[{"citation":{"short":"G. Besova, D. Steenken, H. Wehrheim, Computer Languages, Systems &#38; Structures (2015) 116–138.","mla":"Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” <i>Computer Languages, Systems &#38; Structures</i>, Elsevier, 2015, pp. 116–38, doi:<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>.","bibtex":"@article{Besova_Steenken_Wehrheim_2015, title={Grammar-based model transformations: Definition, execution, and quality properties}, DOI={<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>}, journal={Computer Languages, Systems &#38; Structures}, publisher={Elsevier}, author={Besova, Galina and Steenken, Dominik and Wehrheim, Heike}, year={2015}, pages={116–138} }","apa":"Besova, G., Steenken, D., &#38; Wehrheim, H. (2015). Grammar-based model transformations: Definition, execution, and quality properties. <i>Computer Languages, Systems &#38; Structures</i>, 116–138. <a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">https://doi.org/10.1016/j.cl.2015.05.003</a>","ama":"Besova G, Steenken D, Wehrheim H. Grammar-based model transformations: Definition, execution, and quality properties. <i>Computer Languages, Systems &#38; Structures</i>. 2015:116-138. doi:<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>","ieee":"G. Besova, D. Steenken, and H. Wehrheim, “Grammar-based model transformations: Definition, execution, and quality properties,” <i>Computer Languages, Systems &#38; Structures</i>, pp. 116–138, 2015.","chicago":"Besova, Galina, Dominik Steenken, and Heike Wehrheim. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” <i>Computer Languages, Systems &#38; Structures</i>, 2015, 116–38. <a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">https://doi.org/10.1016/j.cl.2015.05.003</a>."},"page":"116-138","year":"2015","has_accepted_license":"1","doi":"10.1016/j.cl.2015.05.003","title":"Grammar-based model transformations: Definition, execution, and quality properties","author":[{"full_name":"Besova, Galina","last_name":"Besova","first_name":"Galina"},{"last_name":"Steenken","full_name":"Steenken, Dominik","first_name":"Dominik"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2017-10-17T12:41:48Z","date_updated":"2022-01-06T06:58:43Z","publisher":"Elsevier","file":[{"file_name":"290-BSW15-main.pdf","access_level":"closed","file_id":"1464","file_size":1329478,"date_created":"2018-03-21T09:22:03Z","creator":"florida","date_updated":"2018-03-21T09:22:03Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","abstract":[{"lang":"eng","text":"Model transformation is a key concept in model-driven software engineering. The definition of model transformations is usually based on meta-models describing the abstract syntax of languages. While meta-models are thereby able to abstract from uperfluous details of concrete syntax, they often loose structural information inherent in languages, like information on model elements always occurring together in particular shapes. As a consequence, model transformations cannot naturally re-use language structures, thus leading to unnecessary complexity in their development as well as in quality assurance.In this paper, we propose a new approach to model transformation development which allows to simplify the developed transformations and improve their quality via the exploitation of the languages׳ structures. The approach is based on context-free graph grammars and transformations defined by pairing productions of source and target grammars. We show that such transformations have important properties: they terminate and are sound, complete, and deterministic."}],"type":"journal_article","publication":"Computer Languages, Systems & Structures","file_date_updated":"2018-03-21T09:22:03Z","language":[{"iso":"eng"}],"ddc":["040"],"user_id":"477","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"290"},{"title":"Temporal plans for software architecture reconfiguration","doi":"10.1007/s00450-014-0259-7","date_updated":"2022-01-06T06:59:01Z","author":[{"first_name":"Steffen","last_name":"Ziegert","full_name":"Ziegert, Steffen"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_created":"2018-06-13T07:47:56Z","year":"2015","page":"303--320","citation":{"bibtex":"@article{Ziegert_Wehrheim_2015, title={Temporal plans for software architecture reconfiguration}, DOI={<a href=\"https://doi.org/10.1007/s00450-014-0259-7\">10.1007/s00450-014-0259-7</a>}, number={3–4}, journal={Computer Science - R &#38; D}, author={Ziegert, Steffen and Wehrheim, Heike}, year={2015}, pages={303--320} }","mla":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4, 2015, pp. 303--320, doi:<a href=\"https://doi.org/10.1007/s00450-014-0259-7\">10.1007/s00450-014-0259-7</a>.","short":"S. Ziegert, H. Wehrheim, Computer Science - R &#38; D (2015) 303--320.","apa":"Ziegert, S., &#38; Wehrheim, H. (2015). Temporal plans for software architecture reconfiguration. <i>Computer Science - R &#38; D</i>, (3–4), 303--320. <a href=\"https://doi.org/10.1007/s00450-014-0259-7\">https://doi.org/10.1007/s00450-014-0259-7</a>","ama":"Ziegert S, Wehrheim H. Temporal plans for software architecture reconfiguration. <i>Computer Science - R &#38; D</i>. 2015;(3-4):303--320. doi:<a href=\"https://doi.org/10.1007/s00450-014-0259-7\">10.1007/s00450-014-0259-7</a>","ieee":"S. Ziegert and H. Wehrheim, “Temporal plans for software architecture reconfiguration,” <i>Computer Science - R &#38; D</i>, no. 3–4, pp. 303--320, 2015.","chicago":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4 (2015): 303--320. <a href=\"https://doi.org/10.1007/s00450-014-0259-7\">https://doi.org/10.1007/s00450-014-0259-7</a>."},"has_accepted_license":"1","issue":"3-4","ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T15:52:13Z","_id":"3162","project":[{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject B3","_id":"11"}],"department":[{"_id":"77"}],"user_id":"477","status":"public","file":[{"date_updated":"2018-11-02T15:52:13Z","creator":"ups","date_created":"2018-11-02T15:52:13Z","file_size":2136451,"access_level":"closed","file_id":"5315","file_name":"TemporalPlansForSoftwareArchit.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"Computer Science - R & D","type":"journal_article"},{"year":"2015","page":"3--4","citation":{"apa":"Meyer, R., &#38; Wehrheim, H. (2015). From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog. In R. Meyer, A. Platzer, &#38; H. Wehrheim (Eds.), <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i> (pp. 3--4). <a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">https://doi.org/10.1007/978-3-319-23506-6_1</a>","short":"R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.","mla":"Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog.” <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, edited by Roland Meyer et al., 2015, pp. 3--4, doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">10.1007/978-3-319-23506-6_1</a>.","bibtex":"@inproceedings{Meyer_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">10.1007/978-3-319-23506-6_1</a>}, booktitle={Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}, author={Meyer, Roland and Wehrheim, Heike}, editor={Meyer, Roland and Platzer, Andr{\\’{e}} and Wehrheim, HeikeEditors}, year={2015}, pages={3--4}, collection={Lecture Notes in Computer Science} }","ama":"Meyer R, Wehrheim H. From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog. In: Meyer R, Platzer A, Wehrheim H, eds. