Review Research 2021

Computer Science

FMT



Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015

2020

Abstract


Fehnker, A. , & Mader, A. (2020). Atelier for Creative Programming. Abstract from 12th International Conference on Computer Supported Education, CSEDU 2020, .

Article (contribution to journal)


Budde, C. E., D’Argenio, P. R. , Hartmanns, A., & Sedwards, S. (2020). An efficient statistical model checker for nondeterminism and rare events. International journal on software tools for technology transfer, 22(6), 759-780. https://doi.org/10.1007/s10009-020-00563-2




Guo, Z. , Li, B. , Li, X., & Zhang, S. (2020). Compatible spanning circuits in edge-colored graphs. Discrete mathematics, 343(7), [111908]. https://doi.org/10.1016/j.disc.2020.111908

Hartmanns, A., Junges, S. , Katoen, J-P., & Quatmann, T. (2020). Multi-cost Bounded Tradeoff Analysis in MDP. Journal of automated reasoning, 64(7), 1483-1522. https://doi.org/10.1007/s10817-020-09574-9


Li, M., Turrini, A. , Hahn, E. M., She, Z., & Zhang, L. (2020). Probabilistic Preference Planning Problem for Markov Decision Processes. IEEE transactions on software engineering. https://doi.org/10.1109/TSE.2020.3024215


Qi, J. , Bloemen, V., Wang, S., Van Wijk, J., & Van De Wetering, H. (2020). STBins: Visual Tracking and Comparison of Multiple Data Sequences Using Temporal Binning. IEEE transactions on visualization and computer graphics, 26(1), 1054-1063. [8805450]. https://doi.org/10.1109/TVCG.2019.2934289




Ton, B., Basten, R., Bolte, J. , Braaksma, J., Bucchianico, A. D., Calseyde, P. V. D., Grooteman, F., Heskes, T., Jansen, N., Teeuw, W. , Tinga, T. , & Stoelinga, M. (2020). PrimaVera: Synergising Predictive Maintenance. Applied Sciences, 10(23), [8348]. https://doi.org/10.3390/app10238348

Wetselaar, P., Lobbezoo, F., de Jong, P., Choudry, U., van Rooijen, J. , & Langerak, R. (2020). A methodology for evaluating tooth wear monitoring using timed automata modelling. Journal of Oral Rehabilitation, 47(3), 353-360. https://doi.org/10.1111/joor.12908



Chapter


Arias, J. , Budde, C. E., Penczek, W. , Petrucci, L., Sidoruk, T. , & Stoelinga, M. (2020). Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems. In SW. Lin, Z. Hou, & B. Mahoney (Eds.), Formal Methods and Software Engineering - 22nd International Conference on Formal Engineering Methods, ICFEM 2020, Proceedings (pp. 3-19). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12531 LNCS). Springer. https://doi.org/10.1007/978-3-030-63406-3_1

Budde, C. E. (2020). FIG: The Finite Improbability Generator. In A. Biere, & D. Parker (Eds.), Tools and Algorithms for the Construction and Analysis of Systems- 26th International Conference, TACAS 2020, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings, Part I (pp. 483-491). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12078 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-45190-5_27

Budde, C. E. , & Stoelinga, M. (2020). Automated Rare Event Simulation for Fault Tree Analysis via Minimal Cut Sets. In H. Hermanns (Ed.), Measurement, Modelling and Evaluation of Computing Systems - 20th International GI/ITG Conference, MMB 2020, Proceedings (pp. 259-277). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12040 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-43024-5_16

Budde, C. E. , Biagi, M. , Monti, R. E., D’Argenio, P. R. , & Stoelinga, M. (2020). Rare Event Simulation for Non-Markovian Repairable Fault Trees. In A. Biere, & D. Parker (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25–30, 2020, Proceedings (Vol. I, pp. 463-482). (Lecture Notes in Computer Science; Vol. 12078). Springer Singapore. https://doi.org/10.1007/978-3-030-45190-5_26

Budde, C. E. , Ruijters, E. , & Stoelinga, M. (2020). The Dynamic Fault Tree Rare Event Simulator. In M. Gribaudo, D. N. Jansen, & A. Remke (Eds.), Quantitative Evaluation of Systems: 17th International Conference, QEST 2020, Vienna, Austria, August 31 – September 3, 2020, Proceedings (pp. 233-238). (Lecture Notes in Computer Science; Vol. 12289), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-59854-9_17

Haak, L. B. V. D., Wijs, A., Brand, M. V. D. , & Huisman, M. (2020). Formal Methods for GPGPU Programming: Is the Demand Met? In B. Dongol, & E. Troubitsyna (Eds.), Integrated Formal Methods: 16th International Conference, IFM 2020, Lugano, Switzerland, November 16–20, 2020, Proceedings (pp. 160-177). (Lecture Notes in Computer Science; Vol. 12546). Springer. https://doi.org/10.1007/978-3-030-63461-2_9

Huisman, M. , Monti, R. E., Ulbrich, M., & Weigl, A. (2020). The VerifyThis Collaborative Long Term Challenge. In W. Ahrendt, B. Beckert, R. Bubel, R. Hähnle, & M. Ulbrich (Eds.), Deductive Software Verification: Future Perspectives: Reflections on the Occasion of 20 Years of KeY (pp. 246-260). (Lecture Notes in Computer Science; Vol. 12345). Springer Singapore. https://doi.org/10.1007/978-3-030-64354-610

Monti, R. , Budde, C. E., & D’argenio, P. R. (2020). A compositional semantics for repairable fault trees with general distributions. In E. Albert, & L. Kovacs (Eds.), Proceedings of the 23rd International Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 354-372). (EPiC Series in Computing; Vol. 73). EasyChair. https://doi.org/10.29007/p16v

Mulder, H. , Huisman, M. , & Joosten, S. J. C. (2020). Improving Performance of the VerCors Program Verifier. In W. Ahrendt, B. Beckert, R. Bubel, R. Hähnle, & M. Ulbrich (Eds.), Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY (pp. 65-82). (Lecture Notes in Computer Science; Vol. 12345). Springer Singapore. https://doi.org/10.1007/978-3-030-64354-6_3

Oortwijn, W. , Huisman, M. , Joosten, S. J. C. , & Pol, J. V. D. (2020). Automated Verification of Parallel Nested DFS. In A. Biere, & D. Parker (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25–30, 2020, Proceedings, Part I (pp. 247-265). (Lecture Notes in Computer Science; Vol. 12078). Springer. https://doi.org/10.1007/978-3-030-45190-5_14

Conference article


Beyer, D. , & Huisman, M. (2020). Tools for the construction and analysis of systems A special issue for TACAS 2018. International journal on software tools for technology transfer, 22(6), 685-687. https://doi.org/10.1007/s10009-020-00581-0


Conference contribution


Abate, A., Blom, H., Cauchi, N., Delicaris, J. , Hartmanns, A., Khaled, M., Lavaei, A., Pilch, C. , Remke, A., Schupp, S., Shmarov, F., Soudjani, S., Vinod, A. P., Wooding, B., Zamani, M., & Zuliani, P. (2020). ARCH-COMP20 Category Report: Stochastic Models. In ARCH20. 7th International Workshop on Applied Verification of Continuous and Hybrid Systems (ARCH20), Berlin, Germany, July 12, 2020 (Vol. 74, pp. 76-106). (EPiC Series in Computing). EasyChair. https://doi.org/10.29007/mqzc

Bouwman, M. , van der Wal, D., Luttik, B. , Stoelinga, M. , & Rensink, A. (2020). What is the point: Formal analysis and test generation for a railway standard. In P. Baraldi, F. Di Maio, & E. Zio (Eds.), Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference (pp. 921-928). Research Publishing Services. https://doi.org/10.3850/978-981-14-8593-0_4410-cd

Chaudhary, K., Chand, V. , & Fehnker, A. (2020). Double-Spending Analysis of Bitcoin. In D. Vogel, K. N. Shen, P. S. Ling, C. Hsu, J. Y. L. Thong, M. D. Marco, M. Limayem, & S. X. Xu (Eds.), 24th Pacific Asia Conference on Information Systems, PACIS 2020, Dubai, UAE, June 22-24, 2020 (pp. 210) https://aisel.aisnet.org/pacis2020/210

D'Argenio, P. R., Fraire, J. A. , & Hartmanns, A. (2020). Sampling Distributed Schedulers for Resilient Space Communication. In R. Lee, S. Jha, & A. Mavridou (Eds.), NASA Formal Methods: 12th International Symposium, NFM 2020, Moffett Field, CA, USA, May 11–15, 2020, Proceedings (pp. 291-310). (Lecture Notes in Computer Science; Vol. 12229). Springer. https://doi.org/10.1007/978-3-030-55754-6_17

Deknop, C., Fabry, J., Mens, K. , & Zaytsev, V. (2020). Improving a Software Modernisation Process by Differencing Migration Logs. In M. Morisio, M. Torchiano, & A. Jedlitschka (Eds.), Product-Focused Software Process Improvement: 21st International Conference, PROFES 2020, Turin, Italy, November 25–27, 2020, Proceedings (pp. 270-286). (Lecture Notes in Computer Science; Vol. 12562). Springer. https://doi.org/10.1007/978-3-030-64148-1_17

Eijkel, D. , & Fehnker, A. (2020). A distributed blockchain model of selfish mining. In E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro, & D. Delmas (Eds.), Formal Methods- FM 2019 International Workshops - Revised Selected Papers (pp. 350-361). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12232 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-54994-7_26

Fehnker, A. (2020). A sports day for programming. In D. R. Stikkolorum, & E. Rahimi (Eds.), CSERC '20: the 9th Computer Science Education Research Conference, Virtual Event, The Netherlands, 19-20 October, 2020 (pp. 11:1-11:6). [11] ACM SIGCOMM. https://doi.org/10.1145/3442481.3442507

Fehnker, A. , Mader, A., Rump, A., Rutgers, M., Steenmeijer, L., & Witteveen, C. (2020). Atelier: An Online Platform for Programming Tutorials. In Proceedings of the 9th Computer Science Education Research Conference (CSERC '20). Association for Computing Machinery (ACM). https://doi.org/10.1145/3442481.3442511

Garavel, H., Ter Beek, M. H. , & Van De Pol, J. (2020). The 2020 Expert Survey on Formal Methods. In M. H. ter Beek, & D. Nickovic (Eds.), Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings (pp. 3-69). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12327 LNCS). Springer. https://doi.org/10.1007/978-3-030-58298-2_1

Hahn, E. M., Perez, M., Schewe, S., Somenzi, F., Trivedi, A., & Wojtczak, D. (2020). Faithful and Effective Reward Schemes for Model-Free Reinforcement Learning of Omega-Regular Objectives. In D. V. Hung, & O. Sokolsky (Eds.), Automated Technology for Verification and Analysis: 18th International Symposium, ATVA 2020, Hanoi, Vietnam, October 19–23, 2020, Proceedings (pp. 108-124). (Lecture Notes in Computer Science; Vol. 12302). Springer. https://doi.org/10.1007/978-3-030-59152-6_6

Hahn, E. M., Perez, M., Schewe, S., Somenzi, F., Trivedi, A., & Wojtczak, D. (2020). Model-Free Reinforcement Learning for Stochastic Parity Games. In I. Konnov, & L. Kovacs (Eds.), 31st International Conference on Concurrency Theory (CONCUR 2020) (Leibniz International Proceedings in Informatics (LIPIcs); Vol. 171). Dagstuhl. https://doi.org/10.4230/LIPICS.CONCUR.2020.21

Hartmanns, A., & Kaminski, B. L. (2020). Optimistic Value Iteration. In S. K. Lahiri, & C. Wang (Eds.), Computer Aided Verification: 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part II (pp. 488-511). (Lecture Notes in Computer Science; Vol. 12225). Springer. https://doi.org/10.1007/978-3-030-53291-8_26

Huisman, M. , & Monti, R. E. (2020). On the Industrial Application of Critical Software Verification with VerCors. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Applications - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Rhodes, Greece, October 20-30, 2020, Proceedings, Part III (pp. 273-292). (Lecture Notes in Computer Science; Vol. 12478). Springer Singapore. https://doi.org/10.1007/978-3-030-61467-6_18

Huisman, M., & Seceleanu, C. (2020). Verification and Validation of Concurrent and Distributed Systems (Track Summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Rhodes, Greece, October 20-30, 2020, Proceedings, Part I (pp. 421-425). (Lecture Notes in Computer Science; Vol. 12476). Springer Singapore. https://doi.org/10.1007/978-3-030-61362-4_24

Huisman, M., & Wijs, A. (2020). Towards verified construction of correct and optimised GPU software. In W. Oortwijn (Ed.), FTfJP 2020: Proceedings of the 22nd ACM SIGPLAN International Workshop on Formal Techniques for Java-Like Programs (pp. 10-14). Association for Computing Machinery (ACM). https://doi.org/10.1145/3427761.3428344

Lathouwers, S. , Everts, M. , & Huisman, M. (2020). Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. In S. Furnell, P. Mori, E. Weippl, & O. Camp (Eds.), Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE (pp. 784-795). SCITEPRESS Digital Library. https://doi.org/10.5220/0009371207840795

Lijzenga, O. , & van Dijk, T. (2020). Symbolic Parity Game Solvers that Yield Winning Strategies. In J-F. Raskin, & D. Bresolin (Eds.), Proceedings 11th International Symposium on Games, Automata, Logics, and Formal Verification: Brussels, Belgium, September 21-22, 2020 (pp. 18-32). (Electronic Proceedings in Theoretical Computer Science; Vol. 326). Open Publishing Association. https://doi.org/10.4204/EPTCS.326.2

