TY - JOUR AU - Ziegert, Steffen AU - Wehrheim, Heike ID - 3162 IS - 3-4 JF - Computer Science - R & D TI - Temporal plans for software architecture reconfiguration ER - TY - CONF AU - Meyer, Roland AU - Wehrheim, Heike ED - Meyer, Roland ED - Platzer, Andr{\'{e}} ED - Wehrheim, Heike ID - 3163 T2 - Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings TI - From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog ER - TY - CONF AU - Derrick, John AU - Dongol, Brijesh AU - Schellhorn, Gerhard AU - Travkin, Oleg AU - Wehrheim, Heike ED - Bj{\o}rner, Nikolaj ED - S. de Boer, Frank ID - 3164 T2 - {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings TI - Verifying Opacity of a Transactional Mutex Lock ER - TY - CONF AU - Wehrheim, Heike AU - Travkin, Oleg ED - Piterman, Nir ID - 3165 T2 - Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings TI - {TSO} to {SC} via Symbolic Execution ER - TY - GEN ED - Meyer, Roland ED - Platzer, Andr{\'{e}} ED - Wehrheim, Heike ID - 3166 SN - 978-3-319-23505-9 TI - Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings ER - TY - CONF AB - Today, service compositions often need to be assembled or changed on-the-fly, which leaves only little time for quality assurance. Moreover, quality assurance is complicated by service providers only giving information on their services in terms of domain specific concepts with only limited semantic meaning. In this paper, we propose a method to construct service compositions based on pre-verifiedtemplates. Templates, given as workflow descriptions, are typed over a (domain-independent) template ontology defining concepts and predicates. Templates are proven correct using an abstract semantics, leaving the specific meaning of ontology concepts open, however, only up to given ontology rules. Construction of service compositions amounts to instantiation of templates with domain-specific services.Correctness of an instantiation can then simply be checked by verifying that the domain ontology(a) adheres to the rules of the template ontology, and (b) fulfills the constraints of the employed template. AU - Walther, Sven AU - Wehrheim, Heike ED - Lanese, Ivan ED - Madelaine, Eric ID - 336 T2 - Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS) TI - Verified Service Compositions by Template-Based Construction ER - TY - GEN AU - Korth, Philipp ID - 340 TI - Untersuchung transitiver Eigenschaften der Technik "Programs from Proofs" ER - TY - CONF AU - Becker, Matthias AU - Becker, Steffen AU - Besova, Galina AU - Walther, Sven AU - Wehrheim, Heike ID - 344 T2 - Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session) TI - Towards Systematic Configuration for Architecture Validation ER - TY - CONF AB - There are many technologies for the automation of processesthat deal with services; examples are service discovery and composition.Automation of these processes requires that the services are described semantically. However, semantically described services are currently not oronly rarely available, which limits the applicability of discovery and composition approaches. The systematic support for creating new semanticservices usable by automated technologies is an open problem.We tackle this problem with a template based approach: Domain independent templates are instantiated with domain specific services andboolean expressions. The obtained services have semantic descriptionswhose correctness directly follows from the correctness of the template.Besides the theory, we present experimental results for a service repository in which 85% of the services were generated automatically. AU - Mohr, Felix AU - Walther, Sven ID - 353 T2 - Proceedings of the 14th International Conference on Software Reuse (ICSR) TI - Template-based Generation of Semantic Services ER - TY - CONF AB - Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space. AU - Wonisch, Daniel AU - Schremmer, Alexander AU - Wehrheim, Heike ID - 383 T2 - Proceedings of the Software Engineering Conference (SE) TI - Programs from Proofs -- Approach and Applications ER - TY - JOUR AU - Schneider, Steve AU - Treharne, Helen AU - Wehrheim, Heike ID - 3167 IS - 2 JF - Formal Asp. Comput. TI - The behavioural semantics of Event-B refinement ER - TY - JOUR AU - Tofan, Bogdan AU - Travkin, Oleg AU - Schellhorn, Gerhard AU - Wehrheim, Heike ID - 3168 JF - Sci. Comput. Program. TI - Two approaches for proving linearizability of multiset ER - TY - JOUR AU - Schellhorn, Gerhard AU - Derrick, John AU - Wehrheim, Heike ID - 3169 IS - 4 JF - {ACM} Trans. Comput. Log. TI - A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures ER - TY - CONF AU - Derrick, John AU - Dongol, Brijesh AU - Schellhorn, Gerhard AU - Tofan, Bogdan AU - Travkin, Oleg AU - Wehrheim, Heike ED - B. Jones, Cliff ED - Pihlajasaari, Pekka ED - Sun, Jun ID - 3170 T2 - {FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings TI - Quiescent Consistency: Defining and Verifying Relaxed Linearizability ER - TY - CONF AU - Travkin, Oleg AU - Wehrheim, Heike ED - Yahav, Eran ID - 3171 T2 - Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014. Proceedings TI - Handling {TSO} in Mechanized Linearizability Proofs ER - TY - CONF AU - Isenberg, Tobias AU - Wehrheim, Heike ED - Merz, Stephan ED - Pang, Jun ID - 3172 T2 - Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings TI - Timed Automata Verification via {IC3} with Zones ER - TY - CONF AU - A. Schneider, Steve AU - Treharne, Helen AU - Wehrheim, Heike AU - M. Williams, David ED - Albert, Elvira ED - Sekerinski, Emil ID - 3173 T2 - Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings TI - Managing {LTL} Properties in Event-B Refinement ER - TY - JOUR AU - Schneider, Steve AU - Treharne, Helen AU - Wehrheim, Heike AU - M. Williams, David ID - 3174 JF - CoRR TI - Managing {LTL} properties in Event-B refinement ER - TY - JOUR AU - Isenberg, Tobias AU - Wehrheim, Heike ID - 3175 JF - CoRR TI - Proof-Carrying Hardware via {IC3} ER - TY - CONF AB - Configurable program analysis (CPA) is a generic concept for the formalization of different software analysis techniques in a single framework. With the tool CPAchecker, this framework allows for an easy configuration and subsequent automatic execution of analysis procedures ranging from data-flow analysis to model checking. The focus of the tool CPAchecker is thus on analysis. In this paper, we study configurability from the point of view of software certification. Certification aims at providing (via a prior analysis) a certificate of correctness for a program which is (a) tamper-proof and (b) more efficient to check for validity than a full analysis. Here, we will show how, given an analysis instance of a CPA, to construct a corresponding sound certification instance, thereby arriving at configurable program certification. We report on experiments with certification based on different analysis techniques, and in particular explain which characteristics of an underlying analysis allow us to design an efficient (in the above (b) sense) certification procedure. AU - Jakobs, Marie-Christine AU - Wehrheim, Heike ID - 450 T2 - Proceedings of the 21st International Symposium on Model Checking of Software (SPIN) TI - Certification for Configurable Program Analysis ER - TY - CONF AB - Verification of hardware and software usually proceeds separately, software analysis relying on the correctness of processors executing instructions. This assumption is valid as long as the software runs on standard CPUs that have been extensively validated and are in wide use. However, for processors exploiting custom instruction set extensions to meet performance and energy constraints the validation might be less extensive, challenging the correctness assumption.In this paper we present an approach for integrating software analyses with hardware verification, specifically targeting custom instruction set extensions. We propose three different techniques for deriving the properties to be proven for the hardware implementation of a custom instruction in order to support software analyses. The techniques are designed to explore the trade-off between generality and efficiency and span from proving functional equivalence