callback( { "result":{ "query":":facetid:toc:\"db/conf/sefm/sefm2006.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"68.28" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"32", "@dc":"32", "@oc":"32", "@id":"43319478", "text":":facetid:toc:db/conf/sefm/sefm2006.bht" } }, "hits":{ "@total":"32", "@computed":"32", "@sent":"32", "@first":"0", "hit":[{ "@score":"1", "@id":"5762583", "info":{"authors":{"author":[{"@pid":"a/MariaAlpuente","text":"María Alpuente"},{"@pid":"66/6512","text":"Demis Ballis"},{"@pid":"87/2367","text":"Moreno Falaschi"},{"@pid":"55/4650-1","text":"Daniel Romero 0001"}]},"title":"A Semi-Automatic Methodology for Repairing FaultyWeb Sites.","venue":"SEFM","pages":"31-40","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/AlpuenteBFR06","doi":"10.1109/SEFM.2006.6","ee":"https://doi.org/10.1109/SEFM.2006.6","url":"https://dblp.org/rec/conf/sefm/AlpuenteBFR06"}, "url":"URL#5762583" }, { "@score":"1", "@id":"5762584", "info":{"authors":{"author":{"@pid":"37/531","text":"S. Arun-Kumar"}},"title":"On Bisimilarities Induced by Relations on Actions.","venue":"SEFM","pages":"41-49","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Arun-Kumar06","doi":"10.1109/SEFM.2006.28","ee":"https://doi.org/10.1109/SEFM.2006.28","url":"https://dblp.org/rec/conf/sefm/Arun-Kumar06"}, "url":"URL#5762584" }, { "@score":"1", "@id":"5762585", "info":{"authors":{"author":{"@pid":"02/2604","text":"Richard Banach"}},"title":"Retrenchment Tutorial.","venue":"SEFM","pages":"259","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Banach06","doi":"10.1109/SEFM.2006.32","ee":"https://doi.org/10.1109/SEFM.2006.32","url":"https://dblp.org/rec/conf/sefm/Banach06"}, "url":"URL#5762585" }, { "@score":"1", "@id":"5762586", "info":{"authors":{"author":[{"@pid":"02/2604","text":"Richard Banach"},{"@pid":"78/3015","text":"John Derrick"}]},"title":"Filtering Retrenchments into Refinements.","venue":"SEFM","pages":"60-69","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/BanachD06","doi":"10.1109/SEFM.2006.17","ee":"https://doi.org/10.1109/SEFM.2006.17","url":"https://dblp.org/rec/conf/sefm/BanachD06"}, "url":"URL#5762586" }, { "@score":"1", "@id":"5762587", "info":{"authors":{"author":[{"@pid":"15/1256","text":"Ananda Basu"},{"@pid":"05/178","text":"Marius Bozga"},{"@pid":"s/JosephSifakis","text":"Joseph Sifakis"}]},"title":"Modeling Heterogeneous Real-time Components in BIP.","venue":"SEFM","pages":"3-12","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/BasuBS06","doi":"10.1109/SEFM.2006.27","ee":"https://doi.org/10.1109/SEFM.2006.27","url":"https://dblp.org/rec/conf/sefm/BasuBS06"}, "url":"URL#5762587" }, { "@score":"1", "@id":"5762588", "info":{"authors":{"author":[{"@pid":"b/BBeckert","text":"Bernhard Beckert"},{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"},{"@pid":"s/PeterHSchmitt","text":"Peter H. Schmitt"}]},"title":"Integrating Object-Oriented Design and Deductive Verification of Software.","venue":"SEFM","pages":"260","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/BeckertHS06","doi":"10.1109/SEFM.2006.25","ee":"https://doi.org/10.1109/SEFM.2006.25","url":"https://dblp.org/rec/conf/sefm/BeckertHS06"}, "url":"URL#5762588" }, { "@score":"1", "@id":"5762589", "info":{"authors":{"author":[{"@pid":"77/485","text":"Nadia Belblidia"},{"@pid":"d/MDebbabi","text":"Mourad Debbabi"}]},"title":"Formalizing AspectJ Weaving for Static Pointcuts.","venue":"SEFM","pages":"50-59","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/BelblidiaD06","doi":"10.1109/SEFM.2006.19","ee":"https://doi.org/10.1109/SEFM.2006.19","url":"https://dblp.org/rec/conf/sefm/BelblidiaD06"}, "url":"URL#5762589" }, { "@score":"1", "@id":"5762590", "info":{"authors":{"author":[{"@pid":"97/4727","text":"Deepak D'Souza"},{"@pid":"92/446","text":"Madhu Gopinathan"}]},"title":"Computing Complete Test Graphs for Hierarchical