International Journal on Software Tools for Technology Transfer, Volume 23 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 23, Number 1, February 2021
SPIoT 2019

Georgios Giantamidis, Stavros Tripakis, Stylianos Basagiannis
:
Learning Moore machines from input-output traces. 1-29

Chris Alvin
, Brian Peterson, Supratik Mukhopadhyay:
Static generation of UML sequence diagrams. 31-53

Yue Yuan, Yi Li, Wenchang Shi:
Detecting multiphase linear ranking functions for single-path linear-constraint loops. 55-67

Florian Kammüller, Axel Legay, Stefano Schivo:
Masterminding change by combining secure system design with security risk assessment. 69-70

Pietro Ferrara
, Amit Kr Mandal, Agostino Cortesi
, Fausto Spoto
:
Static analysis for discovering IoT vulnerabilities. 71-88

René Rydhof Hansen
, Kim Guldstrand Larsen
, Axel Legay, Peter Gjøl Jensen
, Danny Bøgsted Poulsen
:
ADTLang: a programming language approach to attack defense trees. 89-104

Vladimir V. Shakhov, Insoo Koo:
Graph-based technique for survivability assessment and optimization of IoT applications. 105-114
Volume 23, Number 2, April 2021
RV 2018

Omar M. Alhawi, Herbert Rocha
, Mikhail R. Gadelha, Lucas C. Cordeiro
, Eddie Batista de Lima Filho:
Verification and refutation of C programs based on k-induction and invariant inference. 115-135

Raphaël Khoury, Sylvain Hallé, Yannick Lebrun:
Automata-based monitoring for LTL-FO+. 137-154

Martin Leucker
, Christian Colombo:
Preface. 155-156

Felipe Gorostiaga
, César Sánchez
:
Stream runtime verification of real-time event streams with the Striver language. 157-183

Joshua Schneider
, David A. Basin
, Frederik Brix, Srdan Krstic
, Dmitriy Traytel
:
Scalable online first-order monitoring. 185-208

Giles Reger, David E. Rydeheard:
From parametric trace slicing to rule systems. 209-228

Patricia Bouyer, Léo Henry
, Samy Jaziri, Thierry Jéron, Nicolas Markey:
Diagnosing timed automata using timed markings. 229-253

Yliès Falcone, Srdan Krstic, Giles Reger, Dmitriy Traytel
:
A taxonomy for classifying runtime verification tools. 255-284
Volume 23, Number 3, June 2021
FASE 2019

Reiner Hähnle
, Wil M. P. van der Aalst
:
Automated model analysis tools and techniques presented at FASE 2019. 285-287

Artur Boronat
:
Incremental execution of rule-based model transformation. 289-311

Dirk Beyer
, Marie-Christine Jakobs
:
Cooperative verifier-based testing with CoVeriTest. 313-333

Lars Fritsche
, Jens Kosiol, Andy Schürr, Gabriele Taentzer:
Avoiding unnecessary information loss: correct and efficient model synchronization based on triple graph grammars. 335-368

Sven Schneider
, Leen Lambers
, Fernando Orejas
:
A logic-based incremental approach to graph repair featuring delta preservation. 369-410

Sven Schneider
, Maria Maximova
, Lucas Sakizloglou
, Holger Giese
:
Formal testing of timed graph transformation systems using metric temporal graph logic. 411-488

Paul Dubrulle
, Nikolai Kosmatov
, Christophe Gaston
, Arnault Lapitre
:
PolyGraph: a data flow model with frequency arithmetic. 489-517

Paul Dubrulle
, Nikolai Kosmatov
, Christophe Gaston
, Arnault Lapitre
:
Correction to: PolyGraph: a data flow model with frequency arithmetic. 519
Volume 23, Number 4, August 2021
RV 2019

Markus Frohme
, Bernhard Steffen:
Compositional learning of mutually recursive procedural systems. 521-543

Bernd Finkbeiner, Leonardo Mariani:
Introduction to the special issue of the 19th International Conference on Runtime Verification. 545-546

Klaus Havelund, Doron Peled:
An extension of first-order LTL with rules with application to runtime verification. 547-563

Dejan Nickovic
, Xin Qin, Thomas Ferrère, Cristinel Mateis
, Jyotirmoy Deshmukh
:
Specifying and detecting temporal patterns with shape expressions. 565-577

Sean Kauffman, Klaus Havelund, Sebastian Fischmeister:
What can we monitor over unreliable channels? 579-600

Luca Aceto, Ian Cassar, Adrian Francalanza, Anna Ingólfsdóttir:
Comparing controlled system synthesis and suppression enforcement. 601-614