over checking the rules of a particular analysis domain to verifying actual pre and post conditions resulting from program analysis. We demonstrate and compare the three techniques on example programs with custom instructions, using stateof-the-art software and hardware verification techniques. AU - Jakobs, Marie-Christine AU - Platzner, Marco AU - Wiersema, Tobias AU - Wehrheim, Heike ED - Albert, Elvira ED - Sekerinski, Emil ID - 408 T2 - Proceedings of the 11th International Conference on Integrated Formal Methods (iFM) TI - Integrating Software and Hardware Verification ER - TY - CONF AB - Model transformation is a key concept in modeldrivensoftware engineering. The definition of model transformationsis usually based on meta-models describing the abstractsyntax of languages. While meta-models are thereby able to abstractfrom superfluous details of concrete syntax, they often loosestructural information inherent in languages, like information onmodel elements always occurring together in particular shapes.As a consequence, model transformations cannot naturally re-uselanguage structures, thus leading to unnecessary complexity intheir development as well as analysis.In this paper, we propose a new approach to model transformationdevelopment which allows to simplify and improve thequality of the developed transformations via the exploitation ofthe languages’ structures. The approach is based on context-freegrammars and transformations defined by pairing productions ofsource and target grammars. We show that such transformationsexhibit three important characteristics: they are sound, completeand deterministic. AU - Besova, Galina AU - Steenke, Dominik AU - Wehrheim, Heike ID - 417 T2 - Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD) TI - Grammar-based model transformations ER - TY - GEN AU - Pauck, Felix ID - 418 TI - Generierung von Eigenschaftsprüfern in einem Hardware/Software-Co-Verifikationsverfahren ER - TY - CONF AU - Isenberg, Tobias AU - Steenken, Dominik AU - Wehrheim, Heike ED - Beyer, Dirk ED - Boreale, Michele ID - 3176 T2 - Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings TI - Bounded Model Checking of Graph Transformation Systems via {SMT} Solving ER - TY - CONF AU - Travkin, Oleg AU - Mütze, Annika AU - Wehrheim, Heike ED - Bertacco, Valeria ED - Legay, Axel ID - 3177 T2 - Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings TI - {SPIN} as a Linearizability Checker under Weak Memory Models ER - TY - CONF AU - Dongol, Brijesh AU - Travkin, Oleg AU - Derrick, John AU - Wehrheim, Heike ED - Liu, Zhiming ED - Woodcock, Jim ED - Zhu, Huibiao ID - 3178 T2 - Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings TI - A High-Level Semantics for Program Execution under Total Store Order Memory ER - TY - CONF AU - Ziegert, Steffen AU - Wehrheim, Heike ED - Kowalewski, Stefan ED - Rumpe, Bernhard ID - 3179 T2 - Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen TI - Temporal Reconfiguration Plans for Self-Adaptive Systems ER - TY - CONF AB - Runtime monitoring aims at ensuring program safety by monitoring the program's behaviour during execution and taking appropriate action before a program violates some property.Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead.In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program (except for unsafe behaviour),and has the same performance characteristics. AU - Wonisch, Daniel AU - Schremmer, Alexander AU - Wehrheim, Heike ID - 469 T2 - Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM) TI - Zero Overhead Runtime Monitoring ER - TY - THES AB - Software systems are playing an increasing role in our everyday life, and as the amount of software applications grows, so does their complexity and the relevance of their computations. Software components can be found in many systems that are charged with safety-critical tasks, such as control systems for aviation or power plants. Hence, software verification techniques that are capable of proving the absence of critical errors are becoming more and more important in the field software engineering. A well-established