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. Lecture Notes in Computer Science. ; 2015:3--4. doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">10.1007/978-3-319-23506-6_1</a>","ieee":"R. Meyer and H. Wehrheim, “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog,” in <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, 2015, pp. 3--4.","chicago":"Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog.” In <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, edited by Roland Meyer, Andr{\\’{e}} Platzer, and Heike Wehrheim, 3--4. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">https://doi.org/10.1007/978-3-319-23506-6_1</a>."},"date_updated":"2022-01-06T06:59:01Z","author":[{"full_name":"Meyer, Roland","last_name":"Meyer","first_name":"Roland"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2018-06-13T07:49:28Z","title":"From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog","doi":"10.1007/978-3-319-23506-6_1","publication":"Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings","type":"conference","editor":[{"last_name":"Meyer","full_name":"Meyer, Roland","first_name":"Roland"},{"first_name":"Andr{\\'{e}}","last_name":"Platzer","full_name":"Platzer, Andr{\\'{e}}"},{"full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"status":"public","_id":"3163","department":[{"_id":"77"}],"series_title":"Lecture Notes in Computer Science","user_id":"29719"},{"year":"2015","citation":{"chicago":"Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, and Heike Wehrheim. “Verifying Opacity of a Transactional Mutex Lock.” In <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, edited by Nikolaj Bj{\\o}rner and Frank S. de Boer, 161--177. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">https://doi.org/10.1007/978-3-319-19249-9_11</a>.","ieee":"J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, and H. Wehrheim, “Verifying Opacity of a Transactional Mutex Lock,” in <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, 2015, pp. 161--177.","ama":"Derrick J, Dongol B, Schellhorn G, Travkin O, Wehrheim H. Verifying Opacity of a Transactional Mutex Lock. In: Bj{\\o}rner N, S. de Boer F, eds. <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>. Lecture Notes in Computer Science. ; 2015:161--177. doi:<a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">10.1007/978-3-319-19249-9_11</a>","apa":"Derrick, J., Dongol, B., Schellhorn, G., Travkin, O., &#38; Wehrheim, H. (2015). Verifying Opacity of a Transactional Mutex Lock. In N. Bj{\\o}rner &#38; F. S. de Boer (Eds.), <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i> (pp. 161--177). <a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">https://doi.org/10.1007/978-3-319-19249-9_11</a>","mla":"Derrick, John, et al. “Verifying Opacity of a Transactional Mutex Lock.” <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, edited by Nikolaj Bj{\\o}rner and Frank S. de Boer, 2015, pp. 161--177, doi:<a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">10.1007/978-3-319-19249-9_11</a>.","bibtex":"@inproceedings{Derrick_Dongol_Schellhorn_Travkin_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={Verifying Opacity of a Transactional Mutex Lock}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">10.1007/978-3-319-19249-9_11</a>}, booktitle={{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings}, author={Derrick, John and Dongol, Brijesh and Schellhorn, Gerhard and Travkin, Oleg and Wehrheim, Heike}, editor={Bj{\\o}rner, Nikolaj and S. de Boer, FrankEditors}, year={2015}, pages={161--177}, collection={Lecture Notes in Computer Science} }","short":"J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177."},"page":"161--177","title":"Verifying Opacity of a Transactional Mutex Lock","doi":"10.1007/978-3-319-19249-9_11","date_updated":"2022-01-06T06:59:01Z","date_created":"2018-06-13T07:50:43Z","author":[{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"first_name":"Brijesh","last_name":"Dongol","full_name":"Dongol, Brijesh"},{"last_name":"Schellhorn","full_name":"Schellhorn, Gerhard","first_name":"Gerhard"},{"full_name":"Travkin, Oleg","last_name":"Travkin","first_name":"Oleg"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"editor":[{"first_name":"Nikolaj","last_name":"Bj{\\o}rner","full_name":"Bj{\\o}rner, Nikolaj"},{"last_name":"S. de Boer","full_name":"S. de Boer, Frank","first_name":"Frank"}],"status":"public","type":"conference","publication":"{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings","project":[{"name":"Validation of Software Transactional Memory","_id":"78"}],"_id":"3164","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}]},{"year":"2015","citation":{"ama":"Wehrheim H, Travkin O. {TSO} to {SC} via Symbolic Execution. In: Piterman N, ed. <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>. Lecture Notes in Computer Science. ; 2015:104--119. doi:<a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">10.1007/978-3-319-26287-1_7</a>","chicago":"Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” In <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>, edited by Nir Piterman, 104--119. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">https://doi.org/10.1007/978-3-319-26287-1_7</a>.","ieee":"H. Wehrheim and O. Travkin, “{TSO} to {SC} via Symbolic Execution,” in <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>, 2015, pp. 104--119.","apa":"Wehrheim, H., &#38; Travkin, O. (2015). {TSO} to {SC} via Symbolic Execution. In N. Piterman (Ed.), <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i> (pp. 104--119). <a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">https://doi.org/10.1007/978-3-319-26287-1_7</a>","mla":"Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>, edited by Nir Piterman, 2015, pp. 104--119, doi:<a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">10.1007/978-3-319-26287-1_7</a>.","bibtex":"@inproceedings{Wehrheim_Travkin_2015, series={Lecture Notes in Computer Science}, title={{TSO} to {SC} via Symbolic Execution}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">10.1007/978-3-319-26287-1_7</a>}, booktitle={Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings}, author={Wehrheim, Heike and Travkin, Oleg}, editor={Piterman, NirEditor}, year={2015}, pages={104--119}, collection={Lecture Notes in Computer Science} }","short":"H. Wehrheim, O. Travkin, in: N. Piterman (Ed.), Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119."