT15","doi":"10.4230/LIPICS.CONCUR.2015.155","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.155","url":"https://dblp.org/rec/conf/concur/GeblerT15"}, "url":"URL#3535019" }, { "@score":"1", "@id":"3535020", "info":{"authors":{"author":[{"@pid":"75/4014","text":"Julian Gutierrez 0001"},{"@pid":"71/6562","text":"Paul Harrenstein"},{"@pid":"w/MichaelWooldridge","text":"Michael J. Wooldridge"}]},"title":"Expresiveness and Complexity Results for Strategic Reasoning.","venue":"CONCUR","pages":"268-282","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/GutierrezHW15","doi":"10.4230/LIPICS.CONCUR.2015.268","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.268","url":"https://dblp.org/rec/conf/concur/GutierrezHW15"}, "url":"URL#3535020" }, { "@score":"1", "@id":"3535021", "info":{"authors":{"author":[{"@pid":"78/6159","text":"Ernst Moritz Hahn"},{"@pid":"93/5951","text":"Guangyuan Li"},{"@pid":"38/5198","text":"Sven Schewe"},{"@pid":"51/3769","text":"Andrea Turrini"},{"@pid":"76/4015-1","text":"Lijun Zhang 0001"}]},"title":"Lazy Probabilistic Model Checking without Determinisation.","venue":"CONCUR","pages":"354-367","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/HahnLST015","doi":"10.4230/LIPICS.CONCUR.2015.354","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.354","url":"https://dblp.org/rec/conf/concur/HahnLST015"}, "url":"URL#3535021" }, { "@score":"1", "@id":"3535022", "info":{"authors":{"author":[{"@pid":"h/DavidHarel","text":"David Harel"},{"@pid":"23/10321","text":"Guy Katz"},{"@pid":"60/4801","text":"Robby Lampert"},{"@pid":"98/5121","text":"Assaf Marron"},{"@pid":"52/1274","text":"Gera Weiss"}]},"title":"On the Succinctness of Idioms for Concurrent Programming.","venue":"CONCUR","pages":"85-99","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/HarelKLMW15","doi":"10.4230/LIPICS.CONCUR.2015.85","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.85","url":"https://dblp.org/rec/conf/concur/HarelKLMW15"}, "url":"URL#3535022" }, { "@score":"1", "@id":"3535023", "info":{"authors":{"author":{"@pid":"h/MatthewHennessy","text":"Matthew Hennessy"}},"title":"Behavioural Equivalences for Co-operating Transactions (Invited Paper).","venue":"CONCUR","pages":"41-41","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/Hennessy15","doi":"10.4230/LIPICS.CONCUR.2015.41","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.41","url":"https://dblp.org/rec/conf/concur/Hennessy15"}, "url":"URL#3535023" }, { "@score":"1", "@id":"3535024", "info":{"authors":{"author":[{"@pid":"39/3508","text":"Paul Hunter"},{"@pid":"135/6266","text":"Guillermo A. Pérez 0001"},{"@pid":"05/4174","text":"Jean-François Raskin"}]},"title":"Reactive Synthesis Without Regret.","venue":"CONCUR","pages":"114-127","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/HunterPR15","doi":"10.4230/LIPICS.CONCUR.2015.114","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.114","url":"https://dblp.org/rec/conf/concur/HunterPR15"}, "url":"URL#3535024" }, { "@score":"1", "@id":"3535025", "info":{"authors":{"author":[{"@pid":"72/7537","text":"Narges Khakpour"},{"@pid":"m/MohammadRezaMousavi","text":"Mohammad Reza Mousavi 0001"}]},"title":"Notions of Conformance Testing for Cyber-Physical Systems: Overview and Roadmap (Invited Paper).","venue":"CONCUR","pages":"18-40","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/KhakpourM15","doi":"10.4230/LIPICS.CONCUR.2015.18","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.18","url":"https://dblp.org/rec/conf/concur/KhakpourM15"}, "url":"URL#3535025" }, { "@score":"1", "@id":"3535026", "info":{"authors":{"author":[{"@pid":"40/8244","text":"Dimitrios Kouzapas"},{"@pid":"p/JorgeAPerez","text":"Jorge A. Pérez 0001"},{"@pid":"29/3650","text":"Nobuko Yoshida"}]},"title":"Characteristic Bisimulation for Higher-Order Session Processes.","venue":"CONCUR","pages":"398-411","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/KouzapasPY15","doi":"10.4230/LIPICS.CONCUR.2015.398","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.398","url":"https://dblp.org/rec/conf/concur/KouzapasPY15"}, "url":"URL#3535026" }, { "@score":"1", "@id":"3535027", "info":{"authors":{"author":[{"@pid":"95/6511","text":"Jan Kretínský"},{"@pid":"l/KimGuldstrandLarsen","text":"Kim Guldstrand Larsen"},{"@pid":"125/3005","text":"Simon Laursen"},{"@pid":"s/JiriSrba","text":"Jirí Srba"}]},"title":"Polynomial Time Decidability of Weighted Synchronization under Partial Observability.","venue":"CONCUR","pages":"142-154","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/KretinskyLLS15","doi":"10.4230/LIPICS.CONCUR.2015.142","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.142","url":"https://dblp.org/rec/conf/concur/KretinskyLLS15"}, "url":"URL#3535027" }, { "@score":"1", "@id":"3535028", "info":{"authors":{"author":[{"@pid":"88/3992","text":"Sergueï