approach to software verification is model checking. Applying this technique involves an exhaustive exploration of a state space model corresponding to the system under consideration. The major challenge in model checking is the so-called state explosion problem: The state space of a software system grows exponentially with its size. Thus, the straightforward modelling of real-life systems practically impossible. A common approach to this problem is the application of abstraction techniques, which reduce the original state space by mapping it on a significantly smaller abstract one. Abstraction inherently involves a loss of information, and thus, the resulting abstract model may be too imprecise for a definite result in verification. Therefore, abstraction is typically combined with abstraction refinement: An initially very coarse abstract model is iteratively refined, i.e. enriched with new details about the original system, until a level of abstraction is reached that is precise enough for a definite outcome. Abstraction refinement-based model checking is fully automatable and it is considered as one of the most promising approaches to the state explosion problem in verification. However, it is still faced with a number of challenges. There exist several types of abstraction techniques and not every type is equally well-suited for all kinds of systems and verification tasks. Moreover, the selection of adequate refinement steps is nontrivial and typically the most crucial part of the overall approach: Unfavourable refinement decisions can compromise the state space-reducing effect of abstraction, and as a consequence, can easily lead to the failure of verification. It is, however, hard to predict which refinement steps will eventually be expedient for verification – and which not. AU - Timm, Nils ID - 478 TI - Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems ER - TY - CONF AB - Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space. AU - Wonisch, Daniel AU - Schremmer, Alexander AU - Wehrheim, Heike ID - 498 T2 - Proceedings of the 25th International Conference on Computer Aided Verification (CAV) TI - Programs from Proofs – A PCC Alternative ER - TY - CONF AB - In the Semantic (Web) Services area, services are considered black boxes with a semantic description of their interfaces as to allow for precise service selection and configuration. The semantic description is usually grounded on domain-specific concepts as modeled in ontologies. This accounts for types used in service signatures, but also predicates occurring in preconditions and effects of services. Ontologies, in particular those enhanced with rules, capture the knowledge of domain experts on properties of and relations between domain concepts. In this paper, we present a verification technique for service compositions which makes use of this domain knowledge. We consider a service composition to be an assembly of services of which we just know signatures, preconditions, and effects. We aim at proving that a composition satisfies a (user-defined) requirement, specified in terms of guaranteed preconditions and required postconditions. As an underlying verification engine we use an SMT solver. To take advantage of the domain knowledge (and often, to enable verification at all), the knowledge is fed into the solver in the form of sorts, uninterpreted functions and in particular assertions as to enhance the solver’s reasoning capabilities. Thereby, we allow for deductions within a domain previously unknown to the solver. We exemplify our technique on a case study from the area of water network optimization software. AU - Walther, Sven AU - Wehrheim, Heike ID - 517 T2 - Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS) TI - Knowledge-Based Verification of Service Compositions - An SMT approach ER - TY - JOUR AU - Travkin, Oleg AU - Wehrheim, Heike AU - Schellhorn, Gerhard ID - 3180 JF - {ECEASST} TI - Proving Linearizability of Multiset with Local Proof Obligations ER - TY - JOUR AU - Ruhroth, Thomas AU - Wehrheim, Heike ID - 3181 IS - 3 JF - Sci. Comput. Program. TI - Model evolution and refinement ER - TY - CONF AU - Schellhorn, Gerhard AU - Wehrheim, Heike AU - Derrick, John ED - Madhusudan, P. ED - A. Seshia, Sanjit ID - 3182 T2 - Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings TI - How to Prove Algorithms Linearisable ER - TY - CONF AB - Predicate abstraction is an established technique for reducing the size of the state space during verification. In this paper, we extend predication abstraction with block-abstraction memoization (BAM), which exploits the fact that blocks are often executed several times in a program. The verification can thus benefit from caching the values of previous block analyses and reusing them upon next entry into a block. In addition to function bodies, BAM also performs well for nested loops. To further increase effectiveness, block memoization has been integrated with lazy abstraction adopting a lazy strategy for cache refinement. Together, this achieves significant performance increases: our tool (an implementation within the configurable program analysis framework CPAchecker) has won the Competition on Software Verification 2012 in the category “Overall”. AU - Wonisch, Daniel AU - Wehrheim, Heike ID - 590 T2 - Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) TI - Predicate Analysis with Block-Abstraction Memoization ER - TY - CONF AB - Predicate abstraction is an established technique in software verification. It inherently includes an abstraction refinement loop successively adding predicates until the right level of abstraction is found. For concurrent systems, predicate abstraction can be combined with spotlight abstraction, further reducing the state space by abstracting away certain processes. Refinement then has to decide whether to add a new predicate or a new process. Selecting the right predicates and processes is a crucial task: The positive effect of abstraction may be compromised by unfavourable refinement decisions. Here we present a heuristic approach to abstraction refinement. The basis for a decision is a set of refinement candidates, derived by multiple counterexample-generation. Candidates are evaluated with respect to their influence on other components in the system. Experimental results show that our technique can significantly speed up verification as compared to a naive abstraction refinement. AU - Timm, Nils AU - Wehrheim, Heike AU - Czech, Mike ID - 608 T2 - Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) TI - Heuristic-Guided Abstraction Refinement for Concurrent Systems ER - TY - CONF AB - Block Abstraction Memoization (ABM) is a technique in software model checking that exploits the modularity of programs during verification by caching. To this end, ABM records the results of block analyses and reuses them if possible when revisiting the same block again. In this paper we present an implementation of ABM into the predicate-analysis component of the software-verification framework CPAchecker. With our participation at the Competition on Software Verification we aim at providing evidence that ABM can not only substantially increase the efficiency of predicate analysis but also enables verification of a wider range of programs. AU - Wonisch, Daniel ID - 627 T2 - Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) TI - Block Abstraction Memoization for CPAchecker ER - TY - CONF AB - In model-driven development of multi-layer systems (e.g. application, platform and infrastructure), each layer is usually described by separate models. When generating analysis models or code, these separate models rst of all need to be linked. Hence, existing model transformations for single layers cannot be simply re-used. In this paper, we present a modular approach to the transformation of multi-layer systems. It employs model weaving to dene the interconnections between models of dierent layers. The weaving models themselves are subject to model transformations: The result of transforming a weaving model constitutes a conguration for the models obtained by transforming single layers, thereby allowing for a re-use of existing model