[{"language":[{"iso":"eng"}],"_id":"162","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"user_id":"15504","status":"public","type":"mastersthesis","title":"Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:52:45Z","author":[{"first_name":"Guangli","full_name":"Zhang, Guangli","last_name":"Zhang"}],"supervisor":[{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_created":"2017-10-17T12:41:23Z","year":"2016","citation":{"apa":"Zhang, G. (2016). <i>Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions</i>. Universität Paderborn.","bibtex":"@book{Zhang_2016, title={Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions}, publisher={Universität Paderborn}, author={Zhang, Guangli}, year={2016} }","short":"G. Zhang, Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions, Universität Paderborn, 2016.","mla":"Zhang, Guangli. <i>Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions</i>. Universität Paderborn, 2016.","ama":"Zhang G. <i>Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions</i>. Universität Paderborn; 2016.","ieee":"G. Zhang, <i>Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions</i>. Universität Paderborn, 2016.","chicago":"Zhang, Guangli. <i>Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions</i>. Universität Paderborn, 2016."}},{"author":[{"last_name":"Czech","full_name":"Czech, Mike","first_name":"Mike"}],"supervisor":[{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_created":"2017-10-17T12:41:24Z","date_updated":"2022-01-06T06:52:50Z","publisher":"Universität Paderborn","title":"Predicting Rankings of Software Verification Tools Using Kernels for Structured Data","citation":{"ama":"Czech M. <i>Predicting Rankings of Software Verification Tools Using Kernels for Structured Data</i>. Universität Paderborn; 2016.","ieee":"M. Czech, <i>Predicting Rankings of Software Verification Tools Using Kernels for Structured Data</i>. Universität Paderborn, 2016.","chicago":"Czech, Mike. <i>Predicting Rankings of Software Verification Tools Using Kernels for Structured Data</i>. Universität Paderborn, 2016.","mla":"Czech, Mike. <i>Predicting Rankings of Software Verification Tools Using Kernels for Structured Data</i>. Universität Paderborn, 2016.","bibtex":"@book{Czech_2016, title={Predicting Rankings of Software Verification Tools Using Kernels for Structured Data}, publisher={Universität Paderborn}, author={Czech, Mike}, year={2016} }","short":"M. Czech, Predicting Rankings of Software Verification Tools Using Kernels for Structured Data, Universität Paderborn, 2016.","apa":"Czech, M. (2016). <i>Predicting Rankings of Software Verification Tools Using Kernels for Structured Data</i>. Universität Paderborn."},"year":"2016","user_id":"15504","department":[{"_id":"77"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"164","language":[{"iso":"eng"}],"type":"mastersthesis","status":"public"},{"type":"bachelorsthesis","abstract":[{"text":".","lang":"eng"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"133","user_id":"15504","department":[{"_id":"77"}],"language":[{"iso":"ger"}],"year":"2016","citation":{"apa":"Dewender, M. (2016). <i>Verifikation von Service Kompositionen mit Spin</i>. Universität Paderborn.","short":"M. Dewender, Verifikation von Service Kompositionen mit Spin, Universität Paderborn, 2016.","bibtex":"@book{Dewender_2016, title={Verifikation von Service Kompositionen mit Spin}, publisher={Universität Paderborn}, author={Dewender, Markus}, year={2016} }","mla":"Dewender, Markus. <i>Verifikation von Service Kompositionen mit Spin</i>. Universität Paderborn, 2016.","ieee":"M. Dewender, <i>Verifikation von Service Kompositionen mit Spin</i>. Universität Paderborn, 2016.","chicago":"Dewender, Markus. <i>Verifikation von Service Kompositionen mit Spin</i>. Universität Paderborn, 2016.","ama":"Dewender M. <i>Verifikation von Service Kompositionen mit Spin</i>. Universität Paderborn; 2016."},"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:51:32Z","supervisor":[{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike"}],"author":[{"last_name":"Dewender","full_name":"Dewender, Markus","first_name":"Markus"}],"date_created":"2017-10-17T12:41:17Z","title":"Verifikation von Service Kompositionen mit Spin"},{"title":"Verifikation von Service Kompositionen mit Prolog","supervisor":[{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike"}],"author":[{"full_name":"Heinisch, Philipp","last_name":"Heinisch","first_name":"Philipp"}],"date_created":"2017-10-17T12:41:17Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:51:34Z","citation":{"ama":"Heinisch P. <i>Verifikation von Service Kompositionen mit Prolog</i>. Universität Paderborn; 2016.","chicago":"Heinisch, Philipp. <i>Verifikation von Service Kompositionen mit Prolog</i>. Universität Paderborn, 2016.","ieee":"P. Heinisch, <i>Verifikation von Service Kompositionen mit Prolog</i>. Universität Paderborn, 2016.","short":"P. Heinisch, Verifikation von Service Kompositionen mit Prolog, Universität Paderborn, 2016.","bibtex":"@book{Heinisch_2016, title={Verifikation von Service Kompositionen mit Prolog}, publisher={Universität Paderborn}, author={Heinisch, Philipp}, year={2016} }","mla":"Heinisch, Philipp. <i>Verifikation von Service Kompositionen mit Prolog</i>. Universität Paderborn, 2016.","apa":"Heinisch, P. (2016). <i>Verifikation von Service Kompositionen mit Prolog</i>. Universität Paderborn."},"year":"2016","language":[{"iso":"ger"}],"user_id":"15504","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"134","status":"public","abstract":[{"text":".","lang":"eng"}],"type":"bachelorsthesis"},{"page":"159--174","citation":{"ama":"Jakobs M-C. Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning. In: <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>. LNCS. ; 2015:159--174. doi:<a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">10.1007/978-3-319-22969-0_12</a>","chicago":"Jakobs, Marie-Christine. “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning.” In <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 159--174. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">https://doi.org/10.1007/978-3-319-22969-0_12</a>.","ieee":"M.-C. Jakobs, “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning,” in <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 2015, pp. 159--174.","apa":"Jakobs, M.-C. (2015). Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning. In <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i> (pp. 159--174). <a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">https://doi.org/10.1007/978-3-319-22969-0_12</a>","mla":"Jakobs, Marie-Christine. “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning.” <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 2015, pp. 159--174, doi:<a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">10.1007/978-3-319-22969-0_12</a>.","bibtex":"@inproceedings{Jakobs_2015, series={LNCS}, title={Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">10.1007/978-3-319-22969-0_12</a>}, booktitle={Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)}, author={Jakobs, Marie-Christine}, year={2015}, pages={159--174}, collection={LNCS} }","short":"M.-C. Jakobs, in: Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM), 2015, pp. 159--174."},"has_accepted_license":"1","doi":"10.1007/978-3-319-22969-0_12","date_updated":"2022-01-06T06:56:43Z","author":[{"full_name":"Jakobs, Marie-Christine","last_name":"Jakobs","first_name":"Marie-Christine"}],"status":"public","type":"conference","file_date_updated":"2018-03-21T09:45:15Z","_id":"250","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"user_id":"477","series_title":"LNCS","year":"2015","title":"Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning","date_created":"2017-10-17T12:41:40Z","abstract":[{"text":"Before execution, users should formally validate the correctness of software received from untrusted providers. To accelerate this validation, in the proof carrying code (PCC) paradigm the provider delivers the software together with a certificate, a formal proof of the software’s correctness. Thus, the user only checks if the attached certificate shows correctness of the delivered software.Recently, we introduced configurable program certification, a generic, PCC based framework supporting various software analyses and safety properties. Evaluation of our framework revealed that validation suffers from certificate reading. In this paper, we present two orthogonal approaches which improve certificate validation, both reducing the impact of certificate reading. The first approach reduces the certificate size, storing information only if it cannot easily be recomputed. The second approach partitions the certificate into independently checkable parts. The trick is to read parts of the certificate while already checking read parts. Our experiments show that validation highly benefits from our improvements.","lang":"eng"}],"file":[{"date_updated":"2018-03-21T09:45:15Z","creator":"florida","date_created":"2018-03-21T09:45:15Z","file_size":724308,"access_level":"closed","file_id":"1489","file_name":"250-Jakobs2015.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)","ddc":["040"],"language":[{"iso":"eng"}]},{"author":[{"first_name":"Mike","full_name":"Czech, Mike","last_name":"Czech"},{"first_name":"Marie-Christine","last_name":"Jakobs","full_name":"Jakobs, Marie-Christine"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2017-10-17T12:41:47Z","date_updated":"2022-01-06T06:58:00Z","doi":"10.1007/978-3-662-46675-9_7","title":"Just test what you cannot verify!","has_accepted_license":"1","page":"100-114","citation":{"ieee":"M. Czech, M.-C. Jakobs, and H. Wehrheim, “Just test what you cannot verify!,” in <i>Fundamental Approaches to Software Engineering</i>, 2015, pp. 100–114.","chicago":"Czech, Mike, Marie-Christine Jakobs, and Heike Wehrheim. “Just Test What You Cannot Verify!” In <i>Fundamental Approaches to Software Engineering</i>, edited by Alexander Egyed and Ina Schaefer, 100–114. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46675-9_7\">https://doi.org/10.1007/978-3-662-46675-9_7</a>.","ama":"Czech M, Jakobs M-C, Wehrheim H. Just test what you cannot verify! In: Egyed A, Schaefer I, eds. <i>Fundamental Approaches to Software Engineering</i>. Lecture Notes in Computer Science. ; 2015:100-114. doi:<a href=\"https://doi.org/10.1007/978-3-662-46675-9_7\">10.1007/978-3-662-46675-9_7</a>","short":"M. Czech, M.-C. Jakobs, H. Wehrheim, in: A. Egyed, I. Schaefer (Eds.), Fundamental Approaches to Software Engineering, 2015, pp. 100–114.","mla":"Czech, Mike, et al. “Just Test What You Cannot Verify!” <i>Fundamental Approaches to Software Engineering</i>, edited by Alexander Egyed and Ina Schaefer, 2015, pp. 100–14, doi:<a href=\"https://doi.org/10.1007/978-3-662-46675-9_7\">10.1007/978-3-662-46675-9_7</a>.","bibtex":"@inproceedings{Czech_Jakobs_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={Just test what you cannot verify!}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46675-9_7\">10.1007/978-3-662-46675-9_7</a>}, booktitle={Fundamental Approaches to Software Engineering}, author={Czech, Mike and Jakobs, Marie-Christine and Wehrheim, Heike}, editor={Egyed, Alexander and Schaefer, InaEditors}, year={2015}, pages={100–114}, collection={Lecture Notes in Computer Science} }","apa":"Czech, M., Jakobs, M.-C., &#38; Wehrheim, H. (2015). Just test what you cannot verify! In A. Egyed &#38; I. Schaefer (Eds.), <i>Fundamental Approaches to Software Engineering</i> (pp. 100–114). <a href=\"https://doi.org/10.1007/978-3-662-46675-9_7\">https://doi.org/10.1007/978-3-662-46675-9_7</a>"},"year":"2015","department":[{"_id":"77"}],"user_id":"477","series_title":"Lecture Notes in Computer Science","_id":"283","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-21T09:25:36Z","ddc":["040"],"publication":"Fundamental Approaches to Software Engineering","type":"conference","status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-21T09:25:36Z","date_created":"2018-03-21T09:25:36Z","creator":"florida","file_size":391253,"access_level":"closed","file_name":"283-FASEsubmission38_01.pdf","file_id":"1469"}],"abstract":[{"lang":"eng","text":"Today, software verification is an established analysis method which can provide high guarantees for software safety. However, the resources (time and/or memory) for an exhaustive verification are not always available, and analysis then has to resort to other techniques, like testing. Most often, the already achieved partial verification results arediscarded in this case, and testing has to start from scratch.In this paper, we propose a method for combining verification and testing in which testing only needs to check the residual fraction of an uncompleted verification. To this end, the partial results of a verification run are used to construct a residual program (and residual assertions to be checked on it). The residual program can afterwards be fed into standardtesting tools. The proposed technique is sound modulo the soundness of the testing procedure. Experimental results show that this combinedusage of verification and testing can significantly reduce the effort for the subsequent testing."