},"page":"104--119","date_updated":"2022-01-06T06:59:01Z","date_created":"2018-06-13T07:52:44Z","author":[{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"},{"first_name":"Oleg","full_name":"Travkin, Oleg","last_name":"Travkin"}],"title":"{TSO} to {SC} via Symbolic Execution","doi":"10.1007/978-3-319-26287-1_7","type":"conference","publication":"Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings","editor":[{"first_name":"Nir","full_name":"Piterman, Nir","last_name":"Piterman"}],"status":"public","_id":"3165","user_id":"29719","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}]},{"publication_identifier":{"isbn":["978-3-319-23505-9"]},"citation":{"ieee":"R. Meyer, A. Platzer, and H. Wehrheim, Eds., <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. 2015.","chicago":"Meyer, Roland, Andr{\\’{e}} Platzer, and Heike Wehrheim, eds. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-23506-6\">https://doi.org/10.1007/978-3-319-23506-6</a>.","ama":"Meyer R, Platzer A, Wehrheim H, eds. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>.; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6\">10.1007/978-3-319-23506-6</a>","bibtex":"@book{Meyer_Platzer_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-23506-6\">10.1007/978-3-319-23506-6</a>}, year={2015}, collection={Lecture Notes in Computer Science} }","mla":"Meyer, Roland, et al., editors. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6\">10.1007/978-3-319-23506-6</a>.","short":"R. Meyer, A. Platzer, H. Wehrheim, eds., Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015.","apa":"Meyer, R., Platzer, A., &#38; Wehrheim, H. (Eds.). (2015). <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. <a href=\"https://doi.org/10.1007/978-3-319-23506-6\">https://doi.org/10.1007/978-3-319-23506-6</a>"},"year":"2015","date_created":"2018-06-13T07:54:06Z","date_updated":"2022-01-06T06:59:01Z","doi":"10.1007/978-3-319-23506-6","title":"Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings","type":"conference_editor","status":"public","editor":[{"first_name":"Roland","last_name":"Meyer","full_name":"Meyer, Roland"},{"full_name":"Platzer, Andr{\\'{e}}","last_name":"Platzer","first_name":"Andr{\\'{e}}"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"department":[{"_id":"77"}],"user_id":"29719","series_title":"Lecture Notes in Computer Science","_id":"3166"},{"page":"184-190","citation":{"apa":"Flaßkamp, K., Grösbrink, S., Hartmann, P., Heinzemann, C., Kleinjohann, B., Kleinjohann, L., Krüger, M., Ober-Blöbaum, S., Priesterjahn, C., Rasche, C., Schäfer, W., Steenken, D., Trächtler, A., Wehrheim, H., &#38; Ziegert, S. (2014). Development of the RailCab Vehicle. In <i>Dependability of Self-Optimizing Mechatronic Systems</i> (pp. 184–190). Springer-Verlag .","short":"K. Flaßkamp, S. Grösbrink, P. Hartmann, C. Heinzemann, B. Kleinjohann, L. Kleinjohann, M. Krüger, S. Ober-Blöbaum, C. Priesterjahn, C. Rasche, W. Schäfer, D. Steenken, A. Trächtler, H. Wehrheim, S. Ziegert, in: Dependability of Self-Optimizing Mechatronic Systems, Springer-Verlag , Heidelberg, Germany, 2014, pp. 184–190.","bibtex":"@inbook{Flaßkamp_Grösbrink_Hartmann_Heinzemann_Kleinjohann_Kleinjohann_Krüger_Ober-Blöbaum_Priesterjahn_Rasche_et al._2014, place={Heidelberg, Germany}, title={Development of the RailCab Vehicle}, booktitle={Dependability of Self-Optimizing Mechatronic Systems}, publisher={Springer-Verlag }, author={Flaßkamp, Kathrin and Grösbrink, Stefan and Hartmann, Philip and Heinzemann, Christian and Kleinjohann, Bernd and Kleinjohann, Lisa and Krüger, Martin and Ober-Blöbaum, Sina and Priesterjahn, Claudia and Rasche, Christoph and et al.}, year={2014}, pages={184–190} }","mla":"Flaßkamp, Kathrin, et al. “Development of the RailCab Vehicle.” <i>Dependability of Self-Optimizing Mechatronic Systems</i>, Springer-Verlag , 2014, pp. 184–90.","ama":"Flaßkamp K, Grösbrink S, Hartmann P, et al. Development of the RailCab Vehicle. In: <i>Dependability of Self-Optimizing Mechatronic Systems</i>. Springer-Verlag ; 2014:184-190.","chicago":"Flaßkamp, Kathrin, Stefan Grösbrink, Philip Hartmann, Christian Heinzemann, Bernd Kleinjohann, Lisa Kleinjohann, Martin Krüger, et al. “Development of the RailCab Vehicle.” In <i>Dependability of Self-Optimizing Mechatronic Systems</i>, 184–90. Heidelberg, Germany: Springer-Verlag , 2014.","ieee":"K. Flaßkamp <i>et al.</i>, “Development of the RailCab Vehicle,” in <i>Dependability of Self-Optimizing Mechatronic Systems</i>, Heidelberg, Germany: Springer-Verlag , 2014, pp. 184–190."},"place":"Heidelberg, Germany","year":"2014","title":"Development of the RailCab Vehicle","date_created":"2021-09-30T12:44:57Z","author":[{"last_name":"Flaßkamp","full_name":"Flaßkamp, Kathrin","first_name":"Kathrin"},{"first_name":"Stefan","full_name":"Grösbrink, Stefan","last_name":"Grösbrink"},{"full_name":"Hartmann, Philip","last_name":"Hartmann","first_name":"Philip"},{"first_name":"Christian","last_name":"Heinzemann","full_name":"Heinzemann, Christian"},{"first_name":"Bernd","full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann"},{"id":"15588","full_name":"Kleinjohann, Lisa","last_name":"Kleinjohann","first_name":"Lisa"},{"full_name":"Krüger, Martin","last_name":"Krüger","first_name":"Martin"},{"id":"16494","full_name":"Ober-Blöbaum, Sina","last_name":"Ober-Blöbaum","first_name":"Sina"},{"full_name":"Priesterjahn, Claudia","last_name":"Priesterjahn","first_name":"Claudia"},{"first_name":"Christoph","last_name":"Rasche","full_name":"Rasche, Christoph"},{"full_name":"Schäfer, Wilhelm","last_name":"Schäfer","first_name":"Wilhelm"},{"first_name":"Dominik","full_name":"Steenken, Dominik","last_name":"Steenken"},{"first_name":"Ansgar","last_name":"Trächtler","full_name":"Trächtler, Ansgar","id":"552"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"},{"full_name":"Ziegert, Steffen","last_name":"Ziegert","first_name":"Steffen"}],"date_updated":"2022-01-06T06:56:54Z","publisher":"Springer-Verlag ","status":"public","publication":"Dependability of Self-Optimizing Mechatronic Systems","type":"book_chapter","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"user_id":"21240","_id":"25177"},{"language":[{"iso":"eng"}],"user_id":"71124","department":[{"_id":"671"}],"_id":"25775","status":"public","type":"book_chapter","publication":"Dependability of Self-Optimizing Mechatronic Systems","title":"Development of the RailCab Vehicle","author":[{"full_name":"Fla{\\ss}kamp, Kathrin","last_name":"Fla{\\ss}kamp","first_name":"Kathrin"},{"last_name":" Gr{\\\"o}sbrink","full_name":" Gr{\\\"o}sbrink,  Stefan ","first_name":" Stefan "},{"last_name":"Hartmann","full_name":"Hartmann, Philip","first_name":"Philip"},{"last_name":"Heinzemann","full_name":"Heinzemann, Christian","first_name":"Christian"},{"full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann","first_name":"Bernd"},{"first_name":"Lisa","id":"15588","full_name":"Kleinjohann, Lisa","last_name":"Kleinjohann"},{"first_name":" Martin","full_name":" Kr{\\\"u}ger,  