Oortwijn, W., Gurov, D. , & Huisman, M. (2020). Practical Abstractions for Automated Verification of Shared-Memory Concurrency. In D. Beyer, & D. Zufferey (Eds.), Verification, Model Checking, and Abstract Interpretation - 21st International Conference, VMCAI 2020, New Orleans, LA, USA, January 16-21, 2020, Proceedings (pp. 401-425). (Lecture Notes in Computer Science; Vol. 11990). Springer Singapore. https://doi.org/10.1007/978-3-030-39322-9_19

Pilch, C. , Hartmanns, A. , & Remke, A. (2020). Classic and non-prophetic model checking for hybrid Petri nets with stochastic firings. In A. Ames, S. A. Seshia, & J. Deshmukh (Eds.), HSCC '20: Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control [10] Association for Computing Machinery (ACM). https://doi.org/10.1145/3365365.3382198

Safari, M. , & Huisman, M. (2020). A Generic Approach to the Verification of the Permutation Property of Sequential and Parallel Swap-Based Sorting Algorithms. In B. Dongol, & E. Troubitsyna (Eds.), Integrated Formal Methods - 16th International Conference, IFM 2020, Lugano, Switzerland, November 16-20, 2020, Proceedings (pp. 257-275). (Lecture Notes in Computer Science; Vol. 12546). Springer Singapore. https://doi.org/10.1007/978-3-030-63461-2_14

Safari, M. , & Huisman, M. (2020). Formal Verification of Parallel Stream Compaction and Summed-Area Table Algorithms. In V. K. I. Pun, V. Stolz, & A. Simão (Eds.), Theoretical Aspects of Computing - ICTAC 2020 - 17th International Colloquium, Macau, China, November 30 - December 4, 2020, Proceedings (pp. 181-199). (Lecture Notes in Computer Science; Vol. 12545). Springer Singapore. https://doi.org/10.1007/978-3-030-64276-1_10

Safari, M. , Oortwijn, W. , Joosten, S. J. C. , & Huisman, M. (2020). Formal Verification of Parallel Prefix Sum. In R. Lee, S. Jha, & A. Mavridou (Eds.), NASA Formal Methods - 12th International Symposium, NFM 2020, Moffett Field, CA, USA, May 11-15, 2020, Proceedings (pp. 170-186). (Lecture Notes in Computer Science; Vol. 12229). Springer Singapore. https://doi.org/10.1007/978-3-030-55754-6_10

Tomassetti, F. , & Zaytsev, V. (2020). Reflections on the Lack of Adoption of Domain Specific Languages. In L. Burgueño, & L. M. Kristensen (Eds.), STAF Workshop Proceedings (pp. 85-94). [5] (CEUR Workshop Proceedings; Vol. 2707). CEUR. http://ceur-ws.org/Vol-2707/oopslepaper5.pdf

Zaytsev, V. (2020). Software Language Engineers' Worst Nightmare. In R. Lämmel, L. Tratt, & J. De Lara (Eds.), Proceedings of the 13th International Conference on Software Language Engineering (13th ed., pp. 72-85). ACM Publishing. https://doi.org/10.1145/3426425.3426933

van Huizen, J. C. , Huisman, M. , Lathouwers, S. A. M. , Schaafstal, A. M. , & Stoelinga, M. I. A. (2020). Alice and Eve: a celebration of women in computer science. In J. van der Veen, N. van Hattum-Janssen, H-M. Järvinen, T. de Laet, & I. ten Dam (Eds.), Engaging, Engineering, Education: Book of Abstracts, SEFI 48th Annual Conference University of Twente (online), 20-24 September, 2020 University of Twente.

Digital or Visual Products

Editorial



Cuadrado, J. S. , & Rensink, A. (2020). Special section on ICMT at STAF 2018. Software and systems modeling, 19(2), 399-400. https://doi.org/10.1007/s10270-020-00775-9

Fehnker, A., & Garavel, H. (2020). Preface. Electronic Proceedings in Theoretical Computer Science, EPTCS, 316. http://eptcs.web.cse.unsw.edu.au/content.cgi?MARS2020#EPTCS316.0

Paper


Mader, A. H. , Fehnker, A. , & Dertien, E. C. (2020). Tinkering in Informatics as Teaching Method. 450-457. Paper presented at 12th International Conference on Computer Supported Education, CSEDU 2020, . https://doi.org/10.5220/0009467304500457

PhD Thesis - Research external, graduation UT

2019

Article (contribution to journal)


Bloemen, V., Duret-Lutz, A. , & van de Pol, J. (2019). Model checking with generalized Rabin and Fin-less automata. International journal on software tools for technology transfer, 21(3), 307-324. https://doi.org/10.1007/s10009-019-00508-4



Budde, C. E., D'Argenio, P. R. , & Hartmanns, A. (2019). Automated compositional importance splitting. Science of computer programming, 174, 90 - 108. https://doi.org/10.1016/j.scico.2019.01.006

Burgueño, L., Ciccozzi, F., Famelis, M., Kappel, G., Lambers, L., Mosser, S., Paige, R. F., Pierantonio, A. , Rensink, A., Salay, R., Taentzer, G., Vallecillo, A., & Wimmer, M. (2019). Contents for a Model-Based Software Engineering Body of Knowledge. Software and systems modeling, 18(6), 3193-3205. https://doi.org/10.1007/s10270-019-00746-9

Fujita, S. , Li, R., & Wang, G. (2019). Decomposing edge-coloured graphs under colour degree constraints. Combinatorics Probability and Computing, 28(5), 755-767. https://doi.org/10.1017/S0963548319000014

Gerhold, M. , Hartmanns, A. , & Stoelinga, M. (2019). Model-based testing of stochastically timed systems. Innovations in systems and software engineering, 15(3-4), 207-233. https://doi.org/10.1007/s11334-019-00349-z

Hahn, E. M., Hashemi, V. , Hermanns, H., Lahijanian, M., & Turrini, A. (2019). Interval Markov Decision Processes with Multiple Objectives: From Robust Strategies to Pareto Curves. ACM transactions on modeling and computer simulation, 29(4), [27]. https://doi.org/10.1145/3309683

Li, F., Ye, Q., & Rada, J. (2019). The Augmented Zagreb Indices of Fluoranthene-Type Benzenoid Systems. Bulletin of the Malaysian Mathematical Sciences Society, 42(3), 1119-1141. https://doi.org/10.1007/s40840-017-0536-2



Meijer, J. , & van de Pol, J. (2019). Sound black-box checking in the LearnLib. Innovations in systems and software engineering, 15(3-4), 267-287. https://doi.org/10.1007/s11334-019-00342-6



Zhang, D., Bošnački, D., van den Brand, M., Huizing, C., Jacobs, B., Kuiper, R., & Wijs, A. (2019). Dependency safety for Java – Implementing and testing failboxes. Science of computer programming, 184, [102316]. https://doi.org/10.1016/j.scico.2019.102316

Chapter


Baier, C. , Hermanns, H. , & Katoen, J-P. (2019). The 10,000 Facets of MDP Model Checking. In B. Steffen, & G. Woeginger (Eds.), Computing and Software Science: State of the Art and Perspectives (Vol. 10000, pp. 420-451). (Lecture Notes in Computer Science; Vol. 10000). Springer. https://doi.org/10.1007/978-3-319-91908-9_21

Hahn, E. M., Perez, M., Schewe, S., Somenzi, F., Trivedi, A., Trivedi, A., & Wojtczak, D. (2019). Omega-Regular Objectives in Model-Free Reinforcement Learning. In T. Vojnar, & L. Zhang (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings (Vol. Part I, pp. 395-412). (Lecture Notes in Computer Science; Vol. 11427). Springer. https://doi.org/10.1007/978-3-030-17462-0_27

Hähnle, R. , & Huisman, M. (2019). Deductive Software Verification: From Pen-and-Paper Proofs to Industrial Tools. In B. Steffen, & G. Woeginger (Eds.), Computing and Software Science : State of the Art and Perspectives (pp. 345-373). (Lecture Notes in Computer Science; Vol. 10000), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-91908-9_18

Kordon, F., Leuschel, M. , Pol, J. V. D., & Thierry-Mieg, Y. (2019). Software Architecture of Modern Model Checkers. In B. Steffen, & G. Woeginger (Eds.), Computing and Software Science: State of the Art and Perspectives (pp. 393-419). (Lecture Notes in Computer Science; Vol. 10000), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-91908-9_20

van de Pol, J. , & Meijer, J. (2019). Synchronous or Alternating? LTL Black-Box Checking of Mealy Machines by Combining the LearnLib and LTSmin. In T. Margaria, S. Graf, & K. G. Larsen (Eds.), Models, Mindsets, Meta: The What, the How, and the Why Not?: Essays Dedicated to Bernhard Steffen on the Occasion of His 60th Birthday (pp. 417-430). (Lecture Notes in Computer Science; Vol. 11200), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-22348-9_24

Conference contribution


Amparore, E., Berthomieu, B., Ciardo, G., Dal Zilio, S., Gallà, F., Hillah, L. M., Hulin-Hubard, F., Jensen, P. G., Jezequel, L., Kordon, F., Le Botlan, D., Liebke, T. , Meijer, J., Miner, A., Paviot-Adet, E., Srba, J., Thierry-Mieg, Y. , van Dijk, T., & Wolf, K. (2019). Presentation of the 9th Edition of the Model Checking Contest. In F. Kordon, M. Huisman, B. Steffen, & D. Beyer (Eds.), Tools and Algorithms for the Construction and Analysis of Systems - 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Proceedings (pp. 50-68). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11429 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-17502-3_4

Amrani, M., Blouin, D., Heinrich, R. , Rensink, A., Vangheluwe, H., & Wortmann, A. (2019). Towards a formal specification of multi-paradigm modelling. In L. Burgueño, A. Pretschner, S. Voss, M. Chaudron, J. Kienzle, M. Völter, S. Gérard, M. Zahedi, E. Bousse, A. Rensink, F. Polack, G. Engels, & G. Kappel (Eds.), Proceedings - 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion, MODELS-C 2019 (pp. 419-424). [8904740] IEEE. https://doi.org/10.1109/MODELS-C.2019.00067

André, É. , Bloemen, V. , Petrucci, L. , & van de Pol, J. (2019). Minimal-time synthesis for parametric timed automata. In L. Zhang, & T. Vojnar (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 211-228). (Lecture Notes in Computer Science; Vol. 11428), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-17465-1_12

André, É., Lime, D., Ramparison, M. , & Stoelinga, M. (2019). Parametric Analyses of Attack-Fault Trees. In Proceedings - 2019 19th International Conference on Application of Concurrency to System Design, ACSD 2019 (pp. 33-42). (Proceedings - International Conference on Application of Concurrency to System Design, ACSD; Vol. 2019). IEEE. https://doi.org/10.1109/ACSD.2019.00008

Bartocci, E., Beyer, D., Black, P. E., Fedyukovich, G., Garavel, H. , Hartmanns, A. , Huisman, M., Kordon, F., Nagele, J., Sighireanu, M., Steffen, B., Suda, M., Sutcliffe, G., Weber, T., & Yamada, A. (2019). TOOLympics 2019: An Overview of Competitions in Formal Methods. In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems - 25 Years of TACAS (pp. 3-24). (Lecture Notes in Computer Science; Vol. 11429). Springer. https://doi.org/10.1007/978-3-030-17502-3_1

Butkova, Y. , Hartmanns, A. , & Hermanns, H. (2019). A Modest Approach to Modelling and Checking Markov Automata. In D. Parker, & V. Wolf (Eds.), Proceedings of the 16th International Conference on Quantitative Evaluation of Systems (QEST 2019) (pp. 52-69). (Lecture Notes in Computer Science; Vol. 11785), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-30281-8_4

Corradini, A., Heindel, T., König, B., Nolte, D. , & Rensink, A. (2019). Rewriting Abstract Structures: Materialization Explained Categorically. In A. Simpson, & M. Bojanczyk (Eds.), Foundations of Software Science and Computation Structures: 22nd International Conference, FOSSACS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 169-188). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11425 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-17127-8_10

Dijk, T. V. (2019). A Parity Game Tale of Two Counters. In J. Leroux, & J-F. Raskin (Eds.), Proceedings Tenth International Symposium on Games, Automata, Logics, and Formal Verification, GandALF 2019: Bordeaux, France, 2-3rd September 2019 (pp. 107-122). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 305). ArXiv. https://doi.org/10.4204/EPTCS.305.8

Dijk, T. V., & Rubbens, B. (2019). Simple Fixpoint Iteration To Solve Parity Games. In J. Leroux, & J-F. Raskin (Eds.), Proceedings Tenth International Symposium on Games, Automata, Logics, and Formal Verification, GandALF 2019: Bordeaux, France, 2-3rd September 2019 (pp. 123-139). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 305). ArXiv. https://doi.org/10.4204/EPTCS.305.9

Ernst, G. , Huisman, M. , Mostowski, W., & Ulbrich, M. (2019). VerifyThis - Verification Competition with a Human Factor. In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part III (pp. 176-195). (Lecture Notes in Computer Science; Vol. 11429). Springer. https://doi.org/10.1007/978-3-030-17502-3_12

Fehnker, A., & de Man, R. (2019). Detecting and Addressing Design Smells in Novice Processing Programs. In B. M. McLaren, R. Reilly, S. Zvacek, & J. Uhomoibhi (Eds.), Computer Supported Education: 10th International Conference, CSEDU 2018, Funchal, Madeira, Portugal, March 15–17, 2018, Revised Selected Papers (pp. 507-531). (Communications in Computer and Information Science; Vol. 1022). Springer. https://doi.org/10.1007/978-3-030-21151-6_24

