[{"citation":{"short":"S. Ziegert, H. Wehrheim, Computer Science - R & D (2015) 303--320.","ieee":"S. Ziegert and H. Wehrheim, “Temporal plans for software architecture reconfiguration,” Computer Science - R & D, no. 3–4, pp. 303--320, 2015.","chicago":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” Computer Science - R & D, no. 3–4 (2015): 303--320. https://doi.org/10.1007/s00450-014-0259-7.","apa":"Ziegert, S., & Wehrheim, H. (2015). Temporal plans for software architecture reconfiguration. Computer Science - R & D, (3–4), 303--320. https://doi.org/10.1007/s00450-014-0259-7","ama":"Ziegert S, Wehrheim H. Temporal plans for software architecture reconfiguration. Computer Science - R & D. 2015;(3-4):303--320. doi:10.1007/s00450-014-0259-7","mla":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” Computer Science - R & D, no. 3–4, 2015, pp. 303--320, doi:10.1007/s00450-014-0259-7.","bibtex":"@article{Ziegert_Wehrheim_2015, title={Temporal plans for software architecture reconfiguration}, DOI={10.1007/s00450-014-0259-7}, number={3–4}, journal={Computer Science - R & D}, author={Ziegert, Steffen and Wehrheim, Heike}, year={2015}, pages={303--320} }"},"type":"journal_article","year":"2015","page":"303--320","_id":"3162","issue":"3-4","file":[{"file_name":"TemporalPlansForSoftwareArchit.pdf","date_created":"2018-11-02T15:52:13Z","access_level":"closed","file_id":"5315","creator":"ups","file_size":2136451,"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-11-02T15:52:13Z"}],"author":[{"last_name":"Ziegert","full_name":"Ziegert, Steffen","first_name":"Steffen"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"file_date_updated":"2018-11-02T15:52:13Z","publication":"Computer Science - R & D","has_accepted_license":"1","status":"public","date_created":"2018-06-13T07:47:56Z","user_id":"477","ddc":["000"],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:59:01Z","doi":"10.1007/s00450-014-0259-7","department":[{"_id":"77"}],"project":[{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject B3","_id":"11"}],"title":"Temporal plans for software architecture reconfiguration"},{"series_title":"Lecture Notes in Computer Science","citation":{"ieee":"R. Meyer and H. Wehrheim, “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog,” in Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.","short":"R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.","mla":"Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog.” Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, edited by Roland Meyer et al., 2015, pp. 3--4, doi:10.1007/978-3-319-23506-6_1.","bibtex":"@inproceedings{Meyer_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog}, DOI={10.1007/978-3-319-23506-6_1}, booktitle={Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}, author={Meyer, Roland and Wehrheim, Heike}, editor={Meyer, Roland and Platzer, Andr{\\’{e}} and Wehrheim, HeikeEditors}, year={2015}, pages={3--4}, collection={Lecture Notes in Computer Science} }","ama":"Meyer R, Wehrheim H. From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog. In: Meyer R, Platzer A, Wehrheim H, eds. Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. Lecture Notes in Computer Science. ; 2015:3--4. doi:10.1007/978-3-319-23506-6_1","apa":"Meyer, R., & Wehrheim, H. (2015). From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog. In R. Meyer, A. Platzer, & H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings (pp. 3--4). https://doi.org/10.1007/978-3-319-23506-6_1","chicago":"Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog.” In Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, edited by Roland Meyer, Andr{\\’{e}} Platzer, and Heike Wehrheim, 3--4. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-23506-6_1."},"type":"conference","year":"2015","page":"3--4","_id":"3163","date_updated":"2022-01-06T06:59:01Z","doi":"10.1007/978-3-319-23506-6_1","author":[{"last_name":"Meyer","first_name":"Roland","full_name":"Meyer, Roland"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"department":[{"_id":"77"}],"publication":"Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings","editor":[{"full_name":"Meyer, Roland","first_name":"Roland","last_name":"Meyer"},{"last_name":"Platzer","full_name":"Platzer, Andr{\\'{e}}","first_name":"Andr{\\'{e}}"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"status":"public","date_created":"2018-06-13T07:49:28Z","title":"From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog","user_id":"29719"},{"doi":"10.1007/978-3-319-19249-9_11","date_updated":"2022-01-06T06:59:01Z","_id":"3164","page":"161--177","type":"conference","year":"2015","citation":{"ieee":"J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, and H. Wehrheim, “Verifying Opacity of a Transactional Mutex Lock,” in {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.","short":"J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.","mla":"Derrick, John, et al. “Verifying Opacity of a Transactional Mutex Lock.” {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, edited by Nikolaj Bj{\\o}rner and Frank S. de Boer, 2015, pp. 161--177, doi:10.1007/978-3-319-19249-9_11.","bibtex":"@inproceedings{Derrick_Dongol_Schellhorn_Travkin_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={Verifying Opacity of a Transactional Mutex Lock}, DOI={10.1007/978-3-319-19249-9_11}, booktitle={{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings}, author={Derrick, John and Dongol, Brijesh and Schellhorn, Gerhard and Travkin, Oleg and Wehrheim, Heike}, editor={Bj{\\o}rner, Nikolaj and S. de Boer, FrankEditors}, year={2015}, pages={161--177}, collection={Lecture Notes in Computer Science} }","chicago":"Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, and Heike Wehrheim. “Verifying Opacity of a Transactional Mutex Lock.” In {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, edited by Nikolaj Bj{\\o}rner and Frank S. de Boer, 161--177. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-19249-9_11.","apa":"Derrick, J., Dongol, B., Schellhorn, G., Travkin, O., & Wehrheim, H. (2015). Verifying Opacity of a Transactional Mutex Lock. In N. Bj{\\o}rner & F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings (pp. 161--177). https://doi.org/10.1007/978-3-319-19249-9_11","ama":"Derrick J, Dongol B, Schellhorn G, Travkin O, Wehrheim H. Verifying Opacity of a Transactional Mutex Lock. In: Bj{\\o}rner N, S. de Boer F, eds. {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings. Lecture Notes in Computer Science. ; 2015:161--177. doi:10.1007/978-3-319-19249-9_11"},"series_title":"Lecture Notes in Computer Science","user_id":"29719","title":"Verifying Opacity of a Transactional Mutex Lock","project":[{"_id":"78","name":"Validation of Software Transactional Memory"}],"date_created":"2018-06-13T07:50:43Z","status":"public","editor":[{"last_name":"Bj{\\o}rner","full_name":"Bj{\\o}rner, Nikolaj","first_name":"Nikolaj"},{"last_name":"S. de Boer","first_name":"Frank","full_name":"S. de Boer, Frank"}],"publication":"{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings","department":[{"_id":"77"}],"author":[{"full_name":"Derrick, John","first_name":"John","last_name":"Derrick"},{"full_name":"Dongol, Brijesh","first_name":"Brijesh","last_name":"Dongol"},{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}]},{"page":"104--119","citation":{"ieee":"H. Wehrheim and O. Travkin, “{TSO} to {SC} via Symbolic Execution,” in Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119.","short":"H. Wehrheim, O. Travkin, in: N. Piterman (Ed.), Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119.","mla":"Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, edited by Nir Piterman, 2015, pp. 104--119, doi:10.1007/978-3-319-26287-1_7.","bibtex":"@inproceedings{Wehrheim_Travkin_2015, series={Lecture Notes in Computer Science}, title={{TSO} to {SC} via Symbolic Execution}, DOI={10.1007/978-3-319-26287-1_7}, booktitle={Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings}, author={Wehrheim, Heike and Travkin, Oleg}, editor={Piterman, NirEditor}, year={2015}, pages={104--119}, collection={Lecture Notes in Computer Science} }","ama":"Wehrheim H, Travkin O. {TSO} to {SC} via Symbolic Execution. In: Piterman N, ed. Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings. Lecture Notes in Computer Science. ; 2015:104--119. doi:10.1007/978-3-319-26287-1_7","apa":"Wehrheim, H., & Travkin, O. (2015). {TSO} to {SC} via Symbolic Execution. In N. Piterman (Ed.), Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings (pp. 104--119). https://doi.org/10.1007/978-3-319-26287-1_7","chicago":"Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” In Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, edited by Nir Piterman, 104--119. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-26287-1_7."},"year":"2015","type":"conference","series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-319-26287-1_7","_id":"3165","date_updated":"2022-01-06T06:59:01Z","date_created":"2018-06-13T07:52:44Z","status":"public","editor":[{"full_name":"Piterman, Nir","first_name":"Nir","last_name":"Piterman"}],"publication":"Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings","department":[{"_id":"77"}],"author":[{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"},{"full_name":"Travkin, Oleg","first_name":"Oleg","last_name":"Travkin"}],"user_id":"29719","title":"{TSO} to {SC} via Symbolic Execution"},{"title":"Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings","user_id":"29719","department":[{"_id":"77"}],"editor":[{"first_name":"Roland","full_name":"Meyer, Roland","last_name":"Meyer"},{"last_name":"Platzer","first_name":"Andr{\\'{e}}","full_name":"Platzer, Andr{\\'{e}}"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"publication_identifier":{"isbn":["978-3-319-23505-9"]},"status":"public","date_created":"2018-06-13T07:54:06Z","date_updated":"2022-01-06T06:59:01Z","_id":"3166","doi":"10.1007/978-3-319-23506-6","series_title":"Lecture Notes in Computer Science","citation":{"chicago":"Meyer, Roland, Andr{\\’{e}} Platzer, and Heike Wehrheim, eds. Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-23506-6.","apa":"Meyer, R., Platzer, A., & Wehrheim, H. (Eds.). (2015). Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. https://doi.org/10.1007/978-3-319-23506-6","ama":"Meyer R, Platzer A, Wehrheim H, eds. Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings.; 2015. doi:10.1007/978-3-319-23506-6","mla":"Meyer, Roland, et al., editors. Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. 2015, doi:10.1007/978-3-319-23506-6.","bibtex":"@book{Meyer_Platzer_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}, DOI={10.1007/978-3-319-23506-6}, year={2015}, collection={Lecture Notes in Computer Science} }","short":"R. Meyer, A. Platzer, H. Wehrheim, eds., Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015.","ieee":"R. Meyer, A. Platzer, and H. Wehrheim, Eds., Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. 2015."},"year":"2015","type":"conference_editor"},{"abstract":[{"lang":"eng","text":"Today, service compositions often need to be assembled or changed on-the-fly, which leaves only little time for quality assurance. Moreover, quality assurance is complicated by service providers only giving information on their services in terms of domain specific concepts with only limited semantic meaning. In this paper, we propose a method to construct service compositions based on pre-verifiedtemplates. Templates, given as workflow descriptions, are typed over a (domain-independent) template ontology defining concepts and predicates. Templates are proven correct using an abstract semantics, leaving the specific meaning of ontology concepts open, however, only up to given ontology rules. Construction of service compositions amounts to instantiation of templates with domain-specific services.Correctness of an instantiation can then simply be checked by verifying that the domain ontology(a) adheres to the rules of the template ontology, and (b) fulfills the constraints of the employed template."}],"ddc":["040"],"user_id":"477","author":[{"first_name":"Sven","full_name":"Walther, Sven","last_name":"Walther"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"publication":"Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)","file_date_updated":"2018-03-20T07:29:29Z","file":[{"access_level":"closed","file_name":"336-facs2014_walther.pdf","date_created":"2018-03-20T07:29:29Z","date_updated":"2018-03-20T07:29:29Z","content_type":"application/pdf","relation":"main_file","success":1,"file_size":484422,"creator":"florida","file_id":"1423"}],"has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:41:57Z","_id":"336","type":"conference","year":"2014","citation":{"mla":"Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), edited by Ivan Lanese and Eric Madelaine, 2014, pp. 31–48, doi:10.1007/978-3-319-15317-9_3.","bibtex":"@inproceedings{Walther_Wehrheim_2014, series={LNCS}, title={Verified Service Compositions by Template-Based Construction}, DOI={10.1007/978-3-319-15317-9_3}, booktitle={Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)}, author={Walther, Sven and Wehrheim, Heike}, editor={Lanese, Ivan and Madelaine, EricEditors}, year={2014}, pages={31–48}, collection={LNCS} }","ama":"Walther S, Wehrheim H. Verified Service Compositions by Template-Based Construction. In: Lanese I, Madelaine E, eds. Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS). LNCS. ; 2014:31-48. doi:10.1007/978-3-319-15317-9_3","apa":"Walther, S., & Wehrheim, H. (2014). Verified Service Compositions by Template-Based Construction. In I. Lanese & E. Madelaine (Eds.), Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS) (pp. 31–48). https://doi.org/10.1007/978-3-319-15317-9_3","chicago":"Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” In Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), edited by Ivan Lanese and Eric Madelaine, 31–48. LNCS, 2014. https://doi.org/10.1007/978-3-319-15317-9_3.","ieee":"S. Walther and H. Wehrheim, “Verified Service Compositions by Template-Based Construction,” in Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), 2014, pp. 31–48.","short":"S. Walther, H. Wehrheim, in: I. Lanese, E. Madelaine (Eds.), Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), 2014, pp. 31–48."},"page":"31-48","title":"Verified Service Compositions by Template-Based Construction","department":[{"_id":"77"}],"editor":[{"full_name":"Lanese, Ivan","first_name":"Ivan","last_name":"Lanese"},{"first_name":"Eric","full_name":"Madelaine, Eric","last_name":"Madelaine"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"date_updated":"2022-01-06T06:59:13Z","doi":"10.1007/978-3-319-15317-9_3","series_title":"LNCS","language":[{"iso":"eng"}]},{"supervisor":[{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"language":[{"iso":"ger"}],"year":"2014","type":"bachelorsthesis","citation":{"ieee":"P. Korth, Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.” Universität Paderborn, 2014.","short":"P. Korth, Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs,” Universität Paderborn, 2014.","bibtex":"@book{Korth_2014, title={Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs”}, publisher={Universität Paderborn}, author={Korth, Philipp}, year={2014} }","mla":"Korth, Philipp. Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.” Universität Paderborn, 2014.","apa":"Korth, P. (2014). Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.” Universität Paderborn.","ama":"Korth P. Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.” Universität Paderborn; 2014.","chicago":"Korth, Philipp. Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.” Universität Paderborn, 2014."},"_id":"340","date_updated":"2022-01-06T06:59:14Z","department":[{"_id":"77"}],"author":[{"last_name":"Korth","full_name":"Korth, Philipp","first_name":"Philipp"}],"publisher":"Universität Paderborn","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_created":"2017-10-17T12:41:58Z","status":"public","user_id":"15504","title":"Untersuchung transitiver Eigenschaften der Technik \"Programs from Proofs\""},{"type":"conference","year":"2014","citation":{"ieee":"M. Becker, S. Becker, G. Besova, S. Walther, and H. Wehrheim, “Towards Systematic Configuration for Architecture Validation,” in Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.","short":"M. Becker, S. Becker, G. Besova, S. Walther, H. Wehrheim, in: Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.","mla":"Becker, Matthias, et al. “Towards Systematic Configuration for Architecture Validation.” Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.","bibtex":"@inproceedings{Becker_Becker_Besova_Walther_Wehrheim_2014, title={Towards Systematic Configuration for Architecture Validation}, booktitle={Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)}, author={Becker, Matthias and Becker, Steffen and Besova, Galina and Walther, Sven and Wehrheim, Heike}, year={2014} }","apa":"Becker, M., Becker, S., Besova, G., Walther, S., & Wehrheim, H. (2014). Towards Systematic Configuration for Architecture Validation. In Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session).","ama":"Becker M, Becker S, Besova G, Walther S, Wehrheim H. Towards Systematic Configuration for Architecture Validation. In: Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session). ; 2014.","chicago":"Becker, Matthias, Steffen Becker, Galina Besova, Sven Walther, and Heike Wehrheim. “Towards Systematic Configuration for Architecture Validation.” In Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014."},"language":[{"iso":"eng"}],"_id":"344","date_updated":"2022-01-06T06:59:17Z","author":[{"last_name":"Becker","first_name":"Matthias","full_name":"Becker, Matthias"},{"last_name":"Becker","first_name":"Steffen","full_name":"Becker, Steffen"},{"full_name":"Besova, Galina","first_name":"Galina","last_name":"Besova"},{"first_name":"Sven","full_name":"Walther, Sven","last_name":"Walther"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"file_date_updated":"2018-03-20T07:27:54Z","department":[{"_id":"77"}],"publication":"Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)","file":[{"date_created":"2018-03-20T07:27:54Z","file_name":"344-paper_CAMERA_READY.pdf","access_level":"closed","file_size":80674,"file_id":"1420","creator":"florida","date_updated":"2018-03-20T07:27:54Z","content_type":"application/pdf","success":1,"relation":"main_file"}],"has_accepted_license":"1","status":"public","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"date_created":"2017-10-17T12:41:59Z","title":"Towards Systematic Configuration for Architecture Validation","ddc":["040"],"user_id":"477"},{"date_updated":"2022-01-06T06:59:22Z","doi":"10.1007/978-3-319-14130-5_14","series_title":"LNCS","language":[{"iso":"eng"}],"title":"Template-based Generation of Semantic Services","department":[{"_id":"77"},{"_id":"355"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"_id":"353","year":"2014","citation":{"ieee":"F. Mohr and S. Walther, “Template-based Generation of Semantic Services,” in Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203.","short":"F. Mohr, S. Walther, in: Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203.","bibtex":"@inproceedings{Mohr_Walther_2014, series={LNCS}, title={Template-based Generation of Semantic Services}, DOI={10.1007/978-3-319-14130-5_14}, booktitle={Proceedings of the 14th International Conference on Software Reuse (ICSR)}, author={Mohr, Felix and Walther, Sven}, year={2014}, pages={188–203}, collection={LNCS} }","mla":"Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203, doi:10.1007/978-3-319-14130-5_14.","apa":"Mohr, F., & Walther, S. (2014). Template-based Generation of Semantic Services. In Proceedings of the 14th International Conference on Software Reuse (ICSR) (pp. 188–203). https://doi.org/10.1007/978-3-319-14130-5_14","ama":"Mohr F, Walther S. Template-based Generation of Semantic Services. In: Proceedings of the 14th International Conference on Software Reuse (ICSR). LNCS. ; 2014:188-203. doi:10.1007/978-3-319-14130-5_14","chicago":"Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” In Proceedings of the 14th International Conference on Software Reuse (ICSR), 188–203. LNCS, 2014. https://doi.org/10.1007/978-3-319-14130-5_14."},"type":"conference","page":"188-203","abstract":[{"lang":"eng","text":"There are many technologies for the automation of processesthat deal with services; examples are service discovery and composition.Automation of these processes requires that the services are described semantically. However, semantically described services are currently not oronly rarely available, which limits the applicability of discovery and composition approaches. The systematic support for creating new semanticservices usable by automated technologies is an open problem.We tackle this problem with a template based approach: Domain independent templates are instantiated with domain specific services andboolean expressions. The obtained services have semantic descriptionswhose correctness directly follows from the correctness of the template.Besides the theory, we present experimental results for a service repository in which 85% of the services were generated automatically."}],"user_id":"477","ddc":["040"],"file":[{"content_type":"application/pdf","date_updated":"2018-03-20T07:23:32Z","success":1,"relation":"main_file","file_size":431778,"creator":"florida","file_id":"1414","access_level":"closed","file_name":"353-icsr2015_submission_17.pdf","date_created":"2018-03-20T07:23:32Z"}],"author":[{"full_name":"Mohr, Felix","first_name":"Felix","last_name":"Mohr"},{"last_name":"Walther","full_name":"Walther, Sven","first_name":"Sven"}],"file_date_updated":"2018-03-20T07:23:32Z","publication":"Proceedings of the 14th International Conference on Software Reuse (ICSR)","has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:42:00Z"},{"department":[{"_id":"77"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"title":"Programs from Proofs -- Approach and Applications","series_title":"Lecture Notes in Informatics (LNI)","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:59:38Z","author":[{"first_name":"Daniel","full_name":"Wonisch, Daniel","last_name":"Wonisch"},{"first_name":"Alexander","full_name":"Schremmer, Alexander","last_name":"Schremmer"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Proceedings of the Software Engineering Conference (SE)","file_date_updated":"2018-03-20T07:04:52Z","file":[{"file_name":"383-programmsFromProofsSE.pdf","date_created":"2018-03-20T07:04:52Z","access_level":"closed","file_id":"1392","creator":"florida","file_size":66474,"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-20T07:04:52Z"}],"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:06Z","abstract":[{"text":"Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space.","lang":"eng"}],"ddc":["040"],"user_id":"477","main_file_link":[{"url":"http://eprints.uni-kiel.de/23752/"}],"citation":{"short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68.","ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs -- Approach and Applications,” in Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68.","ama":"Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs -- Approach and Applications. In: Proceedings of the Software Engineering Conference (SE). Lecture Notes in Informatics (LNI). ; 2014:67-68.","apa":"Wonisch, D., Schremmer, A., & Wehrheim, H. (2014). Programs from Proofs -- Approach and Applications. In Proceedings of the Software Engineering Conference (SE) (pp. 67–68).","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from Proofs -- Approach and Applications.” In Proceedings of the Software Engineering Conference (SE), 67–68. Lecture Notes in Informatics (LNI), 2014.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2014, series={Lecture Notes in Informatics (LNI)}, title={Programs from Proofs -- Approach and Applications}, booktitle={Proceedings of the Software Engineering Conference (SE)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2014}, pages={67–68}, collection={Lecture Notes in Informatics (LNI)} }","mla":"Wonisch, Daniel, et al. “Programs from Proofs -- Approach and Applications.” Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68."},"year":"2014","type":"conference","page":"67-68","_id":"383"},{"publication":"Formal Asp. Comput.","department":[{"_id":"77"}],"author":[{"first_name":"Steve","full_name":"Schneider, Steve","last_name":"Schneider"},{"full_name":"Treharne, Helen","first_name":"Helen","last_name":"Treharne"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2018-06-13T07:55:10Z","status":"public","title":"The behavioural semantics of Event-B refinement","user_id":"29719","page":"251--280","year":"2014","type":"journal_article","citation":{"short":"S. Schneider, H. Treharne, H. Wehrheim, Formal Asp. Comput. (2014) 251--280.","ieee":"S. Schneider, H. Treharne, and H. Wehrheim, “The behavioural semantics of Event-B refinement,” Formal Asp. Comput., no. 2, pp. 251--280, 2014.","chicago":"Schneider, Steve, Helen Treharne, and Heike Wehrheim. “The Behavioural Semantics of Event-B Refinement.” Formal Asp. Comput., no. 2 (2014): 251--280. https://doi.org/10.1007/s00165-012-0265-0.","apa":"Schneider, S., Treharne, H., & Wehrheim, H. (2014). The behavioural semantics of Event-B refinement. Formal Asp. Comput., (2), 251--280. https://doi.org/10.1007/s00165-012-0265-0","ama":"Schneider S, Treharne H, Wehrheim H. The behavioural semantics of Event-B refinement. Formal Asp Comput. 2014;(2):251--280. doi:10.1007/s00165-012-0265-0","mla":"Schneider, Steve, et al. “The Behavioural Semantics of Event-B Refinement.” Formal Asp. Comput., no. 2, 2014, pp. 251--280, doi:10.1007/s00165-012-0265-0.","bibtex":"@article{Schneider_Treharne_Wehrheim_2014, title={The behavioural semantics of Event-B refinement}, DOI={10.1007/s00165-012-0265-0}, number={2}, journal={Formal Asp. Comput.}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike}, year={2014}, pages={251--280} }"},"_id":"3167","date_updated":"2022-01-06T06:59:01Z","doi":"10.1007/s00165-012-0265-0","issue":"2"},{"doi":"10.1016/j.scico.2014.04.001","_id":"3168","date_updated":"2022-01-06T06:59:01Z","type":"journal_article","citation":{"mla":"Tofan, Bogdan, et al. “Two Approaches for Proving Linearizability of Multiset.” Sci. Comput. Program., 2014, pp. 297--314, doi:10.1016/j.scico.2014.04.001.","bibtex":"@article{Tofan_Travkin_Schellhorn_Wehrheim_2014, title={Two approaches for proving linearizability of multiset}, DOI={10.1016/j.scico.2014.04.001}, journal={Sci. Comput. Program.}, author={Tofan, Bogdan and Travkin, Oleg and Schellhorn, Gerhard and Wehrheim, Heike}, year={2014}, pages={297--314} }","chicago":"Tofan, Bogdan, Oleg Travkin, Gerhard Schellhorn, and Heike Wehrheim. “Two Approaches for Proving Linearizability of Multiset.” Sci. Comput. Program., 2014, 297--314. https://doi.org/10.1016/j.scico.2014.04.001.","ama":"Tofan B, Travkin O, Schellhorn G, Wehrheim H. Two approaches for proving linearizability of multiset. Sci Comput Program. 2014:297--314. doi:10.1016/j.scico.2014.04.001","apa":"Tofan, B., Travkin, O., Schellhorn, G., & Wehrheim, H. (2014). Two approaches for proving linearizability of multiset. Sci. Comput. Program., 297--314. https://doi.org/10.1016/j.scico.2014.04.001","ieee":"B. Tofan, O. Travkin, G. Schellhorn, and H. Wehrheim, “Two approaches for proving linearizability of multiset,” Sci. Comput. Program., pp. 297--314, 2014.","short":"B. Tofan, O. Travkin, G. Schellhorn, H. Wehrheim, Sci. Comput. Program. (2014) 297--314."},"year":"2014","page":"297--314","user_id":"29719","title":"Two approaches for proving linearizability of multiset","status":"public","date_created":"2018-06-13T07:56:12Z","author":[{"first_name":"Bogdan","full_name":"Tofan, Bogdan","last_name":"Tofan"},{"full_name":"Travkin, Oleg","first_name":"Oleg","last_name":"Travkin"},{"last_name":"Schellhorn","first_name":"Gerhard","full_name":"Schellhorn, Gerhard"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"department":[{"_id":"77"}],"publication":"Sci. Comput. Program."},{"page":"31:1--31:37","citation":{"ieee":"G. Schellhorn, J. Derrick, and H. Wehrheim, “A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures,” {ACM} Trans. Comput. Log., no. 4, pp. 31:1--31:37, 2014.","short":"G. Schellhorn, J. Derrick, H. Wehrheim, {ACM} Trans. Comput. Log. (2014) 31:1--31:37.","mla":"Schellhorn, Gerhard, et al. “A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures.” {ACM} Trans. Comput. Log., no. 4, 2014, pp. 31:1--31:37, doi:10.1145/2629496.","bibtex":"@article{Schellhorn_Derrick_Wehrheim_2014, title={A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures}, DOI={10.1145/2629496}, number={4}, journal={{ACM} Trans. Comput. Log.}, author={Schellhorn, Gerhard and Derrick, John and Wehrheim, Heike}, year={2014}, pages={31:1--31:37} }","apa":"Schellhorn, G., Derrick, J., & Wehrheim, H. (2014). A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures. {ACM} Trans. Comput. Log., (4), 31:1--31:37. https://doi.org/10.1145/2629496","ama":"Schellhorn G, Derrick J, Wehrheim H. A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures. {ACM} Trans Comput Log. 2014;(4):31:1--31:37. doi:10.1145/2629496","chicago":"Schellhorn, Gerhard, John Derrick, and Heike Wehrheim. “A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures.” {ACM} Trans. Comput. Log., no. 4 (2014): 31:1--31:37. https://doi.org/10.1145/2629496."