callback( { "result":{ "query":":facetid:toc:\"db/journals/fmsd/fmsd49.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.94" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"8", "@dc":"8", "@oc":"8", "@id":"43438508", "text":":facetid:toc:db/journals/fmsd/fmsd49.bht" } }, "hits":{ "@total":"8", "@computed":"8", "@sent":"8", "@first":"0", "hit":[{ "@score":"1", "@id":"3110694", "info":{"authors":{"author":[{"@pid":"b/DavidABasin","text":"David A. Basin"},{"@pid":"99/1475","text":"Germano Caronni"},{"@pid":"34/9839","text":"Sarah Ereth"},{"@pid":"84/1563","text":"Matús Harvan"},{"@pid":"27/6182","text":"Felix Klaedtke"},{"@pid":"m/HeikoMantel","text":"Heiko Mantel"}]},"title":"Scalable offline monitoring of temporal specifications.","venue":"Formal Methods Syst. Des.","volume":"49","number":"1-2","pages":"75-108","year":"2016","type":"Journal Articles","access":"closed","key":"journals/fmsd/BasinCEHKM16","doi":"10.1007/S10703-016-0242-Y","ee":"https://doi.org/10.1007/s10703-016-0242-y","url":"https://dblp.org/rec/journals/fmsd/BasinCEHKM16"}, "url":"URL#3110694" }, { "@score":"1", "@id":"3110695", "info":{"authors":{"author":[{"@pid":"117/2568","text":"Mitra Tabaei Befrouei"},{"@pid":"w/ChaoWang","text":"Chao Wang 0001"},{"@pid":"15/3636","text":"Georg Weissenbacher"}]},"title":"Abstraction and mining of traces to explain concurrency bugs.","venue":"Formal Methods Syst. Des.","volume":"49","number":"1-2","pages":"1-32","year":"2016","type":"Journal Articles","access":"open","key":"journals/fmsd/BefroueiWW16","doi":"10.1007/S10703-015-0240-5","ee":"https://doi.org/10.1007/s10703-015-0240-5","url":"https://dblp.org/rec/journals/fmsd/BefroueiWW16"}, "url":"URL#3110695" }, { "@score":"1", "@id":"3110696", "info":{"authors":{"author":[{"@pid":"13/5961","text":"Alessandro Cimatti"},{"@pid":"19/3686","text":"Alberto Griggio"},{"@pid":"59/7880","text":"Sergio Mover"},{"@pid":"t/StefanoTonetta","text":"Stefano Tonetta"}]},"title":"Infinite-state invariant checking with IC3 and predicate abstraction.","venue":"Formal Methods Syst. Des.","volume":"49","number":"3","pages":"190-218","year":"2016","type":"Journal Articles","access":"closed","key":"journals/fmsd/CimattiGMT16","doi":"10.1007/S10703-016-0257-4","ee":"https://doi.org/10.1007/s10703-016-0257-4","url":"https://dblp.org/rec/journals/fmsd/CimattiGMT16"}, "url":"URL#3110696" }, { "@score":"1", "@id":"3110697", "info":{"authors":{"author":[{"@pid":"39/7271","text":"Christian Colombo 0001"},{"@pid":"11/5986","text":"Yliès Falcone"}]},"title":"Organising LTL monitors over distributed systems with a global clock.","venue":"Formal Methods Syst. Des.","volume":"49","number":"1-2","pages":"109-158","year":"2016","type":"Journal Articles","access":"closed","key":"journals/fmsd/ColomboF16","doi":"10.1007/S10703-016-0251-X","ee":"https://doi.org/10.1007/s10703-016-0251-x","url":"https://dblp.org/rec/journals/fmsd/ColomboF16"}, "url":"URL#3110697" }, { "@score":"1", "@id":"3110698", "info":{"authors":{"author":[{"@pid":"e/JEsparza","text":"Javier Esparza"},{"@pid":"95/6511","text":"Jan Kretínský"},{"@pid":"129/1369","text":"Salomon Sickert"}]},"title":"From LTL to deterministic automata - A safraless compositional approach.","venue":"Formal Methods Syst. Des.","volume":"49","number":"3","pages":"219-271","year":"2016","type":"Journal Articles","access":"closed","key":"journals/fmsd/EsparzaKS16","doi":"10.1007/S10703-016-0259-2","ee":"https://doi.org/10.1007/s10703-016-0259-2","url":"https://dblp.org/rec/journals/fmsd/EsparzaKS16"}, "url":"URL#3110698" }, { "@score":"1", "@id":"3110700", "info":{"authors":{"author":[{"@pid":"44/4535","text":"Fatemeh Ghassemi"},{"@pid":"f/WanFokkink","text":"Wan J. Fokkink"}]},"title":"Model checking mobile ad hoc networks.","venue":"Formal Methods Syst. Des.","volume":"49","number":"3","pages":"159-189","year":"2016","type":"Journal Articles","access":"closed","key":"journals/fmsd/GhassemiF16","doi":"10.1007/S10703-016-0254-7","ee":"https://doi.org/10.1007/s10703-016-0254-7","url":"https://dblp.org/rec/journals/fmsd/GhassemiF16"}, "url":"URL#3110700" }, { "@score":"1", "@id":"3110701", "info":{"authors":{"author":[{"@pid":"40/472","text":"Ajith K. John"},{"@pid":"34/4525","text":"Supratik Chakraborty"}]},"title":"A layered algorithm for quantifier elimination from linear modular constraints.","venue":"Formal Methods Syst. Des.","volume":"49","number":"3","pages":"272-323","year":"2016","type":"Journal Articles","access":"closed","key":"journals/fmsd/JohnC16","doi":"10.1007/S10703-016-0260-9","ee":"https://doi.org/10.1007/s10703-016-0260-9","url":"https://dblp.org/rec/journals/fmsd/JohnC16"}, "url":"URL#3110701" }, { "@score":"1", "@id":"3110705", "info":{"authors":{"author":[{"@pid":"61/5931","text":"Stefan Mitsch"},{"@pid":"55/950","text":"André Platzer"}]},"title":"ModelPlex: verified runtime validation of verified cyber-physical system models.","venue":"Formal Methods Syst. Des.","volume":"49","number":"1-2","pages":"33-74","year":"2016","type":"Journal Articles","access":"open","key":"journals/fmsd/MitschP16","doi":"10.1007/S10703-016-0241-Z","ee":"https://doi.org/10.1007/s10703-016-0241-z","url":"https://dblp.org/rec/journals/fmsd/MitschP16"}, "url":"URL#3110705" } ] } } } )