Hahn, E. M. , Hartmanns, A., Hensel, C., Klauck, M., Klein, J., Křetínský, J., Parker, D., Quatmann, T., Steinmetz, M. , & Ruijters, E. (2019). The 2019 Comparison of Tools for the Analysis of Quantitative Formal Models: (QComp 2019 Competition Report). In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings (Vol. Part III, pp. 69-92). (Lecture Notes in Computer Science; Vol. 11429). Springer. https://doi.org/10.1007/978-3-030-17502-3_5

Hartmanns, A. , & Hermanns, H. (2019). A Modest Markov Automata Tutorial. In M. Krötzsch, & D. Stepanova (Eds.), 15th International Reasoning Web Summer School on Explainable Artificial Intelligence (RW 2019) (pp. 250-276). (Lecture Notes in Computer Science; Vol. 11810), (Information Systems and Applications, incl. Internet/Web, and HCI ). Springer. https://doi.org/10.1007/978-3-030-31423-1_8

Hartmanns, A., Klauck, M., Parker, D., Quatmann, T. , & Ruijters, E. J. J. (2019). The Quantitative Verification Benchmark Set. In T. Vojnar, & L. Zhang (Eds.), Proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2019) (pp. 344-350). (Lecture Notes in Computer Science; Vol. 11427). Springer. https://doi.org/10.1007/978-3-030-17462-0_20

Honig, J. J. , Everts, M. H. , & Huisman, M. (2019). Practical Mutation Testing for Smart Contracts. In C. Pérez-Solà, G. Navarro-Arribas, A. Biryukov, & J. García-Alfaro (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings (pp. 289-303). (Lecture Notes in Computer Science; Vol. 11737). Springer. https://doi.org/10.1007/978-3-030-31500-9_19

Kließ, M. S. , Stoelinga, M. , & van Riemsdijk, M. B. (2019). From Good Intentions to Behaviour Change: Probabilistic Feature Diagrams for Behaviour Support Agents. In M. Baldoni, M. Dastani, B. Liao, Y. Sakurai, & R. Zalila-Wenkstern (Eds.), PRIMA 2019: Principles and Practice of Multi-Agent Systems: 22nd International Conference, Turin, Italy, October 28-31, 2019, Proceedings (pp. 354-369). (Lecture Notes in Computer Science; Vol. 11873). Springer. https://doi.org/10.1007/978-3-030-33792-6_22

Lewis, B. , Hartmanns, A., Basu, P., Shridevi, R. J., Chakraborty, K., Roy, S., & Zhang, Z. (2019). Probabilistic Verification for Reliable Network-on-Chip System Design. In K. G. Larsen, & T. Willemse (Eds.), Formal Methods for Industrial Critical Systems: 24th International Conference, FMICS 2019, Amsterdam, The Netherlands, August 30–31, 2019, Proceedings (pp. 110-126). (Lecture Notes in Computer Science; Vol. 11687). Springer. https://doi.org/10.1007/978-3-030-27008-7_7

Linard, A. , Bucur, D. , & Stoelinga, M. (2019). Fault Trees from Data: Efficient Learning with an Evolutionary Algorithm. In N. Guan, J-P. Katoen, & J. Sun (Eds.), Dependable Software Engineering. Theories, Tools, and Applications: 5th International Symposium, SETTA 2019, Shanghai, China, November 27-29, 2019, Proceedings (pp. 19-37). (Lecture Notes in Computer Science; Vol. 11951), (Programming and Software Engineering). Springer. https://doi.org/10.1007/978-3-030-35540-1_2

Linard, A., Bueno, M. , Bucur, D. , & Stoelinga, M. I. A. (2019). Induction of Fault Trees through Bayesian Networks. In M. Beer, & E. Zio (Eds.), Proceedings of the 29th European Safety and Reliability Conference (ESREL) (pp. 910-918). Research Publishing. http://itekcmsonline.com/rps2prod/esrel2019/e-proceedings/pdf/0596.pdf

Nakhaee, M. C. , Hiemstra, D. , Stoelinga, M., & Noort, M. V. (2019). The Recent Applications of Machine Learning in Rail Track Maintenance: A Survey. In S. Collart-Dutilleul, T. Lecomte, & A. B. Romanovsky (Eds.), Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: Third International Conference, RSSRail 2019, Lille, France, June 4-6, 2019, Proceedings (pp. 91-105). (Lecture Notes in Computer Science; Vol. 11495). Springer. https://doi.org/10.1007/978-3-030-18744-6_6

Oortwijn, W. , & Huisman, M. (2019). Formal Verification of an Industrial Safety-Critical Traffic Tunnel Control System. In W. Ahrendt, & S. L. Tapia Tarifa (Eds.), Integrated Formal Methods: 15th International Conference, IFM 2019, Bergen, Norway, December 2–6, 2019, Proceedings (pp. 418-436). (Lecture Notes in Computer Science; Vol. 11918). Springer. https://doi.org/10.1007/978-3-030-34968-4_23

Oortwijn, W. , & Huisman, M. (2019). Practical Abstractions for Automated Verification of Message Passing Concurrency. In W. Ahrendt, & S. L. Tapia Tarifa (Eds.), Integrated Formal Methods - 15th International Conference, IFM 2019, Proceedings (pp. 399-417). (Lecture Notes in Computer Science; Vol. 11918). Springer. https://doi.org/10.1007/978-3-030-34968-4_22

Ruijters, E. J. J. , Budde, C. E. , Chenariyan Nakhaee, M. , Stoelinga, M. I. A. , Bucur, D. , Hiemstra, D. , & Schivo, S. (2019). FFORT: A benchmark suite for fault tree analysis. In M. Beer, & E. Zio (Eds.), ESREL 2019: Proceedings of the 29th European Safety and Reliability Conference (pp. 878-885). Research Publishing. https://doi.org/10.3850/978-981-11-2724-3_0641-cd

Río, N. G. D., González-González, C. S., Martín-González, R., Navarro-Adelantado, V., Toledo-Delgado, P., Marrero-Gordillo, N. , Barrios-Fleitas, Y. D. C., Armas-Ramos, H., & Gacía-Pẽalvo, F. (2019). Treatment of children obesity and diabetes through gamification: A case of study. In M. A. Conde-Gonzalez, F. J. Rodriguez-Sedano, C. Fernandez-Llamas, & F. J. Garcia-Penalvo (Eds.), Proceedings - TEEM 2019: 7th International Conference on Technological Ecosystems for Enhancing Multiculturality (pp. 452-458). (ACM International Conference Proceeding Series). Association for Computing Machinery (ACM). https://doi.org/10.1145/3362789.3362935

Sun, J. , Katoen, J-P., & Guan, N. (2019). Preface. In Dependable Software Engineering. Theories, Tools, and Applications: 5th International Symposium, SETTA 2019, Shanghai, China, November 27–29, 2019, Proceedings (pp. v-v). (Lecture Notes in Computer Science; Vol. 11951). Springer. https://link.springer.com/content/pdf/bfm%3A978-3-030-35540-1%2F1.pdf

van Dijk, T. , Meijer, J. , & van de Pol, J. (2019). Multi-core On-The-Fly Saturation. In L. Zhang, & T. Vojnar (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 58-75). (Lecture Notes in Computer Science; Vol. 11428), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-030-17465-1_4

van de Pol, J. (2019). Concurrent algorithms and data structures for model checking. In W. Fokkink, & R. van Glabbeek (Eds.), 30th International Conference on Concurrency Theory, CONCUR 2019 [4] (Leibniz International Proceedings in Informatics, LIPIcs; Vol. 140). Dagstuhl. https://doi.org/10.4230/LIPIcs.CONCUR.2019.4

van der Berg, F. I. , & van de Pol, J. (2019). Concurrent chaining hash maps for software model checking. In C. Barrett, & J. Yang (Eds.), 2019 Formal Methods in Computer Aided Design (FMCAD) (pp. 46-54). [8894279] (Proceedings of the Conference on Formal Methods in Computer-Aided Design (FMCAD); Vol. 2019). IEEE. https://doi.org/10.23919/FMCAD.2019.8894279

Foreword/postscript


Burgue, L., Pretschner, A., Voss, S., Chaudron, M., Kienzle, J., Völter, M., Gérard, S., Zahedi, M., Bousse, E. , Rensink, A., Polack, F., Engels, G., & Kappel, G. (2019). Preface to the ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C). In L. Burgueño, A. Pretschner, S. Voss, M. Chaudron, J. Kienzle, M. Völter, S. Gérard, M. Zahedi, E. Bousse, A. Rensink, F. Polack, G. Engels, & G. Kappel (Eds.), 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C) (pp. xviii-xxiv) https://doi.org/10.1109/MODELS-C.2019.00005

Katoen, J-P. (2019). ETAPS Foreword. In D. Beyer, M. Huisman, F. Kordon, & B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part III (pp. v-vi). (Lecture Notes in Computer Science; Vol. 11429), (Theoretical Computer Science and General Issues). Springer. https://link.springer.com/content/pdf/bfm%3A978-3-030-17502-3%2F1.pdf

Paper


Eijkel, D. , & Fehnker, A. (2019). A Distributed Blockchain Model of Selfish Mining. 48-59. Paper presented at 3rd World Congress on Formal Methods, FM 2019, Porto, Portugal. https://drive.google.com/file/d/1s0PkOn6RzTEVmZrWSK5zkGfTIHcRGzvk/view?usp=sharing

Guo, Z. , Broersma, H. , Li, B., & Zhang, S. (2019). Compatible spanning circuits in edge-colored Fan-type graphs. 61-64. Paper presented at 17th Cologne-Twente Workshop on Graphs and Combinatorial Optimization, CTW 2019, Enschede, Netherlands.

Report


Huisman, M., Monahan, R., Müller, P., Paskevich, A., & Ernst, G. (2019). VerifyThis2018: A Program Verification Competition. https://hal.inria.fr/hal-01981937

2018

Article (contribution to journal)


Divasón, J. , Joosten, S., Thiemann, R., & Yamada, A. (2018). A verified LLL algorithm. Archive of Formal Proofs, 2018. https://www.isa-afp.org/entries/LLL_Basis_Reduction.html




Gomes, P. D. C., Gurov, D. , Huisman, M., & Artho, C. (2018). Specification and verification of synchronization with condition variables. Science of computer programming, 163, 174-189. https://doi.org/10.1016/j.scico.2018.05.001

Huisman, M., & Rubin, J. (2018). Software quality tools and techniques presented in FASE’17. International journal on software tools for technology transfer, 20(6), 611-613. https://doi.org/10.1007/s10009-018-0504-7

Joosten, S. J. C. (2018). Finding models through graph saturation. Journal of Logical and Algebraic Methods in Programming, 100, 98-112. https://doi.org/10.1016/j.jlamp.2018.06.005




van Dijk, T. , & van de Pol, J. (2018). Multi-core symbolic bisimulation minimisation. International journal on software tools for technology transfer, 20(2), 157-177. https://doi.org/10.1007/s10009-017-0468-z

Chapter


Ahrendt, W. , Huisman, M., Reger, G., & Rozier, K. Y. (2018). A Broader View on Verification: From Static to Runtime and Back (Track Summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Verification : 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part II (pp. 3-7). (Lecture Notes in Computer Science; No. 11245). Springer. https://doi.org/10.1007/978-3-030-03421-4_1

Barnat, J. , Bloemen, V., Duret-Lutz, A. , Laarman, A. , Petrucci, L. , van de Pol, J., & Renault, E. (2018). Parallel Model Checking Algorithms for Linear-Time Temporal Logic. In Y. Hamadi, & L. Sais (Eds.), Handbook of Parallel Constraint Reasoning (pp. 457-507). Springer. https://doi.org/10.1007/978-3-319-63516-3_12

Bloemen, V. , van de Pol, J., & van der Aalst, W. M. P. (2018). Symbolically Aligning Observed and Modelled Behaviour. In 2018 18th International Conference on Application of Concurrency to System Design : Proceedings (pp. 50-59). IEEE. https://doi.org/10.1109/ACSD.2018.00008

Broersma, H. (2018). Evolution in Nanomaterio: The NASCENCE Project. In S. Stepney, & A. Adamatzky (Eds.), Inspired by Nature: Essays Presented to Julian F. Miller on the Occasion of his 60th Birthday (pp. 87-111). (Emergence, Complexity and Computation; Vol. 28). Springer. https://doi.org/10.1007/978-3-319-67997-6_4

Broersma, H., Stepney, S., & Wendin, G. (2018). Computability and Complexity of Unconventional Computing Devices. In S. Stepney, S. Rasmussen, & M. Amos (Eds.), Computational Matter (pp. 185-229). (Natural Computing Series). Springer. https://doi.org/10.1007/978-3-319-65826-1_11

Divasón, J. , Joosten, S., Thiemann, R., & Yamada, A. (2018). A Formalization of the LLL Basis Reduction Algorithm. In J. Avigad, & A. Mahboubi (Eds.), Interactive Theorem Proving: 9th International Conference, ITP 2018. Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 9-12, 2018. Proceedings (pp. 160-177). (Lecture Notes in Computer Science; Vol. 10895). Springer. https://doi.org/10.1007/978-3-319-94821-8_10

Kastenberg, H. , & Rensink, A. (2018). Graph Attribution Through Sub-Graphs. In R. Hecke, & G. Taentzer (Eds.), Graph Transformation, Specifications, and Nets: In Memory of Hartmut Ehrig (pp. 245-265). (Lecture Notes in Computer Science; Vol. 10800), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-75396-6_14