},"type":"journal_article","year":"2014","date_updated":"2022-01-06T06:59:01Z","_id":"3169","issue":"4","doi":"10.1145/2629496","publication":"{ACM} Trans. Comput. Log.","department":[{"_id":"77"}],"author":[{"full_name":"Schellhorn, Gerhard","first_name":"Gerhard","last_name":"Schellhorn"},{"first_name":"John","full_name":"Derrick, John","last_name":"Derrick"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"date_created":"2018-06-13T07:57:31Z","status":"public","user_id":"29719","title":"A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures"},{"series_title":"Lecture Notes in Computer Science","page":"200--214","type":"conference","year":"2014","citation":{"mla":"Derrick, John, et al. “Quiescent Consistency: Defining and Verifying Relaxed Linearizability.” {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings, edited by Cliff B. Jones et al., 2014, pp. 200--214, doi:10.1007/978-3-319-06410-9_15.","bibtex":"@inproceedings{Derrick_Dongol_Schellhorn_Tofan_Travkin_Wehrheim_2014, series={Lecture Notes in Computer Science}, title={Quiescent Consistency: Defining and Verifying Relaxed Linearizability}, DOI={10.1007/978-3-319-06410-9_15}, booktitle={{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings}, author={Derrick, John and Dongol, Brijesh and Schellhorn, Gerhard and Tofan, Bogdan and Travkin, Oleg and Wehrheim, Heike}, editor={B. Jones, Cliff and Pihlajasaari, Pekka and Sun, JunEditors}, year={2014}, pages={200--214}, collection={Lecture Notes in Computer Science} }","chicago":"Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Bogdan Tofan, Oleg Travkin, and Heike Wehrheim. “Quiescent Consistency: Defining and Verifying Relaxed Linearizability.” In {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings, edited by Cliff B. Jones, Pekka Pihlajasaari, and Jun Sun, 200--214. Lecture Notes in Computer Science, 2014. https://doi.org/10.1007/978-3-319-06410-9_15.","apa":"Derrick, J., Dongol, B., Schellhorn, G., Tofan, B., Travkin, O., & Wehrheim, H. (2014). Quiescent Consistency: Defining and Verifying Relaxed Linearizability. In C. B. Jones, P. Pihlajasaari, & J. Sun (Eds.), {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings (pp. 200--214). https://doi.org/10.1007/978-3-319-06410-9_15","ama":"Derrick J, Dongol B, Schellhorn G, Tofan B, Travkin O, Wehrheim H. Quiescent Consistency: Defining and Verifying Relaxed Linearizability. In: B. Jones C, Pihlajasaari P, Sun J, eds. {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings. Lecture Notes in Computer Science. ; 2014:200--214. doi:10.1007/978-3-319-06410-9_15","ieee":"J. Derrick, B. Dongol, G. Schellhorn, B. Tofan, O. Travkin, and H. Wehrheim, “Quiescent Consistency: Defining and Verifying Relaxed Linearizability,” in {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings, 2014, pp. 200--214.","short":"J. Derrick, B. Dongol, G. Schellhorn, B. Tofan, O. Travkin, H. Wehrheim, in: C. B. Jones, P. Pihlajasaari, J. Sun (Eds.), {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings, 2014, pp. 200--214."},"_id":"3170","date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-319-06410-9_15","department":[{"_id":"77"}],"publication":"{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings","author":[{"last_name":"Derrick","first_name":"John","full_name":"Derrick, John"},{"first_name":"Brijesh","full_name":"Dongol, Brijesh","last_name":"Dongol"},{"last_name":"Schellhorn","full_name":"Schellhorn, Gerhard","first_name":"Gerhard"},{"full_name":"Tofan, Bogdan","first_name":"Bogdan","last_name":"Tofan"},{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2018-06-13T07:58:40Z","status":"public","editor":[{"last_name":"B. Jones","first_name":"Cliff","full_name":"B. Jones, Cliff"},{"last_name":"Pihlajasaari","first_name":"Pekka","full_name":"Pihlajasaari, Pekka"},{"last_name":"Sun","full_name":"Sun, Jun","first_name":"Jun"}],"user_id":"29719","title":"Quiescent Consistency: Defining and Verifying Relaxed Linearizability"},{"page":"132--147","type":"conference","year":"2014","citation":{"chicago":"Travkin, Oleg, and Heike Wehrheim. “Handling {TSO} in Mechanized Linearizability Proofs.” In Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings, edited by Eran Yahav, 132--147. Lecture Notes in Computer Science, 2014. https://doi.org/10.1007/978-3-319-13338-6_11.","ama":"Travkin O, Wehrheim H. Handling {TSO} in Mechanized Linearizability Proofs. In: Yahav E, ed. Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings. Lecture Notes in Computer Science. ; 2014:132--147. doi:10.1007/978-3-319-13338-6_11","apa":"Travkin, O., & Wehrheim, H. (2014). Handling {TSO} in Mechanized Linearizability Proofs. In E. Yahav (Ed.), Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings (pp. 132--147). https://doi.org/10.1007/978-3-319-13338-6_11","mla":"Travkin, Oleg, and Heike Wehrheim. “Handling {TSO} in Mechanized Linearizability Proofs.” Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings, edited by Eran Yahav, 2014, pp. 132--147, doi:10.1007/978-3-319-13338-6_11.","bibtex":"@inproceedings{Travkin_Wehrheim_2014, series={Lecture Notes in Computer Science}, title={Handling {TSO} in Mechanized Linearizability Proofs}, DOI={10.1007/978-3-319-13338-6_11}, booktitle={Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings}, author={Travkin, Oleg and Wehrheim, Heike}, editor={Yahav, EranEditor}, year={2014}, pages={132--147}, collection={Lecture Notes in Computer Science} }","short":"O. Travkin, H. Wehrheim, in: E. Yahav (Ed.), Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings, 2014, pp. 132--147.","ieee":"O. Travkin and H. Wehrheim, “Handling {TSO} in Mechanized Linearizability Proofs,” in Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings, 2014, pp. 132--147."},"series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-319-13338-6_11","date_updated":"2022-01-06T06:59:02Z","_id":"3171","date_created":"2018-06-13T07:59:46Z","status":"public","editor":[{"last_name":"Yahav","full_name":"Yahav, Eran","first_name":"Eran"}],"publication":"Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings","department":[{"_id":"77"}],"author":[{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"user_id":"29719","title":"Handling {TSO} in Mechanized Linearizability Proofs"},{"user_id":"29719","title":"Timed Automata Verification via {IC3} with Zones","publication":"Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings","department":[{"_id":"77"}],"author":[{"first_name":"Tobias","full_name":"Isenberg, Tobias","last_name":"Isenberg"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"date_created":"2018-06-13T08:01:04Z","status":"public","editor":[{"last_name":"Merz","full_name":"Merz, Stephan","first_name":"Stephan"},{"first_name":"Jun","full_name":"Pang, Jun","last_name":"Pang"}],"date_updated":"2022-01-06T06:59:02Z","_id":"3172","doi":"10.1007/978-3-319-11737-9_14","series_title":"Lecture Notes in Computer Science","page":"203--218","type":"conference","citation":{"chicago":"Isenberg, Tobias, and Heike Wehrheim. “Timed Automata Verification via {IC3} with Zones.” In Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings, edited by Stephan Merz and Jun Pang, 203--218. Lecture Notes in Computer Science, 2014. https://doi.org/10.1007/978-3-319-11737-9_14.","ama":"Isenberg T, Wehrheim H. Timed Automata Verification via {IC3} with Zones. In: Merz S, Pang J, eds. Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings. Lecture Notes in Computer Science. ; 2014:203--218. doi:10.1007/978-3-319-11737-9_14","apa":"Isenberg, T., & Wehrheim, H. (2014). Timed Automata Verification via {IC3} with Zones. In S. Merz & J. Pang (Eds.), Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings (pp. 203--218). https://doi.org/10.1007/978-3-319-11737-9_14","bibtex":"@inproceedings{Isenberg_Wehrheim_2014, series={Lecture Notes in Computer Science}, title={Timed Automata Verification via {IC3} with Zones}, DOI={10.1007/978-3-319-11737-9_14}, booktitle={Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings}, author={Isenberg, Tobias and Wehrheim, Heike}, editor={Merz, Stephan and Pang, JunEditors}, year={2014}, pages={203--218}, collection={Lecture Notes in Computer Science} }","mla":"Isenberg, Tobias, and Heike Wehrheim. “Timed Automata Verification via {IC3} with Zones.” Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings, edited by Stephan Merz and Jun Pang, 2014, pp. 203--218, doi:10.1007/978-3-319-11737-9_14.","short":"T. Isenberg, H. Wehrheim, in: S. Merz, J. Pang (Eds.), Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings, 2014, pp. 203--218.","ieee":"T. Isenberg and H. Wehrheim, “Timed Automata Verification via {IC3} with Zones,” in Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings, 2014, pp. 203--218."},"year":"2014"},{"status":"public","date_created":"2018-06-13T08:04:33Z","editor":[{"full_name":"Albert, Elvira","first_name":"Elvira","last_name":"Albert"},{"last_name":"Sekerinski","full_name":"Sekerinski, Emil","first_name":"Emil"}],"author":[{"last_name":"A. Schneider","first_name":"Steve","full_name":"A. Schneider, Steve"},{"last_name":"Treharne","first_name":"Helen","full_name":"Treharne, Helen"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"},{"first_name":"David","full_name":"M. Williams, David","last_name":"M. Williams"}],"department":[{"_id":"77"}],"publication":"Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings","user_id":"29719","title":"Managing {LTL} Properties in Event-B Refinement","type":"conference","citation":{"bibtex":"@inproceedings{A. Schneider_Treharne_Wehrheim_M. Williams_2014, series={Lecture Notes in Computer Science}, title={Managing {LTL} Properties in Event-B Refinement}, DOI={10.1007/978-3-319-10181-1_14}, booktitle={Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings}, author={A. Schneider, Steve and Treharne, Helen and Wehrheim, Heike and M. Williams, David}, editor={Albert, Elvira and Sekerinski, EmilEditors}, year={2014}, pages={221--237}, collection={Lecture Notes in Computer Science} }","mla":"A. Schneider, Steve, et al. “Managing {LTL} Properties in Event-B Refinement.” Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings, edited by Elvira Albert and Emil Sekerinski, 2014, pp. 221--237, doi:10.1007/978-3-319-10181-1_14.","ama":"A. Schneider S, Treharne H, Wehrheim H, M. Williams D. Managing {LTL} Properties in Event-B Refinement. In: Albert E, Sekerinski E, eds. Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings. Lecture Notes in Computer Science. ; 2014:221--237. doi:10.1007/978-3-319-10181-1_14","apa":"A. Schneider, S., Treharne, H., Wehrheim, H., & M. Williams, D. (2014). Managing {LTL} Properties in Event-B Refinement. In E. Albert & E. Sekerinski (Eds.), Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings (pp. 221--237). https://doi.org/10.1007/978-3-319-10181-1_14","chicago":"A. Schneider, Steve, Helen Treharne, Heike Wehrheim, and David M. Williams. “Managing {LTL} Properties in Event-B Refinement.” In Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings, edited by Elvira Albert and Emil Sekerinski, 221--237. Lecture Notes in Computer Science, 2014. https://doi.org/10.1007/978-3-319-10181-1_14.","ieee":"S. A. Schneider, H. Treharne, H. Wehrheim, and D. M. Williams, “Managing {LTL} Properties in Event-B Refinement,” in Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings, 2014, pp. 221--237.","short":"S. A. Schneider, H. Treharne, H. Wehrheim, D. M. Williams, in: E. Albert, E. Sekerinski (Eds.), Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings, 2014, pp. 221--237."},"year":"2014","page":"221--237","series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-319-10181-1_14","date_updated":"2022-01-06T06:59:02Z","_id":"3173"},{"date_updated":"2022-01-06T06:59:02Z","_id":"3174","citation":{"apa":"Schneider, S., Treharne, H., Wehrheim, H., & M. Williams, D. (2014). Managing {LTL} properties in Event-B refinement. CoRR.","ama":"Schneider S, Treharne H, Wehrheim H, M. Williams D. Managing {LTL} properties in Event-B refinement. CoRR. 2014.","chicago":"Schneider, Steve, Helen Treharne, Heike Wehrheim, and David M. Williams. “Managing {LTL} Properties in Event-B Refinement.” CoRR, 2014.","mla":"Schneider, Steve, et al. “Managing {LTL} Properties in Event-B Refinement.” CoRR, 2014.","bibtex":"@article{Schneider_Treharne_Wehrheim_M. Williams_2014, title={Managing {LTL} properties in Event-B refinement}, journal={CoRR}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike and M. Williams, David}, year={2014} }","short":"S. Schneider, H. Treharne, H. Wehrheim, D. M. Williams, CoRR (2014).","ieee":"S. Schneider, H. Treharne, H. Wehrheim, and D. M. Williams, “Managing {LTL} properties in Event-B refinement,” CoRR, 2014."},"type":"journal_article","year":"2014","title":"Managing {LTL} properties in Event-B refinement","user_id":"29719","publication":"CoRR","department":[{"_id":"77"}],"author":[{"last_name":"Schneider","first_name":"Steve","full_name":"Schneider, Steve"},{"last_name":"Treharne","full_name":"Treharne, Helen","first_name":"Helen"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"},{"first_name":"David","full_name":"M. Williams, David","last_name":"M. Williams"}],"date_created":"2018-06-13T08:05:39Z","status":"public"},{"user_id":"29719","title":"Proof-Carrying Hardware via {IC3}","date_created":"2018-06-13T08:07:24Z","status":"public","department":[{"_id":"77"}],"publication":"CoRR","author":[{"first_name":"Tobias","full_name":"Isenberg, Tobias","last_name":"Isenberg"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"_id":"3175","date_updated":"2022-01-06T06:59:02Z","year":"2014","type":"journal_article","citation":{"ieee":"T. Isenberg and H. Wehrheim, “Proof-Carrying Hardware via {IC3},” CoRR, 2014.","short":"T. Isenberg, H. Wehrheim, CoRR (2014).","mla":"Isenberg, Tobias, and Heike Wehrheim. “Proof-Carrying Hardware via {IC3}.” CoRR, 2014.","bibtex":"@article{Isenberg_Wehrheim_2014, title={Proof-Carrying Hardware via {IC3}}, journal={CoRR}, author={Isenberg, Tobias and Wehrheim, Heike}, year={2014} }","chicago":"Isenberg, Tobias, and Heike Wehrheim. “Proof-Carrying Hardware via {IC3}.” CoRR, 2014.","apa":"Isenberg, T., & Wehrheim, H. (2014). Proof-Carrying Hardware via {IC3}. CoRR.","ama":"Isenberg T, Wehrheim H. Proof-Carrying Hardware via {IC3}. CoRR. 2014."}},{"doi":"10.1145/2632362.2632372","date_updated":"2022-01-06T07:01:07Z","language":[{"iso":"eng"}],"series_title":"SPIN 2014","title":"Certification for Configurable Program Analysis","project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"_id":"450","year":"2014","type":"conference","citation":{"bibtex":"@inproceedings{Jakobs_Wehrheim_2014, series={SPIN 2014}, title={Certification for Configurable Program Analysis}, DOI={10.1145/2632362.2632372}, booktitle={Proceedings of the 21st International Symposium on Model Checking of Software (SPIN)}, author={Jakobs, Marie-Christine and Wehrheim, Heike}, year={2014}, pages={30–39}, collection={SPIN 2014} }","mla":"Jakobs, Marie-Christine, and Heike Wehrheim. “Certification for Configurable Program Analysis.” Proceedings of the 21st International Symposium on Model Checking of Software (SPIN), 2014, pp. 30–39, doi:10.1145/2632362.2632372.","apa":"Jakobs, M.-C., & Wehrheim, H. (2014). Certification for Configurable Program Analysis. In Proceedings of the 21st International Symposium on Model Checking of Software (SPIN) (pp. 30–39). https://doi.org/10.1145/2632362.2632372","ama":"Jakobs M-C, Wehrheim H. Certification for Configurable Program Analysis. In: Proceedings of the 21st International Symposium on Model Checking of Software (SPIN). SPIN 2014. ; 2014:30-39. doi:10.1145/2632362.2632372","chicago":"Jakobs, Marie-Christine, and Heike Wehrheim. “Certification for Configurable Program Analysis.” In Proceedings of the 21st International Symposium on Model Checking of Software (SPIN), 30–39. SPIN 2014, 2014. https://doi.org/10.1145/2632362.2632372.","ieee":"M.-C. Jakobs and H. Wehrheim, “Certification for Configurable Program Analysis,” in Proceedings of the 21st International Symposium on Model Checking of Software (SPIN), 2014, pp. 30–39.","short":"M.-C. Jakobs, H. Wehrheim, in: Proceedings of the 21st International Symposium on Model Checking of Software (SPIN), 2014, pp. 30–39."},"page":"30-39","user_id":"477","ddc":["040"],"abstract":[{"lang":"eng","text":"Configurable program analysis (CPA) is a generic concept for the formalization of different software analysis techniques in a single framework. With the tool CPAchecker, this framework allows for an easy configuration and subsequent automatic execution of analysis procedures ranging from data-flow analysis to model checking. The focus of the tool CPAchecker is thus on analysis. In this paper, we study configurability from the point of view of software certification. Certification aims at providing (via a prior analysis) a certificate of correctness for a program which is (a) tamper-proof and (b) more efficient to check for validity than a full analysis. Here, we will show how, given an analysis instance of a CPA, to construct a corresponding sound certification instance, thereby arriving at configurable program certification. We report on experiments with certification based on different analysis techniques, and in particular explain which characteristics of an underlying analysis allow us to design an efficient (in the above (b) sense) certification procedure. "}],"has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:42:19Z","file":[{"access_level":"closed","date_created":"2018-03-16T11:25:35Z","file_name":"450-p30-jakobs.pdf","success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-16T11:25:35Z","file_id":"1345","creator":"florida","file_size":487366}],"author":[{"last_name":"Jakobs","first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Proceedings of the 21st International Symposium on Model Checking of Software (SPIN)","file_date_updated":"2018-03-16T11:25:35Z"},{"page":"307-322","year":"2014","type":"conference","citation":{"short":"M.-C. Jakobs, M. Platzner, T. Wiersema, H. Wehrheim, in: E. Albert, E. Sekerinski (Eds.), Proceedings of the 11th International Conference on Integrated Formal Methods (IFM), 2014, pp. 307–322.","ieee":"M.-C. Jakobs, M. Platzner, T. Wiersema, and H. Wehrheim, “Integrating Software and Hardware Verification,” in Proceedings of the 11th International Conference on Integrated Formal Methods (iFM), 2014, pp. 307–322.","chicago":"Jakobs, Marie-Christine, Marco Platzner, Tobias Wiersema, and Heike Wehrheim. “Integrating Software and Hardware Verification.” In Proceedings of the 11th International Conference on Integrated Formal Methods (IFM), edited by Elvira Albert and Emil Sekerinski, 307–22. LNCS, 2014. https://doi.org/10.1007/978-3-319-10181-1_19.","apa":"Jakobs, M.-C., Platzner, M., Wiersema, T., & Wehrheim, H. (2014). Integrating Software and Hardware Verification. In E. Albert & E. Sekerinski (Eds.), Proceedings of the 11th International Conference on Integrated Formal Methods (iFM) (pp. 307–322). https://doi.org/10.1007/978-3-319-10181-1_19","ama":"Jakobs M-C, Platzner M, Wiersema T, Wehrheim H. Integrating Software and Hardware Verification. In: Albert E, Sekerinski E, eds. Proceedings of the 11th International Conference on Integrated Formal Methods (IFM). LNCS. ; 2014:307-322. doi:10.1007/978-3-319-10181-1_19","bibtex":"@inproceedings{Jakobs_Platzner_Wiersema_Wehrheim_2014, series={LNCS}, title={Integrating Software and Hardware Verification}, DOI={10.1007/978-3-319-10181-1_19}, booktitle={Proceedings of the 11th International Conference on Integrated Formal Methods (iFM)}, author={Jakobs, Marie-Christine and Platzner, Marco and Wiersema, Tobias and Wehrheim, Heike}, editor={Albert, Elvira and Sekerinski, EmilEditors}, year={2014}, pages={307–322}, collection={LNCS} }","mla":"Jakobs, Marie-Christine, et al. “Integrating Software and Hardware Verification.” Proceedings of the 11th International Conference on Integrated Formal Methods (IFM), edited by Elvira Albert and Emil Sekerinski, 2014, pp. 307–22, doi:10.1007/978-3-319-10181-1_19."},"_id":"408","file":[{"file_id":"1364","creator":"florida","file_size":561325,"success":1,"relation":"main_file","date_updated":"2018-03-16T11:35:28Z","content_type":"application/pdf","date_created":"2018-03-16T11:35:28Z","file_name":"408-jakobs14_ifm.pdf","access_level":"closed"}],"file_date_updated":"2018-03-16T11:35:28Z","publication":"Proceedings of the 11th International Conference on Integrated Formal Methods (iFM)","author":[{"last_name":"Jakobs","full_name":"Jakobs, Marie-Christine","first_name":"Marie-Christine"},{"first_name":"Marco","full_name":"Platzner, Marco","last_name":"Platzner","id":"398"},{"first_name":"Tobias","full_name":"Wiersema, Tobias","last_name":"Wiersema","id":"3118"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2017-10-17T12:42:11Z","status":"public","has_accepted_license":"1","abstract":[{"lang":"eng","text":"Verification of hardware and software usually proceeds separately, software analysis relying on the correctness of processors executing instructions. This assumption is valid as long as the software runs on standard CPUs that have been extensively validated and are in wide use. However, for processors exploiting custom instruction set extensions to meet performance and energy constraints the validation might be less extensive, challenging the correctness assumption.In this paper we present an approach for integrating software analyses with hardware verification, specifically targeting custom instruction set extensions. We propose three different techniques for deriving the properties to be proven for the hardware implementation of a custom instruction in order to support software analyses. The techniques are designed to explore the trade-off between generality and efficiency and span from proving functional equivalence over checking the rules of a particular analysis domain to verifying actual pre and post conditions resulting from program analysis. We demonstrate and compare the three techniques on example programs with custom instructions, using stateof-the-art software and hardware verification techniques."}],"user_id":"477","ddc":["040"],"series_title":"LNCS","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:00:14Z","doi":"10.1007/978-3-319-10181-1_19","department":[{"_id":"77"},{"_id":"78"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"editor":[{"last_name":"Albert","full_name":"Albert, Elvira","first_name":"Elvira"},{"first_name":"Emil","full_name":"Sekerinski, Emil","last_name":"Sekerinski"}],"title":"Integrating Software and Hardware Verification"},{"language":[{"iso":"eng"}],"doi":"10.1016/j.cl.2015.05.003","date_updated":"2022-01-06T07:00:28Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"title":"Grammar-based model transformations","page":"1601-1610","year":"2014","type":"conference","citation":{"mla":"Besova, Galina, et al. “Grammar-Based Model Transformations.” Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD), 2014, pp. 1601–10, doi:10.1016/j.cl.2015.05.003.","bibtex":"@inproceedings{Besova_Steenke_Wehrheim_2014, title={Grammar-based model transformations}, DOI={10.1016/j.cl.2015.05.003}, booktitle={Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD)}, author={Besova, Galina and Steenke, Dominik and Wehrheim, Heike}, year={2014}, pages={1601–1610} }","chicago":"Besova, Galina, Dominik Steenke, and Heike Wehrheim. “Grammar-Based Model Transformations.” In Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD), 1601–10, 2014. https://doi.org/10.1016/j.cl.2015.05.003.","apa":"Besova, G., Steenke, D., & Wehrheim, H. (2014). Grammar-based model transformations. In Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD) (pp. 1601–1610). https://doi.org/10.1016/j.cl.2015.05.003","ama":"Besova G, Steenke D, Wehrheim H. Grammar-based model transformations. In: Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD). ; 2014:1601-1610. doi:10.1016/j.cl.2015.05.003","ieee":"G. Besova, D. Steenke, and H. Wehrheim, “Grammar-based model transformations,” in Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD), 2014, pp. 1601–1610.","short":"G. Besova, D. Steenke, H. Wehrheim, in: Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD), 2014, pp. 1601–1610."},"_id":"417","date_created":"2017-10-17T12:42:13Z","has_accepted_license":"1","status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-16T11:33:33Z","file_id":"1360","creator":"florida","file_size":643382,"access_level":"closed","file_name":"417-main.pdf","date_created":"2018-03-16T11:33:33Z"}],"file_date_updated":"2018-03-16T11:33:33Z","publication":"Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD)","author":[{"last_name":"Besova","first_name":"Galina","full_name":"Besova, Galina"},{"first_name":"Dominik","full_name":"Steenke, Dominik","last_name":"Steenke"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"user_id":"477","ddc":["040"],"abstract":[{"lang":"eng","text":"Model transformation is a key concept in modeldrivensoftware engineering. The definition of model transformationsis usually based on meta-models describing the abstractsyntax of languages. While meta-models are thereby able to abstractfrom superfluous details of concrete syntax, they often loosestructural information inherent in languages, like information onmodel elements always occurring together in particular shapes.As a consequence, model transformations cannot naturally re-uselanguage structures, thus leading to unnecessary complexity intheir development as well as analysis.In this paper, we propose a new approach to model transformationdevelopment which allows to simplify and improve thequality of the developed transformations via the exploitation ofthe languages’ structures. The approach is based on context-freegrammars and transformations defined by pairing productions ofsource and target grammars. We show that such transformationsexhibit three important characteristics: they are sound, completeand deterministic."}]},{"user_id":"22398","title":"Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren","ddc":["000"],"status":"public","has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_created":"2017-10-17T12:42:13Z","file":[{"access_level":"open_access","date_created":"2019-08-07T09:00:20Z","file_name":"fpauck_2014.pdf","relation":"main_file","content_type":"application/pdf","date_updated":"2019-08-07T09:05:38Z","title":"Bachelorarbeit","creator":"fpauck","file_id":"12906","file_size":3191756}],"author":[{"id":"22398","last_name":"Pauck","full_name":"Pauck, Felix","first_name":"Felix"}],"publisher":"Universität Paderborn","department":[{"_id":"77"}],"file_date_updated":"2019-08-07T09:05:38Z","oa":"1","_id":"418","date_updated":"2022-01-06T07:00:30Z","language":[{"iso":"ger"}],"supervisor":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"type":"bachelorsthesis","citation":{"short":"F. Pauck, Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren, Universität Paderborn, 2014.","ieee":"F. Pauck, Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren. Universität Paderborn, 2014.","apa":"Pauck, F. (2014). Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren. Universität Paderborn.","ama":"Pauck F. Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren. Universität Paderborn; 2014.","chicago":"Pauck, Felix. Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren. Universität Paderborn, 2014.","mla":"Pauck, Felix. Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren. Universität Paderborn, 2014.","bibtex":"@book{Pauck_2014, title={Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren}, publisher={Universität Paderborn}, author={Pauck, Felix}, year={2014} }"},"year":"2014"},{"doi":"10.1007/978-3-642-38592-6_13","_id":"3176","date_updated":"2022-01-06T06:59:02Z","type":"conference","year":"2013","citation":{"bibtex":"@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={Bounded Model Checking of Graph Transformation Systems via {SMT} Solving}, DOI={10.1007/978-3-642-38592-6_13}, booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013}, pages={178--192}, collection={Lecture Notes in Computer Science} }","mla":"Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, edited by Dirk Beyer and Michele Boreale, 2013, pp. 178--192, doi:10.1007/978-3-642-38592-6_13.","ama":"Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings. Lecture Notes in Computer Science. ; 2013:178--192. doi:10.1007/978-3-642-38592-6_13","apa":"Isenberg, T., Steenken, D., & Wehrheim, H. (2013). Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In D. Beyer & M. Boreale (Eds.), Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings (pp. 178--192). https://doi.org/10.1007/978-3-642-38592-6_13","chicago":"Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” In Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-38592-6_13.","ieee":"T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving,” in Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, 2013, pp. 178--192.","short":"T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.), Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, 2013, pp. 178--192."