Systems.","venue":"SEFM","pages":"70-79","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/DSouzaG06","doi":"10.1109/SEFM.2006.13","ee":"https://doi.org/10.1109/SEFM.2006.13","url":"https://dblp.org/rec/conf/sefm/DSouzaG06"}, "url":"URL#5762590" }, { "@score":"1", "@id":"5762591", "info":{"authors":{"author":[{"@pid":"21/5714","text":"Yishai A. Feldman"},{"@pid":"11/4182","text":"Ohad Barzilay"},{"@pid":"98/4936","text":"Shmuel S. Tyszberowicz"}]},"title":"Jose: Aspects for Design by Contract80-89.","venue":"SEFM","pages":"80-89","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/FeldmanBT06","doi":"10.1109/SEFM.2006.26","ee":"https://doi.org/10.1109/SEFM.2006.26","url":"https://dblp.org/rec/conf/sefm/FeldmanBT06"}, "url":"URL#5762591" }, { "@score":"1", "@id":"5762592", "info":{"authors":{"author":[{"@pid":"21/5714","text":"Yishai A. Feldman"},{"@pid":"16/5316","text":"Leon Gendler"}]},"title":"Discern: Towards the Automatic Discovery of Software Contracts.","venue":"SEFM","pages":"90-99","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/FeldmanG06","doi":"10.1109/SEFM.2006.16","ee":"https://doi.org/10.1109/SEFM.2006.16","url":"https://dblp.org/rec/conf/sefm/FeldmanG06"}, "url":"URL#5762592" }, { "@score":"1", "@id":"5762593", "info":{"authors":{"author":[{"@pid":"61/2636","text":"Aditya Kanade"},{"@pid":"56/4658","text":"Amitabha Sanyal"},{"@pid":"k/UdayPKhedker","text":"Uday P. Khedker"}]},"title":"A PVS Based Framework for Validating Compiler Optimizations.","venue":"SEFM","pages":"108-117","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/KanadeSK06","doi":"10.1109/SEFM.2006.4","ee":"https://doi.org/10.1109/SEFM.2006.4","url":"https://dblp.org/rec/conf/sefm/KanadeSK06"}, "url":"URL#5762593" }, { "@score":"1", "@id":"5762594", "info":{"authors":{"author":{"@pid":"75/2282","text":"Hemangee K. Kapoor"}},"title":"Formal Modelling and Verification of an Asynchronous DLX Pipeline.","venue":"SEFM","pages":"118-127","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Kapoor06","doi":"10.1109/SEFM.2006.18","ee":"https://doi.org/10.1109/SEFM.2006.18","url":"https://dblp.org/rec/conf/sefm/Kapoor06"}, "url":"URL#5762594" }, { "@score":"1", "@id":"5762595", "info":{"authors":{"author":{"@pid":"k/UdayPKhedker","text":"Uday P. Khedker"}},"title":"Static Analysis of Programs: A Heap Centric View.","venue":"SEFM","pages":"261","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Khedker06","doi":"10.1109/SEFM.2006.35","ee":"https://doi.org/10.1109/SEFM.2006.35","url":"https://dblp.org/rec/conf/sefm/Khedker06"}, "url":"URL#5762595" }, { "@score":"1", "@id":"5762596", "info":{"authors":{"author":{"@pid":"87/489","text":"G. Murali Krishna"}},"title":"Requirements Modeling -- Experience from an Insurance Project.","venue":"SEFM","pages":"157-166","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Krishna06","doi":"10.1109/SEFM.2006.31","ee":"https://doi.org/10.1109/SEFM.2006.31","url":"https://dblp.org/rec/conf/sefm/Krishna06"}, "url":"URL#5762596" }, { "@score":"1", "@id":"5762597", "info":{"authors":{"author":{"@pid":"l/KamalLodaya","text":"Kamal Lodaya"}},"title":"Product Automata and Process Algebra.","venue":"SEFM","pages":"128-136","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Lodaya06","doi":"10.1109/SEFM.2006.30","ee":"https://doi.org/10.1109/SEFM.2006.30","url":"https://dblp.org/rec/conf/sefm/Lodaya06"}, "url":"URL#5762597" }, { "@score":"1", "@id":"5762598", "info":{"authors":{"author":[{"@pid":"85/1251","text":"Claude Marché"},{"@pid":"33/2830","text":"Nicolas Rousset"}]},"title":"Verification of JAVA CARD Applets Behavior with Respect to Transactions and Card Tears.","venue":"SEFM","pages":"137-146","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/MarcheR06","doi":"10.1109/SEFM.2006.38","ee":"https://doi.org/10.1109/SEFM.2006.38","url":"https://dblp.org/rec/conf/sefm/MarcheR06"}, "url":"URL#5762598" }, { "@score":"1", "@id":"5762599", "info":{"authors":{"author":[{"@pid":"84/4043","text":"Annapaola