Luca Bortolussi, Francesca Cairoli, Nicola Paoletti
, Scott A. Smolka
, Scott D. Stoller:
Neural predictive monitoring and a comparison of frequentist and Bayesian approaches. 615-640

Saeid Tizpaz-Niari, Pavol Cerný, Sriram Sankaranarayanan, Ashutosh Trivedi:
Quantitative estimation of side-channel leaks with neural networks. 641-654
Volume 23, Number 5, October 2021

Dawid Kopetzki, Michael Lybecait, Stefan Naujokat
, Bernhard Steffen:
Towards language-to-language transformation. 655-677

Simon Bliudze, Panagiotis Katsaros, Saddek Bensalem, Martin Wirsing:
On methods and tools for rigorous system design. 679-684

Christos Grompanopoulos, Antonios Gouglidis, Anastasia Mavridou:
Specifying and verifying usage control models and policies in TLA+. 685-700

Rim El Ballouli, Saddek Bensalem, Marius Bozga, Joseph Sifakis:
Programming dynamic reconfigurable systems. 701-719

Pujie Han, Zhengjun Zhai, Brian Nielsen
, Ulrik Nyman:
Model-based optimization of ARINC-653 partition scheduling. 721-740

Stefan Blom, Saeed Darabi, Marieke Huisman
, Mohsen Safari:
Correct program parallelisations. 741-763

Alexios Lekidis
, Panagiotis Katsaros:
Energy characterization of IoT systems through design aspect monitoring. 765-781

Ezio Bartocci
, Niveditha Manjunath, Leonardo Mariani, Cristinel Mateis
, Dejan Nickovic
:
CPSDebug: Automatic failure explanation in CPS models. 783-796

Nathalie Bertrand, Igor Konnov, Marijana Lazic, Josef Widder:
Verification of randomized consensus algorithms under round-rigid adversaries. 797-821

Nathalie Bertrand, Igor Konnov, Marijana Lazic, Josef Widder:
Correction to: Verification of randomized consensus algorithms under round-rigid adversaries. 823

Parosh Aziz Abdulla, Frédéric Haziza, Lukás Holík, Bengt Jonsson, Ahmed Rezine:
Correction to: An integrated specification and verification technique for highly concurrent data structures. 825

Jan-David Quesel, Stefan Mitsch, Sarah M. Loos, Nikos Aréchiga, André Platzer:
Correction to: How to model and prove hybrid systems with KeYmaera: a tutorial on safety. 827
Volume 23, Number 6, December 2021

Dirk Beyer
, Marieke Huisman
:
TOOLympics I: Competition on software testing. 829-832

Dirk Beyer
:
First international competition on software testing. 833-846

Marie-Christine Jakobs
:
CoVeriTest: interleaving value and predicate analysis for test-case generation. 847-851

Sebastian Ruland, Malte Lochau, Oliver Fehse, Andy Schürr:
CPA/Tiger-MGP: test-goal set partitioning for efficient multi-goal test-suite generation. 853-856

Mikhail R. Gadelha, Rafael S. Menezes
, Lucas C. Cordeiro
:
ESBMC 6.1: automated test case generation using bounded model checking. 857-861

Caroline Lemieux, Koushik Sen:
FairFuzz-TC: a fuzzer targeting rare branches. 863-866

Cristian Cadar
, Martin Nowack
:
KLEE symbolic execution engine in 2019. 867-870

Thomas Lemberger:
Plain random test generation with PRTest. 871-873

Marek Chalupa
, Martina Vitovská, Tomás Jasek, Michael Simácek, Jan Strejcek:
Symbiotic 6: generating test cases by slicing and symbolic execution. 875-877

Dirk Beyer
, Marieke Huisman
, Fabrice Kordon
, Bernhard Steffen
:
TOOLympics II: competitions on formal methods. 879-881

Claire Dross, Carlo A. Furia, Marieke Huisman
, Rosemary Monahan
, Peter Müller:
VerifyThis 2019: a program verification competition. 883-893

Mihaela Sighireanu:
SL-COMP: competition of solvers for separation logic. 895-903

Aart Middeldorp, Julian Nagele
, Kiraku Shintani:
CoCo 2019: report on the eighth confluence competition. 905-916

Falk Howar
, Marc Jasper, Malte Mues
, David Schmidt
, Bernhard Steffen:
The RERS challenge: towards controllable and scalable benchmark synthesis. 917-930

Fabrice Kordon, Lom-Messan Hillah, Francis Hulin-Hubard, Loïg Jezequel, Emmanuel Paviot-Adet:
Study of the efficiency of model checking techniques using results of the MCC from 2015 To 2019. 931-952

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