Martin","last_name":" Kr{\\\"u}ger"},{"last_name":" Ober-Bl{\\\"o}baum","full_name":" Ober-Bl{\\\"o}baum,  Sina","first_name":" Sina"},{"last_name":"Priesterjahn","full_name":"Priesterjahn, Claudia ","first_name":"Claudia "},{"last_name":"Rasche","full_name":"Rasche, Christoph","first_name":"Christoph"},{"last_name":"Sch{\\\"a}fer","full_name":"Sch{\\\"a}fer, Wilhelm","first_name":"Wilhelm"},{"first_name":"Dominik ","last_name":"Steenken","full_name":"Steenken, Dominik "},{"first_name":"Ansgar","last_name":"Tr{\\\"a}chtler","full_name":"Tr{\\\"a}chtler, Ansgar"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"},{"last_name":"Ziegert","full_name":"Ziegert, Steffen","first_name":"Steffen"}],"date_created":"2021-10-07T12:51:40Z","date_updated":"2022-01-06T06:57:12Z","publisher":"Springer-Verlag, Heidelberg, Germany","citation":{"apa":"Fla{\\ss}kamp, K.,  Gr{\\\"o}sbrink,  Stefan , Hartmann, P., Heinzemann, C., Kleinjohann, B., Kleinjohann, L.,  Kr{\\\"u}ger,  Martin,  Ober-Bl{\\\"o}baum,  Sina, Priesterjahn, C., Rasche, C., Sch{\\\"a}fer, W., Steenken, D., Tr{\\\"a}chtler, A., Wehrheim, H., &#38; Ziegert, S. (2014). Development of the RailCab Vehicle. In <i>Dependability of Self-Optimizing Mechatronic Systems</i> (pp. 184–190). Springer-Verlag, Heidelberg, Germany.","bibtex":"@inbook{Fla{\\ss}kamp_ Gr{\\\"o}sbrink_Hartmann_Heinzemann_Kleinjohann_Kleinjohann_ Kr{\\\"u}ger_ Ober-Bl{\\\"o}baum_Priesterjahn_Rasche_et al._2014, title={Development of the RailCab Vehicle}, booktitle={Dependability of Self-Optimizing Mechatronic Systems}, publisher={Springer-Verlag, Heidelberg, Germany}, author={Fla{\\ss}kamp, Kathrin and  Gr{\\\"o}sbrink,  Stefan  and Hartmann, Philip and Heinzemann, Christian and Kleinjohann, Bernd and Kleinjohann, Lisa and  Kr{\\\"u}ger,  Martin and  Ober-Bl{\\\"o}baum,  Sina and Priesterjahn, Claudia  and Rasche, Christoph and et al.}, year={2014}, pages={184–190} }","mla":"Fla{\\ss}kamp, Kathrin, et al. “Development of the RailCab Vehicle.” <i>Dependability of Self-Optimizing Mechatronic Systems</i>, Springer-Verlag, Heidelberg, Germany, 2014, pp. 184–90.","short":"K. Fla{\\ss}kamp,  Stefan   Gr{\\\"o}sbrink, P. Hartmann, C. Heinzemann, B. Kleinjohann, L. Kleinjohann,  Martin  Kr{\\\"u}ger,  Sina  Ober-Bl{\\\"o}baum, C. Priesterjahn, C. Rasche, W. Sch{\\\"a}fer, D. Steenken, A. Tr{\\\"a}chtler, H. Wehrheim, S. Ziegert, in: Dependability of Self-Optimizing Mechatronic Systems, Springer-Verlag, Heidelberg, Germany, 2014, pp. 184–190.","ieee":"K. Fla{\\ss}kamp <i>et al.</i>, “Development of the RailCab Vehicle,” in <i>Dependability of Self-Optimizing Mechatronic Systems</i>, Springer-Verlag, Heidelberg, Germany, 2014, pp. 184–190.","chicago":"Fla{\\ss}kamp, Kathrin,  Stefan   Gr{\\\"o}sbrink, Philip Hartmann, Christian Heinzemann, Bernd Kleinjohann, Lisa Kleinjohann,  Martin  Kr{\\\"u}ger, et al. “Development of the RailCab Vehicle.” In <i>Dependability of Self-Optimizing Mechatronic Systems</i>, 184–90. Springer-Verlag, Heidelberg, Germany, 2014.","ama":"Fla{\\ss}kamp K,  Gr{\\\"o}sbrink  Stefan , Hartmann P, et al. Development of the RailCab Vehicle. In: <i>Dependability of Self-Optimizing Mechatronic Systems</i>. Springer-Verlag, Heidelberg, Germany; 2014:184-190."},"page":"184-190","year":"2014","publication_status":"published"},{"title":"Verified Service Compositions by Template-Based Construction","date_created":"2017-10-17T12:41:57Z","year":"2014","ddc":["040"],"language":[{"iso":"eng"}],"abstract":[{"text":"Today, service compositions often need to be assembled or changed on-the-fly, which leaves only little time for quality assurance. Moreover, quality assurance is complicated by service providers only giving information on their services in terms of domain specific concepts with only limited semantic meaning. In this paper, we propose a method to construct service compositions based on pre-verifiedtemplates. Templates, given as workflow descriptions, are typed over a (domain-independent) template ontology defining concepts and predicates. Templates are proven correct using an abstract semantics, leaving the specific meaning of ontology concepts open, however, only up to given ontology rules. Construction of service compositions amounts to instantiation of templates with domain-specific services.Correctness of an instantiation can then simply be checked by verifying that the domain ontology(a) adheres to the rules of the template ontology, and (b) fulfills the constraints of the employed template.","lang":"eng"}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-20T07:29:29Z","creator":"florida","date_created":"2018-03-20T07:29:29Z","file_size":484422,"file_id":"1423","file_name":"336-facs2014_walther.pdf","access_level":"closed"}],"publication":"Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)","doi":"10.1007/978-3-319-15317-9_3","date_updated":"2022-01-06T06:59:13Z","author":[{"first_name":"Sven","full_name":"Walther, Sven","last_name":"Walther"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"citation":{"ama":"Walther S, Wehrheim H. Verified Service Compositions by Template-Based Construction. In: Lanese I, Madelaine E, eds. <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>. LNCS. ; 2014:31-48. doi:<a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">10.1007/978-3-319-15317-9_3</a>","chicago":"Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” In <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>, edited by Ivan Lanese and Eric Madelaine, 31–48. LNCS, 2014. <a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">https://doi.org/10.1007/978-3-319-15317-9_3</a>.","ieee":"S. Walther and H. Wehrheim, “Verified Service Compositions by Template-Based Construction,” in <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>, 2014, pp. 31–48.","apa":"Walther, S., &#38; Wehrheim, H. (2014). Verified Service Compositions by Template-Based Construction. In I. Lanese &#38; E. Madelaine (Eds.), <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i> (pp. 31–48). <a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">https://doi.org/10.1007/978-3-319-15317-9_3</a>","mla":"Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>, edited by Ivan Lanese and Eric Madelaine, 2014, pp. 31–48, doi:<a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">10.1007/978-3-319-15317-9_3</a>.","bibtex":"@inproceedings{Walther_Wehrheim_2014, series={LNCS}, title={Verified Service Compositions by Template-Based Construction}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">10.1007/978-3-319-15317-9_3</a>}, booktitle={Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)}, author={Walther, Sven and Wehrheim, Heike}, editor={Lanese, Ivan and Madelaine, EricEditors}, year={2014}, pages={31–48}, collection={LNCS} }","short":"S. Walther, H. Wehrheim, in: I. Lanese, E. Madelaine (Eds.), Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), 2014, pp. 31–48."