}],"editor":[{"full_name":"Egyed, Alexander","last_name":"Egyed","first_name":"Alexander"},{"full_name":"Schaefer, Ina","last_name":"Schaefer","first_name":"Ina"}]},{"year":"2015","page":"1-9 ","citation":{"chicago":"Isenberg, Tobias. “Incremental Inductive Verification of Parameterized Timed Systems.” In <i>Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)</i>, 1–9, 2015. <a href=\"https://doi.org/10.1109/ACSD.2015.13\">https://doi.org/10.1109/ACSD.2015.13</a>.","ieee":"T. Isenberg, “Incremental Inductive Verification of Parameterized Timed Systems,” in <i>Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)</i>, 2015, pp. 1–9.","ama":"Isenberg T. Incremental Inductive Verification of Parameterized Timed Systems. In: <i>Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)</i>. ; 2015:1-9. doi:<a href=\"https://doi.org/10.1109/ACSD.2015.13\">10.1109/ACSD.2015.13</a>","mla":"Isenberg, Tobias. “Incremental Inductive Verification of Parameterized Timed Systems.” <i>Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)</i>, 2015, pp. 1–9, doi:<a href=\"https://doi.org/10.1109/ACSD.2015.13\">10.1109/ACSD.2015.13</a>.","short":"T. Isenberg, in: Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD), 2015, pp. 1–9.","bibtex":"@inproceedings{Isenberg_2015, title={Incremental Inductive Verification of Parameterized Timed Systems}, DOI={<a href=\"https://doi.org/10.1109/ACSD.2015.13\">10.1109/ACSD.2015.13</a>}, booktitle={Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)}, author={Isenberg, Tobias}, year={2015}, pages={1–9} }","apa":"Isenberg, T. (2015). Incremental Inductive Verification of Parameterized Timed Systems. In <i>Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)</i> (pp. 1–9). <a href=\"https://doi.org/10.1109/ACSD.2015.13\">https://doi.org/10.1109/ACSD.2015.13</a>"},"has_accepted_license":"1","title":"Incremental Inductive Verification of Parameterized Timed Systems","doi":"10.1109/ACSD.2015.13","date_updated":"2022-01-06T06:58:07Z","date_created":"2017-10-17T12:41:47Z","author":[{"full_name":"Isenberg, Tobias","last_name":"Isenberg","first_name":"Tobias"}],"abstract":[{"lang":"eng","text":"We propose an incremental workflow for the verification of parameterized systems modeled as symmetric networks of timed automata. Starting with a small number of timed automata in the network, a safety property is verified using IC3, a state-of-the-art algorithm based on induction.The result of the verification, an inductive strengthening, is reused proposing a candidate inductive strengthening for a larger network.If the candidate is valid, our main theorem states that the safety property holds for all sizes of the network of timed automata. Otherwise the number of automata is increased and the next iteration is started with a new run of IC3.We propose and thoroughly examine optimizations to our workflow, e.g. Feedback mechanisms to speed up the run of IC3."}],"status":"public","file":[{"date_updated":"2018-03-21T09:23:45Z","date_created":"2018-03-21T09:23:45Z","creator":"florida","file_size":479808,"file_id":"1466","access_level":"closed","file_name":"285-07352419.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)","type":"conference","ddc":["040"],"file_date_updated":"2018-03-21T09:23:45Z","language":[{"iso":"eng"}],"_id":"285","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"user_id":"477"},{"project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"246","user_id":"477","department":[{"_id":"77"}],"ddc":["040"],"file_date_updated":"2018-03-21T09:47:14Z","type":"dissertation","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":10091866,"file_name":"246-Dissertation_-_Besova.pdf","access_level":"closed","file_id":"1492","date_updated":"2018-03-21T09:47:14Z","date_created":"2018-03-21T09:47:14Z","creator":"florida"}],"status":"public","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:56:30Z","date_created":"2017-10-17T12:41:40Z","supervisor":[{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"author":[{"first_name":"Galina","last_name":"Besova","full_name":"Besova, Galina"}],"title":"Systematic Development and Re-Use of Model Tranformations","has_accepted_license":"1","related_material":{"link":[{"url":"http://digital.ub.uni-paderborn.de/hsx/content/titleinfo/1705899","relation":"confirmation"}]},"year":"2015","citation":{"bibtex":"@book{Besova_2015, title={Systematic Development and Re-Use of Model Tranformations}, publisher={Universität Paderborn}, author={Besova, Galina}, year={2015} }","mla":"Besova, Galina. <i>Systematic Development and Re-Use of Model Tranformations</i>. Universität Paderborn, 2015.","short":"G. Besova, Systematic Development and Re-Use of Model Tranformations, Universität Paderborn, 2015.","apa":"Besova, G. (2015). <i>Systematic Development and Re-Use of Model Tranformations</i>. Universität Paderborn.","chicago":"Besova, Galina. <i>Systematic Development and Re-Use of Model Tranformations</i>. Universität Paderborn, 2015.","ieee":"G. Besova, <i>Systematic Development and Re-Use of Model Tranformations</i>. Universität Paderborn, 2015.","ama":"Besova G. <i>Systematic Development and Re-Use of Model Tranformations</i>. Universität Paderborn; 2015."}},{"status":"public","file":[{"access_level":"closed","file_id":"1483","file_name":"262-mainSACfinal.pdf","file_size":554583,"creator":"florida","date_created":"2018-03-21T09:35:34Z","date_updated":"2018-03-21T09:35:34Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Programs from Proofs\" is a generic method which generates new programs out of correctness proofs of given programs. The technique ensures that the new and given program are behaviorally equivalent and that the new program is easily verifiable, thus serving as an alternative to proof-carrying code concepts. So far, this generic method has one instantiation that verifies type-state properties of programs. In this paper, we present a whole range of new instantiations, all based on data ow analyses. More precisely, we show how an imprecise but fast data ow analysis can be enhanced with a predicate analysis as to yield a precise but expensive analysis. Out of the safety proofs of this analysis, we generate new programs, again behaviorally equivalent to the given ones, which are easily verifiable\" in the sense that now the data ow analysis alone can yield precise results. An experimental evaluation practically supports our claim of easy verification."