},"page":"178--192","series_title":"Lecture Notes in Computer Science","user_id":"29719","title":"Bounded Model Checking of Graph Transformation Systems via {SMT} Solving","status":"public","date_created":"2018-06-13T08:08:39Z","editor":[{"last_name":"Beyer","full_name":"Beyer, Dirk","first_name":"Dirk"},{"last_name":"Boreale","first_name":"Michele","full_name":"Boreale, Michele"}],"author":[{"last_name":"Isenberg","full_name":"Isenberg, Tobias","first_name":"Tobias"},{"last_name":"Steenken","first_name":"Dominik","full_name":"Steenken, Dominik"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings","department":[{"_id":"77"}]},{"date_created":"2018-06-13T08:09:44Z","status":"public","editor":[{"first_name":"Valeria","full_name":"Bertacco, Valeria","last_name":"Bertacco"},{"last_name":"Legay","full_name":"Legay, Axel","first_name":"Axel"}],"department":[{"_id":"77"}],"publication":"Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings","author":[{"first_name":"Oleg","full_name":"Travkin, Oleg","last_name":"Travkin"},{"last_name":"Mütze","full_name":"Mütze, Annika","first_name":"Annika"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"user_id":"29719","title":"{SPIN} as a Linearizability Checker under Weak Memory Models","page":"311--326","year":"2013","type":"conference","citation":{"apa":"Travkin, O., Mütze, A., & Wehrheim, H. (2013). {SPIN} as a Linearizability Checker under Weak Memory Models. In V. Bertacco & A. Legay (Eds.), Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings (pp. 311--326). https://doi.org/10.1007/978-3-319-03077-7_21","ama":"Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under Weak Memory Models. In: Bertacco V, Legay A, eds. Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings. Lecture Notes in Computer Science. ; 2013:311--326. doi:10.1007/978-3-319-03077-7_21","chicago":"Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability Checker under Weak Memory Models.” In Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, edited by Valeria Bertacco and Axel Legay, 311--326. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-319-03077-7_21.","bibtex":"@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models}, DOI={10.1007/978-3-319-03077-7_21}, booktitle={Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco, Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture Notes in Computer Science} }","mla":"Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory Models.” Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326, doi:10.1007/978-3-319-03077-7_21.","short":"O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013, pp. 311--326.","ieee":"O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker under Weak Memory Models,” in Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013, pp. 311--326."},"series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-319-03077-7_21","date_updated":"2022-01-06T06:59:02Z","_id":"3177"},{"author":[{"full_name":"Dongol, Brijesh","first_name":"Brijesh","last_name":"Dongol"},{"first_name":"Oleg","full_name":"Travkin, Oleg","last_name":"Travkin"},{"last_name":"Derrick","first_name":"John","full_name":"Derrick, John"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings","department":[{"_id":"77"}],"editor":[{"last_name":"Liu","full_name":"Liu, Zhiming","first_name":"Zhiming"},{"last_name":"Woodcock","full_name":"Woodcock, Jim","first_name":"Jim"},{"full_name":"Zhu, Huibiao","first_name":"Huibiao","last_name":"Zhu"}],"status":"public","date_created":"2018-06-13T08:13:31Z","title":"A High-Level Semantics for Program Execution under Total Store Order Memory","user_id":"29719","series_title":"Lecture Notes in Computer Science","type":"conference","year":"2013","citation":{"ieee":"B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics for Program Execution under Total Store Order Memory,” in Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194.","short":"B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock, H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194.","mla":"Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under Total Store Order Memory.” Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, edited by Zhiming Liu et al., 2013, pp. 177--194, doi:10.1007/978-3-642-39718-9_11.","bibtex":"@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={A High-Level Semantics for Program Execution under Total Store Order Memory}, DOI={10.1007/978-3-642-39718-9_11}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol, Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu, Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194}, collection={Lecture Notes in Computer Science} }","apa":"Dongol, B., Travkin, O., Derrick, J., & Wehrheim, H. (2013). A High-Level Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J. Woodcock, & H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings (pp. 177--194). https://doi.org/10.1007/978-3-642-39718-9_11","ama":"Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings. Lecture Notes in Computer Science. ; 2013:177--194. doi:10.1007/978-3-642-39718-9_11","chicago":"Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level Semantics for Program Execution under Total Store Order Memory.” In Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, edited by Zhiming Liu, Jim Woodcock, and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-39718-9_11."},"page":"177--194","_id":"3178","date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-642-39718-9_11"},{"series_title":"{LNI}","page":"271--284","year":"2013","type":"conference","citation":{"mla":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen, edited by Stefan Kowalewski and Bernhard Rumpe, 2013, pp. 271--284.","bibtex":"@inproceedings{Ziegert_Wehrheim_2013, series={{LNI}}, title={Temporal Reconfiguration Plans for Self-Adaptive Systems}, booktitle={Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen}, author={Ziegert, Steffen and Wehrheim, Heike}, editor={Kowalewski, Stefan and Rumpe, BernhardEditors}, year={2013}, pages={271--284}, collection={{LNI}} }","chicago":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” In Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen, edited by Stefan Kowalewski and Bernhard Rumpe, 271--284. {LNI}, 2013.","apa":"Ziegert, S., & Wehrheim, H. (2013). Temporal Reconfiguration Plans for Self-Adaptive Systems. In S. Kowalewski & B. Rumpe (Eds.), Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen (pp. 271--284).","ama":"Ziegert S, Wehrheim H. Temporal Reconfiguration Plans for Self-Adaptive Systems. In: Kowalewski S, Rumpe B, eds. Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen. {LNI}. ; 2013:271--284.","ieee":"S. Ziegert and H. Wehrheim, “Temporal Reconfiguration Plans for Self-Adaptive Systems,” in Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen, 2013, pp. 271--284.","short":"S. Ziegert, H. Wehrheim, in: S. Kowalewski, B. Rumpe (Eds.), Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen, 2013, pp. 271--284."},"_id":"3179","date_updated":"2022-01-06T06:59:02Z","publication":"Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen","department":[{"_id":"77"}],"author":[{"first_name":"Steffen","full_name":"Ziegert, Steffen","last_name":"Ziegert"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"editor":[{"last_name":"Kowalewski","first_name":"Stefan","full_name":"Kowalewski, Stefan"},{"full_name":"Rumpe, Bernhard","first_name":"Bernhard","last_name":"Rumpe"}],"date_created":"2018-06-13T08:15:08Z","status":"public","title":"Temporal Reconfiguration Plans for Self-Adaptive Systems","user_id":"29719"},{"citation":{"ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Zero Overhead Runtime Monitoring,” in Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–258.","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–258.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2013, series={LNCS}, title={Zero Overhead Runtime Monitoring}, DOI={10.1007/978-3-642-40561-7_17}, booktitle={Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2013}, pages={244–258}, collection={LNCS} }","mla":"Wonisch, Daniel, et al. “Zero Overhead Runtime Monitoring.” Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–58, doi:10.1007/978-3-642-40561-7_17.","apa":"Wonisch, D., Schremmer, A., & Wehrheim, H. (2013). Zero Overhead Runtime Monitoring. In Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM) (pp. 244–258). https://doi.org/10.1007/978-3-642-40561-7_17","ama":"Wonisch D, Schremmer A, Wehrheim H. Zero Overhead Runtime Monitoring. In: Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM). LNCS. ; 2013:244-258. doi:10.1007/978-3-642-40561-7_17","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Zero Overhead Runtime Monitoring.” In Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 244–58. LNCS, 2013. https://doi.org/10.1007/978-3-642-40561-7_17."},"type":"conference","year":"2013","page":"244-258","_id":"469","file":[{"file_id":"1332","creator":"florida","file_size":394804,"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-16T11:18:41Z","file_name":"469-WSW2013-2.pdf","date_created":"2018-03-16T11:18:41Z","access_level":"closed"}],"author":[{"last_name":"Wonisch","first_name":"Daniel","full_name":"Wonisch, Daniel"},{"full_name":"Schremmer, Alexander","first_name":"Alexander","last_name":"Schremmer"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)","file_date_updated":"2018-03-16T11:18:41Z","status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:23Z","abstract":[{"lang":"eng","text":"Runtime monitoring aims at ensuring program safety by monitoring the program's behaviour during execution and taking appropriate action before a program violates some property.Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead.In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program (except for unsafe behaviour),and has the same performance characteristics."}],"user_id":"477","ddc":["040"],"series_title":"LNCS","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:18Z","doi":"10.1007/978-3-642-40561-7_17","department":[{"_id":"77"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"}],"title":"Zero Overhead Runtime Monitoring"},{"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:25Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"}],"publisher":"Universität Paderborn","author":[{"first_name":"Nils","full_name":"Timm, Nils","last_name":"Timm"}],"file_date_updated":"2018-03-15T14:06:05Z","department":[{"_id":"77"}],"file":[{"file_size":931458,"file_id":"1324","creator":"florida","date_updated":"2018-03-15T14:06:05Z","content_type":"application/pdf","relation":"main_file","success":1,"file_name":"478-Dissertation-Timm.pdf","date_created":"2018-03-15T14:06:05Z","access_level":"closed"}],"title":"Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems","ddc":["040"],"user_id":"477","abstract":[{"lang":"eng","text":"Software systems are playing an increasing role in our everyday life, and as the amount of software applications grows, so does their complexity and the relevance of their computations. Software components can be found in many systems that are charged with safety-critical tasks, such as control systems for aviation or power plants. Hence, software verification techniques that are capable of proving the absence of critical errors are becoming more and more important in the field software engineering. A well-established approach to software verification is model checking. Applying this technique involves an exhaustive exploration of a state space model corresponding to the system under consideration. The major challenge in model checking is the so-called state explosion problem: The state space of a software system grows exponentially with its size. Thus, the straightforward modelling of real-life systems practically impossible. A common approach to this problem is the application of abstraction techniques, which reduce the original state space by mapping it on a significantly smaller abstract one. Abstraction inherently involves a loss of information, and thus, the resulting abstract model may be too imprecise for a definite result in verification. Therefore, abstraction is typically combined with abstraction refinement: An initially very coarse abstract model is iteratively refined, i.e. enriched with new details about the original system, until a level of abstraction is reached that is precise enough for a definite outcome. Abstraction refinement-based model checking is fully automatable and it is considered as one of the most promising approaches to the state explosion problem in verification. However, it is still faced with a number of challenges. There exist several types of abstraction techniques and not every type is equally well-suited for all kinds of systems and verification tasks. Moreover, the selection of adequate refinement steps is nontrivial and typically the most crucial part of the overall approach: Unfavourable refinement decisions can compromise the state space-reducing effect of abstraction, and as a consequence, can easily lead to the failure of verification. It is, however, hard to predict which refinement steps will eventually be expedient for verification – and which not."}],"type":"dissertation","year":"2013","citation":{"ama":"Timm N. Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn; 2013.","apa":"Timm, N. (2013). Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn.","chicago":"Timm, Nils. Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn, 2013.","bibtex":"@book{Timm_2013, title={Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems}, publisher={Universität Paderborn}, author={Timm, Nils}, year={2013} }","mla":"Timm, Nils. Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn, 2013.","short":"N. Timm, Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems, Universität Paderborn, 2013.","ieee":"N. Timm, Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn, 2013."},"supervisor":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"date_updated":"2022-01-06T07:01:22Z","_id":"478"},{"_id":"498","page":"912-927","year":"2013","type":"conference","citation":{"ama":"Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs – A PCC Alternative. In: Proceedings of the 25th International Conference on Computer Aided Verification (CAV). LNCS. ; 2013:912-927. doi:10.1007/978-3-642-39799-8_65","apa":"Wonisch, D., Schremmer, A., & Wehrheim, H. (2013). Programs from Proofs – A PCC Alternative. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV) (pp. 912–927). https://doi.org/10.1007/978-3-642-39799-8_65","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from Proofs – A PCC Alternative.” In Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 912–27. LNCS, 2013. https://doi.org/10.1007/978-3-642-39799-8_65.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2013, series={LNCS}, title={Programs from Proofs – A PCC Alternative}, DOI={10.1007/978-3-642-39799-8_65}, booktitle={Proceedings of the 25th International Conference on Computer Aided Verification (CAV)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2013}, pages={912–927}, collection={LNCS} }","mla":"Wonisch, Daniel, et al. “Programs from Proofs – A PCC Alternative.” Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–27, doi:10.1007/978-3-642-39799-8_65.","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–927.","ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs – A PCC Alternative,” in Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–927."},"user_id":"477","ddc":["040"],"abstract":[{"lang":"eng","text":"Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space."}],"date_created":"2017-10-17T12:42:29Z","status":"public","has_accepted_license":"1","file":[{"creator":"florida","file_id":"1313","file_size":487617,"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-15T13:42:30Z","date_created":"2018-03-15T13:42:30Z","file_name":"498-WonischSchremmerWehrheim2013.pdf","access_level":"closed"}],"file_date_updated":"2018-03-15T13:42:30Z","publication":"Proceedings of the 25th International Conference on Computer Aided Verification (CAV)","author":[{"last_name":"Wonisch","first_name":"Daniel","full_name":"Wonisch, Daniel"},{"first_name":"Alexander","full_name":"Schremmer, Alexander","last_name":"Schremmer"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"doi":"10.1007/978-3-642-39799-8_65","date_updated":"2022-01-06T07:01:32Z","language":[{"iso":"eng"}],"series_title":"LNCS","title":"Programs from Proofs – A PCC Alternative","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}]},{"ddc":["000"],"user_id":"477","abstract":[{"text":"In the Semantic (Web) Services area, services are considered black boxes with a semantic description of their interfaces as to allow for precise service selection and configuration. The semantic description is usually grounded on domain-specific concepts as modeled in ontologies. This accounts for types used in service signatures, but also predicates occurring in preconditions and effects of services. Ontologies, in particular those enhanced with rules, capture the knowledge of domain experts on properties of and relations between domain concepts. In this paper, we present a verification technique for service compositions which makes use of this domain knowledge. We consider a service composition to be an assembly of services of which we just know signatures, preconditions, and effects. We aim at proving that a composition satisfies a (user-defined) requirement, specified in terms of guaranteed preconditions and required postconditions. As an underlying verification engine we use an SMT solver. To take advantage of the domain knowledge (and often, to enable verification at all), the knowledge is fed into the solver in the form of sorts, uninterpreted functions and in particular assertions as to enhance the solver’s reasoning capabilities. Thereby, we allow for deductions within a domain previously unknown to the solver. We exemplify our technique on a case study from the area of water network optimization software.","lang":"eng"}],"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:33Z","author":[{"full_name":"Walther, Sven","first_name":"Sven","last_name":"Walther"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS)","file_date_updated":"2018-11-02T13:26:08Z","file":[{"file_size":217085,"creator":"ups","file_id":"5248","date_updated":"2018-11-02T13:26:08Z","content_type":"application/pdf","relation":"main_file","file_name":"06601801.pdf","date_created":"2018-11-02T13:26:08Z","access_level":"closed"}],"_id":"517","year":"2013","type":"conference","citation":{"bibtex":"@inproceedings{Walther_Wehrheim_2013, title={Knowledge-Based Verification of Service Compositions - An SMT approach}, DOI={10.1109/ICECCS.2013.14}, booktitle={Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS)}, author={Walther, Sven and Wehrheim, Heike}, year={2013}, pages={24–32} }","mla":"Walther, Sven, and Heike Wehrheim. “Knowledge-Based Verification of Service Compositions - An SMT Approach.” Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2013, pp. 24–32, doi:10.1109/ICECCS.2013.14.","apa":"Walther, S., & Wehrheim, H. (2013). Knowledge-Based Verification of Service Compositions - An SMT approach. In Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS) (pp. 24–32). https://doi.org/10.1109/ICECCS.2013.14","ama":"Walther S, Wehrheim H. Knowledge-Based Verification of Service Compositions - An SMT approach. In: Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS). ; 2013:24-32. doi:10.1109/ICECCS.2013.14","chicago":"Walther, Sven, and Heike Wehrheim. “Knowledge-Based Verification of Service Compositions - An SMT Approach.” In Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 24–32, 2013. https://doi.org/10.1109/ICECCS.2013.14.","ieee":"S. Walther and H. Wehrheim, “Knowledge-Based Verification of Service Compositions - An SMT approach,” in Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2013, pp. 24–32.","short":"S. Walther, H. Wehrheim, in: Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2013, pp. 24–32."},"page":"24 - 32 ","title":"Knowledge-Based Verification of Service Compositions - An SMT approach","project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"doi":"10.1109/ICECCS.2013.14","date_updated":"2022-01-06T07:01:41Z","language":[{"iso":"eng"}]},{"title":"Proving Linearizability of Multiset with Local Proof Obligations","user_id":"29719","author":[{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"},{"last_name":"Schellhorn","full_name":"Schellhorn, Gerhard","first_name":"Gerhard"}],"publication":"{ECEASST}","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-13T08:16:49Z","_id":"3180","date_updated":"2022-01-06T06:59:03Z","citation":{"chicago":"Travkin, Oleg, Heike Wehrheim, and Gerhard Schellhorn. “Proving Linearizability of Multiset with Local Proof Obligations.” {ECEASST}, 2012.","apa":"Travkin, O., Wehrheim, H., & Schellhorn, G. (2012). Proving Linearizability of Multiset with Local Proof Obligations. {ECEASST}.","ama":"Travkin O, Wehrheim H, Schellhorn G. Proving Linearizability of Multiset with Local Proof Obligations. {ECEASST}. 2012.","mla":"Travkin, Oleg, et al. “Proving Linearizability of Multiset with Local Proof Obligations.” {ECEASST}, 2012.","bibtex":"@article{Travkin_Wehrheim_Schellhorn_2012, title={Proving Linearizability of Multiset with Local Proof Obligations}, journal={{ECEASST}}, author={Travkin, Oleg and Wehrheim, Heike and Schellhorn, Gerhard}, year={2012} }","short":"O. Travkin, H. Wehrheim, G. Schellhorn, {ECEASST} (2012).","ieee":"O. Travkin, H. Wehrheim, and G. Schellhorn, “Proving Linearizability of Multiset with Local Proof Obligations,” {ECEASST}, 2012."},"year":"2012","type":"journal_article"},{"citation":{"bibtex":"@article{Ruhroth_Wehrheim_2012, title={Model evolution and refinement}, DOI={10.1016/j.scico.2011.04.007}, number={3}, journal={Sci. Comput. Program.}, author={Ruhroth, Thomas and Wehrheim, Heike}, year={2012}, pages={270--289} }","mla":"Ruhroth, Thomas, and Heike Wehrheim. “Model Evolution and Refinement.” Sci. Comput. Program., no. 3, 2012, pp. 270--289, doi:10.1016/j.scico.2011.04.007.","apa":"Ruhroth, T., & Wehrheim, H. (2012). Model evolution and refinement. Sci. Comput. Program., (3), 270--289. https://doi.org/10.1016/j.scico.2011.04.007","ama":"Ruhroth T, Wehrheim H. Model evolution and refinement. Sci Comput Program. 2012;(3):270--289. doi:10.1016/j.scico.2011.04.007","chicago":"Ruhroth, Thomas, and Heike Wehrheim. “Model Evolution and Refinement.” Sci. Comput. Program., no. 3 (2012): 270--289. https://doi.org/10.1016/j.scico.2011.04.007.","ieee":"T. Ruhroth and H. Wehrheim, “Model evolution and refinement,” Sci. Comput. Program., no. 3, pp. 270--289, 2012.","short":"T. Ruhroth, H. Wehrheim, Sci. Comput. Program. (2012) 270--289."},"year":"2012","type":"journal_article","page":"270--289","doi":"10.1016/j.scico.2011.04.007","issue":"3","date_updated":"2022-01-06T06:59:03Z","_id":"3181","status":"public","date_created":"2018-06-13T08:17:58Z","author":[{"first_name":"Thomas","full_name":"Ruhroth, Thomas","last_name":"Ruhroth"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"department":[{"_id":"77"}],"publication":"Sci. Comput. Program.","title":"Model evolution and refinement","user_id":"29719"},{"editor":[{"last_name":"Madhusudan","full_name":"Madhusudan, P.","first_name":"P."},{"last_name":"A. Seshia","full_name":"A. Seshia, Sanjit","first_name":"Sanjit"}],"date_created":"2018-06-13T08:19:33Z","status":"public","department":[{"_id":"77"}],"publication":"Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings","author":[{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"},{"first_name":"John","full_name":"Derrick, John","last_name":"Derrick"}],"title":"How to Prove Algorithms Linearisable","user_id":"29719","page":"243--259","citation":{"ieee":"G. Schellhorn, H. Wehrheim, and J. Derrick, “How to Prove Algorithms Linearisable,” in Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, 2012, pp. 243--259.","short":"G. Schellhorn, H. Wehrheim, J. Derrick, in: P. Madhusudan, S. A. Seshia (Eds.), Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, 2012, pp. 243--259.","bibtex":"@inproceedings{Schellhorn_Wehrheim_Derrick_2012, series={Lecture Notes in Computer Science}, title={How to Prove Algorithms Linearisable}, DOI={10.1007/978-3-642-31424-7_21}, booktitle={Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}, author={Schellhorn, Gerhard and Wehrheim, Heike and Derrick, John}, editor={Madhusudan, P. and A. Seshia, SanjitEditors}, year={2012}, pages={243--259}, collection={Lecture Notes in Computer Science} }","mla":"Schellhorn, Gerhard, et al. “How to Prove Algorithms Linearisable.” Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, edited by P. Madhusudan and Sanjit A. Seshia, 2012, pp. 243--259, doi:10.1007/978-3-642-31424-7_21.","apa":"Schellhorn, G., Wehrheim, H., & Derrick, J. (2012). How to Prove Algorithms Linearisable. In P. Madhusudan & S. A. Seshia (Eds.), Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings (pp. 243--259). https://doi.org/10.1007/978-3-642-31424-7_21","ama":"Schellhorn G, Wehrheim H, Derrick J. How to Prove Algorithms Linearisable. In: Madhusudan P, A. Seshia S, eds. Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings. Lecture Notes in Computer Science. ; 2012:243--259. doi:10.1007/978-3-642-31424-7_21","chicago":"Schellhorn, Gerhard, Heike Wehrheim, and John Derrick. “How to Prove Algorithms Linearisable.” In Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, edited by P. Madhusudan and Sanjit A. Seshia, 243--259. Lecture Notes in Computer Science, 2012. https://doi.org/10.1007/978-3-642-31424-7_21."},"year":"2012","type":"conference","series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-642-31424-7_21","_id":"3182","date_updated":"2022-01-06T06:59:03Z"},{"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-15T08:33:56Z","creator":"florida","file_id":"1258","file_size":320901,"access_level":"closed","file_name":"590-WonischWehrheim2012.pdf","date_created":"2018-03-15T08:33:56Z"}],"publication":"Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)","file_date_updated":"2018-03-15T08:33:56Z","author":[{"first_name":"Daniel","full_name":"Wonisch, Daniel","last_name":"Wonisch"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2017-10-17T12:42:47Z","status":"public","has_accepted_license":"1","abstract":[{"lang":"eng","text":"Predicate abstraction is an established technique for reducing the size of the state space during verification. In this paper, we extend predication abstraction with block-abstraction memoization (BAM), which exploits the fact that blocks are often executed several times in a program. The verification can thus benefit from caching the values of previous block analyses and reusing them upon next entry into a block. In addition to function bodies, BAM also performs well for nested loops. To further increase effectiveness, block memoization has been integrated with lazy abstraction adopting a lazy strategy for cache refinement. Together, this achieves significant performance increases: our tool (an implementation within the configurable program analysis framework CPAchecker) has won the Competition on Software Verification 2012 in the category “Overall”."}],"user_id":"477","ddc":["040"],"page":"332-347","type":"conference","citation":{"bibtex":"@inproceedings{Wonisch_Wehrheim_2012, series={LNCS}, title={Predicate Analysis with Block-Abstraction Memoization}, DOI={10.1007/978-3-642-34281-3_24}, booktitle={Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)}, author={Wonisch, Daniel and Wehrheim, Heike}, year={2012}, pages={332–347}, collection={LNCS} }","mla":"Wonisch, Daniel, and Heike Wehrheim. “Predicate Analysis with Block-Abstraction Memoization.” Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 2012, pp. 332–47, doi:10.1007/978-3-642-34281-3_24.","ama":"Wonisch D, Wehrheim H. Predicate Analysis with Block-Abstraction Memoization. In: Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM). LNCS. ; 2012:332-347. doi:10.1007/978-3-642-34281-3_24","apa":"Wonisch, D., & Wehrheim, H. (2012). Predicate Analysis with Block-Abstraction Memoization. In Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) (pp. 332–347). https://doi.org/10.1007/978-3-642-34281-3_24","chicago":"Wonisch, Daniel, and Heike Wehrheim. “Predicate Analysis with Block-Abstraction Memoization.” In Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 332–47. LNCS, 2012. https://doi.org/10.1007/978-3-642-34281-3_24.","ieee":"D. Wonisch and H. Wehrheim, “Predicate Analysis with Block-Abstraction Memoization,” in Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 2012, pp. 332–347.","short":"D. Wonisch, H. Wehrheim, in: Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 2012, pp. 332–347."},"year":"2012","_id":"590","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"title":"Predicate Analysis with Block-Abstraction Memoization","series_title":"LNCS","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:46Z","doi":"10.1007/978-3-642-34281-3_24"},{"ddc":["040"],"user_id":"477","abstract":[{"text":"Predicate abstraction is an established technique in software verification. It inherently includes an abstraction refinement loop successively adding predicates until the right level of abstraction is found. For concurrent systems, predicate abstraction can be combined with spotlight abstraction, further reducing the state space by abstracting away certain processes. Refinement then has to decide whether to add a new predicate or a new process. Selecting the right predicates and processes is a crucial task: The positive effect of abstraction may be compromised by unfavourable refinement decisions. Here we present a heuristic approach to abstraction refinement. The basis for a decision is a set of refinement candidates, derived by multiple counterexample-generation. Candidates are evaluated with respect to their influence on other components in the system. Experimental results show that our technique can significantly speed up verification as compared to a naive abstraction refinement.","lang":"eng"}],"date_created":"2017-10-17T12:42:50Z","has_accepted_license":"1","status":"public","publication":"Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)","file_date_updated":"2018-03-15T08:15:33Z","author":[{"full_name":"Timm, Nils","first_name":"Nils","last_name":"Timm"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"},{"full_name":"Czech, Mike","first_name":"Mike","last_name":"Czech"}],"file":[{"creator":"florida","file_id":"1250","file_size":396337,"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-15T08:15:33Z","date_created":"2018-03-15T08:15:33Z","file_name":"608-Timm2013-0main.pdf","access_level":"closed"}],"_id":"608","page":"348-363","year":"2012","citation":{"chicago":"Timm, Nils, Heike Wehrheim, and Mike Czech. “Heuristic-Guided Abstraction Refinement for Concurrent Systems.” In Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 348–63. LNCS, 2012. https://doi.org/10.1007/978-3-642-34281-3_25.","apa":"Timm, N., Wehrheim, H., & Czech, M. (2012). Heuristic-Guided Abstraction Refinement for Concurrent Systems. In Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) (pp. 348–363). https://doi.org/10.1007/978-3-642-34281-3_25","ama":"Timm N, Wehrheim H, Czech M. Heuristic-Guided Abstraction Refinement for Concurrent Systems. In: Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM). LNCS. ; 2012:348-363. doi:10.1007/978-3-642-34281-3_25","mla":"Timm, Nils, et al. “Heuristic-Guided Abstraction Refinement for Concurrent Systems.” Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 2012, pp. 348–63, doi:10.1007/978-3-642-34281-3_25.","bibtex":"@inproceedings{Timm_Wehrheim_Czech_2012, series={LNCS}, title={Heuristic-Guided Abstraction Refinement for Concurrent Systems}, DOI={10.1007/978-3-642-34281-3_25}, booktitle={Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)}, author={Timm, Nils and Wehrheim, Heike and Czech, Mike}, year={2012}, pages={348–363}, collection={LNCS} }","short":"N. Timm, H. Wehrheim, M. Czech, in: Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 2012, pp. 348–363.","ieee":"N. Timm, H. Wehrheim, and M. Czech, “Heuristic-Guided Abstraction Refinement for Concurrent Systems,” in Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 2012, pp. 348–363."},"type":"conference","title":"Heuristic-Guided Abstraction Refinement for Concurrent Systems","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"doi":"10.1007/978-3-642-34281-3_25","date_updated":"2022-01-06T07:02:52Z","language":[{"iso":"eng"}],"series_title":"LNCS"},{"page":"531-533","year":"2012","citation":{"ama":"Wonisch D. Block Abstraction Memoization for CPAchecker. In: Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS). LNCS. ; 2012:531-533. doi:10.1007/978-3-642-28756-5_41","apa":"Wonisch, D. (2012). Block Abstraction Memoization for CPAchecker. In Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) (pp. 531–533). https://doi.org/10.1007/978-3-642-28756-5_41","chicago":"Wonisch, Daniel. “Block Abstraction Memoization for CPAchecker.” In Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 531–33. LNCS, 2012. https://doi.org/10.1007/978-3-642-28756-5_41.","bibtex":"@inproceedings{Wonisch_2012, series={LNCS}, title={Block Abstraction Memoization for CPAchecker}, DOI={10.1007/978-3-642-28756-5_41}, booktitle={Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)}, author={Wonisch, Daniel}, year={2012}, pages={531–533}, collection={LNCS} }","mla":"Wonisch, Daniel. “Block Abstraction Memoization for CPAchecker.” Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2012, pp. 531–33, doi:10.1007/978-3-642-28756-5_41.","short":"D. Wonisch, in: Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2012, pp. 531–533.","ieee":"D. Wonisch, “Block Abstraction Memoization for CPAchecker,” in Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2012, pp. 531–533."},"type":"conference","_id":"627","date_created":"2017-10-17T12:42:54Z","has_accepted_license":"1","status":"public","publication":"Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)","file_date_updated":"2018-03-15T06:46:05Z","author":[{"last_name":"Wonisch","full_name":"Wonisch, Daniel","first_name":"Daniel"}],"file":[{"creator":"florida","file_id":"1242","file_size":184000,"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-15T06:46:05Z","file_name":"627-WonischSV-Comp2012_01.pdf","date_created":"2018-03-15T06:46:05Z","access_level":"closed"}],"ddc":["040"],"user_id":"477","abstract":[{"lang":"eng","text":"Block Abstraction Memoization (ABM) is a technique in software model checking that exploits the modularity of programs during verification by caching. To this end, ABM records the results of block analyses and reuses them if possible when revisiting the same block again. In this paper we present an implementation of ABM into the predicate-analysis component of the software-verification framework CPAchecker. With our participation at the Competition on Software Verification we aim at providing evidence that ABM can not only substantially increase the efficiency of predicate analysis but also enables verification of a wider range of programs."}],"language":[{"iso":"eng"}],"series_title":"LNCS","doi":"10.1007/978-3-642-28756-5_41","date_updated":"2022-01-06T07:02:59Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"title":"Block Abstraction Memoization for CPAchecker"},{"_id":"565","year":"2012","citation":{"short":"G. Besova, S. Walther, H. Wehrheim, S. Becker, in: Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS), 2012, pp. 776–792.","ieee":"G. Besova, S. Walther, H. Wehrheim, and S. Becker, “Weaving-based configuration and modular transformation of multi-layer systems,” in Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS), 2012, pp. 776–792.","chicago":"Besova, Galina, Sven Walther, Heike Wehrheim, and Steffen Becker. “Weaving-Based Configuration and Modular Transformation of Multi-Layer Systems.” In Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS), 776–92. LNCS, 2012. https://doi.org/10.1007/978-3-642-33666-9_49.","apa":"Besova, G., Walther, S., Wehrheim, H., & Becker, S. (2012). Weaving-based configuration and modular transformation of multi-layer systems. In Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS) (pp. 776–792). https://doi.org/10.1007/978-3-642-33666-9_49","ama":"Besova G, Walther S, Wehrheim H, Becker S. Weaving-based configuration and modular transformation of multi-layer systems. In: Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS). LNCS. ; 2012:776-792. doi:10.1007/978-3-642-33666-9_49","mla":"Besova, Galina, et al. “Weaving-Based Configuration and Modular Transformation of Multi-Layer Systems.” Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS), 2012, pp. 776–92, doi:10.1007/978-3-642-33666-9_49.","bibtex":"@inproceedings{Besova_Walther_Wehrheim_Becker_2012, series={LNCS}, title={Weaving-based configuration and modular transformation of multi-layer systems}, DOI={10.1007/978-3-642-33666-9_49}, booktitle={Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS)}, author={Besova, Galina and Walther, Sven and Wehrheim, Heike and Becker, Steffen}, year={2012}, pages={776–792}, collection={LNCS} }"},"type":"conference","page":"776-792","ddc":["040"],"user_id":"477","abstract":[{"text":"In model-driven development of multi-layer systems (e.g. application, platform and infrastructure), each layer is usually described by separate models. When generating analysis models or code, these separate models rst of all need to be linked. Hence, existing model transformations for single layers cannot be simply re-used. In this paper, we present a modular approach to the transformation of multi-layer systems. It employs model weaving to dene the interconnections between models of dierent layers. The weaving models themselves are subject to model transformations: The result of transforming a weaving model constitutes a conguration for the models obtained by transforming single layers, thereby allowing for a re-use of existing model transformations. We exemplify our approach by the generation of analysis models for component-based software.","lang":"eng"}],"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:42Z","author":[{"last_name":"Besova","full_name":"Besova, Galina","first_name":"Galina"},{"last_name":"Walther","first_name":"Sven","full_name":"Walther, Sven"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"},{"first_name":"Steffen","full_name":"Becker, Steffen","last_name":"Becker"}],"file_date_updated":"2018-03-15T10:24:06Z","publication":"Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS)","file":[{"access_level":"closed","file_name":"565-Besova_et_al._-_2012_-_Weaving-Based_Configuration_and_Modular_Transformation_of_Multi-layer_Systems_01.pdf","date_created":"2018-03-15T10:24:06Z","relation":"main_file","success":1,"date_updated":"2018-03-15T10:24:06Z","content_type":"application/pdf","file_id":"1276","creator":"florida","file_size":589972}],"doi":"10.1007/978-3-642-33666-9_49","date_updated":"2022-01-06T07:02:20Z","language":[{"iso":"eng"}],"series_title":"LNCS","title":"Weaving-based configuration and modular transformation of multi-layer systems","project":[{"_id":"1","name":"SFB 901"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}]},{"user_id":"29719","title":"Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study","author":[{"last_name":"Schneider","first_name":"Steve","full_name":"Schneider, Steve"},{"last_name":"Treharne","first_name":"Helen","full_name":"Treharne, Helen"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"publication":"Electr. Notes Theor. Comput. Sci.","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-13T08:20:47Z","date_updated":"2022-01-06T06:59:03Z","_id":"3183","doi":"10.1016/j.entcs.2011.11.019","type":"journal_article","citation":{"short":"S. Schneider, H. Treharne, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2011) 69--80.","ieee":"S. Schneider, H. Treharne, and H. Wehrheim, “Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study,” Electr. Notes Theor. Comput. Sci., pp. 69--80, 2011.","apa":"Schneider, S., Treharne, H., & Wehrheim, H. (2011). Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study. Electr. Notes Theor. Comput. Sci., 69--80. https://doi.org/10.1016/j.entcs.2011.11.019","ama":"Schneider S, Treharne H, Wehrheim H. Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study. Electr Notes Theor Comput Sci. 2011:69--80. doi:10.1016/j.entcs.2011.11.019","chicago":"Schneider, Steve, Helen Treharne, and Heike Wehrheim. “Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: A Case Study.” Electr. Notes Theor. Comput. Sci., 2011, 69--80. https://doi.org/10.1016/j.entcs.2011.11.019.","mla":"Schneider, Steve, et al. “Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: A Case Study.” Electr. Notes Theor. Comput. Sci., 2011, pp. 69--80, doi:10.1016/j.entcs.2011.11.019.","bibtex":"@article{Schneider_Treharne_Wehrheim_2011, title={Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study}, DOI={10.1016/j.entcs.2011.11.019}, journal={Electr. Notes Theor. Comput. Sci.}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike}, year={2011}, pages={69--80} }"},"year":"2011","page":"69--80"},{"citation":{"mla":"Derrick, John, et al. “Mechanically Verified Proof Obligations for Linearizability.” {ACM} Trans. Program. Lang. Syst., no. 1, 2011, pp. 4:1--4:43, doi:10.1145/1889997.1890001.","bibtex":"@article{Derrick_Schellhorn_Wehrheim_2011, title={Mechanically verified proof obligations for linearizability}, DOI={10.1145/1889997.1890001}, number={1}, journal={{ACM} Trans. Program. Lang. Syst.}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, year={2011}, pages={4:1--4:43} }","ama":"Derrick J, Schellhorn G, Wehrheim H. Mechanically verified proof obligations for linearizability. {ACM} Trans Program Lang Syst. 2011;(1):4:1--4:43. doi:10.1145/1889997.1890001","apa":"Derrick, J., Schellhorn, G., & Wehrheim, H. (2011). Mechanically verified proof obligations for linearizability. {ACM} Trans. Program. Lang. Syst., (1), 4:1--4:43. https://doi.org/10.1145/1889997.1890001","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Mechanically Verified Proof Obligations for Linearizability.” {ACM} Trans. Program. Lang. Syst., no. 1 (2011): 4:1--4:43. https://doi.org/10.1145/1889997.1890001.","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Mechanically verified proof obligations for linearizability,” {ACM} Trans. Program. Lang. Syst., no. 1, pp. 4:1--4:43, 2011.","short":"J. Derrick, G. Schellhorn, H. Wehrheim, {ACM} Trans. Program. Lang. Syst. (2011) 4:1--4:43."},"type":"journal_article","year":"2011","page":"4:1--4:43","doi":"10.1145/1889997.1890001","issue":"1","_id":"3184","date_updated":"2022-01-06T06:59:03Z","status":"public","date_created":"2018-06-13T08:22:02Z","author":[{"last_name":"Derrick","first_name":"John","full_name":"Derrick, John"},{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"{ACM} Trans. Program. Lang. Syst.","department":[{"_id":"77"}],"title":"Mechanically verified proof obligations for linearizability","user_id":"29719"},{"author":[{"first_name":"Thomas","full_name":"Ruhroth, Thomas","last_name":"Ruhroth"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"},{"last_name":"Ziegert","first_name":"Steffen","full_name":"Ziegert, Steffen"}],"department":[{"_id":"77"}],"publication":"37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011","status":"public","date_created":"2018-06-13T08:23:28Z","title":"ReL: {A} Generic Refactoring Language for Specification and Execution","user_id":"29719","year":"2011","citation":{"short":"T. Ruhroth, H. Wehrheim, S. Ziegert, in: 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011, 2011, pp. 83--90.","ieee":"T. Ruhroth, H. Wehrheim, and S. Ziegert, “ReL: {A} Generic Refactoring Language for Specification and Execution,” in 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011, 2011, pp. 83--90.","ama":"Ruhroth T, Wehrheim H, Ziegert S. ReL: {A} Generic Refactoring Language for Specification and Execution. In: 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011. ; 2011:83--90. doi:10.1109/SEAA.2011.22","apa":"Ruhroth, T., Wehrheim, H., & Ziegert, S. (2011). ReL: {A} Generic Refactoring Language for Specification and Execution. In 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011 (pp. 83--90). https://doi.org/10.1109/SEAA.2011.22","chicago":"Ruhroth, Thomas, Heike Wehrheim, and Steffen Ziegert. “ReL: {A} Generic Refactoring Language for Specification and Execution.” In 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011, 83--90, 2011. https://doi.org/10.1109/SEAA.2011.22.","mla":"Ruhroth, Thomas, et al. “ReL: {A} Generic Refactoring Language for Specification and Execution.” 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011, 2011, pp. 83--90, doi:10.1109/SEAA.2011.22.","bibtex":"@inproceedings{Ruhroth_Wehrheim_Ziegert_2011, title={ReL: {A} Generic Refactoring Language for Specification and Execution}, DOI={10.1109/SEAA.2011.22}, booktitle={37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011}, author={Ruhroth, Thomas and Wehrheim, Heike and Ziegert, Steffen}, year={2011}, pages={83--90} }"},"type":"conference","page":"83--90","_id":"3185","date_updated":"2022-01-06T06:59:03Z","doi":"10.1109/SEAA.2011.22"},{"user_id":"29719","title":"Verifying Linearisability with Potential Linearisation Points","status":"public","date_created":"2018-06-13T08:25:07Z","editor":[{"full_name":"J. Butler, Michael","first_name":"Michael","last_name":"J. Butler"},{"last_name":"Schulte","first_name":"Wolfram","full_name":"Schulte, Wolfram"}],"author":[{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"last_name":"Schellhorn","first_name":"Gerhard","full_name":"Schellhorn, Gerhard"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"publication":"{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings","department":[{"_id":"77"}],"doi":"10.1007/978-3-642-21437-0_25","_id":"3186","date_updated":"2022-01-06T06:59:03Z","citation":{"mla":"Derrick, John, et al. “Verifying Linearisability with Potential Linearisation Points.” {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings, edited by Michael J. Butler and Wolfram Schulte, 2011, pp. 323--337, doi:10.1007/978-3-642-21437-0_25.","bibtex":"@inproceedings{Derrick_Schellhorn_Wehrheim_2011, series={Lecture Notes in Computer Science}, title={Verifying Linearisability with Potential Linearisation Points}, DOI={10.1007/978-3-642-21437-0_25}, booktitle={{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, editor={J. Butler, Michael and Schulte, WolframEditors}, year={2011}, pages={323--337}, collection={Lecture Notes in Computer Science} }","apa":"Derrick, J., Schellhorn, G., & Wehrheim, H. (2011). Verifying Linearisability with Potential Linearisation Points. In M. J. Butler & W. Schulte (Eds.), {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings (pp. 323--337). https://doi.org/10.1007/978-3-642-21437-0_25","ama":"Derrick J, Schellhorn G, Wehrheim H. Verifying Linearisability with Potential Linearisation Points. In: J. Butler M, Schulte W, eds. {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings. Lecture Notes in Computer Science. ; 2011:323--337. doi:10.1007/978-3-642-21437-0_25","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Verifying Linearisability with Potential Linearisation Points.” In {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings, edited by Michael J. Butler and Wolfram Schulte, 323--337. Lecture Notes in Computer Science, 2011. https://doi.org/10.1007/978-3-642-21437-0_25.","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Verifying Linearisability with Potential Linearisation Points,” in {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings, 2011, pp. 323--337.","short":"J. Derrick, G. Schellhorn, H. Wehrheim, in: M. J. Butler, W. Schulte (Eds.), {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings, 2011, pp. 323--337."},"type":"conference","year":"2011","page":"323--337","series_title":"Lecture Notes in Computer Science"},{"_id":"3187","date_updated":"2022-01-06T06:59:03Z","doi":"10.1007/978-3-642-25032-3_7","series_title":"Lecture Notes in Computer Science","page":"92--107","citation":{"short":"D. Steenken, H. Wehrheim, D. Wonisch, in: A. da Silva Sim{\\~{a}}o, C. Morgan (Eds.), Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers, 2011, pp. 92--107.","ieee":"D. Steenken, H. Wehrheim, and D. Wonisch, “Sound and Complete Abstract Graph Transformation,” in Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers, 2011, pp. 92--107.","chicago":"Steenken, Dominik, Heike Wehrheim, and Daniel Wonisch. “Sound and Complete Abstract Graph Transformation.” In Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers, edited by Adenilso da Silva Sim{\\~{a}}o and Carroll Morgan, 92--107. Lecture Notes in Computer Science, 2011. https://doi.org/10.1007/978-3-642-25032-3_7.","ama":"Steenken D, Wehrheim H, Wonisch D. Sound and Complete Abstract Graph Transformation. In: da Silva Sim{\\~{a}}o A, Morgan C, eds. Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science. ; 2011:92--107. doi:10.1007/978-3-642-25032-3_7","apa":"Steenken, D., Wehrheim, H., & Wonisch, D. (2011). Sound and Complete Abstract Graph Transformation. In A. da Silva Sim{\\~{a}}o & C. Morgan (Eds.), Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers (pp. 92--107). https://doi.org/10.1007/978-3-642-25032-3_7","mla":"Steenken, Dominik, et al. “Sound and Complete Abstract Graph Transformation.” Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers, edited by Adenilso da Silva Sim{\\~{a}}o and Carroll Morgan, 2011, pp. 92--107, doi:10.1007/978-3-642-25032-3_7.","bibtex":"@inproceedings{Steenken_Wehrheim_Wonisch_2011, series={Lecture Notes in Computer Science}, title={Sound and Complete Abstract Graph Transformation}, DOI={10.1007/978-3-642-25032-3_7}, booktitle={Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers}, author={Steenken, Dominik and Wehrheim, Heike and Wonisch, Daniel}, editor={da Silva Sim{\\~{a}}o, Adenilso and Morgan, CarrollEditors}, year={2011}, pages={92--107}, collection={Lecture Notes in Computer Science} }"},"type":"conference","year":"2011","title":"Sound and Complete Abstract Graph Transformation","user_id":"29719","publication":"Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers","department":[{"_id":"77"}],"author":[{"last_name":"Steenken","full_name":"Steenken, Dominik","first_name":"Dominik"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"},{"first_name":"Daniel","full_name":"Wonisch, Daniel","last_name":"Wonisch"}],"editor":[{"first_name":"Adenilso","full_name":"da Silva Sim{\\~{a}}o, Adenilso","last_name":"da Silva Sim{\\~{a}}o"},{"last_name":"Morgan","full_name":"Morgan, Carroll","first_name":"Carroll"}],"date_created":"2018-06-13T08:32:12Z","status":"public"},{"date_updated":"2022-01-06T06:59:03Z","_id":"3188","doi":"10.4204/EPTCS.55.9","series_title":"{EPTCS}","citation":{"chicago":"Schneider, Steve, Helen Treharne, and Heike Wehrheim. “A {CSP} Account of Event-B Refinement.” In Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011., edited by John Derrick, Eerke A. Boiten, and Steve Reeves, 139--154. {EPTCS}, 2011. https://doi.org/10.4204/EPTCS.55.9.","ama":"Schneider S, Treharne H, Wehrheim H. A {CSP} Account of Event-B Refinement. In: Derrick J, A. Boiten E, Reeves S, eds. Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011. {EPTCS}. ; 2011:139--154. doi:10.4204/EPTCS.55.9","apa":"Schneider, S., Treharne, H., & Wehrheim, H. (2011). A {CSP} Account of Event-B Refinement. In J. Derrick, E. A. Boiten, & S. Reeves (Eds.), Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011. (pp. 139--154). https://doi.org/10.4204/EPTCS.55.9","mla":"Schneider, Steve, et al. “A {CSP} Account of Event-B Refinement.” Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011., edited by John Derrick et al., 2011, pp. 139--154, doi:10.4204/EPTCS.55.9.","bibtex":"@inproceedings{Schneider_Treharne_Wehrheim_2011, series={{EPTCS}}, title={A {CSP} Account of Event-B Refinement}, DOI={10.4204/EPTCS.55.9}, booktitle={Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike}, editor={Derrick, John and A. Boiten, Eerke and Reeves, SteveEditors}, year={2011}, pages={139--154}, collection={{EPTCS}} }","short":"S. Schneider, H. Treharne, H. Wehrheim, in: J. Derrick, E. A. Boiten, S. Reeves (Eds.), Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011., 2011, pp. 139--154.","ieee":"S. Schneider, H. Treharne, and H. Wehrheim, “A {CSP} Account of Event-B Refinement,” in Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011., 2011, pp. 139--154."},"year":"2011","type":"conference","page":"139--154","title":"A {CSP} Account of Event-B Refinement","user_id":"29719","author":[{"full_name":"Schneider, Steve","first_name":"Steve","last_name":"Schneider"},{"full_name":"Treharne, Helen","first_name":"Helen","last_name":"Treharne"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"publication":"Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.","department":[{"_id":"77"}],"editor":[{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"first_name":"Eerke","full_name":"A. Boiten, Eerke","last_name":"A. Boiten"},{"first_name":"Steve","full_name":"Reeves, Steve","last_name":"Reeves"}],"status":"public","date_created":"2018-06-13T08:43:19Z"},{"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Subproject B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"title":"Selected papers on Integrated Formal Methods (iFM09)","language":[{"iso":"eng"}],"doi":"10.1016/j.scico.2011.01.009","date_updated":"2022-01-06T07:03:06Z","has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:42:58Z","publisher":"Elsevier","author":[{"last_name":"Leuschel","first_name":"Michael","full_name":"Leuschel, Michael"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Science of Computer Programming","file_date_updated":"2018-03-14T13:56:48Z","file":[{"access_level":"closed","file_name":"647-LeuschelWehrheim.pdf","date_created":"2018-03-14T13:56:48Z","relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-14T13:56:48Z","file_id":"1226","creator":"florida","file_size":139105}],"ddc":["040"],"user_id":"477","citation":{"apa":"Leuschel, M., & Wehrheim, H. (2011). Selected papers on Integrated Formal Methods (iFM09). Science of Computer Programming, (10), 835--836. https://doi.org/10.1016/j.scico.2011.01.009","ama":"Leuschel M, Wehrheim H. Selected papers on Integrated Formal Methods (iFM09). Science of Computer Programming. 2011;(10):835--836. doi:10.1016/j.scico.2011.01.009","chicago":"Leuschel, Michael, and Heike Wehrheim. “Selected Papers on Integrated Formal Methods (IFM09).” Science of Computer Programming, no. 10 (2011): 835--836. https://doi.org/10.1016/j.scico.2011.01.009.","bibtex":"@article{Leuschel_Wehrheim_2011, title={Selected papers on Integrated Formal Methods (iFM09)}, DOI={10.1016/j.scico.2011.01.009}, number={10}, journal={Science of Computer Programming}, publisher={Elsevier}, author={Leuschel, Michael and Wehrheim, Heike}, year={2011}, pages={835--836} }","mla":"Leuschel, Michael, and Heike Wehrheim. “Selected Papers on Integrated Formal Methods (IFM09).” Science of Computer Programming, no. 10, Elsevier, 2011, pp. 835--836, doi:10.1016/j.scico.2011.01.009.","short":"M. Leuschel, H. Wehrheim, Science of Computer Programming (2011) 835--836.","ieee":"M. Leuschel and H. Wehrheim, “Selected papers on Integrated Formal Methods (iFM09),” Science of Computer Programming, no. 10, pp. 835--836, 2011."},"type":"journal_article","year":"2011","page":"835--836","issue":"10","_id":"647"},{"doi":"10.1016/j.entcs.2011.11.008","date_updated":"2022-01-06T07:03:07Z","language":[{"iso":"eng"}],"title":"Reputation-based Reliability Prediction of Service Compositions","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"issue":"2","_id":"649","type":"journal_article","citation":{"ieee":"G. Besova, H. Wehrheim, and A. Wagner, “Reputation-based Reliability Prediction of Service Compositions,” Electronic Notes in Theoretical Computer Science, no. 2, pp. 3–16, 2011.","short":"G. Besova, H. Wehrheim, A. Wagner, Electronic Notes in Theoretical Computer Science (2011) 3–16.","mla":"Besova, Galina, et al. “Reputation-Based Reliability Prediction of Service Compositions.” Electronic Notes in Theoretical Computer Science, no. 2, Elsevier, 2011, pp. 3–16, doi:10.1016/j.entcs.2011.11.008.","bibtex":"@article{Besova_Wehrheim_Wagner_2011, title={Reputation-based Reliability Prediction of Service Compositions}, DOI={10.1016/j.entcs.2011.11.008}, number={2}, journal={Electronic Notes in Theoretical Computer Science}, publisher={Elsevier}, author={Besova, Galina and Wehrheim, Heike and Wagner, Annika}, year={2011}, pages={3–16} }","chicago":"Besova, Galina, Heike Wehrheim, and Annika Wagner. “Reputation-Based Reliability Prediction of Service Compositions.” Electronic Notes in Theoretical Computer Science, no. 2 (2011): 3–16. https://doi.org/10.1016/j.entcs.2011.11.008.","apa":"Besova, G., Wehrheim, H., & Wagner, A. (2011). Reputation-based Reliability Prediction of Service Compositions. Electronic Notes in Theoretical Computer Science, (2), 3–16. https://doi.org/10.1016/j.entcs.2011.11.008","ama":"Besova G, Wehrheim H, Wagner A. Reputation-based Reliability Prediction of Service Compositions. Electronic Notes in Theoretical Computer Science. 2011;(2):3-16. doi:10.1016/j.entcs.2011.11.008"},"year":"2011","page":"3-16","user_id":"477","ddc":["040"],"abstract":[{"text":"Today, the concept of service oriented architectures provides a way of building integrated solutions out of existing services. To this end, services from different providers are composed using advanced orchestration and choreography techniques. However, while this principle allows for greater flexibility at a smaller cost, the use of third party services also includes a risk: Deployed services might not work as claimed by their providers. In this paper, we propose a technique for analyzing the expected reliability of service compositions based on ratings given by (previous) service users. Every service thereby comes with a reputation, and the analysis computes an overall reliability of a service composition from the reputations of its constituent services. The proposed model-driven approach proceeds by translating statechart models of service compositions into input for a probabilistic model checker (PRISM) using state-of-the-art model transformations techniques. The approach has been implemented as an Eclipse plug-in and is fully compliant with UML.","lang":"eng"}],"has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:42:58Z","file":[{"access_level":"closed","file_name":"649-ETAPS2011-Besova-Wehrheim-Wagner_01.pdf","date_created":"2018-03-14T13:55:38Z","relation":"main_file","success":1,"date_updated":"2018-03-14T13:55:38Z","content_type":"application/pdf","creator":"florida","file_id":"1225","file_size":534727}],"author":[{"last_name":"Besova","full_name":"Besova, Galina","first_name":"Galina"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"},{"last_name":"Wagner","first_name":"Annika","full_name":"Wagner, Annika"}],"publisher":"Elsevier","file_date_updated":"2018-03-14T13:55:38Z","publication":"Electronic Notes in Theoretical Computer Science"},{"supervisor":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"language":[{"iso":"eng"}],"citation":{"ieee":"A. Schremmer, Function Specification Inference Using Craig Interpolation. Universität Paderborn, 2011.","short":"A. Schremmer, Function Specification Inference Using Craig Interpolation, Universität Paderborn, 2011.","mla":"Schremmer, Alexander. Function Specification Inference Using Craig Interpolation. Universität Paderborn, 2011.","bibtex":"@book{Schremmer_2011, title={Function Specification Inference Using Craig Interpolation}, publisher={Universität Paderborn}, author={Schremmer, Alexander}, year={2011} }","chicago":"Schremmer, Alexander. Function Specification Inference Using Craig Interpolation. Universität Paderborn, 2011.","ama":"Schremmer A. Function Specification Inference Using Craig Interpolation. Universität Paderborn; 2011.","apa":"Schremmer, A. (2011). Function Specification Inference Using Craig Interpolation. Universität Paderborn."