transformations. We exemplify our approach by the generation of analysis models for component-based software. AU - Besova, Galina AU - Walther, Sven AU - Wehrheim, Heike AU - Becker, Steffen ID - 565 T2 - Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS) TI - Weaving-based configuration and modular transformation of multi-layer systems ER - TY - JOUR AU - Schneider, Steve AU - Treharne, Helen AU - Wehrheim, Heike ID - 3183 JF - Electr. Notes Theor. Comput. Sci. TI - Bounded Retransmission in Event-B{\(\parallel\)}CSP: a Case Study ER - TY - JOUR AU - Derrick, John AU - Schellhorn, Gerhard AU - Wehrheim, Heike ID - 3184 IS - 1 JF - {ACM} Trans. Program. Lang. Syst. TI - Mechanically verified proof obligations for linearizability ER - TY - CONF AU - Ruhroth, Thomas AU - Wehrheim, Heike AU - Ziegert, Steffen ID - 3185 T2 - 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011 TI - ReL: {A} Generic Refactoring Language for Specification and Execution ER - TY - CONF AU - Derrick, John AU - Schellhorn, Gerhard AU - Wehrheim, Heike ED - J. Butler, Michael ED - Schulte, Wolfram ID - 3186 T2 - {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings TI - Verifying Linearisability with Potential Linearisation Points ER - TY - CONF AU - Steenken, Dominik AU - Wehrheim, Heike AU - Wonisch, Daniel ED - da Silva Sim{\~{a}}o, Adenilso ED - Morgan, Carroll ID - 3187 T2 - Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers TI - Sound and Complete Abstract Graph Transformation ER - TY - CONF AU - Schneider, Steve AU - Treharne, Helen AU - Wehrheim, Heike ED - Derrick, John ED - A. Boiten, Eerke ED - Reeves, Steve ID - 3188 T2 - Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011. TI - A {CSP} Account of Event-B Refinement ER - TY - JOUR AU - Leuschel, Michael AU - Wehrheim, Heike ID - 647 IS - 10 JF - Science of Computer Programming TI - Selected papers on Integrated Formal Methods (iFM09) ER - TY - JOUR AB - Today, the concept of service oriented architectures provides a way of building integrated solutions out of existing services. To this end, services from different providers are composed using advanced orchestration and choreography techniques. However, while this principle allows for greater flexibility at a smaller cost, the use of third party services also includes a risk: Deployed services might not work as claimed by their providers. In this paper, we propose a technique for analyzing the expected reliability of service compositions based on ratings given by (previous) service users. Every service thereby comes with a reputation, and the analysis computes an overall reliability of a service composition from the reputations of its constituent services. The proposed model-driven approach proceeds by translating statechart models of service compositions into input for a probabilistic model checker (PRISM) using state-of-the-art model transformations techniques. The approach has been implemented as an Eclipse plug-in and is fully compliant with UML. AU - Besova, Galina AU - Wehrheim, Heike AU - Wagner, Annika ID - 649 IS - 2 JF - Electronic Notes in Theoretical Computer Science TI - Reputation-based Reliability Prediction of Service Compositions ER - TY - GEN AU - Schremmer, Alexander ID - 658 TI - Function Specification Inference Using Craig Interpolation ER - TY - CONF AU - Schneider, Steve AU - Treharne, Helen AU - Wehrheim, Heike ED - M{\'{e}}ry, Dominique ED - Merz, Stephan ID - 3195 T2 - Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings TI - A {CSP} Approach to Control in Event-B ER - TY - CONF AU - Dräger, Klaus AU - Kupriyanov, Andrey AU - Finkbeiner, Bernd AU - Wehrheim, Heike ED - Esparza, Javier ED - Majumdar, Rupak ID - 3196 T2 - Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, {TACAS} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings TI - {SLAB:} {A} Certifying Model Checker for Infinite-State Concurrent Systems ER - TY - JOUR AU - Steenken, Dominik AU - Wehrheim, Heike AU - Wonisch, Daniel ID - 3198 JF - CoRR TI - Towards {A} Shape Analysis for Graph Transformation Systems ER - TY - JOUR AU - Derrick, John