},"page":"31-48","has_accepted_license":"1","file_date_updated":"2018-03-20T07:29:29Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"336","series_title":"LNCS","user_id":"477","department":[{"_id":"77"}],"editor":[{"first_name":"Ivan","full_name":"Lanese, Ivan","last_name":"Lanese"},{"last_name":"Madelaine","full_name":"Madelaine, Eric","first_name":"Eric"}],"status":"public","type":"conference"},{"has_accepted_license":"1","year":"2014","citation":{"ama":"Becker M, Becker S, Besova G, Walther S, Wehrheim H. Towards Systematic Configuration for Architecture Validation. In: <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>. ; 2014.","chicago":"Becker, Matthias, Steffen Becker, Galina Besova, Sven Walther, and Heike Wehrheim. “Towards Systematic Configuration for Architecture Validation.” In <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>, 2014.","ieee":"M. Becker, S. Becker, G. Besova, S. Walther, and H. Wehrheim, “Towards Systematic Configuration for Architecture Validation,” in <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>, 2014.","short":"M. Becker, S. Becker, G. Besova, S. Walther, H. Wehrheim, in: Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.","bibtex":"@inproceedings{Becker_Becker_Besova_Walther_Wehrheim_2014, title={Towards Systematic Configuration for Architecture Validation}, booktitle={Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)}, author={Becker, Matthias and Becker, Steffen and Besova, Galina and Walther, Sven and Wehrheim, Heike}, year={2014} }","mla":"Becker, Matthias, et al. “Towards Systematic Configuration for Architecture Validation.” <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>, 2014.","apa":"Becker, M., Becker, S., Besova, G., Walther, S., &#38; Wehrheim, H. (2014). Towards Systematic Configuration for Architecture Validation. In <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>."},"date_updated":"2022-01-06T06:59:17Z","date_created":"2017-10-17T12:41:59Z","author":[{"last_name":"Becker","full_name":"Becker, Matthias","first_name":"Matthias"},{"last_name":"Becker","full_name":"Becker, Steffen","first_name":"Steffen"},{"first_name":"Galina","last_name":"Besova","full_name":"Besova, Galina"},{"last_name":"Walther","full_name":"Walther, Sven","first_name":"Sven"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"title":"Towards Systematic Configuration for Architecture Validation","type":"conference","publication":"Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)","file":[{"access_level":"closed","file_name":"344-paper_CAMERA_READY.pdf","file_id":"1420","file_size":80674,"creator":"florida","date_created":"2018-03-20T07:27:54Z","date_updated":"2018-03-20T07:27:54Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"344","user_id":"477","department":[{"_id":"77"}],"ddc":["040"],"file_date_updated":"2018-03-20T07:27:54Z","language":[{"iso":"eng"}]},{"title":"Programs from Proofs -- Approach and Applications","date_created":"2017-10-17T12:42:06Z","year":"2014","language":[{"iso":"eng"}],"ddc":["040"],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"383-programmsFromProofsSE.pdf","access_level":"closed","file_id":"1392","file_size":66474,"creator":"florida","date_created":"2018-03-20T07:04:52Z","date_updated":"2018-03-20T07:04:52Z"}],"abstract":[{"text":"Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more eﬃciently veriﬁable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof eﬀort can be reduced by several orders of magnitude, both with respect to time and space.","lang":"eng"}],"publication":"Proceedings of the Software Engineering Conference (SE)","main_file_link":[{"url":"http://eprints.uni-kiel.de/23752/"}],"author":[{"full_name":"Wonisch, Daniel","last_name":"Wonisch","first_name":"Daniel"},{"first_name":"Alexander","last_name":"Schremmer","full_name":"Schremmer, Alexander"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_updated":"2022-01-06T06:59:38Z","page":"67-68","citation":{"apa":"Wonisch, D., Schremmer, A., &#38; Wehrheim, H. (2014). Programs from Proofs -- Approach and Applications. In <i>Proceedings of the Software Engineering Conference (SE)</i> (pp. 67–68).","mla":"Wonisch, Daniel, et al. “Programs from Proofs -- Approach and Applications.” <i>Proceedings of the Software Engineering Conference (SE)</i>, 2014, pp. 67–68.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2014, series={Lecture Notes in Informatics (LNI)}, title={Programs from Proofs -- Approach and Applications}, booktitle={Proceedings of the Software Engineering Conference (SE)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2014}, pages={67–68}, collection={Lecture Notes in Informatics (LNI)} }","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68.","ama":"Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs -- Approach and Applications. In: <i>Proceedings of the Software Engineering Conference (SE)</i>. Lecture Notes in Informatics (LNI). ; 2014:67-68.","ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs -- Approach and Applications,” in <i>Proceedings of the Software Engineering Conference (SE)</i>, 2014, pp. 67–68.","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from Proofs -- Approach and Applications.” In <i>Proceedings of the Software Engineering Conference (SE)</i>, 67–68. Lecture Notes in Informatics (LNI), 2014."},"has_accepted_license":"1","file_date_updated":"2018-03-20T07:04:52Z","department":[{"_id":"77"}],"user_id":"477","series_title":"Lecture Notes in Informatics (LNI)","_id":"383","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"status":"public","type":"conference"},{"issue":"2","page":"251--280","citation":{"ieee":"S. Schneider, H. Treharne, and H. Wehrheim, “The behavioural semantics of Event-B refinement,” <i>Formal Asp. Comput.</i>, no. 2, pp. 251--280, 2014.","chicago":"Schneider, Steve, Helen Treharne, and Heike Wehrheim. “The Behavioural Semantics of Event-B Refinement.” <i>Formal Asp. Comput.</i>, no. 2 (2014): 251--280. <a href=\"https://doi.org/10.1007/s00165-012-0265-0\">https://doi.org/10.1007/s00165-012-0265-0</a>.","ama":"Schneider S, Treharne H, Wehrheim H. The behavioural semantics of Event-B refinement. <i>Formal Asp Comput</i>. 2014;(2):251--280. doi:<a href=\"https://doi.org/10.1007/s00165-012-0265-0\">10.1007/s00165-012-0265-0</a>","mla":"Schneider, Steve, et al. “The Behavioural Semantics of Event-B Refinement.” <i>Formal Asp. Comput.</i>, no. 2, 2014, pp. 251--280, doi:<a href=\"https://doi.org/10.1007/s00165-012-0265-0\">10.1007/s00165-012-0265-0</a>.","short":"S. Schneider, H. Treharne, H. Wehrheim, Formal Asp. Comput. (2014) 251--280.","bibtex":"@article{Schneider_Treharne_Wehrheim_2014, title={The behavioural semantics of Event-B refinement}, DOI={<a href=\"https://doi.org/10.1007/s00165-012-0265-0\">10.1007/s00165-012-0265-0</a>}, number={2}, journal={Formal Asp. Comput.