},"year":"2011","type":"mastersthesis","_id":"658","date_updated":"2022-01-06T07:03:12Z","status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_created":"2017-10-17T12:43:00Z","publisher":"Universität Paderborn","author":[{"first_name":"Alexander","full_name":"Schremmer, Alexander","last_name":"Schremmer"}],"department":[{"_id":"77"}],"user_id":"477","title":"Function Specification Inference Using Craig Interpolation"},{"date_created":"2018-06-13T09:20:53Z","status":"public","editor":[{"first_name":"Dominique","full_name":"M{\\'{e}}ry, Dominique","last_name":"M{\\'{e}}ry"},{"full_name":"Merz, Stephan","first_name":"Stephan","last_name":"Merz"}],"department":[{"_id":"77"}],"publication":"Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings","author":[{"last_name":"Schneider","full_name":"Schneider, Steve","first_name":"Steve"},{"last_name":"Treharne","first_name":"Helen","full_name":"Treharne, Helen"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"user_id":"29719","title":"A {CSP} Approach to Control in Event-B","page":"260--274","year":"2010","type":"conference","citation":{"apa":"Schneider, S., Treharne, H., & Wehrheim, H. (2010). A {CSP} Approach to Control in Event-B. In D. M{\\’{e}}ry & S. Merz (Eds.), Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings (pp. 260--274). https://doi.org/10.1007/978-3-642-16265-7_19","ama":"Schneider S, Treharne H, Wehrheim H. A {CSP} Approach to Control in Event-B. In: M{\\’{e}}ry D, Merz S, eds. Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings. Lecture Notes in Computer Science. ; 2010:260--274. doi:10.1007/978-3-642-16265-7_19","chicago":"Schneider, Steve, Helen Treharne, and Heike Wehrheim. “A {CSP} Approach to Control in Event-B.” In Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, edited by Dominique M{\\’{e}}ry and Stephan Merz, 260--274. Lecture Notes in Computer Science, 2010. https://doi.org/10.1007/978-3-642-16265-7_19.","bibtex":"@inproceedings{Schneider_Treharne_Wehrheim_2010, series={Lecture Notes in Computer Science}, title={A {CSP} Approach to Control in Event-B}, DOI={10.1007/978-3-642-16265-7_19}, booktitle={Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike}, editor={M{\\’{e}}ry, Dominique and Merz, StephanEditors}, year={2010}, pages={260--274}, collection={Lecture Notes in Computer Science} }","mla":"Schneider, Steve, et al. “A {CSP} Approach to Control in Event-B.” Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, edited by Dominique M{\\’{e}}ry and Stephan Merz, 2010, pp. 260--274, doi:10.1007/978-3-642-16265-7_19.","short":"S. Schneider, H. Treharne, H. Wehrheim, in: D. M{\\’{e}}ry, S. Merz (Eds.), Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, 2010, pp. 260--274.","ieee":"S. Schneider, H. Treharne, and H. Wehrheim, “A {CSP} Approach to Control in Event-B,” in Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, 2010, pp. 260--274."},"series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-642-16265-7_19","_id":"3195","date_updated":"2022-01-06T06:59:04Z"},{"series_title":"Lecture Notes in Computer Science","page":"271--274","year":"2010","citation":{"ieee":"K. Dräger, A. Kupriyanov, B. Finkbeiner, and H. Wehrheim, “{SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems,” in Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings, 2010, pp. 271--274.","short":"K. Dräger, A. Kupriyanov, B. Finkbeiner, H. Wehrheim, in: J. Esparza, R. Majumdar (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings, 2010, pp. 271--274.","mla":"Dräger, Klaus, et al. “{SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems.” Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings, edited by Javier Esparza and Rupak Majumdar, 2010, pp. 271--274, doi:10.1007/978-3-642-12002-2_22.","bibtex":"@inproceedings{Dräger_Kupriyanov_Finkbeiner_Wehrheim_2010, series={Lecture Notes in Computer Science}, title={{SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems}, DOI={10.1007/978-3-642-12002-2_22}, booktitle={Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings}, author={Dräger, Klaus and Kupriyanov, Andrey and Finkbeiner, Bernd and Wehrheim, Heike}, editor={Esparza, Javier and Majumdar, RupakEditors}, year={2010}, pages={271--274}, collection={Lecture Notes in Computer Science} }","ama":"Dräger K, Kupriyanov A, Finkbeiner B, Wehrheim H. {SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems. In: Esparza J, Majumdar R, eds. Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings. Lecture Notes in Computer Science. ; 2010:271--274. doi:10.1007/978-3-642-12002-2_22","apa":"Dräger, K., Kupriyanov, A., Finkbeiner, B., & Wehrheim, H. (2010). {SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems. In J. Esparza & R. Majumdar (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings (pp. 271--274). https://doi.org/10.1007/978-3-642-12002-2_22","chicago":"Dräger, Klaus, Andrey Kupriyanov, Bernd Finkbeiner, and Heike Wehrheim. “{SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems.” In Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings, edited by Javier Esparza and Rupak Majumdar, 271--274. Lecture Notes in Computer Science, 2010. https://doi.org/10.1007/978-3-642-12002-2_22."},"type":"conference","date_updated":"2022-01-06T06:59:04Z","_id":"3196","doi":"10.1007/978-3-642-12002-2_22","department":[{"_id":"77"}],"publication":"Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings","author":[{"last_name":"Dräger","first_name":"Klaus","full_name":"Dräger, Klaus"},{"first_name":"Andrey","full_name":"Kupriyanov, Andrey","last_name":"Kupriyanov"},{"last_name":"Finkbeiner","full_name":"Finkbeiner, Bernd","first_name":"Bernd"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"editor":[{"full_name":"Esparza, Javier","first_name":"Javier","last_name":"Esparza"},{"last_name":"Majumdar","full_name":"Majumdar, Rupak","first_name":"Rupak"}],"date_created":"2018-06-13T09:22:07Z","status":"public","title":"{SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems","user_id":"29719"},{"type":"journal_article","citation":{"apa":"Steenken, D., Wehrheim, H., & Wonisch, D. (2010). Towards {A} Shape Analysis for Graph Transformation Systems. CoRR.","ama":"Steenken D, Wehrheim H, Wonisch D. Towards {A} Shape Analysis for Graph Transformation Systems. CoRR. 2010.","chicago":"Steenken, Dominik, Heike Wehrheim, and Daniel Wonisch. “Towards {A} Shape Analysis for Graph Transformation Systems.” CoRR, 2010.","mla":"Steenken, Dominik, et al. “Towards {A} Shape Analysis for Graph Transformation Systems.” CoRR, 2010.","bibtex":"@article{Steenken_Wehrheim_Wonisch_2010, title={Towards {A} Shape Analysis for Graph Transformation Systems}, journal={CoRR}, author={Steenken, Dominik and Wehrheim, Heike and Wonisch, Daniel}, year={2010} }","short":"D. Steenken, H. Wehrheim, D. Wonisch, CoRR (2010).","ieee":"D. Steenken, H. Wehrheim, and D. Wonisch, “Towards {A} Shape Analysis for Graph Transformation Systems,” CoRR, 2010."},"year":"2010","date_updated":"2022-01-06T06:59:04Z","_id":"3198","status":"public","date_created":"2018-06-13T09:23:16Z","author":[{"last_name":"Steenken","first_name":"Dominik","full_name":"Steenken, Dominik"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"},{"first_name":"Daniel","full_name":"Wonisch, Daniel","last_name":"Wonisch"}],"department":[{"_id":"77"}],"publication":"CoRR","title":"Towards {A} Shape Analysis for Graph Transformation Systems","user_id":"29719"},{"user_id":"29719","title":"Model transformations across views","publication":"Sci. Comput. Program.","department":[{"_id":"77"}],"author":[{"first_name":"John","full_name":"Derrick, John","last_name":"Derrick"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2018-06-13T08:44:32Z","status":"public","date_updated":"2022-01-06T06:59:03Z","_id":"3189","issue":"3","doi":"10.1016/j.scico.2009.11.004","page":"192--210","type":"journal_article","citation":{"ieee":"J. Derrick and H. Wehrheim, “Model transformations across views,” Sci. Comput. Program., no. 3, pp. 192--210, 2010.","short":"J. Derrick, H. Wehrheim, Sci. Comput. Program. (2010) 192--210.","bibtex":"@article{Derrick_Wehrheim_2010, title={Model transformations across views}, DOI={10.1016/j.scico.2009.11.004}, number={3}, journal={Sci. Comput. Program.}, author={Derrick, John and Wehrheim, Heike}, year={2010}, pages={192--210} }","mla":"Derrick, John, and Heike Wehrheim. “Model Transformations across Views.” Sci. Comput. Program., no. 3, 2010, pp. 192--210, doi:10.1016/j.scico.2009.11.004.","ama":"Derrick J, Wehrheim H. Model transformations across views. Sci Comput Program. 2010;(3):192--210. doi:10.1016/j.scico.2009.11.004","apa":"Derrick, J., & Wehrheim, H. (2010). Model transformations across views. Sci. Comput. Program., (3), 192--210. https://doi.org/10.1016/j.scico.2009.11.004","chicago":"Derrick, John, and Heike Wehrheim. “Model Transformations across Views.” Sci. Comput. Program., no. 3 (2010): 192--210. https://doi.org/10.1016/j.scico.2009.11.004."},"year":"2010"},{"publication":"Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday","department":[{"_id":"77"}],"author":[{"last_name":"Schäfer","full_name":"Schäfer, Wilhelm","first_name":"Wilhelm"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"date_created":"2018-06-13T09:10:56Z","status":"public","editor":[{"last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"last_name":"Lewerentz","first_name":"Claus","full_name":"Lewerentz, Claus"},{"first_name":"Wilhelm","full_name":"Sch{\\\"{a}}fer, Wilhelm","last_name":"Sch{\\\"{a}}fer"},{"last_name":"Sch{\\\"{u}}rr","full_name":"Sch{\\\"{u}}rr, Andy","first_name":"Andy"},{"last_name":"Westfechtel","first_name":"Bernhard","full_name":"Westfechtel, Bernhard"}],"user_id":"29719","title":"Model-Driven Development with Mechatronic {UML}","series_title":"Lecture Notes in Computer Science","page":"533--554","citation":{"ieee":"W. Schäfer and H. Wehrheim, “Model-Driven Development with Mechatronic {UML},” in Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday, 2010, pp. 533--554.","short":"W. Schäfer, H. Wehrheim, in: G. Engels, C. Lewerentz, W. Sch{\\\"{a}}fer, A. Sch{\\\"{u}}rr, B. Westfechtel (Eds.), Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of His 65th Birthday, 2010, pp. 533--554.","mla":"Schäfer, Wilhelm, and Heike Wehrheim. “Model-Driven Development with Mechatronic {UML}.” Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of His 65th Birthday, edited by Gregor Engels et al., 2010, pp. 533--554, doi:10.1007/978-3-642-17322-6_23.","bibtex":"@inproceedings{Schäfer_Wehrheim_2010, series={Lecture Notes in Computer Science}, title={Model-Driven Development with Mechatronic {UML}}, DOI={10.1007/978-3-642-17322-6_23}, booktitle={Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday}, author={Schäfer, Wilhelm and Wehrheim, Heike}, editor={Engels, Gregor and Lewerentz, Claus and Sch{\\\"{a}}fer, Wilhelm and Sch{\\\"{u}}rr, Andy and Westfechtel, BernhardEditors}, year={2010}, pages={533--554}, collection={Lecture Notes in Computer Science} }","ama":"Schäfer W, Wehrheim H. Model-Driven Development with Mechatronic {UML}. In: Engels G, Lewerentz C, Sch{\\\"{a}}fer W, Sch{\\\"{u}}rr A, Westfechtel B, eds. Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of His 65th Birthday. Lecture Notes in Computer Science. ; 2010:533--554. doi:10.1007/978-3-642-17322-6_23","apa":"Schäfer, W., & Wehrheim, H. (2010). Model-Driven Development with Mechatronic {UML}. In G. Engels, C. Lewerentz, W. Sch{\\\"{a}}fer, A. Sch{\\\"{u}}rr, & B. Westfechtel (Eds.), Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday (pp. 533--554). https://doi.org/10.1007/978-3-642-17322-6_23","chicago":"Schäfer, Wilhelm, and Heike Wehrheim. “Model-Driven Development with Mechatronic {UML}.” In Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of His 65th Birthday, edited by Gregor Engels, Claus Lewerentz, Wilhelm Sch{\\\"{a}}fer, Andy Sch{\\\"{u}}rr, and Bernhard Westfechtel, 533--554. Lecture Notes in Computer Science, 2010. https://doi.org/10.1007/978-3-642-17322-6_23."},"type":"conference","year":"2010","_id":"3191","date_updated":"2022-01-06T06:59:04Z","doi":"10.1007/978-3-642-17322-6_23"},{"user_id":"29719","title":"On Symmetries and Spotlights - Verifying Parameterised Systems","date_created":"2018-06-13T09:12:28Z","status":"public","editor":[{"last_name":"Song Dong","first_name":"Jin","full_name":"Song Dong, Jin"},{"full_name":"Zhu, Huibiao","first_name":"Huibiao","last_name":"Zhu"}],"publication":"Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings","department":[{"_id":"77"}],"author":[{"last_name":"Timm","full_name":"Timm, Nils","first_name":"Nils"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"doi":"10.1007/978-3-642-16901-4_35","date_updated":"2022-01-06T06:59:04Z","_id":"3193","page":"534--548","type":"conference","year":"2010","citation":{"mla":"Timm, Nils, and Heike Wehrheim. “On Symmetries and Spotlights - Verifying Parameterised Systems.” Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings, edited by Jin Song Dong and Huibiao Zhu, 2010, pp. 534--548, doi:10.1007/978-3-642-16901-4_35.","bibtex":"@inproceedings{Timm_Wehrheim_2010, series={Lecture Notes in Computer Science}, title={On Symmetries and Spotlights - Verifying Parameterised Systems}, DOI={10.1007/978-3-642-16901-4_35}, booktitle={Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings}, author={Timm, Nils and Wehrheim, Heike}, editor={Song Dong, Jin and Zhu, HuibiaoEditors}, year={2010}, pages={534--548}, collection={Lecture Notes in Computer Science} }","chicago":"Timm, Nils, and Heike Wehrheim. “On Symmetries and Spotlights - Verifying Parameterised Systems.” In Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings, edited by Jin Song Dong and Huibiao Zhu, 534--548. Lecture Notes in Computer Science, 2010. https://doi.org/10.1007/978-3-642-16901-4_35.","ama":"Timm N, Wehrheim H. On Symmetries and Spotlights - Verifying Parameterised Systems. In: Song Dong J, Zhu H, eds. Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings. Lecture Notes in Computer Science. ; 2010:534--548. doi:10.1007/978-3-642-16901-4_35","apa":"Timm, N., & Wehrheim, H. (2010). On Symmetries and Spotlights - Verifying Parameterised Systems. In J. Song Dong & H. Zhu (Eds.), Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings (pp. 534--548). https://doi.org/10.1007/978-3-642-16901-4_35","ieee":"N. Timm and H. Wehrheim, “On Symmetries and Spotlights - Verifying Parameterised Systems,” in Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings, 2010, pp. 534--548.","short":"N. Timm, H. Wehrheim, in: J. Song Dong, H. Zhu (Eds.), Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings, 2010, pp. 534--548."},"series_title":"Lecture Notes in Computer Science"},{"language":[{"iso":"eng"}],"citation":{"short":"M. Hülsbusch, B. König, A. Rensink, M. Semenyak, C. Soltenborn, H. Wehrheim, in: D. M{\\’{e}}ry, S. Merz (Eds.), Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, 2010, pp. 183--198.","ieee":"M. Hülsbusch, B. König, A. Rensink, M. Semenyak, C. Soltenborn, and H. Wehrheim, “Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques,” in Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, 2010, pp. 183--198.","apa":"Hülsbusch, M., König, B., Rensink, A., Semenyak, M., Soltenborn, C., & Wehrheim, H. (2010). Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques. In D. M{\\’{e}}ry & S. Merz (Eds.), Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings (pp. 183--198). https://doi.org/10.1007/978-3-642-16265-7_14","ama":"Hülsbusch M, König B, Rensink A, Semenyak M, Soltenborn C, Wehrheim H. Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques. In: M{\\’{e}}ry D, Merz S, eds. Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings. Lecture Notes in Computer Science. ; 2010:183--198. doi:10.1007/978-3-642-16265-7_14","chicago":"Hülsbusch, Mathias, Barbara König, Arend Rensink, Maria Semenyak, Christian Soltenborn, and Heike Wehrheim. “Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques.” In Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, edited by Dominique M{\\’{e}}ry and Stephan Merz, 183--198. Lecture Notes in Computer Science, 2010. https://doi.org/10.1007/978-3-642-16265-7_14.","bibtex":"@inproceedings{Hülsbusch_König_Rensink_Semenyak_Soltenborn_Wehrheim_2010, series={Lecture Notes in Computer Science}, title={Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques}, DOI={10.1007/978-3-642-16265-7_14}, booktitle={Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings}, author={Hülsbusch, Mathias and König, Barbara and Rensink, Arend and Semenyak, Maria and Soltenborn, Christian and Wehrheim, Heike}, editor={M{\\’{e}}ry, Dominique and Merz, StephanEditors}, year={2010}, pages={183--198}, collection={Lecture Notes in Computer Science} }","mla":"Hülsbusch, Mathias, et al. “Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques.” Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings, edited by Dominique M{\\’{e}}ry and Stephan Merz, 2010, pp. 183--198, doi:10.1007/978-3-642-16265-7_14."},"year":"2010","type":"conference","page":"183--198","series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-642-16265-7_14","date_updated":"2022-01-06T06:59:04Z","_id":"3194","status":"public","date_created":"2018-06-13T09:19:33Z","editor":[{"last_name":"M{\\'{e}}ry","first_name":"Dominique","full_name":"M{\\'{e}}ry, Dominique"},{"last_name":"Merz","full_name":"Merz, Stephan","first_name":"Stephan"}],"author":[{"last_name":"Hülsbusch","first_name":"Mathias","full_name":"Hülsbusch, Mathias"},{"full_name":"König, Barbara","first_name":"Barbara","last_name":"König"},{"first_name":"Arend","full_name":"Rensink, Arend","last_name":"Rensink"},{"last_name":"Semenyak","full_name":"Semenyak, Maria","first_name":"Maria"},{"first_name":"Christian","full_name":"Soltenborn, Christian","orcid":"0000-0002-0342-8227","last_name":"Soltenborn","id":"1737"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings","department":[{"_id":"77"}],"user_id":"14955","title":"Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques"},{"citation":{"mla":"Wehrheim, Heike, and Daniel Wonisch. “Compositional {CSP} Traces Refinement Checking.” Electr. Notes Theor. Comput. Sci., no. 2, 2009, pp. 135--151, doi:10.1016/j.entcs.2009.08.022.","bibtex":"@article{Wehrheim_Wonisch_2009, title={Compositional {CSP} Traces Refinement Checking}, DOI={10.1016/j.entcs.2009.08.022}, number={2}, journal={Electr. Notes Theor. Comput. Sci.}, author={Wehrheim, Heike and Wonisch, Daniel}, year={2009}, pages={135--151} }","apa":"Wehrheim, H., & Wonisch, D. (2009). Compositional {CSP} Traces Refinement Checking. Electr. Notes Theor. Comput. Sci., (2), 135--151. https://doi.org/10.1016/j.entcs.2009.08.022","ama":"Wehrheim H, Wonisch D. Compositional {CSP} Traces Refinement Checking. Electr Notes Theor Comput Sci. 2009;(2):135--151. doi:10.1016/j.entcs.2009.08.022","chicago":"Wehrheim, Heike, and Daniel Wonisch. “Compositional {CSP} Traces Refinement Checking.” Electr. Notes Theor. Comput. Sci., no. 2 (2009): 135--151. https://doi.org/10.1016/j.entcs.2009.08.022.","ieee":"H. Wehrheim and D. Wonisch, “Compositional {CSP} Traces Refinement Checking,” Electr. Notes Theor. Comput. Sci., no. 2, pp. 135--151, 2009.","short":"H. Wehrheim, D. Wonisch, Electr. Notes Theor. Comput. Sci. (2009) 135--151."},"type":"journal_article","year":"2009","page":"135--151","_id":"3199","date_updated":"2022-01-06T06:59:04Z","doi":"10.1016/j.entcs.2009.08.022","issue":"2","author":[{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"},{"last_name":"Wonisch","full_name":"Wonisch, Daniel","first_name":"Daniel"}],"publication":"Electr. Notes Theor. Comput. Sci.","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-13T09:24:52Z","title":"Compositional {CSP} Traces Refinement Checking","user_id":"29719"},{"user_id":"29719","title":"Static Class Elements for Object-Z","author":[{"full_name":"Ruhroth, Thomas","first_name":"Thomas","last_name":"Ruhroth"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"publication":"Electr. Notes Theor. Comput. Sci.","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-13T09:26:31Z","date_updated":"2022-01-06T06:59:04Z","_id":"3200","doi":"10.1016/j.entcs.2009.12.025","citation":{"short":"T. Ruhroth, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2009) 193--205.","ieee":"T. Ruhroth and H. Wehrheim, “Static Class Elements for Object-Z,” Electr. Notes Theor. Comput. Sci., pp. 193--205, 2009.","ama":"Ruhroth T, Wehrheim H. Static Class Elements for Object-Z. Electr Notes Theor Comput Sci. 2009:193--205. doi:10.1016/j.entcs.2009.12.025","apa":"Ruhroth, T., & Wehrheim, H. (2009). Static Class Elements for Object-Z. Electr. Notes Theor. Comput. Sci., 193--205. https://doi.org/10.1016/j.entcs.2009.12.025","chicago":"Ruhroth, Thomas, and Heike Wehrheim. “Static Class Elements for Object-Z.” Electr. Notes Theor. Comput. Sci., 2009, 193--205. https://doi.org/10.1016/j.entcs.2009.12.025.","mla":"Ruhroth, Thomas, and Heike Wehrheim. “Static Class Elements for Object-Z.” Electr. Notes Theor. Comput. Sci., 2009, pp. 193--205, doi:10.1016/j.entcs.2009.12.025.","bibtex":"@article{Ruhroth_Wehrheim_2009, title={Static Class Elements for Object-Z}, DOI={10.1016/j.entcs.2009.12.025}, journal={Electr. Notes Theor. Comput. Sci.}, author={Ruhroth, Thomas and Wehrheim, Heike}, year={2009}, pages={193--205} }"},"type":"journal_article","year":"2009","page":"193--205"},{"doi":"10.1109/SEAA.2009.39","date_updated":"2022-01-06T06:59:04Z","_id":"3201","type":"conference","year":"2009","citation":{"ieee":"T. Ruhroth, H. Voigt, and H. Wehrheim, “Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models,” in 35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings, 2009, pp. 360--367.","short":"T. Ruhroth, H. Voigt, H. Wehrheim, in: 35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings, 2009, pp. 360--367.","mla":"Ruhroth, Thomas, et al. “Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models.” 35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings, 2009, pp. 360--367, doi:10.1109/SEAA.2009.39.","bibtex":"@inproceedings{Ruhroth_Voigt_Wehrheim_2009, title={Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models}, DOI={10.1109/SEAA.2009.39}, booktitle={35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings}, author={Ruhroth, Thomas and Voigt, Hendrik and Wehrheim, Heike}, year={2009}, pages={360--367} }","apa":"Ruhroth, T., Voigt, H., & Wehrheim, H. (2009). Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models. In 35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings (pp. 360--367). https://doi.org/10.1109/SEAA.2009.39","ama":"Ruhroth T, Voigt H, Wehrheim H. Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models. In: 35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings. ; 2009:360--367. doi:10.1109/SEAA.2009.39","chicago":"Ruhroth, Thomas, Hendrik Voigt, and Heike Wehrheim. “Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models.” In 35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings, 360--367, 2009. https://doi.org/10.1109/SEAA.2009.39."},"page":"360--367","user_id":"29719","title":"Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models","status":"public","date_created":"2018-06-13T09:30:27Z","author":[{"last_name":"Ruhroth","first_name":"Thomas","full_name":"Ruhroth, Thomas"},{"last_name":"Voigt","full_name":"Voigt, Hendrik","first_name":"Hendrik"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"publication":"35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings"},{"user_id":"29719","title":"Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings","department":[{"_id":"77"}],"date_created":"2018-06-13T09:44:34Z","status":"public","publication_identifier":{"isbn":["978-3-642-00254-0"]},"editor":[{"last_name":"Leuschel","full_name":"Leuschel, Michael","first_name":"Michael"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"_id":"3202","date_updated":"2022-01-06T06:59:04Z","doi":"10.1007/978-3-642-00255-7","series_title":"Lecture Notes in Computer Science","citation":{"chicago":"Leuschel, Michael, and Heike Wehrheim, eds. Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings. Lecture Notes in Computer Science, 2009. https://doi.org/10.1007/978-3-642-00255-7.","ama":"Leuschel M, Wehrheim H, eds. Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings.; 2009. doi:10.1007/978-3-642-00255-7","apa":"Leuschel, M., & Wehrheim, H. (Eds.). (2009). Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings. https://doi.org/10.1007/978-3-642-00255-7","bibtex":"@book{Leuschel_Wehrheim_2009, series={Lecture Notes in Computer Science}, title={Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings}, DOI={10.1007/978-3-642-00255-7}, year={2009}, collection={Lecture Notes in Computer Science} }","mla":"Leuschel, Michael, and Heike Wehrheim, editors. Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings. 2009, doi:10.1007/978-3-642-00255-7.","short":"M. Leuschel, H. Wehrheim, eds., Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings, 2009.","ieee":"M. Leuschel and H. Wehrheim, Eds., Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\\\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings. 2009."},"type":"conference_editor","year":"2009"},{"status":"public","date_created":"2018-06-13T09:45:42Z","author":[{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"department":[{"_id":"77"}],"publication":"Electr. Notes Theor. Comput. Sci.","title":"Refinement in the Presence of Unknowns","user_id":"29719","type":"journal_article","year":"2008","citation":{"bibtex":"@article{Wehrheim_2008, title={Refinement in the Presence of Unknowns}, DOI={10.1016/j.entcs.2008.02.023}, journal={Electr. Notes Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2008}, pages={255--264} }","mla":"Wehrheim, Heike. “Refinement in the Presence of Unknowns.” Electr. Notes Theor. Comput. Sci., 2008, pp. 255--264, doi:10.1016/j.entcs.2008.02.023.","chicago":"Wehrheim, Heike. “Refinement in the Presence of Unknowns.” Electr. Notes Theor. Comput. Sci., 2008, 255--264. https://doi.org/10.1016/j.entcs.2008.02.023.","ama":"Wehrheim H. Refinement in the Presence of Unknowns. Electr Notes Theor Comput Sci. 2008:255--264. doi:10.1016/j.entcs.2008.02.023","apa":"Wehrheim, H. (2008). Refinement in the Presence of Unknowns. Electr. Notes Theor. Comput. Sci., 255--264. https://doi.org/10.1016/j.entcs.2008.02.023","ieee":"H. Wehrheim, “Refinement in the Presence of Unknowns,” Electr. Notes Theor. Comput. Sci., pp. 255--264, 2008.","short":"H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2008) 255--264."},"page":"255--264","doi":"10.1016/j.entcs.2008.02.023","date_updated":"2022-01-06T06:59:04Z","_id":"3203"},{"title":"Alloy as a Refactoring Checker?","user_id":"29719","date_created":"2018-06-13T09:47:06Z","status":"public","department":[{"_id":"77"}],"publication":"Electr. Notes Theor. Comput. Sci.","author":[{"full_name":"Estler, H.{-}Christian","first_name":"H.{-}Christian","last_name":"Estler"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"doi":"10.1016/j.entcs.2008.06.015","_id":"3204","date_updated":"2022-01-06T06:59:04Z","page":"331--357","type":"journal_article","year":"2008","citation":{"chicago":"Estler, H.{-}Christian, and Heike Wehrheim. “Alloy as a Refactoring Checker?” Electr. Notes Theor. Comput. Sci., 2008, 331--357. https://doi.org/10.1016/j.entcs.2008.06.015.","apa":"Estler, H. .-}Christian, & Wehrheim, H. (2008). Alloy as a Refactoring Checker? Electr. Notes Theor. Comput. Sci., 331--357. https://doi.org/10.1016/j.entcs.2008.06.015","ama":"Estler H.-}Christian, Wehrheim H. Alloy as a Refactoring Checker? Electr Notes Theor Comput Sci. 2008:331--357. doi:10.1016/j.entcs.2008.06.015","mla":"Estler, H. .. }Christian, and Heike Wehrheim. “Alloy as a Refactoring Checker?” Electr. Notes Theor. Comput. Sci., 2008, pp. 331--357, doi:10.1016/j.entcs.2008.06.015.","bibtex":"@article{Estler_Wehrheim_2008, title={Alloy as a Refactoring Checker?}, DOI={10.1016/j.entcs.2008.06.015}, journal={Electr. Notes Theor. Comput. Sci.}, author={Estler, H.{-}Christian and Wehrheim, Heike}, year={2008}, pages={331--357} }","short":"H..-}Christian Estler, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2008) 331--357.","ieee":"H. .-}Christian Estler and H. Wehrheim, “Alloy as a Refactoring Checker?,” Electr. Notes Theor. Comput. Sci., pp. 331--357, 2008."}},{"date_updated":"2022-01-06T06:59:04Z","_id":"3205","issue":"2","doi":"10.1007/s00165-007-0042-7","page":"161--204","type":"journal_article","year":"2008","citation":{"apa":"Möller, M., Olderog, E.-R., Rasch, H., & Wehrheim, H. (2008). Integrating a formal method into a software engineering process with {UML} and Java. Formal Asp. Comput., (2), 161--204. https://doi.org/10.1007/s00165-007-0042-7","ama":"Möller M, Olderog E-R, Rasch H, Wehrheim H. Integrating a formal method into a software engineering process with {UML} and Java. Formal Asp Comput. 2008;(2):161--204. doi:10.1007/s00165-007-0042-7","chicago":"Möller, Michael, Ernst-Rüdiger Olderog, Holger Rasch, and Heike Wehrheim. “Integrating a Formal Method into a Software Engineering Process with {UML} and Java.” Formal Asp. Comput., no. 2 (2008): 161--204. https://doi.org/10.1007/s00165-007-0042-7.","bibtex":"@article{Möller_Olderog_Rasch_Wehrheim_2008, title={Integrating a formal method into a software engineering process with {UML} and Java}, DOI={10.1007/s00165-007-0042-7}, number={2}, journal={Formal Asp. Comput.