Kastenberg, H. , & Rensink, A. (2018). Graph Attribution Through Sub-Graphs. In R. Heckel, & G. Taentzer (Eds.), Graph Transformation, Specifications, and Nets: In Memory of Hartmut Ehrig (Vol. 10800, pp. 245-265). (Lecture Notes in Computer Science; Vol. 10800). Springer International Publishing AG. https://doi.org/10.1007/978-3-319-75396-6_14

Konkoli, Z., Stepney, S. , Broersma, H., Dini, P., Nehaniv, C. L., & Nichele, S. (2018). Philosophy of Computation. In Computational Matter (pp. 153-184). (Natural Computing Series). Springer. https://doi.org/10.1007/978-3-319-65826-1_10

Kordon, F., Garavel, H., Hillah, L-M., Paviot-Adet, E., Jezequel, L., Hulin-Hubard, F., Amparore, E. G., Beccuti, M., Berthomieu, B., Evrard, H., Jensen, P. G., Botlan, D. L., Liebke, T. , Meijer, J., Srba, J., Thierry-Mieg, Y. , Pol, J. V. D., & Wolf, K. (2018). MCC'2017 - The Seventh Model Checking Contest. In M. Koutny, L. M. Kristensen, & W. Penczek (Eds.), Transactions on Petri Nets and Other Models of Concurrency XIII (pp. 181-209). (Lecture notes in computer science; Vol. 11090). https://doi.org/10.1007/978-3-662-58381-4_9

König, B., Nolte, D., Padberg, J. , & Rensink, A. (2018). A tutorial on graph transformation. In R. Heckel, & G. Taentzer (Eds.), Graph Transformation, Specifications, and Nets: In Memory of Hartmut Ehrig (pp. 83-104). (Lecture Notes in Computer Science; Vol. 10800), (Theoretical Computer Science and General Issues). Springer. https://doi.org/10.1007/978-3-319-75396-6_5

Zambon, E. , & Rensink, A. (2018). Recipes for Coffee: Compositional Construction of Jave Control Flow Graphs in GROOVE. In P. Müller, & I. Schaefer (Eds.), Principled Software Development: Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday (pp. 305-323). Springer. https://doi.org/10.1007/978-3-319-98047-8_19

van Dijk, T. , & van de Pol, J. (2018). Multi-core Decision Diagrams. In Y. Hamadi, & L. Sais (Eds.), Handbook of Parallel Constraint Reasoning (pp. 509-545). Springer. https://doi.org/10.1007/978-3-319-63516-3_13

van Glabbeek, R., Höfner, P. , & van der Wal, D. (2018). Analysing AWN-specifications using mCRL2 (extended abstract). In C. A. Furia, & K. Winter (Eds.), Integrated Formal Methods - 14th International Conference, IFM 2018, Proceedings: 14th International Conference, IFM 2018, Maynooth, Ireland, September 5-7, 2018, Proceedings (pp. 398-418). (Lecture Notes in Computer Science; Vol. 11023). Springer. https://doi.org/10.1007/978-3-319-98938-9_23

Conference contribution


Abate, A., Blom, H., Cauchi, N., Haesaert, S. , Hartmanns, A., Lesser, K., Oishi, M., Sivaramakrishnan, V., Soudjani, S., Vasile, C. I., & Vinod, A. P. (2018). ARCH-COMP18 Category Report: Stochastic Modelling. In G. Frehse, M. Althoff, S. Bogomolov, & T. T. Johnson (Eds.), Proceedings of the 5th International Workshop on Applied Verification of Continuous and Hybrid Systems (ARCH 2018) (Vol. 54, pp. 71-103). (EPiC Series in Computing). EasyChair. https://doi.org/10.29007/7ks7

Abate, A. , Budde, C. E., Cauchi, N., Hoque, K. A. , & Stoelinga, M. I. A. (2018). Assessment of Maintenance Policies for Smart Buildings: Application of Formal Methods to Fault Maintenance Trees. In Proceedings of the European Conference of the PHM Society (1 ed., Vol. 4). (Proceedings of the European Conference of the PHM Society). PHM society. https://www.phmpapers.org/index.php/phme/article/view/385

Abate, A. , Budde, C. E., Cauchi, N. , van Harmelen, A., Hoque, K. A. , & Stoelinga, M. I. A. (2018). Modelling Smart Buildings Using Fault Maintenance Trees. In R. Bakhshi, P. Ballarini, B. Barbot, H. Castel-Taleb, & A. Remke (Eds.), Computer Performance Engineering: 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings (pp. 110-125). (Lecture Notes in Computer Science; Vol. 11178). Springer. https://doi.org/10.1007/978-3-030-02227-3_8

Amighi, A. , Huisman, M. , & Blom, S. (2018). Verification of Shared-Reading Synchronisers. In S. Bensalem, & S. Bliudze (Eds.), Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (Metrid) (pp. 107-120). (Electronic Proceedings in Theoretical Computer Science, EPTCS; Vol. 272). https://doi.org/10.4204/EPTCS.272.9

Babur, Ö., Cleophas, L., van den Brand, M., Tekinerdogan, B. , & Aksit, M. (2018). Models, More Models, and Then a Lot More. In S. Zschaler, & M. Seidl (Eds.), Software Technologies: Applications and Foundations - STAF 2017 Collocated Workshops, Revised Selected Papers (pp. 129-135). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10748 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-74730-9_10

Bloemen, V., van Zelst, S. J., van der Aalst, W. M. P., van Dongen, B. F. , & van de Pol, J. (2018). Maximizing Synchronization for Aligning Observed and Modelled Behaviour. In M. Weske, M. Montali, J. vom Brocke, & I. Weber (Eds.), Business Process Management: 16th International Conference, BPM 2018, Sydney, NSW, Australia, September 9–14, 2018, Proceedings (Vol. 11080, pp. 233-249). Springer. https://doi.org/10.1007/978-3-319-98648-7_14

Boerman, J. , Huisman, M. , & Joosten, S. J. C. (2018). Reasoning About JML: Differences Between KeY and OpenJML. In C. A. Furia, & K. Winter (Eds.), Integrated Formal Methods: 14th International Conference, IFM 2018, Maynooth, Ireland, September 5-7, 2018. Proceedings (pp. 30-46). [3] (Lecture Notes in Computer Science; Vol. 11023). Springer. https://doi.org/10.1007/978-3-319-98938-9_3

Bos, P. V. D. , & Stoelinga, M. (2018). Tester versus Bug: A Generic Framework for Model-Based Testing via Games. In A. Orlandini, & M. Zimmermann (Eds.), Proceedings Ninth International Symposium on Games, Automata, Logics, and Formal Verification, GandALF 2018, Saarbrücken, Germany, 26-28th September 2018. (pp. 118-132). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 277). Dagstuhl. https://doi.org/10.4204/EPTCS.277.9

Budde, C. E., D'Argenio, P. R. , Hartmanns, A., & Sedwards, S. (2018). A Statistical Model Checker for Nondeterminism and Rare Events. In D. Beyer, & M. Huisman (Eds.), Proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2018) (pp. 340-358). (Lecture Notes in Computer Science; Vol. 10806). Springer. https://doi.org/10.1007/978-3-319-89963-3_20

Ciccozzi, F., Famelis, M., Kappel, G., Mosser, S., Paige, R. F., Pierantonio, A. , Rensink, A., Salay, R., Taentzer, G., Valecillo, A., & Wimmer, M. (2018). How do we teach modelling and model-driven engineering? A survey. In Ö. Babur, D. Strüber, & S. Abrahão (Eds.), MODELS'18. Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings (pp. 122-129). ACM Press. https://doi.org/10.1145/3270112.3270129

Ciccozzi, F., Lambers, L., Pierantonio, A., Taentzer, G., Famelis, M., Mosser, S. , Rensink, A., Vallecillo, A., Kappel, G., Paige, R. F., Salay, R., & Wimmer, M. (2018). Towards a body of knowledge for model-based software engineering. In Ö. Babur, D. Strüber, & S. Abrahão (Eds.), MODELS'18. Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings (pp. 82-89). ACM Press. https://doi.org/10.1145/3270112.3270121

D'Argenio, P. R. , Gerhold, M. , Hartmanns, A., & Sedwards, S. (2018). A Hierarchy of Scheduler Classes for Stochastic Automata. In C. Baier, & U. Dal Lago (Eds.), Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS 2018) (pp. 384-402). (Lecture Notes in Computer Science; Vol. 10803). Springer. https://doi.org/10.1007/978-3-319-89366-2_21

D'Argenio, P. R. , Hartmanns, A., & Sedwards, S. (2018). Lightweight Statistical Model Checking in Nondeterministic Continuous Time. In T. Margaria, & B. Steffen (Eds.), Proceedings of the 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2018) (Vol. 11245, pp. 336-353). (Lecture Notes in Computer Science; Vol. 11245). Springer. https://doi.org/10.1007/978-3-030-03421-4_22

Divasón, J. , Joosten, S. J. C., Thiemann, R., & Yamada, A. (2018). A Perron-Frobenius Theorem for Jordan Blocks for Complexity Proving. In S. Lucas (Ed.), 16th International Workshop on Termination: WST 2018, July 18-19. 2018, Oxford, UK (pp. 30-34) http://wst2018.webs.upv.es/wst2018proceedings.pdf

Divasón, J. , Joosten, S., Kuncar, O., Thiemann, R., & Yamada, A. (2018). Efficient certification of complexity proofs: formalizing the Perron--Frobenius theorem (invited talk paper). In A. Felty, & J. Andronick (Eds.), Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (pp. 2-13) https://doi.org/10.1145/3167103

Fehnker, A. , & Chaudhary, K. (2018). Twenty Percent and a Few Days: Optimising a Bitcoin Majority Attack. In A. Dutle, C. Muñoz, & A. Narkawicz (Eds.), NASA Formal Methods: 10th International Symposium, NFM 2018 Newport News, VA, USA, April 17-19, 2018 Proceedings (pp. 157-163). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_11

Fehnker, A. , Chaudhary, K., & Mehta, V. (2018). An Even Better Approach: Improving the B.A.T.M.A.N. Protocol Through Formal Modelling and Analysis. In A. Dutle, C. Muñoz, & A. Narkawicz (Eds.), NASA Formal Methods: 10th International Symposium, NFM 2018 Newport News, VA, USA, April 17-19, 2018 Proceedings (pp. 164-178). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_12

Felderer, M., Gurov, D. , Huisman, M., Lisper, B., & Schlick, R. (2018). Formal Methods in Industrial Practice: Bridging the Gap (Track Summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part IV (pp. 77-81). (Lecture Notes in Computer Science; Vol. 11247). Springer. https://doi.org/10.1007/978-3-030-03427-6_10

Gerhold, M. , Hartmanns, A. , & Stoelinga, M. (2018). Model-Based Testing for General Stochastic Time. In A. Dutle, C. Munoz, & A. Narkawicz (Eds.), Proceedings of the 10th International NASA Formal Methods Symposium (NFM 2018) (pp. 203-219). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_15

Hartmanns, A., Junges, S. , Katoen, J-P., & Quatmann, T. (2018). Multi-cost Bounded Reachability in MDP. In D. Beyer, & M. Huisman (Eds.), Proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2018) (pp. 320-339). (Lecture Notes in Computer Science; Vol. 10806). Springer. https://doi.org/10.1007/978-3-319-89963-3_19

Heijblom, R., Postma, W., Natarajan, V. , & Stoelinga, M. (2018). DFT Analysis Incorporating Spare Parts in Fault Trees. In 2018 Annual Reliability and Maintainability Symposium, RAMS 2018 [8463074] (Proceedings - Annual Reliability and Maintainability Symposium; Vol. 2018-January). IEEE. https://doi.org/10.1109/RAM.2018.8463074

Huisman, M. (2018). On Models and Code: A Unified Approach to Support Large-Scale Deductive Program Verification. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Modeling: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part I (pp. 111-118). (Lecture Notes in Computer Science; Vol. 11244). Springer. https://doi.org/10.1007/978-3-030-03418-4_7

Huisman, M. , & Joosten, S. J. C. (2018). Towards Reliable Concurrent Software. In P. Müller, & I. Schaefer (Eds.), Principled Software Development: Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday (pp. 129-146). (Principled Software Development). Springer. https://doi.org/10.1007/978-3-319-98047-8_9

Huisman, M. , Blom, S. , Darabi, S. , & Safari, M. (2018). Program Correctness by Transformation. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Modeling: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part I (pp. 365-380). (Lecture Notes in Computer Science; Vol. 11244). Springer. https://doi.org/10.1007/978-3-030-03418-4_22

Huistra, D. , Meijer, J. , & Pol, J. V. D. (2018). Adaptive Learning for Learn-Based Regression Testing. In F. Howar, & J. Barnat (Eds.), Formal Methods for Industrial Critical Systems: 23rd International Conference, FMICS 2018, Maynooth, Ireland, September 3-4, 2018, Proceedings (pp. 162-177). (Lecture Notes in Computer Science; Vol. 11119). Springer. https://doi.org/10.1007/978-3-030-00244-2_11

Joosten, S. J. C. , & Huisman, M. (2018). Static Code Verification Through Process Models. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part III (pp. 343-354). (Lecture Notes in Computer Science; Vol. 11246). Springer. https://doi.org/10.1007/978-3-030-03424-5_23

Junges, S. , Katoen, J. P. , Stoelinga, M. I. A., & Volk, M. (2018). One Net Fits All: A Unifying Semantics of Dynamic Fault Trees Using GSPNs. In V. Khomenko, & O. H. Roux (Eds.), Application and Theory of Petri Nets and Concurrency: 39th International Conference, PETRI NETS 2018, Bratislava, Slovakia, June 24-29, 2018, Proceedings (pp. 272-293). (Lecture notes in computer science; Vol. 10877). Springer. https://doi.org/10.1007/978-3-319-91268-4_14