}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike}, year={2014}, pages={251--280} }","apa":"Schneider, S., Treharne, H., &#38; Wehrheim, H. (2014). The behavioural semantics of Event-B refinement. <i>Formal Asp. Comput.</i>, (2), 251--280. <a href=\"https://doi.org/10.1007/s00165-012-0265-0\">https://doi.org/10.1007/s00165-012-0265-0</a>"},"year":"2014","author":[{"last_name":"Schneider","full_name":"Schneider, Steve","first_name":"Steve"},{"full_name":"Treharne, Helen","last_name":"Treharne","first_name":"Helen"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_created":"2018-06-13T07:55:10Z","date_updated":"2022-01-06T06:59:01Z","doi":"10.1007/s00165-012-0265-0","title":"The behavioural semantics of Event-B refinement","publication":"Formal Asp. Comput.","type":"journal_article","status":"public","department":[{"_id":"77"}],"user_id":"29719","_id":"3167"},{"doi":"10.1016/j.scico.2014.04.001","title":"Two approaches for proving linearizability of multiset","date_created":"2018-06-13T07:56:12Z","author":[{"first_name":"Bogdan","full_name":"Tofan, Bogdan","last_name":"Tofan"},{"first_name":"Oleg","last_name":"Travkin","full_name":"Travkin, Oleg"},{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"date_updated":"2022-01-06T06:59:01Z","page":"297--314","citation":{"chicago":"Tofan, Bogdan, Oleg Travkin, Gerhard Schellhorn, and Heike Wehrheim. “Two Approaches for Proving Linearizability of Multiset.” <i>Sci. Comput. Program.</i>, 2014, 297--314. <a href=\"https://doi.org/10.1016/j.scico.2014.04.001\">https://doi.org/10.1016/j.scico.2014.04.001</a>.","ieee":"B. Tofan, O. Travkin, G. Schellhorn, and H. Wehrheim, “Two approaches for proving linearizability of multiset,” <i>Sci. Comput. Program.</i>, pp. 297--314, 2014.","ama":"Tofan B, Travkin O, Schellhorn G, Wehrheim H. Two approaches for proving linearizability of multiset. <i>Sci Comput Program</i>. 2014:297--314. doi:<a href=\"https://doi.org/10.1016/j.scico.2014.04.001\">10.1016/j.scico.2014.04.001</a>","apa":"Tofan, B., Travkin, O., Schellhorn, G., &#38; Wehrheim, H. (2014). Two approaches for proving linearizability of multiset. <i>Sci. Comput. Program.</i>, 297--314. <a href=\"https://doi.org/10.1016/j.scico.2014.04.001\">https://doi.org/10.1016/j.scico.2014.04.001</a>","mla":"Tofan, Bogdan, et al. “Two Approaches for Proving Linearizability of Multiset.” <i>Sci. Comput. Program.</i>, 2014, pp. 297--314, doi:<a href=\"https://doi.org/10.1016/j.scico.2014.04.001\">10.1016/j.scico.2014.04.001</a>.","short":"B. Tofan, O. Travkin, G. Schellhorn, H. Wehrheim, Sci. Comput. Program. (2014) 297--314.","bibtex":"@article{Tofan_Travkin_Schellhorn_Wehrheim_2014, title={Two approaches for proving linearizability of multiset}, DOI={<a href=\"https://doi.org/10.1016/j.scico.2014.04.001\">10.1016/j.scico.2014.04.001</a>}, journal={Sci. Comput. Program.}, author={Tofan, Bogdan and Travkin, Oleg and Schellhorn, Gerhard and Wehrheim, Heike}, year={2014}, pages={297--314} }"},"year":"2014","department":[{"_id":"77"}],"user_id":"29719","_id":"3168","status":"public","publication":"Sci. Comput. Program.","type":"journal_article"},{"author":[{"full_name":"Schellhorn, Gerhard","last_name":"Schellhorn","first_name":"Gerhard"},{"first_name":"John","last_name":"Derrick","full_name":"Derrick, John"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2018-06-13T07:57:31Z","date_updated":"2022-01-06T06:59:01Z","doi":"10.1145/2629496","title":"A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures","issue":"4","citation":{"apa":"Schellhorn, G., Derrick, J., &#38; Wehrheim, H. (2014). A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures. <i>{ACM} Trans. Comput. Log.</i>, (4), 31:1--31:37. <a href=\"https://doi.org/10.1145/2629496\">https://doi.org/10.1145/2629496</a>","short":"G. Schellhorn, J. Derrick, H. Wehrheim, {ACM} Trans. Comput. Log. (2014) 31:1--31:37.","bibtex":"@article{Schellhorn_Derrick_Wehrheim_2014, title={A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures}, DOI={<a href=\"https://doi.org/10.1145/2629496\">10.1145/2629496</a>}, number={4}, journal={{ACM} Trans. Comput. Log.}, author={Schellhorn, Gerhard and Derrick, John and Wehrheim, Heike}, year={2014}, pages={31:1--31:37} }","mla":"Schellhorn, Gerhard, et al. “A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures.” <i>{ACM} Trans. Comput. Log.</i>, no. 4, 2014, pp. 31:1--31:37, doi:<a href=\"https://doi.org/10.1145/2629496\">10.1145/2629496</a>.","ama":"Schellhorn G, Derrick J, Wehrheim H. A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures. <i>{ACM} Trans Comput Log</i>. 2014;(4):31:1--31:37. doi:<a href=\"https://doi.org/10.1145/2629496\">10.1145/2629496</a>","chicago":"Schellhorn, Gerhard, John Derrick, and Heike Wehrheim. “A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures.” <i>{ACM} Trans. Comput. Log.</i>, no. 4 (2014): 31:1--31:37. <a href=\"https://doi.org/10.1145/2629496\">https://doi.org/10.1145/2629496</a>.","ieee":"G. Schellhorn, J. Derrick, and H. Wehrheim, “A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures,” <i>{ACM} Trans. Comput. Log.</i>, no. 4, pp. 31:1--31:37, 2014."},"page":"31:1--31:37","year":"2014","user_id":"29719","department":[{"_id":"77"}],"_id":"3169","type":"journal_article","publication":"{ACM} Trans. Comput. Log.","status":"public"},{"series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3170","type":"conference","publication":"{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings","status":"public","editor":[{"full_name":"B. Jones, Cliff","last_name":"B. Jones","first_name":"Cliff"},{"first_name":"Pekka","last_name":"Pihlajasaari","full_name":"Pihlajasaari, Pekka"},{"last_name":"Sun","full_name":"Sun, Jun","first_name":"Jun"}],"date_created":"2018-06-13T07:58:40Z","author":[{"full_name":"Derrick, John","last_name":"Derrick","first_name":"John"},{"last_name":"Dongol","full_name":"Dongol, Brijesh","first_name":"Brijesh"},{"first_name":"Gerhard","last_name":"Schellhorn","full_name":"Schellhorn, Gerhard"},{"first_name":"Bogdan","last_name":"Tofan","full_name":"Tofan, Bogdan"},{"first_name":"Oleg","full_name":"Travkin, Oleg","last_name":"Travkin"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-319-06410-9_15","title":"Quiescent Consistency: Defining and Verifying Relaxed Linearizability","citation":{"apa":"Derrick, J., Dongol, B., Schellhorn, G., Tofan, B., Travkin, O., &#38; Wehrheim, H. (2014). Quiescent Consistency: Defining and Verifying Relaxed Linearizability. In C. B. Jones, P. Pihlajasaari, &#38; J. Sun (Eds.), <i>{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings</i> (pp. 200--214). <a href=\"https://doi.org/10.1007/978-3-319-06410-9_15\">https://doi.org/10.1007/978-3-319-06410-9_15</a>","bibtex":"@inproceedings{Derrick_Dongol_Schellhorn_Tofan_Travkin_Wehrheim_2014, series={Lecture