dblp: STTT, Volume 11 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


International Journal on Software Tools for Technology Transfer (STTT), Volume 11

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 11, Number 1, February 2009

Antti Valmari:
Software model checking is a rich research field. 1-11

Igor Melatti, Robert Palmer, Geoffrey Sawaya, Yu Yang, Robert M. Kirby
, Ganesh Gopalakrishnan
:
Parallel and distributed model checking in Eddy. 13-25

Klaus Dräger, Bernd Finkbeiner, Andreas Podelski:
Directed model checking with distance-preserving abstractions. 27-37

Dragan Bosnacki, Stefan Leue, Alberto Lluch-Lafuente
:
Partial-order reduction for general state exploring algorithms. 39-51

Saswat Anand, Corina S. Pasareanu, Willem Visser:
Symbolic execution with abstraction. 53-67

Alessandro Armando
, Jacopo Mantovani, Lorenzo Platania:
Bounded model checking of software using SMT solvers instead of SAT solvers. 69-83
Volume 11, Number 2, April 2009

Michael Huth, Orna Grumberg:
Special section on advances in reachability analysis and decision procedures: contributions to abstraction-based system verification. 85-94

Randal E. Bryant, Daniel Kroening
, Joël Ouaknine
, Sanjit A. Seshia, Ofer Strichman, Bryan A. Brady:
An abstraction-based decision procedure for bit-vector arithmetic. 95-104

Shaunak Chatterjee, Shuvendu K. Lahiri, Shaz Qadeer, Zvonimir Rakamaric:
A low-level memory model and an accompanying reachability predicate. 105-116

Andy Jinqing Yu, Gianfranco Ciardo
, Gerald Lüttgen:
Decision-diagram-based techniques for bounded reachability checking of asynchronous systems. 117-131

Lili Tan:
The worst-case execution time tool challenge 2006. 133-152

Chryssis Georgiou
, Nancy A. Lynch, Panayiotis Mavrommatis, Joshua A. Tauber:
Automated implementation of complex distributed algorithms specified in the IOA language. 153-171
Volume 11, Number 3, July 2009
Papers from ISoLA 2005

Mike Hinchey
, Tiziana Margaria
, Bernhard Steffen:
Guest Editor's introduction. 173-174

Boutheina Chetali, Quang Huy Nguyen:
An automated testing experiment for layered embedded C code. 175-185

Bastian Schlich, Stefan Kowalewski:
Model checking C source code for embedded systems. 187-202

Eric Van Wyk, Mats Per Erik Heimdahl:
Flexibility in modeling languages and tools: a call to arms. 203-215

Dominique Cansell, Dominique Méry, Cyril Proch:
System-on-chip design by proof-based refinement. 217-238

Yamine Aït Ameur, Mickaël Baron, Nadjet Kamel
, Jean-Marc Mota:
Encoding a process algebra using the Event B method. 239-253

David Déharbe, Silvio Ranise
:
Satisfiability solving for software verification. 255-260

Alexandra Desmoulin, César Viho:
Formalizing interoperability for test case generation purpose. 261-267
Volume 11, Number 4, October 2009
Special Section on HVC 07

Karen Yorav:
Haifa verification conference 2007. 269-272

Benny Pasternak, Shmuel S. Tyszberowicz, Amiram Yehudai:
GenUTest: a unit test and mock aspect generation tool. 273-290

Shai Fine, Laurent Fournier, Avi Ziv:
Using Bayesian networks and virtual coverage to hit hard-to-reach events. 291-305

Harald Raffelt, Maik Merten, Bernhard Steffen, Tiziana Margaria
:
Dynamic testing via automata learning. 307-324

Domagoj Babic, Alan J. Hu:
Approximating the safely reusable set of learned facts. 325-338

Corina S. Pasareanu, Willem Visser:
A survey of new trends in symbolic execution for software testing and analysis. 339-353
Volume 11, Number 5, November 2009
Special Section on FMICS 05

Tiziana Margaria
, Mieke Massink:
Preface. 355-357

Pedro de la Cámara, María-del-Mar Gallardo, Pedro Merino
, David Sanán
:
Checking the reliability of socket based communication software. 359-374

Anton Wijs
, Jaco van de Pol, Elena M. Bortnik:
Solving scheduling problems by untimed model checking. 375-392

Harald Raffelt, Bernhard Steffen, Therese Berg, Tiziana Margaria
:
LearnLib: a framework for extrapolating behavioral models. 393-407

Jan Mikác, Paul Caspi:
Flush: an example of development by refinements in SCADE/Lustre. 409-418
Volume 11, Number 6, December 2009

Filippo Ricca, Liu Chao:
Special section on Web Systems Evolution. 419-425

Alessandro Marchetto
, Filippo Ricca:
From objects to services: toward a stepwise migration approach for Java applications. 427-440

Harry M. Sneed:
A pilot project for migrating COBOL code to web services. 441-451

Keisuke Nakano
, Zhenjiang Hu, Masato Takeichi:
Consistent Web site updating based on bidirectional transformation. 453-468

Giuseppe Scanniello
, Damiano Distante
, Michele Risi:
An approach and an Eclipse-based environment for enhancing the navigation structure of Web sites. 469-484

Mario Luca Bernardi
, Giuseppe A. Di Lucca
, Damiano Distante
:
The RE-UWA approach to recover user centered conceptual models from Web applications. 485-501

Brian Chan, King Chun Foo, Lionel Marks, Ying Zou:
An approach for estimating the time needed to perform code changes in business applications. 503-515

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