Kamali, M. , & Fehnker, A. (2018). Adaptive Formal Framework for WMN Routing Protocols. In Formal Aspects of Component Software: 15th International Conference, FACS 2018, Pohang, South Korea, October 10-12, 2018, Proceedings (pp. 175-195). (Lecture notes in computer science; Vol. 11222). https://doi.org/10.1007/978-3-030-02146-7_9

Kumar, R. , Rensink, A. , & Stoelinga, M. I. A. (2018). LOCKS: a property specification language for security goals. In H. M. Haddad, R. L. Wainwright, & R. Chbeir (Eds.), SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing (pp. 1907-1915). Association for Computing Machinery (ACM). https://doi.org/10.1145/3167132.3167336

Kumar, R. , Schivo, S. , Ruijters, E. J. J. , Yildiz, B. M. , Huistra, D. J., Brandt, J. , Rensink, A. , & Stoelinga, M. I. A. (2018). Effective Analysis of Attack Trees: A Model-Driven Approach. In A. Russo, & A. Schürr (Eds.), Proceedings of the 21st International Conference on Fundamental Approaches to Software Engineering (FASE 2018) (pp. 56-73). (Lecture Notes in Computer Science; Vol. 10802). Springer. https://doi.org/10.1007/978-3-319-89363-1_4

Körner, P., Leuschel, M. , & Meijer, J. (2018). State-of-the-Art Model Checking for B and Event-B Using ProB and LTSmin. In C. A. Furia, & K. Winter (Eds.), Integrated Formal Methods - 14th International Conference, IFM 2018, Proceedings: 14th International Conference, IFM 2018, Maynooth, Ireland, September 5-7, 2018, Proceedings (pp. 275-295). (Lecture Notes in Computer Science; Vol. 11023). Springer. https://doi.org/10.1007/978-3-319-98938-9_16

Man, R. D. , & Fehnker, A. (2018). The Smell of Processing. In B. M. McLaren, R. Reilly, S. Zvacek, & J. Uhomoibhi (Eds.), Proceedings of the 10th International Conference on Computer Supported Education (Vol. 2, pp. 420-431) https://doi.org/10.5220/0006701704200431

Meijer, J. , & van de Pol, J. (2018). Sound Black-Box Checking in the LearnLib. In A. Dutle, C. A. Muñoz, & A. Narkawicz (Eds.), NASA Formal Methods: 10th International Symposium, NFM 2018, Newport News, VA, USA, April 17-19, 2018, Proceedings (pp. 349-366). (Lecture Notes in Computer Science; Vol. 10811). Springer. https://doi.org/10.1007/978-3-319-77935-5_24

Nauta, M. , Bucur, D. , & Stoelinga, M. (2018). LIFT: Learning Fault Trees from Observational Data. In A. McIver, & A. Horvath (Eds.), Quantitative Evaluation of Systems: 15th International Conference, QEST 2018, Beijing, China, September 4-7, 2018, Proceedings (pp. 306-322). (Lecture Notes in Computer Science; Vol. 11024). Springer. https://doi.org/10.1007/978-3-319-99154-2_19

Nguyen, H. G. , Petrucci, L. , & Pol, J. V. D. (2018). Layered and Collecting NDFS with Subsumption for Parametric Timed Automata. In A. W. Lin, & J. Sun (Eds.), 23rd International Conference on Engineering of Complex Computer Systems, ICECCS 2018, Melbourne, Australia, December 12-14, 2018 IEEE Canada. https://doi.org/10.1109/ICECCS2018.2018.00009

Orhan, G. , Aksit, M. , & Rensink, A. (2018). Designing Reusable and Run-Time Evolvable Scheduling Software. In E. K. Burke, L. Di Gaspero, B. McCollum, N. Musliu, & E. Özcan (Eds.), PATAT 2018: Proceedings of the 12th International Conference of the Practice and Theory of Automated Timetabling (pp. 339-373). TU Wien. https://www.persistent-identifier.nl/urn:nbn:nl:ui:28-57a7f02c-0016-44d2-afe1-9be0cc807e66

Petrucci, L. , & van de Pol, J. (2018). Parameter Synthesis Algorithms for Parametric Interval Markov Chains. In C. Baier, & L. Caires (Eds.), Formal Techniques for Distributed Objects, Components, and Systems: 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings (pp. 121-140). (Lecture Notes in Computer Science; Vol. 10854). Springer. https://doi.org/10.1007/978-3-319-92612-4_7

Stoelinga, M. (2018). Risk management for high tech systems. In S. Gnesi, N. Plat, P. Spoletini, & P. Pelliccione (Eds.), FormaliSE'18. Proceedings of the 6th Conference on Formal Methods in Software Engineering, FormaliSE 2018, collocated with ICSE 2018, Gothenburg, Sweden, June 2, 2018 ACM Inc.. https://doi.org/10.1145/3193992.3193993

de Putter, S., Wijs, A. , & Zhang, D. (2018). The SLCO framework for verified, model-driven construction of component software. In P. C. Ölveczky, & K. Bae (Eds.), Formal Aspects of Component Software - 15th International Conference, FACS 2018, Proceedings (pp. 288-296). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11222 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-02146-7_15

van Keulen, M., Kaminski, B., Matheja, C. , & Katoen, J. P. (2018). Rule-based conditioning of probabilistic data. In D. Ciucci, G. Pasi, & B. Vantaggi (Eds.), Scalable Uncertainty Management: 12th International Conference, SUM 2018, Milan, Italy, October 3-5, 2018, Proceedings (pp. 290-305). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11142 LNAI). Springer. https://doi.org/10.1007/978-3-030-00461-3_20

Paper


Cauchi, N., Hoque, K. A. , Stoelinga, M., & Abate, A. (2018). Maintenance of Smart Buildings using Fault Trees. 28:1-28:25. Paper presented at 4th ACM International Conference on Systems for Energy-Efficient Built Environments 2017, Delft, Netherlands. https://doi.org/10.1145/3232616

Huisman, M. (2018). Mercedes: Maximal Reliability of Concurrent and Distributed Software. Paper presented at ICT.OPEN 2018, Amersfoort, Netherlands.

Huisman, M., Varbanescu, A. L., van Werkhoven, B., & Wijs, A. (2018). An overview of GPU Computing Research in the Netherlands: Results from the NIRICT GPGPU Reconnaissance workshop. Paper presented at Fourth workshop in NIRICT GPGPU Reconnaissance workshop series, Utrecht, Netherlands. http://fmt.ewi.utwente.nl/NIRICT_GPGPU/GPU-Workshop-Whitepaper.pdf

Joosten, S. J. C. , Oortwijn, W. , Safari, M. , & Huisman, M. (2018). An Exercise in Verifying Sequential Programs with VerCors. Paper presented at 20th Workshop on Formal Techniques for Java-like Programs Formal techniques, Amsterdam, Netherlands. https://polybox.ethz.ch/index.php/s/HEBJ0Tv6FyzeZz4/download

PhD Thesis - Research UT, graduation UT













2017

Article (contribution to journal)




Joosten, S., Thiemann, R., & Yamada, A. (2017). Subresultants. Archive of Formal Proofs. https://www.isa-afp.org/entries/Subresultants.html


Li, B., Zhang, Y. , & Broersma, H. (2017). An exact formula for all star-kipas Ramsey numbers. Graphs and combinatorics, 33(1), 141-148. https://doi.org/10.1007/s00373-016-1746-3

Li, R. , Broersma, H. J., Xu, C., & Zhang, S. (2017). Cycle extension in edge-colored complete graphs. Discrete mathematics, 340(6), 1235-1241. https://doi.org/10.1016/j.disc.2017.01.023



Zhang, Z-B., Zhang, X. , Broersma, H., & Lou, D. (2017). Extremal and Degree Conditions for Path Extendability in Digraphs. SIAM J. Discrete Math., 31(3), 1990-2014. https://doi.org/10.1137/16M1077453


van Dijk, T. , & van de Pol, J. (2017). Sylvan: multi-core framework for decision diagrams. International journal on software tools for technology transfer, 19(6), 675-696. https://doi.org/10.1007/s10009-016-0433-2

Chapter


Brinksma, E. , Stoelinga, M. , & Timmer, M. (2017). Testing Divergent Transition Systems. In L. Aceto, G. Bacci, G. Bacci, A. Ingolfsdottir, A. Legay, & R. Mardare (Eds.), Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday (pp. 339). (Lecture Notes in Computer Science; Vol. 10460). Springer. https://doi.org/10.1007/978-3-319-63121-9_17

Budde, C. E., D'Argenio, P. R., Monti, R. E., Lee, M. D., Rodríguez, L., & Wolovick, N. (2017). The Road from Stochastic Automata to the Simulation of Rare Events. In R. Langerak, J-P. Katoen, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (Vol. LNCS, pp. 276-294). (Lecture Notes in Computer Science; Vol. 10500). https://doi.org/10.1007/978-3-319-68270-9_14

Katoen, J. P. , & Stoelinga, M. I. A. (2017). Boosting Fault Tree Analysis by Formal Methods. In J-P. Katoen, R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (pp. 368-380). (Lecture notes in computer science; Vol. 10500). https://doi.org/10.1007/978-3-319-68270-9_19

Rensink, A. (2017). How much are your geraniums? Taking graph conditions beyond first Order. In J-P. Katoen, R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (Vol. 10500 LNCS, pp. 191-213). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10500 LNCS). Springer. https://doi.org/10.1007/978-3-319-68270-9_10

Schivo, S. , & Langerak, R. (2017). Discretization of Continuous Dynamical Systems Using UPPAAL. In J-P. Katoen, R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (pp. 297-315). (Lecture Notes in Computer Science; Vol. 10500). Springer. https://doi.org/10.1007/978-3-319-68270-9_15


Conference contribution


Ahmad, W. , Yildiz, B. M. , Rensink, A. , & Stoelinga, M. I. A. (2017). A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications. In C. Berger, M. Mousavi, & R. Wisniewski (Eds.), Proceedings of the 6th International Workshop on Design, Modeling and Evaluation of Cyber Physical Systems: CyPhy 2016. Revised Selected Papers (Vol. 10107, pp. 1-16). (Lecture Notes in Computer Science; Vol. 10107). Springer. https://doi.org/10.1007/978-3-319-51738-4_1

Bernhard, S., Jasper, M. , Meijer, J. , & van de Pol, J. (2017). Property-Preserving Generation of Tailored Benchmark Petri Nets. In 17th International Conference on Application of Concurrency to System Design - ACSD 2017: 25-30 June 2017, Zaragoza, Spain : proceedings IEEE Computer Society. https://doi.org/10.1109/ACSD.2017.24

Bloemen, V., Duret-Lutz, A. , & van de Pol, J. (2017). Explicit State Model Checking with Generalized Büchi and Rabin Automata. In SPIN 2017: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software (pp. 50-59). Association for Computing Machinery (ACM). https://doi.org/10.1145/3092282.3092288

Blok, T. , & Fehnker, A. (2017). Automated Program Analysis for Novice Programmers. In J. Domenech, M. C. Vincent-Vela, E. de la Poza, & D. Blazquez (Eds.), HEAd'17: Proceedings of the 3rd International Conference on Higher Education Advances (pp. 1138-1146). Universitat Politecnica de Valencia. https://doi.org/10.4995/HEAD17.2017.5533

Blom, S. , Darabi, S. , Huisman, M. , & Oortwijn, W. (2017). The VerCors Tool Set: Verification of Parallel and Concurrent Software. In N. Polikarpova, & S. Schneider (Eds.), Integrated Formal Methods: 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings (pp. 102-110). (Lecture Notes in Computer Science; Vol. 10510). Springer. https://doi.org/10.1007/978-3-319-66845-1_7

Budde, C. E. , D'Argenio, P. R. , & Hartmanns, A. (2017). Better Automated Importance Splitting for Transient Rare Events. In K. G. Larsen, & O. Sokolsky (Eds.), Proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2017) (pp. 42-58). (Lecture Notes in Computer Science; Vol. 10606). Springer. https://doi.org/10.1007/978-3-319-69483-2_3

Budde, C. E., Dehnert, C. , Hahn, E. M. , Hartmanns, A., Junges, S., & Turrini, A. (2017). JANI: Quantitative Model and Tool Interaction. In A. Legay, & T. Margaria (Eds.), Tools and Algorithms for the Construction and Analysis of Systems: 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings (Vol. Part II, pp. 151-168). (Lecture Notes in Computer Science; Vol. 10206). Springer. https://doi.org/10.1007/978-3-662-54580-5_9

Cauchi, N., Hoque, K. A., Abate, A. , & Stoelinga, M. (2017). Efficient probabilistic model checking of smart building maintenance using fault maintenance trees. In BuildSys'17: Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments [24] ACM/Sheridan. https://doi.org/10.1145/3137133.3137138

Chaudhary, K. , Fehnker, A., & Mehta, V. (2017). Modelling, Verification, and Comparative Performance Analysis of the B.A.T.M.A.N. Protocol. In H. Hermanns, & P. Höfner (Eds.), Proceedings 2nd Workshop on Models for Formal Analysis of Real Systems, MARS@ETAPS 2017: Uppsala, Sweden, 29th April 2017 (pp. 53-65). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 244). EPTCS. https://doi.org/10.4204/EPTCS.244.3

Darabi, S. , Blom, S. C. C. , & Huisman, M. (2017). A Verification Technique for Deterministic Parallel Programs. In C. Barrett, M. Davies, & T. Kahsai (Eds.), NASA Formal Methods: 9th International Symposium, NFM 2017, Moffett Field, CA, USA, May 16-18, 2017, Proceedings (pp. 247-264). (Lecture Notes in Computer Science; Vol. 10227). https://doi.org/10.1007/978-3-319-57288-8_17