Marconi"},{"@pid":"01/649","text":"Marco Pistore"},{"@pid":"07/4999","text":"Paolo Traverso"}]},"title":"Specifying Data-Flow Requirements for the Automated Composition of Web Services.","venue":"SEFM","pages":"147-156","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/MarconiPT06","doi":"10.1109/SEFM.2006.34","ee":"https://doi.org/10.1109/SEFM.2006.34","url":"https://dblp.org/rec/conf/sefm/MarconiPT06"}, "url":"URL#5762599" }, { "@score":"1", "@id":"5762600", "info":{"authors":{"author":{"@pid":"m/BertrandMeyer","text":"Bertrand Meyer 0001"}},"title":"The Context of Object Computation (extended abstract).","venue":"SEFM","pages":"13-17","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Meyer06","doi":"10.1109/SEFM.2006.36","ee":"https://doi.org/10.1109/SEFM.2006.36","url":"https://dblp.org/rec/conf/sefm/Meyer06"}, "url":"URL#5762600" }, { "@score":"1", "@id":"5762601", "info":{"authors":{"author":[{"@pid":"59/6820","text":"G. Naresh"},{"@pid":"85/4969","text":"B. D. Chaudhary"}]},"title":"A Model for Temporal relations between Object Roles.","venue":"SEFM","pages":"100-107","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/NareshC06","doi":"10.1109/SEFM.2006.3","ee":"https://doi.org/10.1109/SEFM.2006.3","url":"https://dblp.org/rec/conf/sefm/NareshC06"}, "url":"URL#5762601" }, { "@score":"1", "@id":"5762602", "info":{"authors":{"author":[{"@pid":"86/5575","text":"Mats Neovius"},{"@pid":"s/KaisaSere","text":"Kaisa Sere"},{"@pid":"y/LuYan","text":"Lu Yan"},{"@pid":"64/2465","text":"M. Satpathy"}]},"title":"A Formal Model of Context-Awareness and Context-Dependency.","venue":"SEFM","pages":"177-185","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/NeoviusSYS06","doi":"10.1109/SEFM.2006.2","ee":"https://doi.org/10.1109/SEFM.2006.2","url":"https://dblp.org/rec/conf/sefm/NeoviusSYS06"}, "url":"URL#5762602" }, { "@score":"1", "@id":"5762603", "info":{"authors":{"author":[{"@pid":"42/5585","text":"Dong Ha Nguyen"},{"@pid":"s/MarioSudholt","text":"Mario Südholt"}]},"title":"VPA-Based Aspects: Better Support for AOP over Protocols.","venue":"SEFM","pages":"167-176","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/NguyenS06","doi":"10.1109/SEFM.2006.39","ee":"https://doi.org/10.1109/SEFM.2006.39","url":"https://dblp.org/rec/conf/sefm/NguyenS06"}, "url":"URL#5762603" }, { "@score":"1", "@id":"5762604", "info":{"authors":{"author":{"@pid":"r/SriramKRajamani","text":"Sriram K. Rajamani"}},"title":"Automatic Property Checking for Software: Past, Present and Future.","venue":"SEFM","pages":"18-20","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Rajamani06","doi":"10.1109/SEFM.2006.10","ee":"https://doi.org/10.1109/SEFM.2006.10","url":"https://dblp.org/rec/conf/sefm/Rajamani06"}, "url":"URL#5762604" }, { "@score":"1", "@id":"5762605", "info":{"authors":{"author":[{"@pid":"94/496","text":"Pemadeep Ramsokul"},{"@pid":"83/3319","text":"Arcot Sowmya"}]},"title":"ASEHA: A Framework for Modelling and Verification ofWeb Services Protocols.","venue":"SEFM","pages":"196-205","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/RamsokulS06","doi":"10.1109/SEFM.2006.8","ee":"https://doi.org/10.1109/SEFM.2006.8","url":"https://dblp.org/rec/conf/sefm/RamsokulS06"}, "url":"URL#5762605" }, { "@score":"1", "@id":"5762606", "info":{"authors":{"author":[{"@pid":"r/SilvioRanise","text":"Silvio Ranise"},{"@pid":"z/CGZarba","text":"Calogero G. Zarba"}]},"title":"A Theory of Singly-Linked Lists and its Extensible Decision Procedure.","venue":"SEFM","pages":"206-215","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/RaniseZ06","doi":"10.1109/SEFM.2006.7","ee":"https://doi.org/10.1109/SEFM.2006.7","url":"https://dblp.org/rec/conf/sefm/RaniseZ06"}, "url":"URL#5762606" }, { "@score":"1", "@id":"5762607", "info":{"authors":{"author":[{"@pid":"74/1263","text":"Pascal