Notes in Computer Science}, title={Quiescent Consistency: Defining and Verifying Relaxed Linearizability}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-06410-9_15\">10.1007/978-3-319-06410-9_15</a>}, booktitle={{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings}, author={Derrick, John and Dongol, Brijesh and Schellhorn, Gerhard and Tofan, Bogdan and Travkin, Oleg and Wehrheim, Heike}, editor={B. Jones, Cliff and Pihlajasaari, Pekka and Sun, JunEditors}, year={2014}, pages={200--214}, collection={Lecture Notes in Computer Science} }","mla":"Derrick, John, et al. “Quiescent Consistency: Defining and Verifying Relaxed Linearizability.” <i>{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings</i>, edited by Cliff B. Jones et al., 2014, pp. 200--214, doi:<a href=\"https://doi.org/10.1007/978-3-319-06410-9_15\">10.1007/978-3-319-06410-9_15</a>.","short":"J. Derrick, B. Dongol, G. Schellhorn, B. Tofan, O. Travkin, H. Wehrheim, in: C. B. Jones, P. Pihlajasaari, J. Sun (Eds.), {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings, 2014, pp. 200--214.","ieee":"J. Derrick, B. Dongol, G. Schellhorn, B. Tofan, O. Travkin, and H. Wehrheim, “Quiescent Consistency: Defining and Verifying Relaxed Linearizability,” in <i>{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings</i>, 2014, pp. 200--214.","chicago":"Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Bogdan Tofan, Oleg Travkin, and Heike Wehrheim. “Quiescent Consistency: Defining and Verifying Relaxed Linearizability.” In <i>{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings</i>, edited by Cliff B. Jones, Pekka Pihlajasaari, and Jun Sun, 200--214. Lecture Notes in Computer Science, 2014. <a href=\"https://doi.org/10.1007/978-3-319-06410-9_15\">https://doi.org/10.1007/978-3-319-06410-9_15</a>.","ama":"Derrick J, Dongol B, Schellhorn G, Tofan B, Travkin O, Wehrheim H. Quiescent Consistency: Defining and Verifying Relaxed Linearizability. In: B. Jones C, Pihlajasaari P, Sun J, eds. <i>{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings</i>. Lecture Notes in Computer Science. ; 2014:200--214. doi:<a href=\"https://doi.org/10.1007/978-3-319-06410-9_15\">10.1007/978-3-319-06410-9_15</a>"},"page":"200--214","year":"2014"},{"author":[{"full_name":"Travkin, Oleg","last_name":"Travkin","first_name":"Oleg"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_created":"2018-06-13T07:59:46Z","date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-319-13338-6_11","title":"Handling {TSO} in Mechanized Linearizability Proofs","page":"132--147","citation":{"apa":"Travkin, O., &#38; Wehrheim, H. (2014). Handling {TSO} in Mechanized Linearizability Proofs. In E. Yahav (Ed.), <i>Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings</i> (pp. 132--147). <a href=\"https://doi.org/10.1007/978-3-319-13338-6_11\">https://doi.org/10.1007/978-3-319-13338-6_11</a>","bibtex":"@inproceedings{Travkin_Wehrheim_2014, series={Lecture Notes in Computer Science}, title={Handling {TSO} in Mechanized Linearizability Proofs}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-13338-6_11\">10.1007/978-3-319-13338-6_11</a>}, booktitle={Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings}, author={Travkin, Oleg and Wehrheim, Heike}, editor={Yahav, EranEditor}, year={2014}, pages={132--147}, collection={Lecture Notes in Computer Science} }","short":"O. Travkin, H. Wehrheim, in: E. Yahav (Ed.), Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings, 2014, pp. 132--147.","mla":"Travkin, Oleg, and Heike Wehrheim. “Handling {TSO} in Mechanized Linearizability Proofs.” <i>Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings</i>, edited by Eran Yahav, 2014, pp. 132--147, doi:<a href=\"https://doi.org/10.1007/978-3-319-13338-6_11\">10.1007/978-3-319-13338-6_11</a>.","ieee":"O. Travkin and H. Wehrheim, “Handling {TSO} in Mechanized Linearizability Proofs,” in <i>Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings</i>, 2014, pp. 132--147.","chicago":"Travkin, Oleg, and Heike Wehrheim. “Handling {TSO} in Mechanized Linearizability Proofs.” In <i>Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings</i>, edited by Eran Yahav, 132--147. Lecture Notes in Computer Science, 2014. <a href=\"https://doi.org/10.1007/978-3-319-13338-6_11\">https://doi.org/10.1007/978-3-319-13338-6_11</a>.","ama":"Travkin O, Wehrheim H. Handling {TSO} in Mechanized Linearizability Proofs. In: Yahav E, ed. <i>Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings</i>. Lecture Notes in Computer Science. ; 2014:132--147. doi:<a href=\"https://doi.org/10.1007/978-3-319-13338-6_11\">10.1007/978-3-319-13338-6_11</a>"},"year":"2014","department":[{"_id":"77"}],"user_id":"29719","series_title":"Lecture Notes in Computer Science","_id":"3171","publication":"Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings","type":"conference","status":"public","editor":[{"first_name":"Eran","last_name":"Yahav","full_name":"Yahav, Eran"}]},{"citation":{"apa":"Isenberg, T., &#38; Wehrheim, H. (2014). Timed Automata Verification via {IC3} with Zones. In S. Merz &#38; J. Pang (Eds.), <i>Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings</i> (pp. 203--218). <a href=\"https://doi.org/10.1007/978-3-319-11737-9_14\">https://doi.org/10.1007/978-3-319-11737-9_14</a>","bibtex":"@inproceedings{Isenberg_Wehrheim_2014, series={Lecture Notes in Computer Science}, title={Timed Automata Verification via {IC3} with Zones}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-11737-9_14\">10.1007/978-3-319-11737-9_14</a>}, booktitle={Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings}, author={Isenberg, Tobias and Wehrheim, Heike}, editor={Merz, Stephan and Pang, JunEditors}, year={2014}, pages={203--218}, collection={Lecture Notes in Computer Science} }","short":"T. Isenberg, H. Wehrheim, in: S. Merz, J. Pang (Eds.), Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings, 2014, pp. 203--218.","mla":"Isenberg, Tobias, and Heike Wehrheim. “Timed Automata Verification via {IC3} with Zones.” <i>Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings</i>, edited by Stephan Merz and Jun Pang, 2014, pp. 203--218, doi:<a href=\"https://doi.org/10.1007/978-3-319-11737-9_14\">10.1007/978-3-319-11737-9_14</a>.","ama":"Isenberg T, Wehrheim H. Timed Automata Verification via {IC3} with Zones. In: Merz S, Pang J, eds. <i>Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings</i>. Lecture Notes in Computer Science. ; 2014:203--218. doi:<a href=\"https://doi.org/10.1007/978-3-319-11737-9_14\">10.1007/978-3-319-11737-9_14</a>","ieee":"T. Isenberg and H. Wehrheim, “Timed Automata Verification via {IC3} with Zones,” in <i>Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings</i>, 2014, pp. 203--218.","chicago":"Isenberg, Tobias, and Heike Wehrheim. “Timed Automata Verification via {IC3} with Zones.” In <i>Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings</i>, edited by Stephan Merz and Jun Pang, 203--218. Lecture Notes in Computer Science, 2014. <a href=\"https://doi.org/10.1007/978-3-319-11737-9_14\">https://doi.org/10.1007/978-3-319-11737-9_14</a>."