Divasón, J. , Joosten, S., Thiemann, R., & Yamada, A. (2017). A formalization of the Berlekamp-Zassenhaus factorization algorithm. In CPP 2017: Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs (pp. 17-29). Association for Computing Machinery (ACM). https://doi.org/10.1145/3018610.3018617

Gerhold, M. , & Stoelinga, M. (2017). Model-Based Testing of Probabilistic Systems with Stochastic Time. In E. Broch Johnsen (Ed.), Tests and Proofs: 11th International Conference, TAP 2017, Held as Part of STAF 2017, Marburg, Germany, July 19–20, 2017, Proceedings (pp. 77-97). (Lecture notes in computer science; Vol. 10375). https://doi.org/10.1007/978-3-319-61467-0_5

Graf-Brill, A. , Hartmanns, A. , Hermanns, H., & Rose, S. (2017). Modelling and certification for electric mobility. In 2017 IEEE 15th International Conference on Industrial Informatics (INDIN 2017) (pp. 109-114). IEEE. https://doi.org/10.1109/INDIN.2017.8104755

Hartmanns, A., Sedwards, S. , & D'Argenio, P. R. (2017). Efficient simulation-based verification of probabilistic timed automata. In W. K. V. Chan, A. D’Ambrogio, G. Zacharewicz, N. Mustafee, G. Wainer, & E. Page (Eds.), Proceedings of the 2017 Winter Simulation Conference (pp. 1419-1430). IEEE. https://doi.org/10.1109/WSC.2017.8247885

Huisman, M. (2017). A verification technique for deterministic parallel programs: Invited abstract. In W. Vanhoof, & B. Pientka (Eds.), Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming, Namur, Belgium, October 09 - 11, 2017 (pp. 3). ACM/Sheridan. https://doi.org/10.1145/3131851.3131852

Huisman, M. (2017). Verification of Concurrent Software with VerCors. In M. Walden (Ed.), Proceedings of the 29th Nordic Workshop on Programming Theory (NWPT) (pp. 2). (TUCS lecture notes; No. 27).

Hähnle, R. , & Huisman, M. (2017). 24 Challenges in Deductive Software Verification. In G. Reger, & D. Traytel (Eds.), ARCADE 2017, 1st International Workshop on Automated Reasoning: Challenges, Applications, Directions, Exemplary Achievements, Gothenburg, Sweden, 6th August 2017 (pp. 37-41). (EPiC Series in Computing; Vol. 51). EasyChair. http://www.easychair.org/publications/paper/kdZ7

Jasper, M., Fecke, M., Steffen, B., Schordan, M. , Meijer, J. , van de Pol, J., Howar, F., & Siegel, S. F. (2017). The RERS 2017 Challenge and Workshop. In Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software (pp. 11-20). ACM Inc.. https://doi.org/10.1145/3092282.3098206

Joosten, S. JC. (2017). Parsing and Printing of and with Triples. In P. Höfner, D. Pous, & G. Struth (Eds.), Relational and algebraic methods in computer science: 16th International Conference, RAMiCS 2017, Lyon, France, May 15-18, 2017. Proceedings (pp. 159-176). (Lecture Notes in Computer Science; Vol. 10226). Springer.

Kumar, R. , & Stoelinga, M. I. A. (2017). Quantitative security and safety analysis with attack-fault trees. In Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017) (pp. 25-32). (HASE). IEEE. https://doi.org/10.1109/HASE.2017.12

Langerak, R. , van de Pol, J. , Post, J. N. , & Schivo, S. (2017). Improving the Timed Automata Approach to Biological Pathway Dynamics. In L. Aceto, G. Bacci, G. Bacci, A. Ingólfsdóttir, A. Legay, & R. Mardare (Eds.), Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday (pp. 96-111). (Lecture Notes in Computer Science; Vol. 10460). Springer. https://doi.org/10.1007/978-3-319-63121-9_5

Oortwijn, W. , Blom, S., Gurov, D. , Huisman, M. , & Zaharieva, M. (2017). An Abstraction Technique for Describing Concurrent Program Behaviour. In A. Paskevich, & T. Wies (Eds.), Verified Software. Theories, Tools, and Experiments: 9th International Conference, VSTTE 2017, Heidelberg, Germany, July 22-23, 2017, Revised Selected Papers (pp. 191-209). (Lecture Notes in Computer Science; Vol. 10712). Springer. https://doi.org/10.1007/978-3-319-72308-2_12

Oortwijn, W. , van Dijk, T. , & van de Pol, J. (2017). Distributed Binary Decision Diagrams for Symbolic Reachability. In SPIN 2017 Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software (pp. 21-30). Association for Computing Machinery (ACM). https://doi.org/10.1145/3092282.3092284

Orhan, G. , Aksit, M. , & Rensink, A. (2017). A Formal Product-Line Engineering Approach for Schedulers. In L. Jololian, D. E. Robbins, & S. L. Fernandes (Eds.), SDPS 22nd International Conference on Emerging Trends and Technologies in Convergence Solutions (pp. 15-30). (Integrated design and process technology; Vol. 22). https://www.sdpsnet.org/sdps/documents/sdps-2017/proceedings-sdps-2017-v2.pdf

Ruijters, E. J. J. , Reijsbergen, D. P. , de Boer, P-T. , & Stoelinga, M. I. A. (2017). Rare Event Simulation for Dynamic Fault Trees. In S. Tonetta, E. Schoitsch, & F. Bitsch (Eds.), Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings (pp. 20-35). (Lecture Notes in Computer Science; Vol. 10488). Springer. https://doi.org/10.1007/978-3-319-66266-4_2


Saini, S. , & Fehnker, A. (2017). Evaluating the Stream Control Transmission Protocol Using Uppaal. In H. Hermanns, & P. Höfner (Eds.), Proceedings 2nd Workshop on Models for Formal Analysis of Real Systems, MARS@ETAPS 2017: Uppsala, Sweden, 29th April 2017 (pp. 1-13). (Electronic Proceedings in Theoretical Computer Science (EPTCS); Vol. 244). EPTCS. https://doi.org/10.4204/EPTCS.244.1

Schivo, S. , Yildiz, B. M. , Ruijters, E. J. J., Gerking, C. , Kumar, R., Dziwok, S. , Rensink, A. , & Stoelinga, M. I. A. (2017). How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In K. Larsen, O. Sokolsky, & J. Wang (Eds.), Dependable Software Engineering. Theories, Tools, and Applications: Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017, Proceedings (pp. 319-336). (Lecture Notes in Computer Science; Vol. 10606), (Lecture Notes in Programming and Software Engineering). Springer. https://doi.org/10.1007/978-3-319-69483-2_19

Yildiz, B. M. , Bockisch, C. , Aksit, M. , & Rensink, A. (2017). An MDE Approach for Modular Program Analyses. In Programming ’17: Companion to the first International Conference on the Art, Science and Engineering of Programming [15] Association for Computing Machinery (ACM). https://doi.org/10.1145/3079368.3079392

Yildiz, B. M. , Bockisch, C. , Rensink, A. , & Aksit, M. (2017). A Java Bytecode Metamodel for Composable Program Analyses. In M. Seidl, & S. Zschaler (Eds.), Software Technologies: Applications and Foundations: STAF 2017 Collocated Workshops, Marburg, Germany, July 17-21, 2017, Revised Selected Papers (pp. 30-40). (Lecture Notes in Computer Science; Vol. 10748). Springer. https://doi.org/10.1007/978-3-319-74730-9_4

Yildiz, B. M. , Rensink, A. , Bockisch, C. , & Aksit, M. (2017). A Model-Derivation Framework for Software Analysis. In H. Hermanns, & P. Höffner (Eds.), Proceedings 2nd Workshop on Models for Formal Analysis of Real Systems (MARS): Uppsala, Sweden, 29th April 2017 (pp. 217-229). (EPTCS - Electronic Publications in Theoretical Computer Science; Vol. 244). arXiv.org. https://doi.org/10.4204/EPTCS.244.9

van de Pol, J. (2017). Parallel Algorithms for Model Checking. In M. R. Mousavi, & J. Sgall (Eds.), Topics in Theoretical Computer Science: Second IFIP WG 1.8 International Conference, TTCS 2017, Tehran, Iran, September 12-14, 2017, Proceedings (pp. xv-xvi). (Lecture Notes in Computer Science; Vol. 10608). Springer.

Editorial


Huisman, M. (2017). Verification of Concurrent Software. Electronic proceedings in theoretical computer science, (261), 2-2.

Report


Darabi, S. , Blom, S. , & Huisman, M. (2017). A Verification Technique for Deterministic Parallel Programs (extended version). (CTIT technical report; No. TR-CTIT-17-01). Centre for Telematics and Information Technology (CTIT).

Huisman, M., Monahan, R., Müller, P. , Mostowski, W., & Ulbrich, M. (2017). VerifyThis 2017: A Program Verification Competition. (Karlsruhe Reports in Informatics; No. 2017-10). Karlsruhe Institute of Technology. https://doi.org/10.5445/ir/1000077160

Huisman, M., Noll, T., & Tatsuta, M. (2017). Analysis and Verification of Pointer Programs. (NII Shonan Meeting Reports; No. 2017-14). National Institute of Informatics.

Ruijters, E. J. J. , Reijsbergen, D. P. , de Boer, P-T. , & Stoelinga, M. I. A. (2017). Rare event simulation for dynamic fault trees. (CTIT technical report series; No. TR-CTIT-17-02). Centre for Telematics and Information Technology (CTIT).

2016

Abstract

Article (contribution to journal)


Amighi, A., de Carvalho Gomes, P., Gurov, D. , & Huisman, M. (2016). Provably correct control flow graphs from Java bytecode programs with exceptions. International journal on software tools for technology transfer, 18(6), 653-684. https://doi.org/10.1007/s10009-015-0375-0



Huisman, M., Klebanov, V., Monahan, R., & Tautschnig, M. (2016). VerifyThis 2015: A program verification competition. International journal on software tools for technology transfer, 19(6), 763–771. https://doi.org/10.1007/s10009-016-0438-x

Laarman, A., Pater, E. , van de Pol, J., & Hansen, H. (2016). Guard-based partial-order reduction. International journal on software tools for technology transfer, 18(4), 427-448. https://doi.org/10.1007/s10009-014-0363-9

Li, B. , Broersma, H. J., & Zhang, S. (2016). Forbidden subgraphs for hamiltonicity of 1-tough graphs. Discussiones mathematicae. Graph theory, 36(4), 915-929. https://doi.org/10.7151/dmgt.1897

Li, R., Ning, B., & Zhang, S. (2016). Color Degree Sum Conditions for Rainbow Triangles in Edge-Colored Graphs. Graphs and combinatorics, 32(5), 2001-2008. https://doi.org/10.1007/s00373-016-1690-2





Zhang, Y. , Broersma, H. J., & Chen, Y. (2016). Narrowing down the gap on cycle-star Ramsey numbers. Journal of combinatorics (Somerville), 7(2-3), 481-493. https://doi.org/10.4310/JOC.2016.v7.n2.a13


Zhang, Y. , Zhang, Y. , Broersma, H. J., & Chen, Y. (2016). On fan-wheel and tree-wheel Ramsey numbers. Discrete mathematics, 339(9), 2284-2287. https://doi.org/10.1016/j.disc.2016.03.013

Chapter


Broersma, H. J., Miller, J. F., & Nichele, S. (2016). Computational matter: evolving computational functions in nanoscale materials. In A. Adamatzky (Ed.), Advances in Unconventional Computing, Volume 2: Prototypes, Models and Algorithms (pp. 397-428). (Emergence, Complexity and Computation; Vol. 23, No. 23). Springer. https://doi.org/10.1007/978-3-319-33921-4_16

Huisman, M., Ahrendt, W., Grahl, D., & Hentschel, M. (2016). Formal specification with the Java modeling language. In W. Ahrendt, B. Beckert, R. Bubel, R. Hähnle, P. H. Schmitt, & M. Ulbrich (Eds.), Deductive Software Verification – The KeY Book (pp. 193-241). (Lecture Notes in Computer Science; Vol. 10001). Springer. https://doi.org/10.1007/978-3-319-49812-6_7

Rensink, A. (2016). Model Patterns - The Quest for the Right Level of Abstraction. In B. Steffen (Ed.), Transactions on Foundations for Mastering Change I (pp. 47-70). (Lecture Notes in Computer Science; Vol. 9960, No. 9960). Springer. https://doi.org/10.1007/978-3-319-46508-1_4

Conference contribution


Ahmad, W. , & van de Pol, J. C. (2016). Synthesizing Energy-Optimal Controllers for Multiprocessor Dataflow Applications with UPPAAL STRATEGO. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 94-113). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_7

Ahmad, W. , Jongerden, M. R. , Stoelinga, M. I. A. , & van de Pol, J. C. (2016). Model checking and evaluating QoS of batteries in MPSoC dataflow applications via hybrid automata. In Proceedings of the 16th International Conference on Application of Concurrency to System Design, ACSD 2016 (pp. 114-123). IEEE Computer Society. https://doi.org/10.1109/ACSD.2016.18

Amighi, A. , Blom, S. , & Huisman, M. (2016). VerCors: A Layered Approach to Practical Verification of Concurrent Software. In Proceedings of the 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016) (pp. 495-503). IEEE Computer Society. https://doi.org/10.1109/PDP.2016.107