AU - Wehrheim, Heike ID - 3189 IS - 3 JF - Sci. Comput. Program. TI - Model transformations across views ER - TY - CONF AU - Schäfer, Wilhelm AU - Wehrheim, Heike ED - Engels, Gregor ED - Lewerentz, Claus ED - Sch{\"{a}}fer, Wilhelm ED - Sch{\"{u}}rr, Andy ED - Westfechtel, Bernhard ID - 3191 T2 - Graph Transformations and Model-Driven Engineering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday TI - Model-Driven Development with Mechatronic {UML} ER - TY - CONF AU - Timm, Nils AU - Wehrheim, Heike ED - Song Dong, Jin ED - Zhu, Huibiao ID - 3193 T2 - Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings TI - On Symmetries and Spotlights - Verifying Parameterised Systems ER - TY - CONF AU - Hülsbusch, Mathias AU - König, Barbara AU - Rensink, Arend AU - Semenyak, Maria AU - Soltenborn, Christian AU - Wehrheim, Heike ED - M{\'{e}}ry, Dominique ED - Merz, Stephan ID - 3194 T2 - Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings TI - Showing Full Semantics Preservation in Model Transformation - {A} Comparison of Techniques ER - TY - JOUR AU - Wehrheim, Heike AU - Wonisch, Daniel ID - 3199 IS - 2 JF - Electr. Notes Theor. Comput. Sci. TI - Compositional {CSP} Traces Refinement Checking ER - TY - JOUR AU - Ruhroth, Thomas AU - Wehrheim, Heike ID - 3200 JF - Electr. Notes Theor. Comput. Sci. TI - Static Class Elements for Object-Z ER - TY - CONF AU - Ruhroth, Thomas AU - Voigt, Hendrik AU - Wehrheim, Heike ID - 3201 T2 - 35th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2009, Patras, Greece, August 27-29, 2009, Proceedings TI - Measure, Diagnose, Refactor: {A} Formal Quality Cycle for Software Models ER - TY - GEN ED - Leuschel, Michael ED - Wehrheim, Heike ID - 3202 SN - 978-3-642-00254-0 TI - Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings ER - TY - JOUR AU - Wehrheim, Heike ID - 3203 JF - Electr. Notes Theor. Comput. Sci. TI - Refinement in the Presence of Unknowns ER - TY - JOUR AU - Estler, H.{-}Christian AU - Wehrheim, Heike ID - 3204 JF - Electr. Notes Theor. Comput. Sci. TI - Alloy as a Refactoring Checker? ER - TY - JOUR AU - Möller, Michael AU - Olderog, Ernst-Rüdiger AU - Rasch, Holger AU - Wehrheim, Heike ID - 3205 IS - 2 JF - Formal Asp. Comput. TI - Integrating a formal method into a software engineering process with {UML} and Java ER - TY - JOUR AU - Brückner, Ingo AU - Dräger, Klaus AU - Finkbeiner, Bernd AU - Wehrheim, Heike ID - 3206 IS - 4 JF - Fundam. Inform. TI - Slicing Abstractions ER - TY - CONF AU - Engels, Gregor AU - Kleppe, Anneke AU - Rensink, Arend AU - Semenyak, Maria AU - Soltenborn, Christian AU - Wehrheim, Heike ED - Schieferdecker, Ina ED - Hartman, Alan ID - 3207 T2 - Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings TI - From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations ER - TY - CONF AU - Derrick, John AU - Schellhorn, Gerhard AU - Wehrheim, Heike ED - Barthe, Gilles ED - S. de Boer, Frank ID - 3208 T2 - Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings TI - Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack ER - TY - CONF AU - Metzler, Björn AU - Wehrheim, Heike AU - Wonisch, Daniel ED - Liu, Shaoying ED - S. E. Maibaum, T. ED - Araki, Keijiro ID - 3209 T2 - Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings TI - Decomposition for Compositional Verification ER - TY - CONF AU - Wehrheim, Heike ED - S. Fitzgerald, John ED - Elisabeth Haxthausen, Anne ED - Yenig{\"{u}}n, H{\"{u}}sn{\"{u}} ID - 3210 T2 - Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings TI - Bounded Model Checking for Partial Kripke Structures ER - TY - JOUR AU - Derrick, John AU - Wehrheim, Heike ID - 3211 IS - 1 JF - Acta Inf. TI - On using data abstractions for model checking refinements ER - TY - JOUR AU - Metzler, Björn AU - Wehrheim, Heike ID - 3212 IS - 2 JF - Electr. Notes Theor. Comput. Sci. TI - Extending a Component Specification Language with Time ER - TY - JOUR AU - Estler, H.