Raymond"},{"@pid":"72/502","text":"Erwan Jahier"},{"@pid":"90/1878","text":"Yvan Roux"}]},"title":"Describing and Executing Random Reactive Systems.","venue":"SEFM","pages":"216-225","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/RaymondJR06","doi":"10.1109/SEFM.2006.15","ee":"https://doi.org/10.1109/SEFM.2006.15","url":"https://dblp.org/rec/conf/sefm/RaymondJR06"}, "url":"URL#5762607" }, { "@score":"1", "@id":"5762608", "info":{"authors":{"author":[{"@pid":"63/3415","text":"Cássio L. Rodrigues"},{"@pid":"58/2700","text":"Paulo E. S. Barbosa"},{"@pid":"11/6459","text":"Jairson M. Cabral"},{"@pid":"f/JorgeCAdeFigueiredo","text":"Jorge C. A. de Figueiredo"},{"@pid":"g/DaltonSereyGuerrero","text":"Dalton Serey Guerrero"}]},"title":"A Bag-of-Tasks Approach for State Space Exploration Using Computational Grids.","venue":"SEFM","pages":"226-235","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/RodriguesBCFG06","doi":"10.1109/SEFM.2006.1","ee":"https://doi.org/10.1109/SEFM.2006.1","url":"https://dblp.org/rec/conf/sefm/RodriguesBCFG06"}, "url":"URL#5762608" }, { "@score":"1", "@id":"5762609", "info":{"authors":{"author":{"@pid":"02/3378","text":"John M. Rushby"}},"title":"Harnessing Disruptive Innovation in Formal Verification.","venue":"SEFM","pages":"21-30","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Rushby06","doi":"10.1109/SEFM.2006.24","ee":"https://doi.org/10.1109/SEFM.2006.24","url":"https://dblp.org/rec/conf/sefm/Rushby06"}, "url":"URL#5762609" }, { "@score":"1", "@id":"5762610", "info":{"authors":{"author":{"@pid":"02/3378","text":"John M. Rushby"}},"title":"Tutorial: Automated Formal Methods with PVS, SAL, and Yices.","venue":"SEFM","pages":"262","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/Rushby06a","doi":"10.1109/SEFM.2006.37","ee":"https://doi.org/10.1109/SEFM.2006.37","url":"https://dblp.org/rec/conf/sefm/Rushby06a"}, "url":"URL#5762610" }, { "@score":"1", "@id":"5762611", "info":{"authors":{"author":[{"@pid":"65/1874","text":"Prahladavaradan Sampath"},{"@pid":"31/4964","text":"Shrawan Kumar"}]},"title":"Composing Context Sensitive Analysis.","venue":"SEFM","pages":"186-195","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/SampathK06","doi":"10.1109/SEFM.2006.12","ee":"https://doi.org/10.1109/SEFM.2006.12","url":"https://dblp.org/rec/conf/sefm/SampathK06"}, "url":"URL#5762611" }, { "@score":"1", "@id":"5762612", "info":{"authors":{"author":[{"@pid":"97/6058","text":"Srihari Sukumaran"},{"@pid":"37/6578","text":"Ashok Sreenivas"},{"@pid":"77/2661","text":"R. Venkatesh"}]},"title":"A Rigorous Approach to Requirements Validation.","venue":"SEFM","pages":"236-245","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/SukumaranSV06","doi":"10.1109/SEFM.2006.5","ee":"https://doi.org/10.1109/SEFM.2006.5","url":"https://dblp.org/rec/conf/sefm/SukumaranSV06"}, "url":"URL#5762612" }, { "@score":"1", "@id":"5762613", "info":{"authors":{"author":[{"@pid":"66/4615","text":"Yong Zhang"},{"@pid":"34/808-1","text":"Tao Huang 0001"},{"@pid":"68/6546-1","text":"Jun Wei 0001"}]},"title":"Declarative Performance Modeling for Component-Based System using UML Profile for Schedulability, Performance and Time.","venue":"SEFM","pages":"246-258","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/sefm/ZhangHW06","doi":"10.1109/SEFM.2006.14","ee":"https://doi.org/10.1109/SEFM.2006.14","url":"https://dblp.org/rec/conf/sefm/ZhangHW06"}, "url":"URL#5762613" }, { "@score":"1", "@id":"5779197", "info":{"title":"Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006), 11-15 September 2006, Pune, India","venue":"SEFM","publisher":"IEEE Computer Society","year":"2006","type":"Editorship","key":"conf/sefm/2006","ee":"https://ieeexplore.ieee.org/xpl/conhome/11157/proceeding","url":"https://dblp.org/rec/conf/sefm/2006"}, "url":"URL#5779197" } ] } } } )