Lenglet"},{"@pid":"36/5932","text":"Alan Schmitt"}]},"title":"Howe's Method for Contextual Semantics.","venue":"CONCUR","pages":"212-225","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/LengletS15","doi":"10.4230/LIPICS.CONCUR.2015.212","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.212","url":"https://dblp.org/rec/conf/concur/LengletS15"}, "url":"URL#3535028" }, { "@score":"1", "@id":"3535029", "info":{"authors":{"author":[{"@pid":"91/6350","text":"Joachim Parrow"},{"@pid":"38/2005","text":"Johannes Borgström"},{"@pid":"54/4160","text":"Lars-Henrik Eriksson"},{"@pid":"141/6330","text":"Ramunas Gutkovas"},{"@pid":"56/3934","text":"Tjark Weber"}]},"title":"Modal Logics for Nominal Transition Systems.","venue":"CONCUR","pages":"198-211","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/ParrowBEGW15","doi":"10.4230/LIPICS.CONCUR.2015.198","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.198","url":"https://dblp.org/rec/conf/concur/ParrowBEGW15"}, "url":"URL#3535029" }, { "@score":"1", "@id":"3535030", "info":{"authors":{"author":[{"@pid":"74/9958","text":"César Rodríguez"},{"@pid":"123/7772","text":"Marcelo Sousa"},{"@pid":"77/1586-1","text":"Subodh Sharma 0001"},{"@pid":"k/DanielKroening","text":"Daniel Kroening"}]},"title":"Unfolding-based Partial Order Reduction.","venue":"CONCUR","pages":"456-469","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/RodriguezSSK15","doi":"10.4230/LIPICS.CONCUR.2015.456","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.456","url":"https://dblp.org/rec/conf/concur/RodriguezSSK15"}, "url":"URL#3535030" }, { "@score":"1", "@id":"3535031", "info":{"authors":{"author":[{"@pid":"09/10016","text":"Fu Song"},{"@pid":"94/4256","text":"Weikai Miao"},{"@pid":"33/1678","text":"Geguang Pu"},{"@pid":"83/5342","text":"Min Zhang"}]},"title":"On Reachability Analysis of Pushdown Systems with Transductions: Application to Boolean Programs with Call-by-Reference.","venue":"CONCUR","pages":"383-397","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/SongMPZ15","doi":"10.4230/LIPICS.CONCUR.2015.383","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.383","url":"https://dblp.org/rec/conf/concur/SongMPZ15"}, "url":"URL#3535031" }, { "@score":"1", "@id":"3535032", "info":{"authors":{"author":[{"@pid":"23/10279","text":"Sadegh Esmaeil Zadeh Soudjani"},{"@pid":"19/3904","text":"Alessandro Abate"},{"@pid":"71/1981","text":"Rupak Majumdar"}]},"title":"Dynamic Bayesian Networks as Formal Abstractions of Structured Stochastic Processes.","venue":"CONCUR","pages":"169-183","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/SoudjaniAM15","doi":"10.4230/LIPICS.CONCUR.2015.169","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.169","url":"https://dblp.org/rec/conf/concur/SoudjaniAM15"}, "url":"URL#3535032" }, { "@score":"1", "@id":"3535033", "info":{"authors":{"author":[{"@pid":"33/5041","text":"Salvatore La Torre"},{"@pid":"m/AMuscholl","text":"Anca Muscholl"},{"@pid":"27/7046","text":"Igor Walukiewicz"}]},"title":"Safety of Parametrized Asynchronous Shared-Memory Systems is Almost Always Decidable.","venue":"CONCUR","pages":"72-84","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/TorreMW15","doi":"10.4230/LIPICS.CONCUR.2015.72","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.72","url":"https://dblp.org/rec/conf/concur/TorreMW15"}, "url":"URL#3535033" }, { "@score":"1", "@id":"3535034", "info":{"authors":{"author":{"@pid":"90/2367","text":"James Worrell 0001"}},"title":"Reachability Problems for Continuous Linear Dynamical Systems (Invited Paper).","venue":"CONCUR","pages":"17-17","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/Worrell15","doi":"10.4230/LIPICS.CONCUR.2015.17","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.17","url":"https://dblp.org/rec/conf/concur/Worrell15"}, "url":"URL#3535034" }, { "@score":"1", "@id":"3535035", "info":{"title":"Front Matter, Table of Contents, Preface, Committees, External Reviewers.","venue":"CONCUR","pages":"i-xiv","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/concur/X15","doi":"10.4230/LIPICS.CONCUR.2015.I","ee":"https://doi.org/10.4230/LIPIcs.CONCUR.2015.i","url":"https://dblp.org/rec/conf/concur/X15"}, "url":"URL#3535035" }, { "@score":"1", "@id":"3667331", "info":{"authors":{"author":[{"@pid":"a/LucaAceto","text":"Luca Aceto"},{"@pid":"02/6709","text":"David de Frutos-Escrig"}]},"title":"26th International Conference on Concurrency Theory, CONCUR 2015, Madrid, Spain, September 1.4, 2015","venue":["CONCUR","LIPIcs"],"volume":"42","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","year":"2015","type":"Editorship","access":"open","key":"conf/concur/2015","ee":"http://www.dagstuhl.de/dagpub/978-3-939897-91-0","url":"https://dblp.org/rec/conf/concur/2015"}, "url":"URL#3667331" } ] } } } )