}, author={Möller, Michael and Olderog, Ernst-Rüdiger and Rasch, Holger and Wehrheim, Heike}, year={2008}, pages={161--204} }","mla":"Möller, Michael, et al. “Integrating a Formal Method into a Software Engineering Process with {UML} and Java.” Formal Asp. Comput., no. 2, 2008, pp. 161--204, doi:10.1007/s00165-007-0042-7.","short":"M. Möller, E.-R. Olderog, H. Rasch, H. Wehrheim, Formal Asp. Comput. (2008) 161--204.","ieee":"M. Möller, E.-R. Olderog, H. Rasch, and H. Wehrheim, “Integrating a formal method into a software engineering process with {UML} and Java,” Formal Asp. Comput., no. 2, pp. 161--204, 2008."},"user_id":"29719","title":"Integrating a formal method into a software engineering process with {UML} and Java","publication":"Formal Asp. Comput.","department":[{"_id":"77"}],"author":[{"first_name":"Michael","full_name":"Möller, Michael","last_name":"Möller"},{"first_name":"Ernst-Rüdiger","full_name":"Olderog, Ernst-Rüdiger","last_name":"Olderog"},{"last_name":"Rasch","full_name":"Rasch, Holger","first_name":"Holger"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"date_created":"2018-06-13T09:48:29Z","status":"public"},{"_id":"3206","date_updated":"2022-01-06T06:59:04Z","issue":"4","page":"369--392","year":"2008","type":"journal_article","citation":{"bibtex":"@article{Brückner_Dräger_Finkbeiner_Wehrheim_2008, title={Slicing Abstractions}, number={4}, journal={Fundam. Inform.}, author={Brückner, Ingo and Dräger, Klaus and Finkbeiner, Bernd and Wehrheim, Heike}, year={2008}, pages={369--392} }","mla":"Brückner, Ingo, et al. “Slicing Abstractions.” Fundam. Inform., no. 4, 2008, pp. 369--392.","chicago":"Brückner, Ingo, Klaus Dräger, Bernd Finkbeiner, and Heike Wehrheim. “Slicing Abstractions.” Fundam. Inform., no. 4 (2008): 369--392.","ama":"Brückner I, Dräger K, Finkbeiner B, Wehrheim H. Slicing Abstractions. Fundam Inform. 2008;(4):369--392.","apa":"Brückner, I., Dräger, K., Finkbeiner, B., & Wehrheim, H. (2008). Slicing Abstractions. Fundam. Inform., (4), 369--392.","ieee":"I. Brückner, K. Dräger, B. Finkbeiner, and H. Wehrheim, “Slicing Abstractions,” Fundam. Inform., no. 4, pp. 369--392, 2008.","short":"I. Brückner, K. Dräger, B. Finkbeiner, H. Wehrheim, Fundam. Inform. (2008) 369--392."},"user_id":"29719","title":"Slicing Abstractions","department":[{"_id":"77"}],"publication":"Fundam. Inform.","author":[{"last_name":"Brückner","full_name":"Brückner, Ingo","first_name":"Ingo"},{"last_name":"Dräger","full_name":"Dräger, Klaus","first_name":"Klaus"},{"first_name":"Bernd","full_name":"Finkbeiner, Bernd","last_name":"Finkbeiner"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2018-06-13T09:50:07Z","status":"public"},{"series_title":"Lecture Notes in Computer Science","page":"94--109","year":"2008","citation":{"bibtex":"@inproceedings{Engels_Kleppe_Rensink_Semenyak_Soltenborn_Wehrheim_2008, series={Lecture Notes in Computer Science}, title={From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations}, DOI={10.1007/978-3-540-69100-6_7}, booktitle={Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings}, author={Engels, Gregor and Kleppe, Anneke and Rensink, Arend and Semenyak, Maria and Soltenborn, Christian and Wehrheim, Heike}, editor={Schieferdecker, Ina and Hartman, AlanEditors}, year={2008}, pages={94--109}, collection={Lecture Notes in Computer Science} }","mla":"Engels, Gregor, et al. “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations.” Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings, edited by Ina Schieferdecker and Alan Hartman, 2008, pp. 94--109, doi:10.1007/978-3-540-69100-6_7.","chicago":"Engels, Gregor, Anneke Kleppe, Arend Rensink, Maria Semenyak, Christian Soltenborn, and Heike Wehrheim. “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations.” In Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings, edited by Ina Schieferdecker and Alan Hartman, 94--109. Lecture Notes in Computer Science, 2008. https://doi.org/10.1007/978-3-540-69100-6_7.","apa":"Engels, G., Kleppe, A., Rensink, A., Semenyak, M., Soltenborn, C., & Wehrheim, H. (2008). From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations. In I. Schieferdecker & A. Hartman (Eds.), Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings (pp. 94--109). https://doi.org/10.1007/978-3-540-69100-6_7","ama":"Engels G, Kleppe A, Rensink A, Semenyak M, Soltenborn C, Wehrheim H. From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations. In: Schieferdecker I, Hartman A, eds. Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings. Lecture Notes in Computer Science. ; 2008:94--109. doi:10.1007/978-3-540-69100-6_7","ieee":"G. Engels, A. Kleppe, A. Rensink, M. Semenyak, C. Soltenborn, and H. Wehrheim, “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations,” in Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings, 2008, pp. 94--109.","short":"G. Engels, A. Kleppe, A. Rensink, M. Semenyak, C. Soltenborn, H. Wehrheim, in: I. Schieferdecker, A. Hartman (Eds.), Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings, 2008, pp. 94--109."},"type":"conference","language":[{"iso":"eng"}],"_id":"3207","date_updated":"2022-01-06T06:59:04Z","doi":"10.1007/978-3-540-69100-6_7","department":[{"_id":"77"}],"publication":"Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings","author":[{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"last_name":"Kleppe","first_name":"Anneke","full_name":"Kleppe, Anneke"},{"last_name":"Rensink","full_name":"Rensink, Arend","first_name":"Arend"},{"full_name":"Semenyak, Maria","first_name":"Maria","last_name":"Semenyak"},{"last_name":"Soltenborn","id":"1737","first_name":"Christian","orcid":"0000-0002-0342-8227","full_name":"Soltenborn, Christian"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"editor":[{"first_name":"Ina","full_name":"Schieferdecker, Ina","last_name":"Schieferdecker"},{"first_name":"Alan","full_name":"Hartman, Alan","last_name":"Hartman"}],"date_created":"2018-06-13T09:51:29Z","status":"public","title":"From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations","user_id":"14955"},{"editor":[{"first_name":"Gilles","full_name":"Barthe, Gilles","last_name":"Barthe"},{"full_name":"S. de Boer, Frank","first_name":"Frank","last_name":"S. de Boer"}],"date_created":"2018-06-13T09:52:29Z","status":"public","publication":"Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings","department":[{"_id":"77"}],"author":[{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"last_name":"Schellhorn","full_name":"Schellhorn, Gerhard","first_name":"Gerhard"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"title":"Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack","user_id":"29719","page":"78--95","citation":{"bibtex":"@inproceedings{Derrick_Schellhorn_Wehrheim_2008, series={Lecture Notes in Computer Science}, title={Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack}, DOI={10.1007/978-3-540-68863-1_6}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, editor={Barthe, Gilles and S. de Boer, FrankEditors}, year={2008}, pages={78--95}, collection={Lecture Notes in Computer Science} }","mla":"Derrick, John, et al. “Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack.” Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings, edited by Gilles Barthe and Frank S. de Boer, 2008, pp. 78--95, doi:10.1007/978-3-540-68863-1_6.","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack.” In Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings, edited by Gilles Barthe and Frank S. de Boer, 78--95. Lecture Notes in Computer Science, 2008. https://doi.org/10.1007/978-3-540-68863-1_6.","apa":"Derrick, J., Schellhorn, G., & Wehrheim, H. (2008). Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack. In G. Barthe & F. S. de Boer (Eds.), Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings (pp. 78--95). https://doi.org/10.1007/978-3-540-68863-1_6","ama":"Derrick J, Schellhorn G, Wehrheim H. Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack. In: Barthe G, S. de Boer F, eds. Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings. Lecture Notes in Computer Science. ; 2008:78--95. doi:10.1007/978-3-540-68863-1_6","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack,” in Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings, 2008, pp. 78--95.","short":"J. Derrick, G. Schellhorn, H. Wehrheim, in: G. Barthe, F. S. de Boer (Eds.), Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings, 2008, pp. 78--95."},"year":"2008","type":"conference","series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-540-68863-1_6","_id":"3208","date_updated":"2022-01-06T06:59:04Z"},{"editor":[{"last_name":"Liu","first_name":"Shaoying","full_name":"Liu, Shaoying"},{"last_name":"S. E. Maibaum","full_name":"S. E. Maibaum, T.","first_name":"T."},{"first_name":"Keijiro","full_name":"Araki, Keijiro","last_name":"Araki"}],"date_created":"2018-06-13T09:53:43Z","status":"public","department":[{"_id":"77"}],"publication":"Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings","author":[{"first_name":"Björn","full_name":"Metzler, Björn","last_name":"Metzler"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"},{"full_name":"Wonisch, Daniel","first_name":"Daniel","last_name":"Wonisch"}],"title":"Decomposition for Compositional Verification","user_id":"29719","page":"105--125","type":"conference","year":"2008","citation":{"bibtex":"@inproceedings{Metzler_Wehrheim_Wonisch_2008, series={Lecture Notes in Computer Science}, title={Decomposition for Compositional Verification}, DOI={10.1007/978-3-540-88194-0_9}, booktitle={Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings}, author={Metzler, Björn and Wehrheim, Heike and Wonisch, Daniel}, editor={Liu, Shaoying and S. E. Maibaum, T. and Araki, KeijiroEditors}, year={2008}, pages={105--125}, collection={Lecture Notes in Computer Science} }","mla":"Metzler, Björn, et al. “Decomposition for Compositional Verification.” Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings, edited by Shaoying Liu et al., 2008, pp. 105--125, doi:10.1007/978-3-540-88194-0_9.","apa":"Metzler, B., Wehrheim, H., & Wonisch, D. (2008). Decomposition for Compositional Verification. In S. Liu, T. S. E. Maibaum, & K. Araki (Eds.), Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings (pp. 105--125). https://doi.org/10.1007/978-3-540-88194-0_9","ama":"Metzler B, Wehrheim H, Wonisch D. Decomposition for Compositional Verification. In: Liu S, S. E. Maibaum T, Araki K, eds. Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings. Lecture Notes in Computer Science. ; 2008:105--125. doi:10.1007/978-3-540-88194-0_9","chicago":"Metzler, Björn, Heike Wehrheim, and Daniel Wonisch. “Decomposition for Compositional Verification.” In Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings, edited by Shaoying Liu, T. S. E. Maibaum, and Keijiro Araki, 105--125. Lecture Notes in Computer Science, 2008. https://doi.org/10.1007/978-3-540-88194-0_9.","ieee":"B. Metzler, H. Wehrheim, and D. Wonisch, “Decomposition for Compositional Verification,” in Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings, 2008, pp. 105--125.","short":"B. Metzler, H. Wehrheim, D. Wonisch, in: S. Liu, T. S. E. Maibaum, K. Araki (Eds.), Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings, 2008, pp. 105--125."},"series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-540-88194-0_9","_id":"3209","date_updated":"2022-01-06T06:59:04Z"},{"date_updated":"2022-01-06T06:59:05Z","_id":"3210","doi":"10.1007/978-3-540-85762-4_26","series_title":"Lecture Notes in Computer Science","page":"380--394","type":"conference","citation":{"apa":"Wehrheim, H. (2008). Bounded Model Checking for Partial Kripke Structures. In J. S. Fitzgerald, A. Elisabeth Haxthausen, & H. Yenig{\\\"{u}}n (Eds.), Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings (pp. 380--394). https://doi.org/10.1007/978-3-540-85762-4_26","ama":"Wehrheim H. Bounded Model Checking for Partial Kripke Structures. In: S. Fitzgerald J, Elisabeth Haxthausen A, Yenig{\\\"{u}}n H, eds. Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science. ; 2008:380--394. doi:10.1007/978-3-540-85762-4_26","chicago":"Wehrheim, Heike. “Bounded Model Checking for Partial Kripke Structures.” In Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings, edited by John S. Fitzgerald, Anne Elisabeth Haxthausen, and H{\\\"{u}}sn{\\\"{u}} Yenig{\\\"{u}}n, 380--394. Lecture Notes in Computer Science, 2008. https://doi.org/10.1007/978-3-540-85762-4_26.","bibtex":"@inproceedings{Wehrheim_2008, series={Lecture Notes in Computer Science}, title={Bounded Model Checking for Partial Kripke Structures}, DOI={10.1007/978-3-540-85762-4_26}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}, author={Wehrheim, Heike}, editor={S. Fitzgerald, John and Elisabeth Haxthausen, Anne and Yenig{\\\"{u}}n, H{\\\"{u}}sn{\\\"{u}}Editors}, year={2008}, pages={380--394}, collection={Lecture Notes in Computer Science} }","mla":"Wehrheim, Heike. “Bounded Model Checking for Partial Kripke Structures.” Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings, edited by John S. Fitzgerald et al., 2008, pp. 380--394, doi:10.1007/978-3-540-85762-4_26.","short":"H. Wehrheim, in: J. S. Fitzgerald, A. Elisabeth Haxthausen, H. Yenig{\\\"{u}}n (Eds.), Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings, 2008, pp. 380--394.","ieee":"H. Wehrheim, “Bounded Model Checking for Partial Kripke Structures,” in Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings, 2008, pp. 380--394."},"year":"2008","user_id":"29719","title":"Bounded Model Checking for Partial Kripke Structures","publication":"Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings","department":[{"_id":"77"}],"author":[{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"date_created":"2018-06-13T09:54:58Z","status":"public","editor":[{"first_name":"John","full_name":"S. Fitzgerald, John","last_name":"S. Fitzgerald"},{"full_name":"Elisabeth Haxthausen, Anne","first_name":"Anne","last_name":"Elisabeth Haxthausen"},{"last_name":"Yenig{\\\"{u}}n","full_name":"Yenig{\\\"{u}}n, H{\\\"{u}}sn{\\\"{u}}","first_name":"H{\\\"{u}}sn{\\\"{u}}"}]},{"title":"On using data abstractions for model checking refinements","user_id":"29719","publication":"Acta Inf.","department":[{"_id":"77"}],"author":[{"last_name":"Derrick","first_name":"John","full_name":"Derrick, John"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2018-06-13T09:56:17Z","status":"public","_id":"3211","date_updated":"2022-01-06T06:59:05Z","doi":"10.1007/s00236-007-0042-3","issue":"1","page":"41--71","type":"journal_article","citation":{"ieee":"J. Derrick and H. Wehrheim, “On using data abstractions for model checking refinements,” Acta Inf., no. 1, pp. 41--71, 2007.","short":"J. Derrick, H. Wehrheim, Acta Inf. (2007) 41--71.","bibtex":"@article{Derrick_Wehrheim_2007, title={On using data abstractions for model checking refinements}, DOI={10.1007/s00236-007-0042-3}, number={1}, journal={Acta Inf.}, author={Derrick, John and Wehrheim, Heike}, year={2007}, pages={41--71} }","mla":"Derrick, John, and Heike Wehrheim. “On Using Data Abstractions for Model Checking Refinements.” Acta Inf., no. 1, 2007, pp. 41--71, doi:10.1007/s00236-007-0042-3.","chicago":"Derrick, John, and Heike Wehrheim. “On Using Data Abstractions for Model Checking Refinements.” Acta Inf., no. 1 (2007): 41--71. https://doi.org/10.1007/s00236-007-0042-3.","apa":"Derrick, J., & Wehrheim, H. (2007). On using data abstractions for model checking refinements. Acta Inf., (1), 41--71. https://doi.org/10.1007/s00236-007-0042-3","ama":"Derrick J, Wehrheim H. On using data abstractions for model checking refinements. Acta Inf. 2007;(1):41--71. doi:10.1007/s00236-007-0042-3"},"year":"2007"},{"date_updated":"2022-01-06T06:59:05Z","_id":"3212","doi":"10.1016/j.entcs.2006.02.031","issue":"2","page":"47--67","citation":{"ieee":"B. Metzler and H. Wehrheim, “Extending a Component Specification Language with Time,” Electr. Notes Theor. Comput. Sci., no. 2, pp. 47--67, 2007.","short":"B. Metzler, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2007) 47--67.","mla":"Metzler, Björn, and Heike Wehrheim. “Extending a Component Specification Language with Time.” Electr. Notes Theor. Comput. Sci., no. 2, 2007, pp. 47--67, doi:10.1016/j.entcs.2006.02.031.","bibtex":"@article{Metzler_Wehrheim_2007, title={Extending a Component Specification Language with Time}, DOI={10.1016/j.entcs.2006.02.031}, number={2}, journal={Electr. Notes Theor. Comput. Sci.}, author={Metzler, Björn and Wehrheim, Heike}, year={2007}, pages={47--67} }","apa":"Metzler, B., & Wehrheim, H. (2007). Extending a Component Specification Language with Time. Electr. Notes Theor. Comput. Sci., (2), 47--67. https://doi.org/10.1016/j.entcs.2006.02.031","ama":"Metzler B, Wehrheim H. Extending a Component Specification Language with Time. Electr Notes Theor Comput Sci. 2007;(2):47--67. doi:10.1016/j.entcs.2006.02.031","chicago":"Metzler, Björn, and Heike Wehrheim. “Extending a Component Specification Language with Time.” Electr. Notes Theor. Comput. Sci., no. 2 (2007): 47--67. https://doi.org/10.1016/j.entcs.2006.02.031."},"year":"2007","type":"journal_article","title":"Extending a Component Specification Language with Time","user_id":"29719","department":[{"_id":"77"}],"publication":"Electr. Notes Theor. Comput. Sci.","author":[{"first_name":"Björn","full_name":"Metzler, Björn","last_name":"Metzler"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2018-06-13T09:57:37Z","status":"public"},{"date_updated":"2022-01-06T06:59:05Z","_id":"3213","doi":"10.1016/j.entcs.2006.08.041","page":"3--17","type":"journal_article","citation":{"ieee":"H. .-}Christian Estler, T. Ruhroth, and H. Wehrheim, “Modelchecking Correctness of Refactorings - Some Experiments,” Electr. Notes Theor. Comput. Sci., pp. 3--17, 2007.","short":"H..-}Christian Estler, T. Ruhroth, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2007) 3--17.","bibtex":"@article{Estler_Ruhroth_Wehrheim_2007, title={Modelchecking Correctness of Refactorings - Some Experiments}, DOI={10.1016/j.entcs.2006.08.041}, journal={Electr. Notes Theor. Comput. Sci.}, author={Estler, H.{-}Christian and Ruhroth, Thomas and Wehrheim, Heike}, year={2007}, pages={3--17} }","mla":"Estler, H. .. }Christian, et al. “Modelchecking Correctness of Refactorings - Some Experiments.” Electr. Notes Theor. Comput. Sci., 2007, pp. 3--17, doi:10.1016/j.entcs.2006.08.041.","chicago":"Estler, H.{-}Christian, Thomas Ruhroth, and Heike Wehrheim. “Modelchecking Correctness of Refactorings - Some Experiments.” Electr. Notes Theor. Comput. Sci., 2007, 3--17. https://doi.org/10.1016/j.entcs.2006.08.041.","apa":"Estler, H. .-}Christian, Ruhroth, T., & Wehrheim, H. (2007). Modelchecking Correctness of Refactorings - Some Experiments. Electr. Notes Theor. Comput. Sci., 3--17. https://doi.org/10.1016/j.entcs.2006.08.041","ama":"Estler H.-}Christian, Ruhroth T, Wehrheim H. Modelchecking Correctness of Refactorings - Some Experiments. Electr Notes Theor Comput Sci. 2007:3--17. doi:10.1016/j.entcs.2006.08.041"},"year":"2007","title":"Modelchecking Correctness of Refactorings - Some Experiments","user_id":"29719","publication":"Electr. Notes Theor. Comput. Sci.","department":[{"_id":"77"}],"author":[{"first_name":"H.{-}Christian","full_name":"Estler, H.{-}Christian","last_name":"Estler"},{"last_name":"Ruhroth","full_name":"Ruhroth, Thomas","first_name":"Thomas"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2018-06-13T09:59:12Z","status":"public"},{"author":[{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"last_name":"Güldali","full_name":"Güldali, Baris","first_name":"Baris"},{"last_name":"Soltenborn","id":"1737","first_name":"Christian","full_name":"Soltenborn, Christian","orcid":"0000-0002-0342-8227"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"publication":"Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers","status":"public","date_created":"2018-06-13T10:00:14Z","editor":[{"last_name":"Sch{\\\"{u}}rr","first_name":"Andy","full_name":"Sch{\\\"{u}}rr, Andy"},{"last_name":"Nagl","full_name":"Nagl, Manfred","first_name":"Manfred"},{"last_name":"Z{\\\"{u}}ndorf","first_name":"Albert","full_name":"Z{\\\"{u}}ndorf, Albert"}],"user_id":"14955","title":"Assuring Consistency of Business Process Models and Web Services Using Visual Contracts","series_title":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"citation":{"short":"G. Engels, B. Güldali, C. Soltenborn, H. Wehrheim, in: A. Sch{\\\"{u}}rr, M. Nagl, A. Z{\\\"{u}}ndorf (Eds.), Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers, 2007, pp. 17--31.","ieee":"G. Engels, B. Güldali, C. Soltenborn, and H. Wehrheim, “Assuring Consistency of Business Process Models and Web Services Using Visual Contracts,” in Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers, 2007, pp. 17--31.","ama":"Engels G, Güldali B, Soltenborn C, Wehrheim H. Assuring Consistency of Business Process Models and Web Services Using Visual Contracts. In: Sch{\\\"{u}}rr A, Nagl M, Z{\\\"{u}}ndorf A, eds. Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers. Lecture Notes in Computer Science. ; 2007:17--31. doi:10.1007/978-3-540-89020-1_2","apa":"Engels, G., Güldali, B., Soltenborn, C., & Wehrheim, H. (2007). Assuring Consistency of Business Process Models and Web Services Using Visual Contracts. In A. Sch{\\\"{u}}rr, M. Nagl, & A. Z{\\\"{u}}ndorf (Eds.), Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers (pp. 17--31). https://doi.org/10.1007/978-3-540-89020-1_2","chicago":"Engels, Gregor, Baris Güldali, Christian Soltenborn, and Heike Wehrheim. “Assuring Consistency of Business Process Models and Web Services Using Visual Contracts.” In Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers, edited by Andy Sch{\\\"{u}}rr, Manfred Nagl, and Albert Z{\\\"{u}}ndorf, 17--31. Lecture Notes in Computer Science, 2007. https://doi.org/10.1007/978-3-540-89020-1_2.","bibtex":"@inproceedings{Engels_Güldali_Soltenborn_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Assuring Consistency of Business Process Models and Web Services Using Visual Contracts}, DOI={10.1007/978-3-540-89020-1_2}, booktitle={Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers}, author={Engels, Gregor and Güldali, Baris and Soltenborn, Christian and Wehrheim, Heike}, editor={Sch{\\\"{u}}rr, Andy and Nagl, Manfred and Z{\\\"{u}}ndorf, AlbertEditors}, year={2007}, pages={17--31}, collection={Lecture Notes in Computer Science} }","mla":"Engels, Gregor, et al. “Assuring Consistency of Business Process Models and Web Services Using Visual Contracts.” Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers, edited by Andy Sch{\\\"{u}}rr et al., 2007, pp. 17--31, doi:10.1007/978-3-540-89020-1_2."},"type":"conference","year":"2007","page":"17--31","date_updated":"2022-01-06T06:59:05Z","_id":"3214","doi":"10.1007/978-3-540-89020-1_2"},{"series_title":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"type":"conference","citation":{"short":"G. Engels, C. Soltenborn, H. Wehrheim, in: M. M. Bonsangue, E. Broch Johnsen (Eds.), Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 76--90.","ieee":"G. Engels, C. Soltenborn, and H. Wehrheim, “Analysis of {UML} Activities Using Dynamic Meta Modeling,” in Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 76--90.","ama":"Engels G, Soltenborn C, Wehrheim H. Analysis of {UML} Activities Using Dynamic Meta Modeling. In: M. Bonsangue M, Broch Johnsen E, eds. Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings. Lecture Notes in Computer Science. ; 2007:76--90. doi:10.1007/978-3-540-72952-5_5","apa":"Engels, G., Soltenborn, C., & Wehrheim, H. (2007). Analysis of {UML} Activities Using Dynamic Meta Modeling. In M. M. Bonsangue & E. Broch Johnsen (Eds.), Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings (pp. 76--90). https://doi.org/10.1007/978-3-540-72952-5_5","chicago":"Engels, Gregor, Christian Soltenborn, and Heike Wehrheim. “Analysis of {UML} Activities Using Dynamic Meta Modeling.” In Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 76--90. Lecture Notes in Computer Science, 2007. https://doi.org/10.1007/978-3-540-72952-5_5.","bibtex":"@inproceedings{Engels_Soltenborn_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Analysis of {UML} Activities Using Dynamic Meta Modeling}, DOI={10.1007/978-3-540-72952-5_5}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings}, author={Engels, Gregor and Soltenborn, Christian and Wehrheim, Heike}, editor={M. Bonsangue, Marcello and Broch Johnsen, EinarEditors}, year={2007}, pages={76--90}, collection={Lecture Notes in Computer Science} }","mla":"Engels, Gregor, et al. “Analysis of {UML} Activities Using Dynamic Meta Modeling.” Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 2007, pp. 76--90, doi:10.1007/978-3-540-72952-5_5."},"year":"2007","page":"76--90","_id":"3215","date_updated":"2022-01-06T06:59:05Z","doi":"10.1007/978-3-540-72952-5_5","author":[{"last_name":"Engels","id":"107","first_name":"Gregor","full_name":"Engels, Gregor"},{"orcid":"0000-0002-0342-8227","full_name":"Soltenborn, Christian","first_name":"Christian","id":"1737","last_name":"Soltenborn"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-13T10:01:31Z","editor":[{"full_name":"M. Bonsangue, Marcello","first_name":"Marcello","last_name":"M. Bonsangue"},{"full_name":"Broch Johnsen, Einar","first_name":"Einar","last_name":"Broch Johnsen"}],"user_id":"14955","title":"Analysis of {UML} Activities Using Dynamic Meta Modeling"},{"user_id":"29719","title":"Refactoring Object-Oriented Specifications with Data and Processes","status":"public","date_created":"2018-06-13T10:03:09Z","editor":[{"last_name":"M. Bonsangue","first_name":"Marcello","full_name":"M. Bonsangue, Marcello"},{"full_name":"Broch Johnsen, Einar","first_name":"Einar","last_name":"Broch Johnsen"}],"author":[{"last_name":"Ruhroth","first_name":"Thomas","full_name":"Ruhroth, Thomas"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings","department":[{"_id":"77"}],"doi":"10.1007/978-3-540-72952-5_15","date_updated":"2022-01-06T06:59:05Z","_id":"3216","type":"conference","citation":{"ieee":"T. Ruhroth and H. Wehrheim, “Refactoring Object-Oriented Specifications with Data and Processes,” in Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 236--251.","short":"T. Ruhroth, H. Wehrheim, in: M. M. Bonsangue, E. Broch Johnsen (Eds.), Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 236--251.","bibtex":"@inproceedings{Ruhroth_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Refactoring Object-Oriented Specifications with Data and Processes}, DOI={10.1007/978-3-540-72952-5_15}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings}, author={Ruhroth, Thomas and Wehrheim, Heike}, editor={M. Bonsangue, Marcello and Broch Johnsen, EinarEditors}, year={2007}, pages={236--251}, collection={Lecture Notes in Computer Science} }","mla":"Ruhroth, Thomas, and Heike Wehrheim. “Refactoring Object-Oriented Specifications with Data and Processes.” Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 2007, pp. 236--251, doi:10.1007/978-3-540-72952-5_15.","chicago":"Ruhroth, Thomas, and Heike Wehrheim. “Refactoring Object-Oriented Specifications with Data and Processes.” In Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 236--251. Lecture Notes in Computer Science, 2007. https://doi.org/10.1007/978-3-540-72952-5_15.","apa":"Ruhroth, T., & Wehrheim, H. (2007). Refactoring Object-Oriented Specifications with Data and Processes. In M. M. Bonsangue & E. Broch Johnsen (Eds.), Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings (pp. 236--251). https://doi.org/10.1007/978-3-540-72952-5_15","ama":"Ruhroth T, Wehrheim H. Refactoring Object-Oriented Specifications with Data and Processes. In: M. Bonsangue M, Broch Johnsen E, eds. Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings. Lecture Notes in Computer Science. ; 2007:236--251. doi:10.1007/978-3-540-72952-5_15"},"year":"2007","page":"236--251","series_title":"Lecture Notes in Computer Science"},{"user_id":"29719","title":"The Challenges of Building Advanced Mechatronic Systems","status":"public","date_created":"2018-06-14T06:30:41Z","editor":[{"full_name":"C. Briand, Lionel","first_name":"Lionel","last_name":"C. Briand"},{"last_name":"L. Wolf","first_name":"Alexander","full_name":"L. Wolf, Alexander"}],"author":[{"full_name":"Schäfer, Wilhelm","first_name":"Wilhelm","last_name":"Schäfer"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"department":[{"_id":"77"}],"publication":"International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}","doi":"10.1109/FOSE.2007.28","_id":"3221","date_updated":"2022-01-06T06:59:05Z","citation":{"mla":"Schäfer, Wilhelm, and Heike Wehrheim. “The Challenges of Building Advanced Mechatronic Systems.” International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}, edited by Lionel C. Briand and Alexander L. Wolf, 2007, pp. 72--84, doi:10.1109/FOSE.2007.28.","bibtex":"@inproceedings{Schäfer_Wehrheim_2007, title={The Challenges of Building Advanced Mechatronic Systems}, DOI={10.1109/FOSE.2007.28}, booktitle={International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}}, author={Schäfer, Wilhelm and Wehrheim, Heike}, editor={C. Briand, Lionel and L. Wolf, AlexanderEditors}, year={2007}, pages={72--84} }","chicago":"Schäfer, Wilhelm, and Heike Wehrheim. “The Challenges of Building Advanced Mechatronic Systems.” In International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}, edited by Lionel C. Briand and Alexander L. Wolf, 72--84, 2007. https://doi.org/10.1109/FOSE.2007.28.","apa":"Schäfer, W., & Wehrheim, H. (2007). The Challenges of Building Advanced Mechatronic Systems. In L. C. Briand & A. L. Wolf (Eds.), International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA} (pp. 72--84). https://doi.org/10.1109/FOSE.2007.28","ama":"Schäfer W, Wehrheim H. The Challenges of Building Advanced Mechatronic Systems. In: C. Briand L, L. Wolf A, eds. International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}. ; 2007:72--84. doi:10.1109/FOSE.2007.28","ieee":"W. Schäfer and H. Wehrheim, “The Challenges of Building Advanced Mechatronic Systems,” in International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}, 2007, pp. 72--84.","short":"W. Schäfer, H. Wehrheim, in: L. C. Briand, A. L. Wolf (Eds.), International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}, 2007, pp. 72--84."