Bendisposto, J., Körner, P., Leuschel, M. , Meijer, J. , van de Pol, J. C., Treharne, H., & Whitefield, J. (2016). Symbolic Reachability Analysis of B through ProB and LTSmin. In E. Ábrahám, & M. Huisman (Eds.), Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings (pp. 275-291). (Lecture Notes in Computer Science; Vol. 9681). Springer. https://doi.org/10.1007/978-3-319-33693-0_18

Bloemen, V. (2016). Parallel Model Checking of ω-Automata. In A. Butterfield, & M. Rossi (Eds.), Proceedings of the Formal Methods 2016 Doctoral Symposium co-located with 21st International Symposium on Formal Methods (FM 2016) (pp. 1). CEUR. http://ceur-ws.org/Vol-1744/paper1.pdf

Bloemen, V. , & van de Pol, J. C. (2016). Multi-core SCC-Based LTL Model Checking. In R. Bloem, & E. Arbel (Eds.), Hardware and Software: Verification and Testing; Proceedings of the 12th International Haifa Verification Conference, HVC 2016 (pp. 18-33). (Lecture Notes in Computer Science; Vol. 10028). Springer. https://doi.org/10.1007/978-3-319-49052-6_2

Bloemen, V. , Laarman, A. , & van de Pol, J. C. (2016). Multi-Core On-The-Fly SCC Decomposition. In Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP 2016 (pp. 8). Association for Computing Machinery (ACM). https://doi.org/10.1145/2851141.2851161

Chaudhary, K. , & Fehnker, A. (2016). Model Checking a Client-Side Micro Payment Protocol. In 3rd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE 2016) (pp. 90-97). IEEE. https://doi.org/10.1109/APWC-on-CSE.2016.026

D'Argenio, P. R. , Hartmanns, A., Legay, A., & Sedwards, S. (2016). Statistical Approximation of Optimal Schedulers for Probabilistic Timed Automata. In Proceedings of the 12th International Conference on Integrated Formal Methods (IFM 2016) (pp. 99-114). (Lecture Notes in Computer Science; Vol. 9681). Springer. https://doi.org/10.1007/978-3-319-33693-0_7

Fraile, M., Ford, M., Gadyatskaya, O. , Kumar, R. , Stoelinga, M. I. A., & Trujillo-Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. In 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) (pp. 326-334). (Lecture Notes in Business Information Processing; Vol. 267). Springer. https://doi.org/10.1007/978-3-319-48393-1_24

Gadyatskaya, O., Hansen, R. R. , Larsen, K. G., Legay, A., Olesen, M. C., & Poulsen, D. B. (2016). Modelling attack-defense trees using timed automata. In 14th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2016 (pp. 35-50). (Lecture notes in computer science; Vol. 9884). Springer. https://doi.org/10.1007/978-3-319-44878-7_3

Gerhold, M. , & Stoelinga, M. I. A. (2016). Model-Based Testing of Probabilistic Systems. In P. Stevens, & A. Wasowski (Eds.), Fundamental Approaches to Software Engineering: 19th International Conference, FASE 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedings (pp. 251-268). (Lecture Notes in Computer Science; Vol. 9633). Springer. https://doi.org/10.1007/978-3-662-49665-7_15

Gerhold, M. , & Stoelinga, M. I. A. (2016). Model-Based Testing of Stochastic Systems with IOCO Theory. In Proceedings of the 7th International Workshop on Automating Test Case Design, Selection, and Evaluation, A-TEST 2016 (pp. 45-51). Association for Computing Machinery (ACM). https://doi.org/10.1145/2994291.2994298

Geske, M., Jasper, M., Steffen, B., Howar, F., Schordan, M. , & van de Pol, J. C. (2016). RERS 2016: Parallel and Sequential Benchmarks with Focus on LTL Verification. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II (pp. 787-803). (Lecture Notes in Computer Science; Vol. 9953). Springer. https://doi.org/10.1007/978-3-319-47169-3_59

Giannakopoulou, D. , Guck, D., & Schumann, J. (2016). Exploring model quality for ACAS X. In FM 2016: Formal Methods: 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings (Vol. 9995, pp. 274-290). (Lecture Notes in Computer Science; Vol. 9995). Springer. https://doi.org/10.1007/978-3-319-48989-6_17

Gomes, P., Gurov, D. , & Huisman, M. (2016). Specification and Verification of Synchronization with Condition Variables. In C. Artho, & P. C. Ölveczky (Eds.), Proceedings of the Fifth International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2016) (pp. 3-19). (Communications in Computer and Information Science; Vol. 694). Springer. https://doi.org/10.1007/978-3-319-53946-1_1

Greff, K. , van Damme, R. M. J., Koutnik, J. , Broersma, H. J. , Mikhal, J. O. , Lawrence, C. P. , van der Wiel, W. G., & Schmidhuber, J. (2016). Unconventional computing using evolution-in-nanomaterio: neural networks meet nanoparticle networks. In The Eighth International Conference on Future Computational Technologies and Applications, FUTURE COMPUTING 2016 (pp. 15-20). IARIA. http://eprints.eemcs.utwente.nl/secure2/26922/01/future_computing_2016_1_30_30037.pdf

Gurov, D., Havelund, K. , Huisman, M., & Monahan, R. (2016). Static and runtime verification, competitors or friends? (Track summary). In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 397-401). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_27

Hahn, E. M. , & Hartmanns, A. (2016). A Comparison of Time- and Reward-Bounded Probabilistic Model Checking Techniques. In M. Fränzle, & D. Kapur (Eds.), Dependable Software Engineering: Theories, Tools, and Applications: Second International Symposium, SETTA 2016, Beijing, China, November 9-11, 2016, Proceedings (pp. 85-100). (Lecture Notes in Computer Science; Vol. 9984). Springer. https://doi.org/10.1007/978-3-319-47677-3_6

Hartmanns, A. , Hermanns, H., & Bungert, M. (2016). Flexible support for time and costs in scenario-aware dataflow. In Proceedings of the 13th International Conference on Embedded Software (EMSOFT 2016) Association for Computing Machinery (ACM). https://doi.org/10.1145/2968478.2968496

Hartmanns, A. , Hermanns, H., & Krčál, J. (2016). Schedulers are no Prophets. In Semantics, Logics, and Calculi: Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays (pp. 214-235). (Lecture Notes in Computer Science; Vol. 9560). Springer. https://doi.org/10.1007/978-3-319-27810-0_11

Hermanns, H., Krämer, J., Krčál, J. , & Stoelinga, M. I. A. (2016). The Value of Attack-Defence Diagrams. In F. Piessens, & L. Viganò (Eds.), Proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016 (pp. 163-185). (Lecture Notes in Computer Science; Vol. 9635). Springer. https://doi.org/10.1007/978-3-662-49635-0_9

Huisman, M., Bos, H. , Brinkkemper, S., van Deursen, A., Groote, J. F., Lago, P. , van de Pol, J., & Visser, E. (2016). Software that meets its Intent. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II (pp. 609-625). (Lecture Notes in Computer Science; Vol. 9953). Springer. https://doi.org/10.1007/978-3-319-47169-3_47

Junges, S. , Guck, D. , Katoen, J. P. , & Stoelinga, M. I. A. (2016). Uncovering dynamic fault trees. In 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2016 (pp. 299-310). IEEE. https://doi.org/10.1109/DSN.2016.35

Katoen, J. P. (2016). The Probabilistic Model Checking Landscape. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS 2016) (pp. 31-45). Association for Computing Machinery (ACM). https://doi.org/10.1145/2933575.2934574

Meijer, J. , & van de Pol, J. C. (2016). Bandwidth and Wavefront Reduction for Static Variable Ordering in Symbolic Reachability Analysis. In S. Rayadurgam, & O. Tkachuk (Eds.), NASA Formal Methods: 8th International Symposium, NFM 2016, Minneapolis, MN, USA, June 7-9, 2016, Proceedings (pp. 255-271). (Lecture Notes in Computer Science; Vol. 9690). Springer. https://doi.org/10.1007/978-3-319-40648-0_20

Mostowski, W. (2016). Dynamic Frames Based Verification Method for Concurrent Java Programs. In A. Gurfinkel, & S. A. Seshia (Eds.), Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2015. Revised Selected Papers (pp. 124-141). (Lecture Notes in Computer Science; Vol. 9593). Springer. https://doi.org/10.1007/978-3-319-29613-5_8

Neele, T., Wijs, A., Bosnacki, D. , & van de Pol, J. C. (2016). Partial-Order Reduction for GPU Model Checking. In C. Artho, A. Legay, & D. Peled (Eds.), Proceedings of the 14th International Symposium on Automated Technology for Verification and Analysis, ATVA 2016 (pp. 357-374). (Lecture Notes in Computer Science; Vol. 9938). Springer. https://doi.org/10.1007/978-3-319-46520-3_23

Nies, G., Stenger, M., Krčál, J. , Hermanns, H., Bisgaard, M., Gerhardt, D. , Haverkort, B. R. H. M. , Jongerden, M. R. , Larsen, K. G., & Wognsen, E. R. (2016). Mastering Operational Limitations of LEO Satellites - The GOMX-3 Approach. In Proceedings of the 23rd IAA Symposium on Small Missions at the 67th International Astronotical Congress, IAC 16/B4 (pp. 1-15). International Astronautical Federation. https://iafastro.directory/iac/archive/browse/IAC-16/B4/3/35160/


Rensink, A. (2016). Verification Techniques for Graph Rewriting (Tutorial). In P. A. Abdulla, F. Gadducci, B. König, & V. Vafeiadis (Eds.), Verification of Evolving Graph Structures (pp. 18-18). (Dagstuhl Reports; Vol. 5, No. 11). Dagstuhl. https://doi.org/10.4230/DagRep.5.11.1

Ruijters, E. J. J. , Guck, D., Drolenga, P. , & Stoelinga, M. I. A. (2016). Fault maintenance trees: reliability centered maintenance via statistical model checking. In Proceedings of the IEEE 62nd Annual Reliability and Maintainability Symposium, RAMS 2016 IEEE. https://doi.org/10.1109/RAMS.2016.7447986

Ruijters, E. J. J. , Guck, D., Drolenga, P., Peters, M. , & Stoelinga, M. I. A. (2016). Maintenance analysis and optimization via statistical model checking: Evaluating a train pneumatic compressor. In G. Agha, & B. Van Houdt (Eds.), Proceedings of the 13th International Conference on Quantitative Evaluation of SysTems, QEST 2016 (pp. 331-347). (Lecture Notes in Computer Science; Vol. 9826). Springer. https://doi.org/10.1007/978-3-319-43425-4_22

Ruijters, E. J. J. , Guck, D., van Noort, M. , & Stoelinga, M. I. A. (2016). Reliability-centered maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A practical experience report. In Proceedings of the 46th annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016 (pp. 662-669). IEEE Computer Society. https://doi.org/10.1109/DSN.2016.67

Ruijters, E. , & Stoelinga, M. (2016). Better railway engineering through statistical model checking. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 151-165). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_10

Wevers, L. , Huisman, M. , & van Keulen, M. (2016). Lazy Evaluation for Concurrent OLTP and Bulk Transactions. In Proceedings of the 20th International Database Engineering & Applications Symposium (IDEAS 2016) (pp. 115-124). Association for Computing Machinery (ACM). https://doi.org/10.1145/2938503.2938555


van Dijk, T. , & van de Pol, J. C. (2016). Multi-core Symbolic Bisimulation Minimisation. In M. Chechik, & J-F. Raskin (Eds.), Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2016) (pp. 332-348). (Lecture Notes in Computer Science; Vol. 9636). Springer. https://doi.org/10.1007/978-3-662-49674-9_19


Paper


Oortwijn, W. H. M. , Blom, S. , & Huisman, M. (2016). Static Verification of Message Passing Programs. Paper presented at ICT.OPEN 2016, Amersfoort, Netherlands.

PhD Thesis - Research UT, graduation UT

Report



Ahmad, W. , Yildiz, B. M. , Rensink, A. , & Stoelinga, M. I. A. (2016). A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications (extended version). (CTIT Technical Report Series; No. TR-CTIT-16-09). Centre for Telematics and Information Technology (CTIT).

Huisman, M., Monahan, R., Müller, P., & Poll, E. (2016). VerifyThis 2016: A Program Verification Competition. (CTIT Technical Report Series; No. TR-CTIT-16-07). Centre for Telematics and Information Technology (CTIT).