}],"publication":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","type":"conference","language":[{"iso":"eng"}],"file_date_updated":"2018-03-21T09:35:34Z","ddc":["040"],"department":[{"_id":"77"}],"series_title":"SAC '15","user_id":"477","_id":"262","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"page":"1729-1736","citation":{"mla":"Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs of Predicated Dataflow Analyses.” <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>, 2015, pp. 1729–36, doi:<a href=\"https://doi.org/10.1145/2695664.2695690\">10.1145/2695664.2695690</a>.","bibtex":"@inproceedings{Jakobs_Wehrheim_2015, series={SAC ’15}, title={Programs from Proofs of Predicated Dataflow Analyses}, DOI={<a href=\"https://doi.org/10.1145/2695664.2695690\">10.1145/2695664.2695690</a>}, booktitle={Proceedings of the 30th Annual ACM Symposium on Applied Computing}, author={Jakobs, Marie-Christine and Wehrheim, Heike}, year={2015}, pages={1729–1736}, collection={SAC ’15} }","short":"M.-C. Jakobs, H. Wehrheim, in: Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015, pp. 1729–1736.","apa":"Jakobs, M.-C., &#38; Wehrheim, H. (2015). Programs from Proofs of Predicated Dataflow Analyses. In <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i> (pp. 1729–1736). <a href=\"https://doi.org/10.1145/2695664.2695690\">https://doi.org/10.1145/2695664.2695690</a>","chicago":"Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs of Predicated Dataflow Analyses.” In <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>, 1729–36. SAC ’15, 2015. <a href=\"https://doi.org/10.1145/2695664.2695690\">https://doi.org/10.1145/2695664.2695690</a>.","ieee":"M.-C. Jakobs and H. Wehrheim, “Programs from Proofs of Predicated Dataflow Analyses,” in <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>, 2015, pp. 1729–1736.","ama":"Jakobs M-C, Wehrheim H. Programs from Proofs of Predicated Dataflow Analyses. In: <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>. SAC ’15. ; 2015:1729-1736. doi:<a href=\"https://doi.org/10.1145/2695664.2695690\">10.1145/2695664.2695690</a>"},"year":"2015","has_accepted_license":"1","doi":"10.1145/2695664.2695690","title":"Programs from Proofs of Predicated Dataflow Analyses","author":[{"full_name":"Jakobs, Marie-Christine","last_name":"Jakobs","first_name":"Marie-Christine"},{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"}],"date_created":"2017-10-17T12:41:43Z","date_updated":"2022-01-06T06:57:18Z"},{"_id":"290","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"user_id":"477","ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-21T09:22:03Z","publication":"Computer Languages, Systems & Structures","type":"journal_article","abstract":[{"text":"Model transformation is a key concept in model-driven software engineering. The definition of model transformations is usually based on meta-models describing the abstract syntax of languages. While meta-models are thereby able to abstract from uperfluous details of concrete syntax, they often loose structural information inherent in languages, like information on model elements always occurring together in particular shapes. As a consequence, model transformations cannot naturally re-use language structures, thus leading to unnecessary complexity in their development as well as in quality assurance.In this paper, we propose a new approach to model transformation development which allows to simplify the developed transformations and improve their quality via the exploitation of the languages׳ structures. The approach is based on context-free graph grammars and transformations defined by pairing productions of source and target grammars. We show that such transformations have important properties: they terminate and are sound, complete, and deterministic.","lang":"eng"}],"status":"public","file":[{"date_updated":"2018-03-21T09:22:03Z","date_created":"2018-03-21T09:22:03Z","creator":"florida","file_size":1329478,"file_id":"1464","access_level":"closed","file_name":"290-BSW15-main.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publisher":"Elsevier","date_updated":"2022-01-06T06:58:43Z","author":[{"first_name":"Galina","full_name":"Besova, Galina","last_name":"Besova"},{"first_name":"Dominik","last_name":"Steenken","full_name":"Steenken, Dominik"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"date_created":"2017-10-17T12:41:48Z","title":"Grammar-based model transformations: Definition, execution, and quality properties","doi":"10.1016/j.cl.2015.05.003","has_accepted_license":"1","year":"2015","page":"116-138","citation":{"ieee":"G. Besova, D. Steenken, and H. Wehrheim, “Grammar-based model transformations: Definition, execution, and quality properties,” <i>Computer Languages, Systems &#38; Structures</i>, pp. 116–138, 2015.","chicago":"Besova, Galina, Dominik Steenken, and Heike Wehrheim. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” <i>Computer Languages, Systems &#38; Structures</i>, 2015, 116–38. <a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">https://doi.org/10.1016/j.cl.2015.05.003</a>.","ama":"Besova G, Steenken D, Wehrheim H. Grammar-based model transformations: Definition, execution, and quality properties. <i>Computer Languages, Systems &#38; Structures</i>. 2015:116-138. doi:<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>","bibtex":"@article{Besova_Steenken_Wehrheim_2015, title={Grammar-based model transformations: Definition, execution, and quality properties}, DOI={<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>}, journal={Computer Languages, Systems &#38; Structures}, publisher={Elsevier}, author={Besova, Galina and Steenken, Dominik and Wehrheim, Heike}, year={2015}, pages={116–138} }","mla":"Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” <i>Computer Languages, Systems &#38; Structures</i>, Elsevier, 2015, pp. 116–38, doi:<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>.","short":"G. Besova, D. Steenken, H. Wehrheim, Computer Languages, Systems &#38; Structures (2015) 116–138.","apa":"Besova, G., Steenken, D., &#38; Wehrheim, H. (2015). Grammar-based model transformations: Definition, execution, and quality properties. <i>Computer Languages, Systems &#38; Structures</i>, 116–138. <a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">https://doi.org/10.1016/j.cl.2015.05.003</a>"}},{"issue":"3-4","has_accepted_license":"1","citation":{"bibtex":"@article{Ziegert_Wehrheim_2015, title={Temporal plans for software architecture reconfiguration}, DOI={<a href=\"https://doi.org/10.1007/s00450-014-0259-7\">10.1007/s00450-014-0259-7</a>}, number={3–4}, journal={Computer Science - R &#38; D}, author={Ziegert, Steffen and Wehrheim, Heike}, year={2015}, pages={303--320} }","short":"S. Ziegert, H. Wehrheim, Computer Science - R &#38; D (2015) 303--320.","mla":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4, 2015, pp. 303--320, doi:<a href=\"https://doi.org/10.1007/s00450-014-0259-7\">10.1007/s00450-014-0259-7</a>.","apa":"Ziegert, S., &#38; Wehrheim, H. (2015). Temporal plans for software architecture reconfiguration. <i>Computer Science - R &#38; D</i>, (3–4), 303--320. <a href=\"https://doi.org/10.1007/s00450-014-0259-7\">https://doi.org/10.1007/s00450-014-0259-7</a>","ieee":"S. Ziegert and H. Wehrheim, “Temporal plans for software architecture reconfiguration,” <i>Computer Science - R &#38; D</i>, no. 3–4, pp. 303--320, 2015.","chicago":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4 (2015): 303--320. <a href=\"https://doi.org/10.1007/s00450-014-0259-7\">https://doi.org/10.1007/s00450-014-0259-7</a>.","ama":"Ziegert S, Wehrheim H. Temporal plans for software architecture reconfiguration. <i>Computer Science - R &#38; D</i>. 2015;(3-4):303--320. doi:<a href=\"https://doi.org/10.1007/s00450-014-0259-7\">10.1007/s00450-014-0259-7</a>"},"page":"303--320","year":"2015","author":[{"first_name":"Steffen","full_name":"Ziegert, Steffen","last_name":"Ziegert"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2018-06-13T07:47:56Z","date_updated":"2022-01-06T06:59:01Z","doi":"10.1007/s00450-014-0259-7","title":"Temporal plans for software architecture reconfiguration","type":"journal_article","publication":"Computer Science - R & D","file":[{"file_size":2136451,"access_level":"closed","file_id":"5315","file_name":"TemporalPlansForSoftwareArchit.pdf","date_updated":"2018-11-02T15:52:13Z","date_created":"2018-11-02T15:52:13Z","creator":"ups","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","user_id":"477","department":[{"_id":"77"}],"project":[{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subproject B3"}],"_id":"3162","language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T15:52:13Z","ddc":["000"]},{"year":"2015","citation":{"chicago":"Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog.” In <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, edited by Roland Meyer, Andr{\\’{e}} Platzer, and Heike Wehrheim, 3--4. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">https://doi.org/10.1007/978-3-319-23506-6_1</a>.","ieee":"R. Meyer and H. Wehrheim, “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog,” in <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, 2015, pp. 3--4.","ama":"Meyer R, Wehrheim H. From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog. In: Meyer R, Platzer A, Wehrheim H, eds. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. Lecture Notes in Computer Science. ; 2015:3--4. doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">10.1007/978-3-319-23506-6_1</a>","apa":"Meyer, R., &#38; Wehrheim, H. (2015). From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog. In R. Meyer, A. Platzer, &#38; H. Wehrheim (Eds.), <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i> (pp. 3--4). <a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">https://doi.org/10.1007/978-3-319-23506-6_1</a>","bibtex":"@inproceedings{Meyer_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">10.1007/978-3-319-23506-6_1</a>}, booktitle={Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}, author={Meyer, Roland and Wehrheim, Heike}, editor={Meyer, Roland and Platzer, Andr{\\’{e}} and Wehrheim, HeikeEditors}, year={2015}, pages={3--4}, collection={Lecture Notes in Computer Science} }","mla":"Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog.” <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, edited by Roland Meyer et al., 2015, pp. 3--4, doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6_1\">10.1007/978-3-319-23506-6_1</a>.","short":"R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4."},"page":"3--4","title":"From Program Verification to Time and Space: The Scientific Life of Ernst-R{\\\"{u}}diger Olderog","doi":"10.1007/978-3-319-23506-6_1","date_updated":"2022-01-06T06:59:01Z","date_created":"2018-06-13T07:49:28Z","author":[{"first_name":"Roland","full_name":"Meyer, Roland","last_name":"Meyer"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"editor":[{"first_name":"Roland","full_name":"Meyer, Roland","last_name":"Meyer"},{"last_name":"Platzer","full_name":"Platzer, Andr{\\'{e}}","first_name":"Andr{\\'{e}}"},{"full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"status":"public","type":"conference","publication":"Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings","_id":"3163","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}]},{"publication":"{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings","type":"conference","editor":[{"full_name":"Bj{\\o}rner, Nikolaj","last_name":"Bj{\\o}rner","first_name":"Nikolaj"},{"last_name":"S. de Boer","full_name":"S. de Boer, Frank","first_name":"Frank"}],"status":"public","_id":"3164","project":[{"name":"Validation of Software Transactional Memory","_id":"78"}],"department":[{"_id":"77"}],"series_title":"Lecture Notes in Computer Science","user_id":"29719","year":"2015","page":"161--177","citation":{"ama":"Derrick J, Dongol B, Schellhorn G, Travkin O, Wehrheim H. Verifying Opacity of a Transactional Mutex Lock. In: Bj{\\o}rner N, S. de Boer F, eds. <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>. Lecture Notes in Computer Science. ; 2015:161--177. doi:<a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">10.1007/978-3-319-19249-9_11</a>","ieee":"J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, and H. Wehrheim, “Verifying Opacity of a Transactional Mutex Lock,” in <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, 2015, pp. 161--177.","chicago":"Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, and Heike Wehrheim. “Verifying Opacity of a Transactional Mutex Lock.” In <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, edited by Nikolaj Bj{\\o}rner and Frank S. de Boer, 161--177. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">https://doi.org/10.1007/978-3-319-19249-9_11</a>.","apa":"Derrick, J., Dongol, B., Schellhorn, G., Travkin, O., &#38; Wehrheim, H. (2015). Verifying Opacity of a Transactional Mutex Lock. In N. Bj{\\o}rner &#38; F. S. de Boer (Eds.), <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i> (pp. 161--177). <a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">https://doi.org/10.1007/978-3-319-19249-9_11</a>","bibtex":"@inproceedings{Derrick_Dongol_Schellhorn_Travkin_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={Verifying Opacity of a Transactional Mutex Lock}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">10.1007/978-3-319-19249-9_11</a>}, booktitle={{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings}, author={Derrick, John and Dongol, Brijesh and Schellhorn, Gerhard and Travkin, Oleg and Wehrheim, Heike}, editor={Bj{\\o}rner, Nikolaj and S. de Boer, FrankEditors}, year={2015}, pages={161--177}, collection={Lecture Notes in Computer Science} }","mla":"Derrick, John, et al. “Verifying Opacity of a Transactional Mutex Lock.” <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, edited by Nikolaj Bj{\\o}rner and Frank S. de Boer, 2015, pp. 161--177, doi:<a href=\"https://doi.org/10.1007/978-3-319-19249-9_11\">10.1007/978-3-319-19249-9_11</a>.","short":"J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177."},"date_updated":"2022-01-06T06:59:01Z","date_created":"2018-06-13T07:50:43Z","author":[{"first_name":"John","last_name":"Derrick","full_name":"Derrick, John"},{"first_name":"Brijesh","full_name":"Dongol, Brijesh","last_name":"Dongol"},{"first_name":"Gerhard","last_name":"Schellhorn","full_name":"Schellhorn, Gerhard"},{"full_name":"Travkin, Oleg","last_name":"Travkin","first_name":"Oleg"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"title":"Verifying Opacity of a Transactional Mutex Lock","doi":"10.1007/978-3-319-19249-9_11"},{"status":"public","editor":[{"first_name":"Nir","full_name":"Piterman, Nir","last_name":"Piterman"}],"type":"conference","publication":"Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings","user_id":"29719","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}],"_id":"3165","citation":{"ama":"Wehrheim H, Travkin O. {TSO} to {SC} via Symbolic Execution. In: Piterman N, ed. <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>. Lecture Notes in Computer Science. ; 2015:104--119. doi:<a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">10.1007/978-3-319-26287-1_7</a>","ieee":"H. Wehrheim and O. Travkin, “{TSO} to {SC} via Symbolic Execution,” in <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>, 2015, pp. 104--119.","chicago":"Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” In <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>, edited by Nir Piterman, 104--119. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">https://doi.org/10.1007/978-3-319-26287-1_7</a>.","apa":"Wehrheim, H., &#38; Travkin, O. (2015). {TSO} to {SC} via Symbolic Execution. In N. Piterman (Ed.), <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i> (pp. 104--119). <a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">https://doi.org/10.1007/978-3-319-26287-1_7</a>","bibtex":"@inproceedings{Wehrheim_Travkin_2015, series={Lecture Notes in Computer Science}, title={{TSO} to {SC} via Symbolic Execution}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">10.1007/978-3-319-26287-1_7</a>}, booktitle={Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings}, author={Wehrheim, Heike and Travkin, Oleg}, editor={Piterman, NirEditor}, year={2015}, pages={104--119}, collection={Lecture Notes in Computer Science} }","mla":"Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” <i>Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>, edited by Nir Piterman, 2015, pp. 104--119, doi:<a href=\"https://doi.org/10.1007/978-3-319-26287-1_7\">10.1007/978-3-319-26287-1_7</a>.","short":"H. Wehrheim, O. Travkin, in: N. Piterman (Ed.), Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119."},"page":"104--119","year":"2015","doi":"10.1007/978-3-319-26287-1_7","title":"{TSO} to {SC} via Symbolic Execution","date_created":"2018-06-13T07:52:44Z","author":[{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"},{"first_name":"Oleg","full_name":"Travkin, Oleg","last_name":"Travkin"}],"date_updated":"2022-01-06T06:59:01Z"},{"type":"conference_editor","editor":[{"last_name":"Meyer","full_name":"Meyer, Roland","first_name":"Roland"},{"last_name":"Platzer","full_name":"Platzer, Andr{\\'{e}}","first_name":"Andr{\\'{e}}"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"status":"public","_id":"3166","user_id":"29719","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}],"publication_identifier":{"isbn":["978-3-319-23505-9"]},"year":"2015","citation":{"ama":"Meyer R, Platzer A, Wehrheim H, eds. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>.; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6\">10.1007/978-3-319-23506-6</a>","chicago":"Meyer, Roland, Andr{\\’{e}} Platzer, and Heike Wehrheim, eds. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-23506-6\">https://doi.org/10.1007/978-3-319-23506-6</a>.","ieee":"R. Meyer, A. Platzer, and H. Wehrheim, Eds., <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. 2015.","bibtex":"@book{Meyer_Platzer_Wehrheim_2015, series={Lecture Notes in Computer Science}, title={Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-23506-6\">10.1007/978-3-319-23506-6</a>}, year={2015}, collection={Lecture Notes in Computer Science} }","short":"R. Meyer, A. Platzer, H. Wehrheim, eds., Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015.","mla":"Meyer, Roland, et al., editors. <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-23506-6\">10.1007/978-3-319-23506-6</a>.","apa":"Meyer, R., Platzer, A., &#38; Wehrheim, H. (Eds.). (2015). <i>Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. <a href=\"https://doi.org/10.1007/978-3-319-23506-6\">https://doi.org/10.1007/978-3-319-23506-6</a>"},"date_updated":"2022-01-06T06:59:01Z","date_created":"2018-06-13T07:54:06Z","title":"Correct System Design - Symposium in Honor of Ernst-R{\\\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings","doi":"10.1007/978-3-319-23506-6"},{"has_accepted_license":"1","page":"31-48","citation":{"apa":"Walther, S., &#38; Wehrheim, H. (2014). Verified Service Compositions by Template-Based Construction. In I. Lanese &#38; E. Madelaine (Eds.), <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i> (pp. 31–48). <a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">https://doi.org/10.1007/978-3-319-15317-9_3</a>","short":"S. Walther, H. Wehrheim, in: I. Lanese, E. Madelaine (Eds.), Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), 2014, pp. 31–48.","bibtex":"@inproceedings{Walther_Wehrheim_2014, series={LNCS}, title={Verified Service Compositions by Template-Based Construction}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">10.1007/978-3-319-15317-9_3</a>}, booktitle={Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)}, author={Walther, Sven