},"type":"conference","year":"2007","page":"72--84"},{"series_title":"Lecture Notes in Computer Science","type":"conference","citation":{"short":"J. Derrick, G. Schellhorn, H. Wehrheim, in: J. Davies, J. Gibbons (Eds.), Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings, 2007, pp. 195--214.","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Proving Linearizability Via Non-atomic Refinement,” in Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings, 2007, pp. 195--214.","ama":"Derrick J, Schellhorn G, Wehrheim H. Proving Linearizability Via Non-atomic Refinement. In: Davies J, Gibbons J, eds. Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings. Lecture Notes in Computer Science. ; 2007:195--214. doi:10.1007/978-3-540-73210-5_11","apa":"Derrick, J., Schellhorn, G., & Wehrheim, H. (2007). Proving Linearizability Via Non-atomic Refinement. In J. Davies & J. Gibbons (Eds.), Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings (pp. 195--214). https://doi.org/10.1007/978-3-540-73210-5_11","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Proving Linearizability Via Non-Atomic Refinement.” In Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings, edited by Jim Davies and Jeremy Gibbons, 195--214. Lecture Notes in Computer Science, 2007. https://doi.org/10.1007/978-3-540-73210-5_11.","bibtex":"@inproceedings{Derrick_Schellhorn_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Proving Linearizability Via Non-atomic Refinement}, DOI={10.1007/978-3-540-73210-5_11}, booktitle={Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, editor={Davies, Jim and Gibbons, JeremyEditors}, year={2007}, pages={195--214}, collection={Lecture Notes in Computer Science} }","mla":"Derrick, John, et al. “Proving Linearizability Via Non-Atomic Refinement.” Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings, edited by Jim Davies and Jeremy Gibbons, 2007, pp. 195--214, doi:10.1007/978-3-540-73210-5_11."},"year":"2007","page":"195--214","date_updated":"2022-01-06T06:59:05Z","_id":"3222","doi":"10.1007/978-3-540-73210-5_11","author":[{"full_name":"Derrick, John","first_name":"John","last_name":"Derrick"},{"last_name":"Schellhorn","first_name":"Gerhard","full_name":"Schellhorn, Gerhard"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-14T06:32:05Z","editor":[{"full_name":"Davies, Jim","first_name":"Jim","last_name":"Davies"},{"last_name":"Gibbons","first_name":"Jeremy","full_name":"Gibbons, Jeremy"}],"user_id":"29719","title":"Proving Linearizability Via Non-atomic Refinement"},{"date_updated":"2022-01-06T06:59:05Z","_id":"3223","issue":"1-2","page":"22--45","year":"2006","type":"journal_article","citation":{"ieee":"I. Brückner, B. Metzler, and H. Wehrheim, “Optimizing Slicing of Formal Specifications by Deductive Verification,” Nord. J. Comput., no. 1–2, pp. 22--45, 2006.","short":"I. Brückner, B. Metzler, H. Wehrheim, Nord. J. Comput. (2006) 22--45.","mla":"Brückner, Ingo, et al. “Optimizing Slicing of Formal Specifications by Deductive Verification.” Nord. J. Comput., no. 1–2, 2006, pp. 22--45.","bibtex":"@article{Brückner_Metzler_Wehrheim_2006, title={Optimizing Slicing of Formal Specifications by Deductive Verification}, number={1–2}, journal={Nord. J. Comput.}, author={Brückner, Ingo and Metzler, Björn and Wehrheim, Heike}, year={2006}, pages={22--45} }","apa":"Brückner, I., Metzler, B., & Wehrheim, H. (2006). Optimizing Slicing of Formal Specifications by Deductive Verification. Nord. J. Comput., (1–2), 22--45.","ama":"Brückner I, Metzler B, Wehrheim H. Optimizing Slicing of Formal Specifications by Deductive Verification. Nord J Comput. 2006;(1-2):22--45.","chicago":"Brückner, Ingo, Björn Metzler, and Heike Wehrheim. “Optimizing Slicing of Formal Specifications by Deductive Verification.” Nord. J. Comput., no. 1–2 (2006): 22--45."},"title":"Optimizing Slicing of Formal Specifications by Deductive Verification","user_id":"29719","publication":"Nord. J. Comput.","department":[{"_id":"77"}],"author":[{"full_name":"Brückner, Ingo","first_name":"Ingo","last_name":"Brückner"},{"last_name":"Metzler","first_name":"Björn","full_name":"Metzler, Björn"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2018-06-14T06:33:37Z","status":"public"},{"citation":{"mla":"Derrick, John, and Heike Wehrheim. “Model Transformations Incorporating Multiple Views.” Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings, edited by Michael Johnson and Varmo Vene, 2006, pp. 111--126, doi:10.1007/11784180_11.","bibtex":"@inproceedings{Derrick_Wehrheim_2006, series={Lecture Notes in Computer Science}, title={Model Transformations Incorporating Multiple Views}, DOI={10.1007/11784180_11}, booktitle={Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings}, author={Derrick, John and Wehrheim, Heike}, editor={Johnson, Michael and Vene, VarmoEditors}, year={2006}, pages={111--126}, collection={Lecture Notes in Computer Science} }","ama":"Derrick J, Wehrheim H. Model Transformations Incorporating Multiple Views. In: Johnson M, Vene V, eds. Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings. Lecture Notes in Computer Science. ; 2006:111--126. doi:10.1007/11784180_11","apa":"Derrick, J., & Wehrheim, H. (2006). Model Transformations Incorporating Multiple Views. In M. Johnson & V. Vene (Eds.), Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings (pp. 111--126). https://doi.org/10.1007/11784180_11","chicago":"Derrick, John, and Heike Wehrheim. “Model Transformations Incorporating Multiple Views.” In Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings, edited by Michael Johnson and Varmo Vene, 111--126. Lecture Notes in Computer Science, 2006. https://doi.org/10.1007/11784180_11.","ieee":"J. Derrick and H. Wehrheim, “Model Transformations Incorporating Multiple Views,” in Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings, 2006, pp. 111--126.","short":"J. Derrick, H. Wehrheim, in: M. Johnson, V. Vene (Eds.), Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings, 2006, pp. 111--126."},"year":"2006","type":"conference","page":"111--126","series_title":"Lecture Notes in Computer Science","doi":"10.1007/11784180_11","date_updated":"2022-01-06T06:59:05Z","_id":"3224","status":"public","date_created":"2018-06-14T06:34:47Z","editor":[{"full_name":"Johnson, Michael","first_name":"Michael","last_name":"Johnson"},{"full_name":"Vene, Varmo","first_name":"Varmo","last_name":"Vene"}],"author":[{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings","department":[{"_id":"77"}],"user_id":"29719","title":"Model Transformations Incorporating Multiple Views"},{"series_title":"Lecture Notes in Computer Science","page":"514--528","type":"conference","year":"2006","citation":{"apa":"Wehrheim, H. (2006). Incremental Slicing. In Z. Liu & J. He (Eds.), Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings (pp. 514--528). https://doi.org/10.1007/11901433_28","ama":"Wehrheim H. Incremental Slicing. In: Liu Z, He J, eds. Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings. Lecture Notes in Computer Science. ; 2006:514--528. doi:10.1007/11901433_28","chicago":"Wehrheim, Heike. “Incremental Slicing.” In Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings, edited by Zhiming Liu and Jifeng He, 514--528. Lecture Notes in Computer Science, 2006. https://doi.org/10.1007/11901433_28.","bibtex":"@inproceedings{Wehrheim_2006, series={Lecture Notes in Computer Science}, title={Incremental Slicing}, DOI={10.1007/11901433_28}, booktitle={Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings}, author={Wehrheim, Heike}, editor={Liu, Zhiming and He, JifengEditors}, year={2006}, pages={514--528}, collection={Lecture Notes in Computer Science} }","mla":"Wehrheim, Heike. “Incremental Slicing.” Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings, edited by Zhiming Liu and Jifeng He, 2006, pp. 514--528, doi:10.1007/11901433_28.","short":"H. Wehrheim, in: Z. Liu, J. He (Eds.), Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings, 2006, pp. 514--528.","ieee":"H. Wehrheim, “Incremental Slicing,” in Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings, 2006, pp. 514--528."},"date_updated":"2022-01-06T06:59:05Z","_id":"3225","doi":"10.1007/11901433_28","department":[{"_id":"77"}],"publication":"Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings","author":[{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"editor":[{"last_name":"Liu","first_name":"Zhiming","full_name":"Liu, Zhiming"},{"last_name":"He","first_name":"Jifeng","full_name":"He, Jifeng"}],"date_created":"2018-06-14T06:35:54Z","status":"public","title":"Incremental Slicing","user_id":"29719"},{"series_title":"Lecture Notes in Computer Science","type":"conference_editor","year":"2006","citation":{"short":"R. Gorrieri, H. Wehrheim, eds., Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings, 2006.","ieee":"R. Gorrieri and H. Wehrheim, Eds., Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings. 2006.","chicago":"Gorrieri, Roberto, and Heike Wehrheim, eds. Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings. Lecture Notes in Computer Science, 2006. https://doi.org/10.1007/11768869.","ama":"Gorrieri R, Wehrheim H, eds. Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings.; 2006. doi:10.1007/11768869","apa":"Gorrieri, R., & Wehrheim, H. (Eds.). (2006). Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings. https://doi.org/10.1007/11768869","bibtex":"@book{Gorrieri_Wehrheim_2006, series={Lecture Notes in Computer Science}, title={Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings}, DOI={10.1007/11768869}, year={2006}, collection={Lecture Notes in Computer Science} }","mla":"Gorrieri, Roberto, and Heike Wehrheim, editors. Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings. 2006, doi:10.1007/11768869."},"_id":"3226","date_updated":"2022-01-06T06:59:05Z","doi":"10.1007/11768869","department":[{"_id":"77"}],"date_created":"2018-06-14T06:37:20Z","status":"public","publication_identifier":{"isbn":["3-540-34893-X"]},"editor":[{"full_name":"Gorrieri, Roberto","first_name":"Roberto","last_name":"Gorrieri"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"user_id":"29719","title":"Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings"},{"title":"Specification and (property) inheritance in {CSP-OZ}","user_id":"29719","status":"public","date_created":"2018-06-14T06:38:42Z","author":[{"full_name":"Olderog, Ernst-Rüdiger","first_name":"Ernst-Rüdiger","last_name":"Olderog"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"publication":"Sci. Comput. Program.","department":[{"_id":"77"}],"doi":"10.1016/j.scico.2004.05.017","issue":"1-3","date_updated":"2022-01-06T06:59:06Z","_id":"3227","year":"2005","citation":{"short":"E.-R. Olderog, H. Wehrheim, Sci. Comput. Program. (2005) 227--257.","ieee":"E.-R. Olderog and H. Wehrheim, “Specification and (property) inheritance in {CSP-OZ},” Sci. Comput. Program., no. 1–3, pp. 227--257, 2005.","chicago":"Olderog, Ernst-Rüdiger, and Heike Wehrheim. “Specification and (Property) Inheritance in {CSP-OZ}.” Sci. Comput. Program., no. 1–3 (2005): 227--257. https://doi.org/10.1016/j.scico.2004.05.017.","apa":"Olderog, E.-R., & Wehrheim, H. (2005). Specification and (property) inheritance in {CSP-OZ}. Sci. Comput. Program., (1–3), 227--257. https://doi.org/10.1016/j.scico.2004.05.017","ama":"Olderog E-R, Wehrheim H. Specification and (property) inheritance in {CSP-OZ}. Sci Comput Program. 2005;(1-3):227--257. doi:10.1016/j.scico.2004.05.017","bibtex":"@article{Olderog_Wehrheim_2005, title={Specification and (property) inheritance in {CSP-OZ}}, DOI={10.1016/j.scico.2004.05.017}, number={1–3}, journal={Sci. Comput. Program.}, author={Olderog, Ernst-Rüdiger and Wehrheim, Heike}, year={2005}, pages={227--257} }","mla":"Olderog, Ernst-Rüdiger, and Heike Wehrheim. “Specification and (Property) Inheritance in {CSP-OZ}.” Sci. Comput. Program., no. 1–3, 2005, pp. 227--257, doi:10.1016/j.scico.2004.05.017."},"type":"journal_article","page":"227--257"},{"_id":"3228","date_updated":"2022-01-06T06:59:06Z","doi":"10.1016/j.tcs.2005.06.020","issue":"3","year":"2005","type":"journal_article","citation":{"mla":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3, 2005, pp. 509--528, doi:10.1016/j.tcs.2005.06.020.","bibtex":"@article{Wehrheim_2005, title={Slicing techniques for verification re-use}, DOI={10.1016/j.tcs.2005.06.020}, number={3}, journal={Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2005}, pages={509--528} }","chicago":"Wehrheim, Heike. “Slicing Techniques for Verification Re-Use.” Theor. Comput. Sci., no. 3 (2005): 509--528. https://doi.org/10.1016/j.tcs.2005.06.020.","ama":"Wehrheim H. Slicing techniques for verification re-use. Theor Comput Sci. 2005;(3):509--528. doi:10.1016/j.tcs.2005.06.020","apa":"Wehrheim, H. (2005). Slicing techniques for verification re-use. Theor. Comput. Sci., (3), 509--528. https://doi.org/10.1016/j.tcs.2005.06.020","ieee":"H. Wehrheim, “Slicing techniques for verification re-use,” Theor. Comput. Sci., no. 3, pp. 509--528, 2005.","short":"H. Wehrheim, Theor. Comput. Sci. (2005) 509--528."},"page":"509--528","title":"Slicing techniques for verification re-use","user_id":"29719","author":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"publication":"Theor. Comput. Sci.","status":"public","date_created":"2018-06-14T06:40:02Z"},{"citation":{"bibtex":"@inproceedings{Rasch_Wehrheim_2005, series={Lecture Notes in Computer Science}, title={Checking the Validity of Scenarios in {UML} Models}, DOI={10.1007/11494881_5}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings}, author={Rasch, Holger and Wehrheim, Heike}, editor={Steffen, Martin and Zavattaro, GianluigiEditors}, year={2005}, pages={67--82}, collection={Lecture Notes in Computer Science} }","mla":"Rasch, Holger, and Heike Wehrheim. “Checking the Validity of Scenarios in {UML} Models.” Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings, edited by Martin Steffen and Gianluigi Zavattaro, 2005, pp. 67--82, doi:10.1007/11494881_5.","chicago":"Rasch, Holger, and Heike Wehrheim. “Checking the Validity of Scenarios in {UML} Models.” In Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings, edited by Martin Steffen and Gianluigi Zavattaro, 67--82. Lecture Notes in Computer Science, 2005. https://doi.org/10.1007/11494881_5.","apa":"Rasch, H., & Wehrheim, H. (2005). Checking the Validity of Scenarios in {UML} Models. In M. Steffen & G. Zavattaro (Eds.), Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings (pp. 67--82). https://doi.org/10.1007/11494881_5","ama":"Rasch H, Wehrheim H. Checking the Validity of Scenarios in {UML} Models. In: Steffen M, Zavattaro G, eds. Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings. Lecture Notes in Computer Science. ; 2005:67--82. doi:10.1007/11494881_5","ieee":"H. Rasch and H. Wehrheim, “Checking the Validity of Scenarios in {UML} Models,” in Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings, 2005, pp. 67--82.","short":"H. Rasch, H. Wehrheim, in: M. Steffen, G. Zavattaro (Eds.), Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings, 2005, pp. 67--82."},"type":"conference","year":"2005","page":"67--82","series_title":"Lecture Notes in Computer Science","doi":"10.1007/11494881_5","date_updated":"2022-01-06T06:59:06Z","_id":"3229","status":"public","date_created":"2018-06-14T06:41:20Z","editor":[{"last_name":"Steffen","full_name":"Steffen, Martin","first_name":"Martin"},{"full_name":"Zavattaro, Gianluigi","first_name":"Gianluigi","last_name":"Zavattaro"}],"author":[{"full_name":"Rasch, Holger","first_name":"Holger","last_name":"Rasch"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"publication":"Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings","user_id":"29719","title":"Checking the Validity of Scenarios in {UML} Models"},{"series_title":"Lecture Notes in Computer Science","page":"360--374","year":"2005","type":"conference","citation":{"mla":"Brückner, Ingo, and Heike Wehrheim. “Slicing an Integrated Formal Method for Verification.” Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings, edited by Kung{-}Kiu Lau and Richard Banach, 2005, pp. 360--374, doi:10.1007/11576280_25.","bibtex":"@inproceedings{Brückner_Wehrheim_2005, series={Lecture Notes in Computer Science}, title={Slicing an Integrated Formal Method for Verification}, DOI={10.1007/11576280_25}, booktitle={Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings}, author={Brückner, Ingo and Wehrheim, Heike}, editor={Lau, Kung{-}Kiu and Banach, RichardEditors}, year={2005}, pages={360--374}, collection={Lecture Notes in Computer Science} }","apa":"Brückner, I., & Wehrheim, H. (2005). Slicing an Integrated Formal Method for Verification. In K.-}Kiu Lau & R. Banach (Eds.), Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings (pp. 360--374). https://doi.org/10.1007/11576280_25","ama":"Brückner I, Wehrheim H. Slicing an Integrated Formal Method for Verification. In: Lau K-}Kiu, Banach R, eds. Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings. Lecture Notes in Computer Science. ; 2005:360--374. doi:10.1007/11576280_25","chicago":"Brückner, Ingo, and Heike Wehrheim. “Slicing an Integrated Formal Method for Verification.” In Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings, edited by Kung{-}Kiu Lau and Richard Banach, 360--374. Lecture Notes in Computer Science, 2005. https://doi.org/10.1007/11576280_25.","ieee":"I. Brückner and H. Wehrheim, “Slicing an Integrated Formal Method for Verification,” in Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings, 2005, pp. 360--374.","short":"I. Brückner, H. Wehrheim, in: K.-}Kiu Lau, R. Banach (Eds.), Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings, 2005, pp. 360--374."},"_id":"3230","date_updated":"2022-01-06T06:59:06Z","doi":"10.1007/11576280_25","department":[{"_id":"77"}],"publication":"Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings","author":[{"last_name":"Brückner","first_name":"Ingo","full_name":"Brückner, Ingo"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"editor":[{"full_name":"Lau, Kung{-}Kiu","first_name":"Kung{-}Kiu","last_name":"Lau"},{"last_name":"Banach","full_name":"Banach, Richard","first_name":"Richard"}],"date_created":"2018-06-14T06:42:51Z","status":"public","title":"Slicing an Integrated Formal Method for Verification","user_id":"29719"},{"type":"conference","citation":{"apa":"Derrick, J., & Wehrheim, H. (2005). Non-atomic Refinement in {Z} and {CSP}. In H. Treharne, S. King, M. C. Henson, & S. A. Schneider (Eds.), {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings (pp. 24--44). https://doi.org/10.1007/11415787_3","ama":"Derrick J, Wehrheim H. Non-atomic Refinement in {Z} and {CSP}. In: Treharne H, King S, C. Henson M, A. Schneider S, eds. {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings. Lecture Notes in Computer Science. ; 2005:24--44. doi:10.1007/11415787_3","chicago":"Derrick, John, and Heike Wehrheim. “Non-Atomic Refinement in {Z} and {CSP}.” In {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, edited by Helen Treharne, Steve King, Martin C. Henson, and Steve A. Schneider, 24--44. Lecture Notes in Computer Science, 2005. https://doi.org/10.1007/11415787_3.","mla":"Derrick, John, and Heike Wehrheim. “Non-Atomic Refinement in {Z} and {CSP}.” {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, edited by Helen Treharne et al., 2005, pp. 24--44, doi:10.1007/11415787_3.","bibtex":"@inproceedings{Derrick_Wehrheim_2005, series={Lecture Notes in Computer Science}, title={Non-atomic Refinement in {Z} and {CSP}}, DOI={10.1007/11415787_3}, booktitle={{ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings}, author={Derrick, John and Wehrheim, Heike}, editor={Treharne, Helen and King, Steve and C. Henson, Martin and A. Schneider, SteveEditors}, year={2005}, pages={24--44}, collection={Lecture Notes in Computer Science} }","short":"J. Derrick, H. Wehrheim, in: H. Treharne, S. King, M. C. Henson, S. A. Schneider (Eds.), {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, 2005, pp. 24--44.","ieee":"J. Derrick and H. Wehrheim, “Non-atomic Refinement in {Z} and {CSP},” in {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, 2005, pp. 24--44."},"year":"2005","page":"24--44","series_title":"Lecture Notes in Computer Science","doi":"10.1007/11415787_3","date_updated":"2022-01-06T06:59:06Z","_id":"3231","editor":[{"first_name":"Helen","full_name":"Treharne, Helen","last_name":"Treharne"},{"last_name":"King","full_name":"King, Steve","first_name":"Steve"},{"last_name":"C. Henson","full_name":"C. Henson, Martin","first_name":"Martin"},{"last_name":"A. Schneider","first_name":"Steve","full_name":"A. Schneider, Steve"}],"status":"public","date_created":"2018-06-14T06:44:17Z","author":[{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"publication":"{ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings","title":"Non-atomic Refinement in {Z} and {CSP}","user_id":"29719"},{"doi":"10.1007/11415787_24","date_updated":"2022-01-06T06:59:06Z","_id":"3232","type":"conference","year":"2005","citation":{"chicago":"Brückner, Ingo, and Heike Wehrheim. “Slicing Object-Z Specifications for Verification.” In {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, edited by Helen Treharne, Steve King, Martin C. Henson, and Steve A. Schneider, 414--433. Lecture Notes in Computer Science, 2005. https://doi.org/10.1007/11415787_24.","ama":"Brückner I, Wehrheim H. Slicing Object-Z Specifications for Verification. In: Treharne H, King S, C. Henson M, A. Schneider S, eds. {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings. Lecture Notes in Computer Science. ; 2005:414--433. doi:10.1007/11415787_24","apa":"Brückner, I., & Wehrheim, H. (2005). Slicing Object-Z Specifications for Verification. In H. Treharne, S. King, M. C. Henson, & S. A. Schneider (Eds.), {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings (pp. 414--433). https://doi.org/10.1007/11415787_24","mla":"Brückner, Ingo, and Heike Wehrheim. “Slicing Object-Z Specifications for Verification.” {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, edited by Helen Treharne et al., 2005, pp. 414--433, doi:10.1007/11415787_24.","bibtex":"@inproceedings{Brückner_Wehrheim_2005, series={Lecture Notes in Computer Science}, title={Slicing Object-Z Specifications for Verification}, DOI={10.1007/11415787_24}, booktitle={{ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings}, author={Brückner, Ingo and Wehrheim, Heike}, editor={Treharne, Helen and King, Steve and C. Henson, Martin and A. Schneider, SteveEditors}, year={2005}, pages={414--433}, collection={Lecture Notes in Computer Science} }","short":"I. Brückner, H. Wehrheim, in: H. Treharne, S. King, M. C. Henson, S. A. Schneider (Eds.), {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, 2005, pp. 414--433.","ieee":"I. Brückner and H. Wehrheim, “Slicing Object-Z Specifications for Verification,” in {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings, 2005, pp. 414--433."},"page":"414--433","series_title":"Lecture Notes in Computer Science","title":"Slicing Object-Z Specifications for Verification","user_id":"29719","editor":[{"full_name":"Treharne, Helen","first_name":"Helen","last_name":"Treharne"},{"last_name":"King","full_name":"King, Steve","first_name":"Steve"},{"last_name":"C. Henson","full_name":"C. Henson, Martin","first_name":"Martin"},{"first_name":"Steve","full_name":"A. Schneider, Steve","last_name":"A. Schneider"}],"status":"public","date_created":"2018-06-14T06:45:30Z","author":[{"first_name":"Ingo","full_name":"Brückner, Ingo","last_name":"Brückner"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"department":[{"_id":"77"}],"publication":"{ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings"},{"title":"Refinement and Consistency in Component Models with Multiple Views","user_id":"29719","editor":[{"first_name":"Ralf","full_name":"H. Reussner, Ralf","last_name":"H. Reussner"},{"first_name":"Judith","full_name":"A. Stafford, Judith","last_name":"A. Stafford"},{"last_name":"A. Szyperski","full_name":"A. Szyperski, Clemens","first_name":"Clemens"}],"date_created":"2018-06-14T06:46:31Z","status":"public","department":[{"_id":"77"}],"publication":"Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers","author":[{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"doi":"10.1007/11786160_5","_id":"3233","date_updated":"2022-01-06T06:59:06Z","page":"84--102","citation":{"ieee":"H. Wehrheim, “Refinement and Consistency in Component Models with Multiple Views,” in Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers, 2004, pp. 84--102.","short":"H. Wehrheim, in: R. H. Reussner, J. A. Stafford, C. A. Szyperski (Eds.), Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers, 2004, pp. 84--102.","mla":"Wehrheim, Heike. “Refinement and Consistency in Component Models with Multiple Views.” Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers, edited by Ralf H. Reussner et al., 2004, pp. 84--102, doi:10.1007/11786160_5.","bibtex":"@inproceedings{Wehrheim_2004, series={Lecture Notes in Computer Science}, title={Refinement and Consistency in Component Models with Multiple Views}, DOI={10.1007/11786160_5}, booktitle={Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers}, author={Wehrheim, Heike}, editor={H. Reussner, Ralf and A. Stafford, Judith and A. Szyperski, ClemensEditors}, year={2004}, pages={84--102}, collection={Lecture Notes in Computer Science} }","apa":"Wehrheim, H. (2004). Refinement and Consistency in Component Models with Multiple Views. In R. H. Reussner, J. A. Stafford, & C. A. Szyperski (Eds.), Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers (pp. 84--102). https://doi.org/10.1007/11786160_5","ama":"Wehrheim H. Refinement and Consistency in Component Models with Multiple Views. In: H. Reussner R, A. Stafford J, A. Szyperski C, eds. Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers. Lecture Notes in Computer Science. ; 2004:84--102. doi:10.1007/11786160_5","chicago":"Wehrheim, Heike. “Refinement and Consistency in Component Models with Multiple Views.” In Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers, edited by Ralf H. Reussner, Judith A. Stafford, and Clemens A. Szyperski, 84--102. Lecture Notes in Computer Science, 2004. https://doi.org/10.1007/11786160_5."},"type":"conference","year":"2004","series_title":"Lecture Notes in Computer Science"},{"author":[{"last_name":"Möller","full_name":"Möller, Michael","first_name":"Michael"},{"full_name":"Olderog, Ernst-Rüdiger","first_name":"Ernst-Rüdiger","last_name":"Olderog"},{"first_name":"Holger","full_name":"Rasch, Holger","last_name":"Rasch"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"department":[{"_id":"77"}],"publication":"Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings","status":"public","date_created":"2018-06-14T06:47:35Z","editor":[{"last_name":"A. Boiten","full_name":"A. Boiten, Eerke","first_name":"Eerke"},{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"full_name":"Smith, Graeme","first_name":"Graeme","last_name":"Smith"}],"user_id":"29719","title":"Linking {CSP-OZ} with {UML} and Java: {A} Case Study","series_title":"Lecture Notes in Computer Science","year":"2004","citation":{"chicago":"Möller, Michael, Ernst-Rüdiger Olderog, Holger Rasch, and Heike Wehrheim. “Linking {CSP-OZ} with {UML} and Java: {A} Case Study.” In Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings, edited by Eerke A. Boiten, John Derrick, and Graeme Smith, 267--286. Lecture Notes in Computer Science, 2004. https://doi.org/10.1007/978-3-540-24756-2_15.","apa":"Möller, M., Olderog, E.-R., Rasch, H., & Wehrheim, H. (2004). Linking {CSP-OZ} with {UML} and Java: {A} Case Study. In E. A. Boiten, J. Derrick, & G. Smith (Eds.), Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings (pp. 267--286). https://doi.org/10.1007/978-3-540-24756-2_15","ama":"Möller M, Olderog E-R, Rasch H, Wehrheim H. Linking {CSP-OZ} with {UML} and Java: {A} Case Study. In: A. Boiten E, Derrick J, Smith G, eds. Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings. Lecture Notes in Computer Science. ; 2004:267--286. doi:10.1007/978-3-540-24756-2_15","mla":"Möller, Michael, et al. “Linking {CSP-OZ} with {UML} and Java: {A} Case Study.” Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings, edited by Eerke A. Boiten et al., 2004, pp. 267--286, doi:10.1007/978-3-540-24756-2_15.","bibtex":"@inproceedings{Möller_Olderog_Rasch_Wehrheim_2004, series={Lecture Notes in Computer Science}, title={Linking {CSP-OZ} with {UML} and Java: {A} Case Study}, DOI={10.1007/978-3-540-24756-2_15}, booktitle={Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings}, author={Möller, Michael and Olderog, Ernst-Rüdiger and Rasch, Holger and Wehrheim, Heike}, editor={A. Boiten, Eerke and Derrick, John and Smith, GraemeEditors}, year={2004}, pages={267--286}, collection={Lecture Notes in Computer Science} }","short":"M. Möller, E.