2015

Article (contribution to journal)



Bauer, D. , Broersma, H. J. , van den Heuvel, J., Kahl, N., Nevo, A., Schmeichel, E., Woodall, D. R., & Yatauro, M. (2015). Best monotone degree conditions for graph properties: a survey. Graphs and combinatorics, 31(1), 1-22. https://doi.org/10.1007/s00373-014-1465-6

Blom, S. , & Huisman, M. (2015). Witnessing the elimination of magic wands. International journal on software tools for technology transfer, 17(6), 757-781. https://doi.org/10.1007/s10009-015-0372-3



Broersma, H. J. (2015). How tough is toughness? Bulletin of the European Association for Theoretical Computer Science, 117, 28-52. http://bulletin.eatcs.org/index.php/beatcs/article/view/362

Broersma, H. J., Fiala, J., Golovach, P. A., Kaiser, T. , Paulusma, D., & Proskurowski, A. (2015). Linear-time algorithms for scattering number and hamilton-connectivity of interval graphs. Journal of graph theory, 79(4), 282-299. https://doi.org/10.1002/jgt.21832

Hartmanns, A. , & Timmer, M. (2015). Sound statistical model checking for MDP using partial order and confluence reduction. International journal on software tools for technology transfer, 17(4), 429-456. https://doi.org/10.1007/s10009-014-0349-7

Huisman, M., Klebanov, V., & Monahan, R. (2015). VerifyThis 2012 - A Program Verification Competition. International journal on software tools for technology transfer, 17(6), 647-657. https://doi.org/10.1007/s10009-015-0396-8

Li, B., Ning, B. , Broersma, H. J., & Zhang, S. (2015). Characterizing heavy subgraph pairs for pancyclicity. Graphs and combinatorics, 31(3), 649-667. https://doi.org/10.1007/s00373-014-1406-4

Li, B. , Zhang, Y., Bielak, H. , Broersma, H. J., & Holub, P. (2015). Closing the gap on path-kipas Ramsey numbers. Electronic journal of combinatorics, 22(3), 3.21. http://www.combinatorics.org/ojs/index.php/eljc/article/view/v22i3p21





Zhang, Y. , Broersma, H. J., & Chen, Y. (2015). A note on Ramsey numbers for fans. Bulletin of the Australian Mathematical Society, 92(1), 19-23. https://doi.org/10.1017/S0004972715000398




Chapter


Kant, G. , Laarman, A. , Meijer, J. , van de Pol, J. C. , Blom, S. , & van Dijk, T. (2015). LTSmin: High-Performance Language-Independent Model Checking. In C. Baier, & C. Tinelli (Eds.), Tools and Algorithms for the Construction and Analysis of Systems (pp. 692-707). (Lecture Notes in Computer Science; Vol. 9035, No. 9035). Springer. https://doi.org/10.1007/978-3-662-46681-0_61

Conference contribution



Aksit, M. , & Malakuti Khah Olun Abadi, S. (2015). Hermeneutics framework: integration of design rationale and optimizing software modules. In Proceedings of the 14th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS 2015) (pp. 58-62). (Recent Advances in Computer Engineering Series; Vol. 27). WSEAS Press. http://www.wseas.us/e-library/conferences/2015/Dubai/SEPADS/SEPADS-06.pdf

Aksit, M. , Tekinerdogan, B. , Sözer, H., Safi, H. F., & Ayas, M. (2015). The DESARC method: An effective approach for university-industry cooperation. In Proceedings of the International Conference on Advances in Computing, Control and Networking, ACCN 2015 (pp. 51-53). Institute of Research Engineers and Doctors. https://doi.org/10.15224/978-1-63248-038-5-10

Amighi, A. , Darabi, S. , Blom, S. , & Huisman, M. (2015). Specification and verification of atomic operations in GPGPU programs. In R. Calinescu, & B. Rumpe (Eds.), Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM 2015) (pp. 69-83). (Lecture Notes in Computer Science; Vol. 9276). Springer. https://doi.org/10.1007/978-3-319-22969-0_5

Arnold, F. , Guck, D. , Kumar, R. , & Stoelinga, M. (2015). Sequential and Parallel Attack Tree Modelling. In F. Koornneef, & C. van Gulijk (Eds.), Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings (pp. 291-299). (Lecture Notes in Computer Science; Vol. 9338). Springer. https://doi.org/10.1007/978-3-319-24249-1_25

Blom, S. , Darabi, S. , & Huisman, M. (2015). Verification of loop parallelisations. In A. Egyed, & I. Schaefer (Eds.), Proceedings of the 18th International Conference on Fundamental Approaches to Software Engineering (FASE 2015) (pp. 202-217). (Lecture Notes in Computer Science; Vol. 9033). Springer. https://doi.org/10.1007/978-3-662-46675-9_14

Blom, S. , Huisman, M. , & Zaharieva, M. (2015). History-Based Verification of Functional Behaviour of Concurrent Programs. In R. Calinescu, & B. Rumpe (Eds.), Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM 2015) (pp. 84-98). (Lecture Notes in Computer Science; Vol. 9276). Springer. https://doi.org/10.1007/978-3-319-22969-0_6

Chaudhary, K. , Fehnker, A. , van de Pol, J. C. , & Stoelinga, M. I. A. (2015). Modeling and Verification of the Bitcoin Protocol. In R. J. van Glabbeek, J. F. Groote, & P. Höfner (Eds.), Proceedings of the Workshop on Models for Formal Analysis of Real Systems (MARS 2015) (pp. 46-60). (Electronic Proceedings in Theoretical Computer Science; Vol. 196). Open Publishing Association. https://doi.org/10.4204/EPTCS.196.5

Chen, T., Kammüller, F., Nemli, I., & Probst, C. W. (2015). A Probabilistic Analysis Framework for Malicious Insider Threats. In T. Tryfonas, & I. Askoxylakis (Eds.), Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings (pp. 178-189). (Lecture notes in computer science; Vol. 9190). Springer. https://doi.org/10.1007/978-3-319-20376-8_16

David, N., David, A., Hansen, R. R. , Larsen, K. G., Legay, A., Olesen, M. C., & Probst, C. W. (2015). Modelling Social-Technical Attacks with Timed Automata. In Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST) (pp. 21-28). Association for Computing Machinery (ACM). https://doi.org/10.1145/2808783.2808787

Gerhold, M. , & Stoelinga, M. I. A. (2015). Ioco Theory for Probabilistic Automata. In Proceedings of the 10th Workshop on Model Based Testing, MBT 2015 (pp. 23-40). (Electronic proceedings in theoretical computer science; Vol. 180). Open Publishing Association. https://doi.org/10.4204/EPTCS.180.2

Guck, D., Spel, J. , & Stoelinga, M. I. A. (2015). DFTCalc: Reliability centered maintenance via fault tree analysis (tool paper). In M. Butler, S. Conchon, & F. Zaïdi (Eds.), Proceedings of the 17th International Conference on Formal Engineering Methods (ICFEM 2015) (pp. 304-311). (Lecture Notes in Computer Science; Vol. 9407). Springer. https://doi.org/10.1007/978-3-319-25423-4_19

Huisman, M. , & Mostowski, W. (2015). A Symbolic Approach to Permission Accounting for Concurrent Reasoning. In Proceedings of the 14th International Symposium on Parallel and Distributed Computing, ISPDC 2015 (pp. 165-174). IEEE Computer Society. https://doi.org/10.1109/ISPDC.2015.26

Junges, S. , Guck, D. , Katoen, J. P. , Rensink, A. , & Stoelinga, M. I. A. (2015). Fault Trees on a Diet: Automated Reduction by Graph Rewriting. In X. Li, Z. Liu, & W. Yi (Eds.), Dependable Software Engineering: Theories, Tools, and Applications: First International Symposium, SETTA 2015, Nanjing, China, November 4-6, 2015, Proceedings (pp. 3-18). (Lecture Notes in Computer Science; Vol. 9409), (Lecture Notes in Programming and Software Engineering). Springer. https://doi.org/10.1007/978-3-319-25942-0_1

Kandziora, J. , Huisman, M. , Bockisch, C. , & Zaharieva, M. (2015). Run-time Assertion Checking of JML Annotations in Multithreaded Applications with e-OpenJML. In R. Monahan (Ed.), Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP 2015) (pp. 8). [8] Association for Computing Machinery (ACM). https://doi.org/10.1145/2786536.2786541

Katoen, J. P. (2015). Probabilistic Programming: A True Verification Challenge. In B. Finkbeiner, G. Pu, & L. Zhang (Eds.), Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings (pp. 1-3). (Lecture Notes in Computer Science; Vol. 9364). Springer. https://doi.org/10.1007/978-3-319-24953-7_1

Kumar, R. , Guck, D. , & Stoelinga, M. I. A. (2015). Time dependent analysis with dynamic counter measure trees. In Proceedings of the 13th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015) (pp. 1-5). INRIA. http://arxiv.org/pdf/1510.00050.pdf

Kumar, R. , Ruijters, E. J. J. , & Stoelinga, M. I. A. (2015). Quantitative Attack Tree Analysis via Priced Timed Automata. In S. Sankaranarayanan, & E. Vicario (Eds.), Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2015) (pp. 156-171). (Lecture Notes in Computer Science; Vol. 9268). Springer. https://doi.org/10.1007/978-3-319-22975-1_11

Kwantes, P. M., van Gorp, P., Kleijn, J. , & Rensink, A. (2015). Towards Compliance Verification Between Global and Local Process Models. In F. Parisi-Presicce, & B. Westfechtel (Eds.), Proceedings of the 8th International Conference on Graph Transformation, ICGT 2015 (pp. 221-236). (Lecture Notes in Computer Science; Vol. 9151). Springer. https://doi.org/10.1007/978-3-319-21145-9_14

Malakuti Khah Olun Abadi, S. , & Aksit, M. (2015). On liberating programs from the von neumann architecture via event-based modularization. In Companion Proceedings of the 14th International Conference on Modularity, MODULARITY Companion 2015 (pp. 31-34). Association for Computing Machinery (ACM). https://doi.org/10.1145/2735386.2735387

Miller, J. F. , & Broersma, H. J. (2015). Computational matter: evolving computational solutions in materials. In S. Silva (Ed.), Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO Companion 2015 (pp. 769-770). Association for Computing Machinery (ACM). https://doi.org/10.1145/2739482.2764939

Mostowski, W., & Ulbrich, M. (2015). Dynamic Dispatch for Method Contracts through Abstract Predicates. In Proceedings of the 14th International Conference on Modularity (MODULARITY 2015) (pp. 109-116). (MODULARITY 2015). Association for Computing Machinery (ACM). https://doi.org/10.1145/2724525.2724574

Oortwijn, W. H. M. , van Dijk, T. , & van de Pol, J. C. (2015). A Distributed Hash Table for Shared Memory. In R. Wyrzykowski, E. Deelman, J. Dongarra, K. Karczewski, J. Kitowski, & K. Wiatr (Eds.), Parallel Processing and Applied Mathematics: 11th International Conference, PPAM 2015, Krakow, Poland, September 6-9, 2015. Revised Selected Papers, Part II (pp. 15-24). (Lecture Notes in Computer Science; Vol. 9574). Springer. https://doi.org/10.1007/978-3-319-32152-3_2

Rensink, A. , & Zambon, E. (2015). Graphs as Models - Preface. In A. Rensink, & E. Zambon (Eds.), Proceedings Graphs as Models (pp. -). (Electronic Proceedings in Theoretical Computer Science; Vol. 181). Open Publishing Association. https://doi.org/10.4204/EPTCS.181

Wevers, L., Hofstra, M., Tammens, M. , Huisman, M. , & van Keulen, M. (2015). A Benchmark for Online Non-Blocking Schema Transformations. In M. Helfert, A. Holzinger, O. Belo, & C. Francalanci (Eds.), Proceedings of 4th International Conference on Data Management Technologies and Applications, DATA 2015: July 20-22, 2015, in Colmar, Alsace, France (pp. 288-298). SCITEPRESS. https://doi.org/10.5220/0005500202880298

Wevers, L., Hofstra, M., Tammens, M. , Huisman, M. , & van Keulen, M. (2015). Analysis of the blocking behaviour of schema transformations in relational database systems. In Proceedings of the 19th East European Conference on Advances in Databases and Information Systems, ADBIS 2015 (pp. 169-183). (Lecture Notes in Computer Science; Vol. 9282). Springer. https://doi.org/10.1007/978-3-319-23135-8_12

Wognsen, E. R. , Haverkort, B. R. H. M. , Jongerden, M. R., Hansen, R. R. , & Larsen, K. G. (2015). A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems. In S. Sankaranarayanan, & E. Vicario (Eds.), Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015 (pp. 305-320). (Lecture Notes in Computer Science; Vol. 9268). Springer. https://doi.org/10.1007/978-3-319-22975-1_20

van Dijk, T. , & van de Pol, J. C. (2015). Sylvan: Multi-core Decision Diagrams. In Proceedings of the 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2015 (pp. 677-691). (Lecture Notes in Computer Science; Vol. 9035). Springer. https://doi.org/10.1007/978-3-662-46681-0_60

van Dijk, T. , Hahn, E. M. , Jansen, D. N., Li, Y., Neele, T. , Stoelinga, M., Turrini, A., & Zhang, L. (2015). A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking. In X. Li, Z. Liu, & W. Yi (Eds.), Dependable Software Engineering: Theories, Tools, and Applications: First International Symposium, SETTA 2015, Nanjing, China, November 4-6, 2015, Proceedings (pp. 35-51). (Lecture Notes in Computer Science; Vol. 9409). Springer. https://doi.org/10.1007/978-3-319-25942-0_3

van de Pol, J. C. (2015). Automated Verification of Nested DFS. In M. Núñez, & M. Güdemann (Eds.), Proceedings of the 20th International Workshop on Formal Methods for Industrial Critical Systems (FMICS 2015) (pp. 181-197). (Lecture Notes in Computer Science; Vol. 9128). Springer. https://doi.org/10.1007/978-3-319-19458-5_12

Poster


Taballione, C., Agbana, T. , Hoekman, M. , Wevers, L., Kalkman, J., Verhaegen, M. , van der Slot, P. J. M. , & Boller, K. J. (2015). Si3N4-Based Waveguide Circuits for Smart Spectrometer Devices. -. Poster session presented at IOP Photonic Devices Symposium 2015, Amsterdam, Netherlands.

Report



Blom, S. , Huisman, M. , & Zaharieva, M. (2015). History-based Verification of Functional Behaviour of Concurrent Programs. (CTIT Technical Report Series; No. TR-CTIT-15-02). Centre for Telematics and Information Technology (CTIT).

Yildiz, B. M. , Rensink, A. , Bockisch, C. , & Aksit, M. (2015). A Model-Derivation Framework for Timing Analysis of Java Software Systems. (CTIT Technical Report Series; No. TR-CTIT-15-08). Centre for Telematics and Information Technology (CTIT).

This publication list has been generated from UT Research Information.