and Wehrheim, Heike}, editor={Lanese, Ivan and Madelaine, EricEditors}, year={2014}, pages={31–48}, collection={LNCS} }","mla":"Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>, edited by Ivan Lanese and Eric Madelaine, 2014, pp. 31–48, doi:<a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">10.1007/978-3-319-15317-9_3</a>.","ama":"Walther S, Wehrheim H. Verified Service Compositions by Template-Based Construction. In: Lanese I, Madelaine E, eds. <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>. LNCS. ; 2014:31-48. doi:<a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">10.1007/978-3-319-15317-9_3</a>","chicago":"Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” In <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>, edited by Ivan Lanese and Eric Madelaine, 31–48. LNCS, 2014. <a href=\"https://doi.org/10.1007/978-3-319-15317-9_3\">https://doi.org/10.1007/978-3-319-15317-9_3</a>.","ieee":"S. Walther and H. Wehrheim, “Verified Service Compositions by Template-Based Construction,” in <i>Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)</i>, 2014, pp. 31–48."},"date_updated":"2022-01-06T06:59:13Z","author":[{"first_name":"Sven","last_name":"Walther","full_name":"Walther, Sven"},{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"doi":"10.1007/978-3-319-15317-9_3","type":"conference","editor":[{"first_name":"Ivan","full_name":"Lanese, Ivan","last_name":"Lanese"},{"first_name":"Eric","last_name":"Madelaine","full_name":"Madelaine, Eric"}],"status":"public","_id":"336","project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"user_id":"477","series_title":"LNCS","file_date_updated":"2018-03-20T07:29:29Z","year":"2014","date_created":"2017-10-17T12:41:57Z","title":"Verified Service Compositions by Template-Based Construction","publication":"Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS)","abstract":[{"lang":"eng","text":"Today, service compositions often need to be assembled or changed on-the-fly, which leaves only little time for quality assurance. Moreover, quality assurance is complicated by service providers only giving information on their services in terms of domain specific concepts with only limited semantic meaning. In this paper, we propose a method to construct service compositions based on pre-verifiedtemplates. Templates, given as workflow descriptions, are typed over a (domain-independent) template ontology defining concepts and predicates. Templates are proven correct using an abstract semantics, leaving the specific meaning of ontology concepts open, however, only up to given ontology rules. Construction of service compositions amounts to instantiation of templates with domain-specific services.Correctness of an instantiation can then simply be checked by verifying that the domain ontology(a) adheres to the rules of the template ontology, and (b) fulfills the constraints of the employed template."}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-20T07:29:29Z","date_created":"2018-03-20T07:29:29Z","creator":"florida","file_size":484422,"file_id":"1423","file_name":"336-facs2014_walther.pdf","access_level":"closed"}],"ddc":["040"],"language":[{"iso":"eng"}]},{"status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"_id":"340","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"user_id":"15504","year":"2014","citation":{"short":"P. Korth, Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs,” Universität Paderborn, 2014.","bibtex":"@book{Korth_2014, title={Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs”}, publisher={Universität Paderborn}, author={Korth, Philipp}, year={2014} }","mla":"Korth, Philipp. <i>Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.”</i> Universität Paderborn, 2014.","apa":"Korth, P. (2014). <i>Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.”</i> Universität Paderborn.","ieee":"P. Korth, <i>Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.”</i> Universität Paderborn, 2014.","chicago":"Korth, Philipp. <i>Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.”</i> Universität Paderborn, 2014.","ama":"Korth P. <i>Untersuchung transitiver Eigenschaften der Technik “Programs from Proofs.”</i> Universität Paderborn; 2014."},"title":"Untersuchung transitiver Eigenschaften der Technik \"Programs from Proofs\"","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:14Z","author":[{"first_name":"Philipp","full_name":"Korth, Philipp","last_name":"Korth"}],"date_created":"2017-10-17T12:41:58Z","supervisor":[{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}]},{"file_date_updated":"2018-03-20T07:27:54Z","language":[{"iso":"eng"}],"ddc":["040"],"user_id":"477","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"344","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"344-paper_CAMERA_READY.pdf","file_id":"1420","file_size":80674,"date_created":"2018-03-20T07:27:54Z","creator":"florida","date_updated":"2018-03-20T07:27:54Z"}],"status":"public","type":"conference","publication":"Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)","title":"Towards Systematic Configuration for Architecture Validation","date_created":"2017-10-17T12:41:59Z","author":[{"first_name":"Matthias","last_name":"Becker","full_name":"Becker, Matthias"},{"first_name":"Steffen","full_name":"Becker, Steffen","last_name":"Becker"},{"first_name":"Galina","full_name":"Besova, Galina","last_name":"Besova"},{"last_name":"Walther","full_name":"Walther, Sven","first_name":"Sven"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"date_updated":"2022-01-06T06:59:17Z","citation":{"ama":"Becker M, Becker S, Besova G, Walther S, Wehrheim H. Towards Systematic Configuration for Architecture Validation. In: <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>. ; 2014.","chicago":"Becker, Matthias, Steffen Becker, Galina Besova, Sven Walther, and Heike Wehrheim. “Towards Systematic Configuration for Architecture Validation.” In <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>, 2014.","ieee":"M. Becker, S. Becker, G. Besova, S. Walther, and H. Wehrheim, “Towards Systematic Configuration for Architecture Validation,” in <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>, 2014.","apa":"Becker, M., Becker, S., Besova, G., Walther, S., &#38; Wehrheim, H. (2014). Towards Systematic Configuration for Architecture Validation. In <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>.","short":"M. Becker, S. Becker, G. Besova, S. Walther, H. Wehrheim, in: Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.","bibtex":"@inproceedings{Becker_Becker_Besova_Walther_Wehrheim_2014, title={Towards Systematic Configuration for Architecture Validation}, booktitle={Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)}, author={Becker, Matthias and Becker, Steffen and Besova, Galina and Walther, Sven and Wehrheim, Heike}, year={2014} }","mla":"Becker, Matthias, et al. “Towards Systematic Configuration for Architecture Validation.” <i>Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session)</i>, 2014."