-R. Olderog, H. Rasch, H. Wehrheim, in: E. A. Boiten, J. Derrick, G. Smith (Eds.), Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings, 2004, pp. 267--286.","ieee":"M. Möller, E.-R. Olderog, H. Rasch, and H. Wehrheim, “Linking {CSP-OZ} with {UML} and Java: {A} Case Study,” in Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings, 2004, pp. 267--286."},"type":"conference","page":"267--286","date_updated":"2022-01-06T06:59:06Z","_id":"3234","doi":"10.1007/978-3-540-24756-2_15"},{"type":"conference","citation":{"ama":"Wehrheim H. Refinement and Consistency in Multiview Models. In: B{\\’{e}}zivin J, Heckel R, eds. Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004. Dagstuhl Seminar Proceedings. ; 2004.","apa":"Wehrheim, H. (2004). Refinement and Consistency in Multiview Models. In J. B{\\’{e}}zivin & R. Heckel (Eds.), Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004.","chicago":"Wehrheim, Heike. “Refinement and Consistency in Multiview Models.” In Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004, edited by Jean B{\\’{e}}zivin and Reiko Heckel. Dagstuhl Seminar Proceedings, 2004.","bibtex":"@inproceedings{Wehrheim_2004, series={Dagstuhl Seminar Proceedings}, title={Refinement and Consistency in Multiview Models}, booktitle={Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004}, author={Wehrheim, Heike}, editor={B{\\’{e}}zivin, Jean and Heckel, ReikoEditors}, year={2004}, collection={Dagstuhl Seminar Proceedings} }","mla":"Wehrheim, Heike. “Refinement and Consistency in Multiview Models.” Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004, edited by Jean B{\\’{e}}zivin and Reiko Heckel, 2004.","short":"H. Wehrheim, in: J. B{\\’{e}}zivin, R. Heckel (Eds.), Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004, 2004.","ieee":"H. Wehrheim, “Refinement and Consistency in Multiview Models,” in Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004, 2004."},"year":"2004","series_title":"Dagstuhl Seminar Proceedings","date_updated":"2022-01-06T06:59:06Z","_id":"3235","editor":[{"first_name":"Jean","full_name":"B{\\'{e}}zivin, Jean","last_name":"B{\\'{e}}zivin"},{"last_name":"Heckel","full_name":"Heckel, Reiko","first_name":"Reiko"}],"date_created":"2018-06-14T06:48:55Z","status":"public","publication":"Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004","department":[{"_id":"77"}],"author":[{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"title":"Refinement and Consistency in Multiview Models","user_id":"29719"},{"author":[{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Formal Methods in System Design","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-14T06:49:57Z","user_id":"29719","title":"Behavioral Subtyping Relations for Active Objects","year":"2003","type":"journal_article","citation":{"chicago":"Wehrheim, Heike. “Behavioral Subtyping Relations for Active Objects.” Formal Methods in System Design, no. 2 (2003): 143--170. https://doi.org/10.1023/A:1024764232069.","ama":"Wehrheim H. Behavioral Subtyping Relations for Active Objects. Formal Methods in System Design. 2003;(2):143--170. doi:10.1023/A:1024764232069","apa":"Wehrheim, H. (2003). Behavioral Subtyping Relations for Active Objects. Formal Methods in System Design, (2), 143--170. https://doi.org/10.1023/A:1024764232069","mla":"Wehrheim, Heike. “Behavioral Subtyping Relations for Active Objects.” Formal Methods in System Design, no. 2, 2003, pp. 143--170, doi:10.1023/A:1024764232069.","bibtex":"@article{Wehrheim_2003, title={Behavioral Subtyping Relations for Active Objects}, DOI={10.1023/A:1024764232069}, number={2}, journal={Formal Methods in System Design}, author={Wehrheim, Heike}, year={2003}, pages={143--170} }","short":"H. Wehrheim, Formal Methods in System Design (2003) 143--170.","ieee":"H. Wehrheim, “Behavioral Subtyping Relations for Active Objects,” Formal Methods in System Design, no. 2, pp. 143--170, 2003."},"page":"143--170","_id":"3236","date_updated":"2022-01-06T06:59:06Z","issue":"2","doi":"10.1023/A:1024764232069"},{"series_title":"Lecture Notes in Computer Science","type":"conference","citation":{"short":"H. Wehrheim, in: F. S. de Boer, M. M. Bonsangue, S. Graf, W. P. de Roever (Eds.), Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures, 2003, pp. 330--343.","ieee":"H. Wehrheim, “Preserving Properties Under Change,” in Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures, 2003, pp. 330--343.","ama":"Wehrheim H. Preserving Properties Under Change. In: S. de Boer F, M. Bonsangue M, Graf S, P. de Roever W, eds. Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures. Lecture Notes in Computer Science. ; 2003:330--343. doi:10.1007/978-3-540-30101-1_16","apa":"Wehrheim, H. (2003). Preserving Properties Under Change. In F. S. de Boer, M. M. Bonsangue, S. Graf, & W. P. de Roever (Eds.), Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures (pp. 330--343). https://doi.org/10.1007/978-3-540-30101-1_16","chicago":"Wehrheim, Heike. “Preserving Properties Under Change.” In Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures, edited by Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, and Willem P. de Roever, 330--343. Lecture Notes in Computer Science, 2003. https://doi.org/10.1007/978-3-540-30101-1_16.","bibtex":"@inproceedings{Wehrheim_2003, series={Lecture Notes in Computer Science}, title={Preserving Properties Under Change}, DOI={10.1007/978-3-540-30101-1_16}, booktitle={Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures}, author={Wehrheim, Heike}, editor={S. de Boer, Frank and M. Bonsangue, Marcello and Graf, Susanne and P. de Roever, WillemEditors}, year={2003}, pages={330--343}, collection={Lecture Notes in Computer Science} }","mla":"Wehrheim, Heike. “Preserving Properties Under Change.” Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures, edited by Frank S. de Boer et al., 2003, pp. 330--343, doi:10.1007/978-3-540-30101-1_16."},"year":"2003","page":"330--343","date_updated":"2022-01-06T06:59:06Z","_id":"3237","doi":"10.1007/978-3-540-30101-1_16","author":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"publication":"Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures","department":[{"_id":"77"}],"editor":[{"first_name":"Frank","full_name":"S. de Boer, Frank","last_name":"S. de Boer"},{"last_name":"M. Bonsangue","full_name":"M. Bonsangue, Marcello","first_name":"Marcello"},{"full_name":"Graf, Susanne","first_name":"Susanne","last_name":"Graf"},{"first_name":"Willem","full_name":"P. de Roever, Willem","last_name":"P. de Roever"}],"status":"public","date_created":"2018-06-14T06:51:09Z","title":"Preserving Properties Under Change","user_id":"29719"},{"date_updated":"2022-01-06T06:59:06Z","_id":"3238","doi":"10.1007/978-3-540-39958-2_6","series_title":"Lecture Notes in Computer Science","page":"79--93","citation":{"ieee":"H. Wehrheim, “Inheritance of Temporal Logic Properties,” in Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, 2003, pp. 79--93.","short":"H. Wehrheim, in: E. Najm, U. Nestmann, P. Stevens (Eds.), Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, 2003, pp. 79--93.","bibtex":"@inproceedings{Wehrheim_2003, series={Lecture Notes in Computer Science}, title={Inheritance of Temporal Logic Properties}, DOI={10.1007/978-3-540-39958-2_6}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings}, author={Wehrheim, Heike}, editor={Najm, Elie and Nestmann, Uwe and Stevens, PerditaEditors}, year={2003}, pages={79--93}, collection={Lecture Notes in Computer Science} }","mla":"Wehrheim, Heike. “Inheritance of Temporal Logic Properties.” Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, edited by Elie Najm et al., 2003, pp. 79--93, doi:10.1007/978-3-540-39958-2_6.","apa":"Wehrheim, H. (2003). Inheritance of Temporal Logic Properties. In E. Najm, U. Nestmann, & P. Stevens (Eds.), Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings (pp. 79--93). https://doi.org/10.1007/978-3-540-39958-2_6","ama":"Wehrheim H. Inheritance of Temporal Logic Properties. In: Najm E, Nestmann U, Stevens P, eds. Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings. Lecture Notes in Computer Science. ; 2003:79--93. doi:10.1007/978-3-540-39958-2_6","chicago":"Wehrheim, Heike. “Inheritance of Temporal Logic Properties.” In Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, edited by Elie Najm, Uwe Nestmann, and Perdita Stevens, 79--93. Lecture Notes in Computer Science, 2003. https://doi.org/10.1007/978-3-540-39958-2_6."},"type":"conference","year":"2003","title":"Inheritance of Temporal Logic Properties","user_id":"29719","department":[{"_id":"77"}],"publication":"Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings","author":[{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"editor":[{"first_name":"Elie","full_name":"Najm, Elie","last_name":"Najm"},{"first_name":"Uwe","full_name":"Nestmann, Uwe","last_name":"Nestmann"},{"last_name":"Stevens","first_name":"Perdita","full_name":"Stevens, Perdita"}],"date_created":"2018-06-14T06:52:17Z","status":"public"},{"type":"conference","citation":{"mla":"Rasch, Holger, and Heike Wehrheim. “Checking Consistency in {UML} Diagramms: Classes and State Machines.” Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, edited by Elie Najm et al., 2003, pp. 229--243, doi:10.1007/978-3-540-39958-2_16.","bibtex":"@inproceedings{Rasch_Wehrheim_2003, series={Lecture Notes in Computer Science}, title={Checking Consistency in {UML} Diagramms: Classes and State Machines}, DOI={10.1007/978-3-540-39958-2_16}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings}, author={Rasch, Holger and Wehrheim, Heike}, editor={Najm, Elie and Nestmann, Uwe and Stevens, PerditaEditors}, year={2003}, pages={229--243}, collection={Lecture Notes in Computer Science} }","chicago":"Rasch, Holger, and Heike Wehrheim. “Checking Consistency in {UML} Diagramms: Classes and State Machines.” In Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, edited by Elie Najm, Uwe Nestmann, and Perdita Stevens, 229--243. Lecture Notes in Computer Science, 2003. https://doi.org/10.1007/978-3-540-39958-2_16.","ama":"Rasch H, Wehrheim H. Checking Consistency in {UML} Diagramms: Classes and State Machines. In: Najm E, Nestmann U, Stevens P, eds. Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings. Lecture Notes in Computer Science. ; 2003:229--243. doi:10.1007/978-3-540-39958-2_16","apa":"Rasch, H., & Wehrheim, H. (2003). Checking Consistency in {UML} Diagramms: Classes and State Machines. In E. Najm, U. Nestmann, & P. Stevens (Eds.), Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings (pp. 229--243). https://doi.org/10.1007/978-3-540-39958-2_16","ieee":"H. Rasch and H. Wehrheim, “Checking Consistency in {UML} Diagramms: Classes and State Machines,” in Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, 2003, pp. 229--243.","short":"H. Rasch, H. Wehrheim, in: E. Najm, U. Nestmann, P. Stevens (Eds.), Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings, 2003, pp. 229--243."},"year":"2003","page":"229--243","series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-540-39958-2_16","_id":"3239","date_updated":"2022-01-06T06:59:06Z","editor":[{"first_name":"Elie","full_name":"Najm, Elie","last_name":"Najm"},{"last_name":"Nestmann","full_name":"Nestmann, Uwe","first_name":"Uwe"},{"last_name":"Stevens","full_name":"Stevens, Perdita","first_name":"Perdita"}],"status":"public","date_created":"2018-06-14T06:53:24Z","author":[{"full_name":"Rasch, Holger","first_name":"Holger","last_name":"Rasch"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"department":[{"_id":"77"}],"publication":"Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings","title":"Checking Consistency in {UML} Diagramms: Classes and State Machines","user_id":"29719"},{"date_created":"2018-06-14T06:54:54Z","status":"public","editor":[{"first_name":"Didier","full_name":"Bert, Didier","last_name":"Bert"},{"full_name":"P. Bowen, Jonathan","first_name":"Jonathan","last_name":"P. Bowen"},{"first_name":"Steve","full_name":"King, Steve","last_name":"King"},{"last_name":"A. Wald{\\'{e}}n","full_name":"A. Wald{\\'{e}}n, Marina","first_name":"Marina"}],"publication":"{ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings","department":[{"_id":"77"}],"author":[{"last_name":"Derrick","first_name":"John","full_name":"Derrick, John"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"user_id":"29719","title":"Using Coupled Simulations in Non-atomic Refinement","page":"127--147","type":"conference","citation":{"short":"J. Derrick, H. Wehrheim, in: D. Bert, J. P. Bowen, S. King, M. A. Wald{\\’{e}}n (Eds.), {ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings, 2003, pp. 127--147.","ieee":"J. Derrick and H. Wehrheim, “Using Coupled Simulations in Non-atomic Refinement,” in {ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings, 2003, pp. 127--147.","apa":"Derrick, J., & Wehrheim, H. (2003). Using Coupled Simulations in Non-atomic Refinement. In D. Bert, J. P. Bowen, S. King, & M. A. Wald{\\’{e}}n (Eds.), {ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings (pp. 127--147). https://doi.org/10.1007/3-540-44880-2_10","ama":"Derrick J, Wehrheim H. Using Coupled Simulations in Non-atomic Refinement. In: Bert D, P. Bowen J, King S, A. Wald{\\’{e}}n M, eds. {ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings. Lecture Notes in Computer Science. ; 2003:127--147. doi:10.1007/3-540-44880-2_10","chicago":"Derrick, John, and Heike Wehrheim. “Using Coupled Simulations in Non-Atomic Refinement.” In {ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings, edited by Didier Bert, Jonathan P. Bowen, Steve King, and Marina A. Wald{\\’{e}}n, 127--147. Lecture Notes in Computer Science, 2003. https://doi.org/10.1007/3-540-44880-2_10.","bibtex":"@inproceedings{Derrick_Wehrheim_2003, series={Lecture Notes in Computer Science}, title={Using Coupled Simulations in Non-atomic Refinement}, DOI={10.1007/3-540-44880-2_10}, booktitle={{ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings}, author={Derrick, John and Wehrheim, Heike}, editor={Bert, Didier and P. Bowen, Jonathan and King, Steve and A. Wald{\\’{e}}n, MarinaEditors}, year={2003}, pages={127--147}, collection={Lecture Notes in Computer Science} }","mla":"Derrick, John, and Heike Wehrheim. “Using Coupled Simulations in Non-Atomic Refinement.” {ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings, edited by Didier Bert et al., 2003, pp. 127--147, doi:10.1007/3-540-44880-2_10."},"year":"2003","series_title":"Lecture Notes in Computer Science","doi":"10.1007/3-540-44880-2_10","_id":"3240","date_updated":"2022-01-06T06:59:07Z"},{"date_updated":"2022-01-06T06:59:07Z","_id":"3241","issue":"4","page":"405--435","year":"2002","type":"journal_article","citation":{"ieee":"H. Wehrheim, “Relating State-based and Behaviour-oriented Subtyping,” Nord. J. Comput., no. 4, pp. 405--435, 2002.","short":"H. Wehrheim, Nord. J. Comput. (2002) 405--435.","mla":"Wehrheim, Heike. “Relating State-Based and Behaviour-Oriented Subtyping.” Nord. J. Comput., no. 4, 2002, pp. 405--435.","bibtex":"@article{Wehrheim_2002, title={Relating State-based and Behaviour-oriented Subtyping}, number={4}, journal={Nord. J. Comput.}, author={Wehrheim, Heike}, year={2002}, pages={405--435} }","chicago":"Wehrheim, Heike. “Relating State-Based and Behaviour-Oriented Subtyping.” Nord. J. Comput., no. 4 (2002): 405--435.","apa":"Wehrheim, H. (2002). Relating State-based and Behaviour-oriented Subtyping. Nord. J. Comput., (4), 405--435.","ama":"Wehrheim H. Relating State-based and Behaviour-oriented Subtyping. Nord J Comput. 2002;(4):405--435."},"user_id":"29719","title":"Relating State-based and Behaviour-oriented Subtyping","publication":"Nord. J. Comput.","department":[{"_id":"77"}],"author":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"date_created":"2018-06-14T06:56:20Z","status":"public"},{"doi":"10.1007/978-3-540-39656-7_15","date_updated":"2022-01-06T06:59:07Z","_id":"3242","type":"conference","citation":{"ama":"Olderog E-R, Wehrheim H. Specification and Inheritance in {CSP-OZ}. In: S. de Boer F, M. Bonsangue M, Graf S, P. de Roever W, eds. Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures. Lecture Notes in Computer Science. ; 2002:361--379. doi:10.1007/978-3-540-39656-7_15","apa":"Olderog, E.-R., & Wehrheim, H. (2002). Specification and Inheritance in {CSP-OZ}. In F. S. de Boer, M. M. Bonsangue, S. Graf, & W. P. de Roever (Eds.), Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures (pp. 361--379). https://doi.org/10.1007/978-3-540-39656-7_15","chicago":"Olderog, Ernst-Rüdiger, and Heike Wehrheim. “Specification and Inheritance in {CSP-OZ}.” In Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures, edited by Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, and Willem P. de Roever, 361--379. Lecture Notes in Computer Science, 2002. https://doi.org/10.1007/978-3-540-39656-7_15.","mla":"Olderog, Ernst-Rüdiger, and Heike Wehrheim. “Specification and Inheritance in {CSP-OZ}.” Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures, edited by Frank S. de Boer et al., 2002, pp. 361--379, doi:10.1007/978-3-540-39656-7_15.","bibtex":"@inproceedings{Olderog_Wehrheim_2002, series={Lecture Notes in Computer Science}, title={Specification and Inheritance in {CSP-OZ}}, DOI={10.1007/978-3-540-39656-7_15}, booktitle={Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures}, author={Olderog, Ernst-Rüdiger and Wehrheim, Heike}, editor={S. de Boer, Frank and M. Bonsangue, Marcello and Graf, Susanne and P. de Roever, WillemEditors}, year={2002}, pages={361--379}, collection={Lecture Notes in Computer Science} }","short":"E.-R. Olderog, H. Wehrheim, in: F. S. de Boer, M. M. Bonsangue, S. Graf, W. P. de Roever (Eds.), Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures, 2002, pp. 361--379.","ieee":"E.-R. Olderog and H. Wehrheim, “Specification and Inheritance in {CSP-OZ},” in Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures, 2002, pp. 361--379."},"year":"2002","page":"361--379","series_title":"Lecture Notes in Computer Science","title":"Specification and Inheritance in {CSP-OZ}","user_id":"29719","editor":[{"last_name":"S. de Boer","full_name":"S. de Boer, Frank","first_name":"Frank"},{"first_name":"Marcello","full_name":"M. Bonsangue, Marcello","last_name":"M. Bonsangue"},{"last_name":"Graf","first_name":"Susanne","full_name":"Graf, Susanne"},{"last_name":"P. de Roever","first_name":"Willem","full_name":"P. de Roever, Willem"}],"status":"public","date_created":"2018-06-14T07:10:28Z","author":[{"last_name":"Olderog","full_name":"Olderog, Ernst-Rüdiger","first_name":"Ernst-Rüdiger"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"department":[{"_id":"77"}],"publication":"Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures"},{"publication":"Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands","department":[{"_id":"77"}],"author":[{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"editor":[{"last_name":"Jacobs","first_name":"Bart","full_name":"Jacobs, Bart"},{"last_name":"Rensink","first_name":"Arend","full_name":"Rensink, Arend"}],"date_created":"2018-06-14T07:11:33Z","status":"public","title":"Checking Behavioural Subtypes via Refinement","user_id":"29719","series_title":"{IFIP} Conference Proceedings","page":"79--93","year":"2002","citation":{"short":"H. Wehrheim, in: B. Jacobs, A. Rensink (Eds.), Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands, 2002, pp. 79--93.","ieee":"H. Wehrheim, “Checking Behavioural Subtypes via Refinement,” in Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands, 2002, pp. 79--93.","chicago":"Wehrheim, Heike. “Checking Behavioural Subtypes via Refinement.” In Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands, edited by Bart Jacobs and Arend Rensink, 79--93. {IFIP} Conference Proceedings, 2002.","ama":"Wehrheim H. Checking Behavioural Subtypes via Refinement. In: Jacobs B, Rensink A, eds. Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands. {IFIP} Conference Proceedings. ; 2002:79--93.","apa":"Wehrheim, H. (2002). Checking Behavioural Subtypes via Refinement. In B. Jacobs & A. Rensink (Eds.), Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands (pp. 79--93).","mla":"Wehrheim, Heike. “Checking Behavioural Subtypes via Refinement.” Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands, edited by Bart Jacobs and Arend Rensink, 2002, pp. 79--93.","bibtex":"@inproceedings{Wehrheim_2002, series={{IFIP} Conference Proceedings}, title={Checking Behavioural Subtypes via Refinement}, booktitle={Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands}, author={Wehrheim, Heike}, editor={Jacobs, Bart and Rensink, ArendEditors}, year={2002}, pages={79--93}, collection={{IFIP} Conference Proceedings} }"},"type":"conference","date_updated":"2022-01-06T06:59:07Z","_id":"3243"},{"author":[{"full_name":"Rensink, Arend","first_name":"Arend","last_name":"Rensink"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"publication":"Acta Inf.","status":"public","date_created":"2018-06-14T07:12:39Z","user_id":"29719","title":"Process algebra with action dependencies","citation":{"ieee":"A. Rensink and H. Wehrheim, “Process algebra with action dependencies,” Acta Inf., no. 3, pp. 155--234, 2001.","short":"A. Rensink, H. Wehrheim, Acta Inf. (2001) 155--234.","bibtex":"@article{Rensink_Wehrheim_2001, title={Process algebra with action dependencies}, DOI={10.1007/s002360100070}, number={3}, journal={Acta Inf.}, author={Rensink, Arend and Wehrheim, Heike}, year={2001}, pages={155--234} }","mla":"Rensink, Arend, and Heike Wehrheim. “Process Algebra with Action Dependencies.” Acta Inf., no. 3, 2001, pp. 155--234, doi:10.1007/s002360100070.","chicago":"Rensink, Arend, and Heike Wehrheim. “Process Algebra with Action Dependencies.” Acta Inf., no. 3 (2001): 155--234. https://doi.org/10.1007/s002360100070.","apa":"Rensink, A., & Wehrheim, H. (2001). Process algebra with action dependencies. Acta Inf., (3), 155--234. https://doi.org/10.1007/s002360100070","ama":"Rensink A, Wehrheim H. Process algebra with action dependencies. Acta Inf. 2001;(3):155--234. doi:10.1007/s002360100070"},"type":"journal_article","year":"2001","page":"155--234","_id":"3244","date_updated":"2022-01-06T06:59:07Z","issue":"3","doi":"10.1007/s002360100070"},{"author":[{"full_name":"Bartetzko, Detlef","first_name":"Detlef","last_name":"Bartetzko"},{"last_name":"Fischer","full_name":"Fischer, Clemens","first_name":"Clemens"},{"last_name":"Möller","full_name":"Möller, Michael","first_name":"Michael"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Electr. Notes Theor. Comput. Sci.","department":[{"_id":"77"}],"status":"public","date_created":"2018-06-14T07:14:07Z","user_id":"29719","title":"Jass - Java with Assertions","citation":{"ieee":"D. Bartetzko, C. Fischer, M. Möller, and H. Wehrheim, “Jass - Java with Assertions,” Electr. Notes Theor. Comput. Sci., no. 2, pp. 103--117, 2001.","short":"D. Bartetzko, C. Fischer, M. Möller, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2001) 103--117.","bibtex":"@article{Bartetzko_Fischer_Möller_Wehrheim_2001, title={Jass - Java with Assertions}, DOI={10.1016/S1571-0661(04)00247-6}, number={2}, journal={Electr. Notes Theor. Comput. Sci.}, author={Bartetzko, Detlef and Fischer, Clemens and Möller, Michael and Wehrheim, Heike}, year={2001}, pages={103--117} }","mla":"Bartetzko, Detlef, et al. “Jass - Java with Assertions.” Electr. Notes Theor. Comput. Sci., no. 2, 2001, pp. 103--117, doi:10.1016/S1571-0661(04)00247-6.","chicago":"Bartetzko, Detlef, Clemens Fischer, Michael Möller, and Heike Wehrheim. “Jass - Java with Assertions.” Electr. Notes Theor. Comput. Sci., no. 2 (2001): 103--117. https://doi.org/10.1016/S1571-0661(04)00247-6.","ama":"Bartetzko D, Fischer C, Möller M, Wehrheim H. Jass - Java with Assertions. Electr Notes Theor Comput Sci. 2001;(2):103--117. doi:10.1016/S1571-0661(04)00247-6","apa":"Bartetzko, D., Fischer, C., Möller, M., & Wehrheim, H. (2001). Jass - Java with Assertions. Electr. Notes Theor. Comput. Sci., (2), 103--117. https://doi.org/10.1016/S1571-0661(04)00247-6"},"year":"2001","type":"journal_article","page":"103--117","date_updated":"2022-01-06T06:59:07Z","_id":"3245","issue":"2","doi":"10.1016/S1571-0661(04)00247-6"},{"title":"A {CSP} View on {UML-RT} Structure Diagrams","user_id":"29719","editor":[{"last_name":"Hu{\\ss}mann","first_name":"Heinrich","full_name":"Hu{\\ss}mann, Heinrich"}],"status":"public","date_created":"2018-06-14T07:15:07Z","author":[{"last_name":"Fischer","first_name":"Clemens","full_name":"Fischer, Clemens"},{"full_name":"Olderog, Ernst-Rüdiger","first_name":"Ernst-Rüdiger","last_name":"Olderog"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings","department":[{"_id":"77"}],"doi":"10.1007/3-540-45314-8_8","_id":"3246","date_updated":"2022-01-06T06:59:07Z","type":"conference","year":"2001","citation":{"short":"C. Fischer, E.-R. Olderog, H. Wehrheim, in: H. Hu{\\ss}mann (Ed.), Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings, 2001, pp. 91--108.","ieee":"C. Fischer, E.-R. Olderog, and H. Wehrheim, “A {CSP} View on {UML-RT} Structure Diagrams,” in Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings, 2001, pp. 91--108.","ama":"Fischer C, Olderog E-R, Wehrheim H. A {CSP} View on {UML-RT} Structure Diagrams. In: Hu{\\ss}mann H, ed. Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings. Lecture Notes in Computer Science. ; 2001:91--108. doi:10.1007/3-540-45314-8_8","apa":"Fischer, C., Olderog, E.-R., & Wehrheim, H. (2001). A {CSP} View on {UML-RT} Structure Diagrams. In H. Hu{\\ss}mann (Ed.), Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings (pp. 91--108). https://doi.org/10.1007/3-540-45314-8_8","chicago":"Fischer, Clemens, Ernst-Rüdiger Olderog, and Heike Wehrheim. “A {CSP} View on {UML-RT} Structure Diagrams.” In Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings, edited by Heinrich Hu{\\ss}mann, 91--108. Lecture Notes in Computer Science, 2001. https://doi.org/10.1007/3-540-45314-8_8.","bibtex":"@inproceedings{Fischer_Olderog_Wehrheim_2001, series={Lecture Notes in Computer Science}, title={A {CSP} View on {UML-RT} Structure Diagrams}, DOI={10.1007/3-540-45314-8_8}, booktitle={Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings}, author={Fischer, Clemens and Olderog, Ernst-Rüdiger and Wehrheim, Heike}, editor={Hu{\\ss}mann, HeinrichEditor}, year={2001}, pages={91--108}, collection={Lecture Notes in Computer Science} }","mla":"Fischer, Clemens, et al. “A {CSP} View on {UML-RT} Structure Diagrams.” Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings, edited by Heinrich Hu{\\ss}mann, 2001, pp. 91--108, doi:10.1007/3-540-45314-8_8."},"page":"91--108","series_title":"Lecture Notes in Computer Science"},{"date_updated":"2022-01-06T06:59:07Z","_id":"3247","year":"2000","type":"journal_article","citation":{"apa":"Fischer, C., & Wehrheim, H. (2000). Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method. Bulletin of the {EATCS}, 92--101.","ama":"Fischer C, Wehrheim H. Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method. Bulletin of the {EATCS}. 2000:92--101.","chicago":"Fischer, Clemens, and Heike Wehrheim. “Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method.” Bulletin of the {EATCS}, 2000, 92--101.","mla":"Fischer, Clemens, and Heike Wehrheim. “Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method.” Bulletin of the {EATCS}, 2000, pp. 92--101.","bibtex":"@article{Fischer_Wehrheim_2000, title={Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method}, journal={Bulletin of the {EATCS}}, author={Fischer, Clemens and Wehrheim, Heike}, year={2000}, pages={92--101} }","short":"C. Fischer, H. Wehrheim, Bulletin of the {EATCS} (2000) 92--101.","ieee":"C. Fischer and H. Wehrheim, “Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method,” Bulletin of the {EATCS}, pp. 92--101, 2000."},"page":"92--101","user_id":"29719","title":"Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method","status":"public","date_created":"2018-06-14T07:17:49Z","author":[{"first_name":"Clemens","full_name":"Fischer, Clemens","last_name":"Fischer"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"publication":"Bulletin of the {EATCS}","department":[{"_id":"77"}]},{"page":"147--164","type":"journal_article","citation":{"bibtex":"@article{Wehrheim_2000, title={Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications}, DOI={10.1007/s001650070026}, number={3}, journal={Formal Asp. Comput.}, author={Wehrheim, Heike}, year={2000}, pages={147--164} }","mla":"Wehrheim, Heike. “Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications.” Formal Asp. Comput., no. 3, 2000, pp. 147--164, doi:10.1007/s001650070026.","ama":"Wehrheim H. Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications. Formal Asp Comput. 2000;(3):147--164. doi:10.1007/s001650070026","apa":"Wehrheim, H. (2000). Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications. Formal Asp. Comput., (3), 147--164. https://doi.org/10.1007/s001650070026","chicago":"Wehrheim, Heike. “Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications.” Formal Asp. Comput., no. 3 (2000): 147--164. https://doi.org/10.1007/s001650070026.","ieee":"H. Wehrheim, “Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications,” Formal Asp. Comput., no. 3, pp. 147--164, 2000.","short":"H. Wehrheim, Formal Asp. Comput. (2000) 147--164."},"year":"2000","doi":"10.1007/s001650070026","issue":"3","date_updated":"2022-01-06T06:59:07Z","_id":"3248","date_created":"2018-06-14T07:19:50Z","status":"public","publication":"Formal Asp. Comput.","department":[{"_id":"77"}],"author":[{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"title":"Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications","user_id":"29719"}]