},"page":"203--218","year":"2014","doi":"10.1007/978-3-319-11737-9_14","title":"Timed Automata Verification via {IC3} with Zones","date_created":"2018-06-13T08:01:04Z","author":[{"last_name":"Isenberg","full_name":"Isenberg, Tobias","first_name":"Tobias"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"date_updated":"2022-01-06T06:59:02Z","status":"public","editor":[{"first_name":"Stephan","full_name":"Merz, Stephan","last_name":"Merz"},{"first_name":"Jun","full_name":"Pang, Jun","last_name":"Pang"}],"type":"conference","publication":"Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3172"},{"year":"2014","page":"221--237","citation":{"short":"S. A. Schneider, H. Treharne, H. Wehrheim, D. M. Williams, in: E. Albert, E. Sekerinski (Eds.), Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings, 2014, pp. 221--237.","bibtex":"@inproceedings{A. Schneider_Treharne_Wehrheim_M. Williams_2014, series={Lecture Notes in Computer Science}, title={Managing {LTL} Properties in Event-B Refinement}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-10181-1_14\">10.1007/978-3-319-10181-1_14</a>}, booktitle={Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings}, author={A. Schneider, Steve and Treharne, Helen and Wehrheim, Heike and M. Williams, David}, editor={Albert, Elvira and Sekerinski, EmilEditors}, year={2014}, pages={221--237}, collection={Lecture Notes in Computer Science} }","mla":"A. Schneider, Steve, et al. “Managing {LTL} Properties in Event-B Refinement.” <i>Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings</i>, edited by Elvira Albert and Emil Sekerinski, 2014, pp. 221--237, doi:<a href=\"https://doi.org/10.1007/978-3-319-10181-1_14\">10.1007/978-3-319-10181-1_14</a>.","apa":"A. Schneider, S., Treharne, H., Wehrheim, H., &#38; M. Williams, D. (2014). Managing {LTL} Properties in Event-B Refinement. In E. Albert &#38; E. Sekerinski (Eds.), <i>Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings</i> (pp. 221--237). <a href=\"https://doi.org/10.1007/978-3-319-10181-1_14\">https://doi.org/10.1007/978-3-319-10181-1_14</a>","ama":"A. Schneider S, Treharne H, Wehrheim H, M. Williams D. Managing {LTL} Properties in Event-B Refinement. In: Albert E, Sekerinski E, eds. <i>Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings</i>. Lecture Notes in Computer Science. ; 2014:221--237. doi:<a href=\"https://doi.org/10.1007/978-3-319-10181-1_14\">10.1007/978-3-319-10181-1_14</a>","ieee":"S. A. Schneider, H. Treharne, H. Wehrheim, and D. M. Williams, “Managing {LTL} Properties in Event-B Refinement,” in <i>Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings</i>, 2014, pp. 221--237.","chicago":"A. Schneider, Steve, Helen Treharne, Heike Wehrheim, and David M. Williams. “Managing {LTL} Properties in Event-B Refinement.” In <i>Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings</i>, edited by Elvira Albert and Emil Sekerinski, 221--237. Lecture Notes in Computer Science, 2014. <a href=\"https://doi.org/10.1007/978-3-319-10181-1_14\">https://doi.org/10.1007/978-3-319-10181-1_14</a>."},"title":"Managing {LTL} Properties in Event-B Refinement","doi":"10.1007/978-3-319-10181-1_14","date_updated":"2022-01-06T06:59:02Z","author":[{"first_name":"Steve","last_name":"A. Schneider","full_name":"A. Schneider, Steve"},{"first_name":"Helen","full_name":"Treharne, Helen","last_name":"Treharne"},{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"},{"first_name":"David","full_name":"M. Williams, David","last_name":"M. Williams"}],"date_created":"2018-06-13T08:04:33Z","editor":[{"first_name":"Elvira","full_name":"Albert, Elvira","last_name":"Albert"},{"full_name":"Sekerinski, Emil","last_name":"Sekerinski","first_name":"Emil"}],"status":"public","publication":"Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings","type":"conference","_id":"3173","department":[{"_id":"77"}],"user_id":"29719","series_title":"Lecture Notes in Computer Science"},{"year":"2014","citation":{"apa":"Schneider, S., Treharne, H., Wehrheim, H., &#38; M. Williams, D. (2014). Managing {LTL} properties in Event-B refinement. <i>CoRR</i>.","short":"S. Schneider, H. Treharne, H. Wehrheim, D. M. Williams, CoRR (2014).","mla":"Schneider, Steve, et al. “Managing {LTL} Properties in Event-B Refinement.” <i>CoRR</i>, 2014.","bibtex":"@article{Schneider_Treharne_Wehrheim_M. Williams_2014, title={Managing {LTL} properties in Event-B refinement}, journal={CoRR}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike and M. Williams, David}, year={2014} }","ama":"Schneider S, Treharne H, Wehrheim H, M. Williams D. Managing {LTL} properties in Event-B refinement. <i>CoRR</i>. 2014.","chicago":"Schneider, Steve, Helen Treharne, Heike Wehrheim, and David M. Williams. “Managing {LTL} Properties in Event-B Refinement.” <i>CoRR</i>, 2014.","ieee":"S. Schneider, H. Treharne, H. Wehrheim, and D. M. Williams, “Managing {LTL} properties in Event-B refinement,” <i>CoRR</i>, 2014."},"date_updated":"2022-01-06T06:59:02Z","author":[{"last_name":"Schneider","full_name":"Schneider, Steve","first_name":"Steve"},{"first_name":"Helen","full_name":"Treharne, Helen","last_name":"Treharne"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"},{"full_name":"M. Williams, David","last_name":"M. Williams","first_name":"David"}],"date_created":"2018-06-13T08:05:39Z","title":"Managing {LTL} properties in Event-B refinement","type":"journal_article","publication":"CoRR","status":"public","_id":"3174","user_id":"29719","department":[{"_id":"77"}]},{"author":[{"full_name":"Isenberg, Tobias","last_name":"Isenberg","first_name":"Tobias"},{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"}],"date_created":"2018-06-13T08:07:24Z","date_updated":"2022-01-06T06:59:02Z","title":"Proof-Carrying Hardware via {IC3}","citation":{"short":"T. Isenberg, H. Wehrheim, CoRR (2014).","mla":"Isenberg, Tobias, and Heike Wehrheim. “Proof-Carrying Hardware via {IC3}.” <i>CoRR</i>, 2014.","bibtex":"@article{Isenberg_Wehrheim_2014, title={Proof-Carrying Hardware via {IC3}}, journal={CoRR}, author={Isenberg, Tobias and Wehrheim, Heike}, year={2014} }","apa":"Isenberg, T., &#38; Wehrheim, H. (2014). Proof-Carrying Hardware via {IC3}. <i>CoRR</i>.","ama":"Isenberg T, Wehrheim H. Proof-Carrying Hardware via {IC3}. <i>CoRR</i>. 2014.","ieee":"T. Isenberg and H. Wehrheim, “Proof-Carrying Hardware via {IC3},” <i>CoRR</i>, 2014.","chicago":"Isenberg, Tobias, and Heike Wehrheim. “Proof-Carrying Hardware via {IC3}.” <i>CoRR</i>, 2014."},"year":"2014","department":[{"_id":"77"}],"user_id":"29719","_id":"3175","publication":"CoRR","type":"journal_article","status":"public"}]