},"year":"2014","has_accepted_license":"1"},{"doi":"10.1007/978-3-319-14130-5_14","date_updated":"2022-01-06T06:59:22Z","author":[{"first_name":"Felix","full_name":"Mohr, Felix","last_name":"Mohr"},{"last_name":"Walther","full_name":"Walther, Sven","first_name":"Sven"}],"citation":{"apa":"Mohr, F., &#38; Walther, S. (2014). Template-based Generation of Semantic Services. In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i> (pp. 188–203). <a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">https://doi.org/10.1007/978-3-319-14130-5_14</a>","short":"F. Mohr, S. Walther, in: Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203.","mla":"Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 2014, pp. 188–203, doi:<a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">10.1007/978-3-319-14130-5_14</a>.","bibtex":"@inproceedings{Mohr_Walther_2014, series={LNCS}, title={Template-based Generation of Semantic Services}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">10.1007/978-3-319-14130-5_14</a>}, booktitle={Proceedings of the 14th International Conference on Software Reuse (ICSR)}, author={Mohr, Felix and Walther, Sven}, year={2014}, pages={188–203}, collection={LNCS} }","ama":"Mohr F, Walther S. Template-based Generation of Semantic Services. In: <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>. LNCS. ; 2014:188-203. doi:<a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">10.1007/978-3-319-14130-5_14</a>","ieee":"F. Mohr and S. Walther, “Template-based Generation of Semantic Services,” in <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 2014, pp. 188–203.","chicago":"Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 188–203. LNCS, 2014. <a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">https://doi.org/10.1007/978-3-319-14130-5_14</a>."},"page":"188-203","has_accepted_license":"1","file_date_updated":"2018-03-20T07:23:32Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"_id":"353","user_id":"477","series_title":"LNCS","department":[{"_id":"77"},{"_id":"355"}],"status":"public","type":"conference","title":"Template-based Generation of Semantic Services","date_created":"2017-10-17T12:42:00Z","year":"2014","ddc":["040"],"language":[{"iso":"eng"}],"abstract":[{"text":"There are many technologies for the automation of processesthat deal with services; examples are service discovery and composition.Automation of these processes requires that the services are described semantically. However, semantically described services are currently not oronly rarely available, which limits the applicability of discovery and composition approaches. The systematic support for creating new semanticservices usable by automated technologies is an open problem.We tackle this problem with a template based approach: Domain independent templates are instantiated with domain specific services andboolean expressions. The obtained services have semantic descriptionswhose correctness directly follows from the correctness of the template.Besides the theory, we present experimental results for a service repository in which 85% of the services were generated automatically.","lang":"eng"}],"file":[{"file_name":"353-icsr2015_submission_17.pdf","access_level":"closed","file_id":"1414","file_size":431778,"date_created":"2018-03-20T07:23:32Z","creator":"florida","date_updated":"2018-03-20T07:23:32Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"publication":"Proceedings of the 14th International Conference on Software Reuse (ICSR)"},{"file":[{"file_size":66474,"access_level":"closed","file_name":"383-programmsFromProofsSE.pdf","file_id":"1392","date_updated":"2018-03-20T07:04:52Z","creator":"florida","date_created":"2018-03-20T07:04:52Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more eﬃciently veriﬁable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof eﬀort can be reduced by several orders of magnitude, both with respect to time and space.","lang":"eng"}],"publication":"Proceedings of the Software Engineering Conference (SE)","language":[{"iso":"eng"}],"ddc":["040"],"year":"2014","title":"Programs from Proofs -- Approach and Applications","date_created":"2017-10-17T12:42:06Z","status":"public","type":"conference","file_date_updated":"2018-03-20T07:04:52Z","series_title":"Lecture Notes in Informatics (LNI)","user_id":"477","department":[{"_id":"77"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"383","citation":{"ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs -- Approach and Applications,” in <i>Proceedings of the Software Engineering Conference (SE)</i>, 2014, pp. 67–68.","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from Proofs -- Approach and Applications.” In <i>Proceedings of the Software Engineering Conference (SE)</i>, 67–68. Lecture Notes in Informatics (LNI), 2014.","ama":"Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs -- Approach and Applications. In: <i>Proceedings of the Software Engineering Conference (SE)</i>. Lecture Notes in Informatics (LNI). ; 2014:67-68.","apa":"Wonisch, D., Schremmer, A., &#38; Wehrheim, H. (2014). Programs from Proofs -- Approach and Applications. In <i>Proceedings of the Software Engineering Conference (SE)</i> (pp. 67–68).","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2014, series={Lecture Notes in Informatics (LNI)}, title={Programs from Proofs -- Approach and Applications}, booktitle={Proceedings of the Software Engineering Conference (SE)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2014}, pages={67–68}, collection={Lecture Notes in Informatics (LNI)} }","mla":"Wonisch, Daniel, et al. “Programs from Proofs -- Approach and Applications.” <i>Proceedings of the Software Engineering Conference (SE)</i>, 2014, pp. 67–68."},"page":"67-68","has_accepted_license":"1","main_file_link":[{"url":"http://eprints.uni-kiel.de/23752/"}],"author":[{"full_name":"Wonisch, Daniel","last_name":"Wonisch","first_name":"Daniel"},{"full_name":"Schremmer, Alexander","last_name":"Schremmer","first_name":"Alexander"},{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"}],"date_updated":"2022-01-06T06:59:38Z"}]