{-}Christian AU - Ruhroth, Thomas AU - Wehrheim, Heike ID - 3213 JF - Electr. Notes Theor. Comput. Sci. TI - Modelchecking Correctness of Refactorings - Some Experiments ER - TY - CONF AU - Engels, Gregor AU - Güldali, Baris AU - Soltenborn, Christian AU - Wehrheim, Heike ED - Sch{\"{u}}rr, Andy ED - Nagl, Manfred ED - Z{\"{u}}ndorf, Albert ID - 3214 T2 - Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers TI - Assuring Consistency of Business Process Models and Web Services Using Visual Contracts ER - TY - CONF AU - Engels, Gregor AU - Soltenborn, Christian AU - Wehrheim, Heike ED - M. Bonsangue, Marcello ED - Broch Johnsen, Einar ID - 3215 T2 - Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings TI - Analysis of {UML} Activities Using Dynamic Meta Modeling ER - TY - CONF AU - Ruhroth, Thomas AU - Wehrheim, Heike ED - M. Bonsangue, Marcello ED - Broch Johnsen, Einar ID - 3216 T2 - Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings TI - Refactoring Object-Oriented Specifications with Data and Processes ER - TY - CONF AU - Schäfer, Wilhelm AU - Wehrheim, Heike ED - C. Briand, Lionel ED - L. Wolf, Alexander ID - 3221 T2 - International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA} TI - The Challenges of Building Advanced Mechatronic Systems ER - TY - CONF AU - Derrick, John AU - Schellhorn, Gerhard AU - Wehrheim, Heike ED - Davies, Jim ED - Gibbons, Jeremy ID - 3222 T2 - Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings TI - Proving Linearizability Via Non-atomic Refinement ER - TY - JOUR AU - Brückner, Ingo AU - Metzler, Björn AU - Wehrheim, Heike ID - 3223 IS - 1-2 JF - Nord. J. Comput. TI - Optimizing Slicing of Formal Specifications by Deductive Verification ER - TY - CONF AU - Derrick, John AU - Wehrheim, Heike ED - Johnson, Michael ED - Vene, Varmo ID - 3224 T2 - Algebraic Methodology and Software Technology, 11th International Conference, {AMAST} 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings TI - Model Transformations Incorporating Multiple Views ER - TY - CONF AU - Wehrheim, Heike ED - Liu, Zhiming ED - He, Jifeng ID - 3225 T2 - Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, {ICFEM} 2006, Macao, China, November 1-3, 2006, Proceedings TI - Incremental Slicing ER - TY - GEN ED - Gorrieri, Roberto ED - Wehrheim, Heike ID - 3226 SN - 3-540-34893-X TI - Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings ER - TY - JOUR AU - Olderog, Ernst-Rüdiger AU - Wehrheim, Heike ID - 3227 IS - 1-3 JF - Sci. Comput. Program. TI - Specification and (property) inheritance in {CSP-OZ} ER - TY - JOUR AU - Wehrheim, Heike ID - 3228 IS - 3 JF - Theor. Comput. Sci. TI - Slicing techniques for verification re-use ER - TY - CONF AU - Rasch, Holger AU - Wehrheim, Heike ED - Steffen, Martin ED - Zavattaro, Gianluigi ID - 3229 T2 - Formal Methods for Open Object-Based Distributed Systems, 7th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2005, Athens, Greece, June 15-17, 2005, Proceedings TI - Checking the Validity of Scenarios in {UML} Models ER - TY - CONF AU - Brückner, Ingo AU - Wehrheim, Heike ED - Lau, Kung{-}Kiu ED - Banach, Richard ID - 3230 T2 - Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings TI - Slicing an Integrated Formal Method for Verification ER - TY - CONF AU - Derrick, John AU - Wehrheim, Heike ED - Treharne, Helen ED - King, Steve ED - C. Henson, Martin ED - A. Schneider, Steve ID - 3231 T2 - {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings TI - Non-atomic Refinement in {Z} and {CSP} ER - TY - CONF AU - Brückner, Ingo AU - Wehrheim, Heike ED - Treharne, Helen ED - King, Steve ED - C. Henson, Martin ED - A. Schneider, Steve ID - 3232 T2 - {ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings TI - Slicing Object-Z Specifications for Verification ER - TY - CONF AU - Wehrheim, Heike ED - H. Reussner, Ralf ED - A. Stafford, Judith ED - A. Szyperski, Clemens ID - 3233 T2 - Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers TI - Refinement and Consistency in Component Models with Multiple Views ER - TY - CONF AU - Möller, Michael AU - Olderog, Ernst-Rüdiger AU - Rasch, Holger AU - Wehrheim, Heike ED - A. Boiten, Eerke ED - Derrick, John ED - Smith, Graeme ID - 3234 T2 - Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings TI - Linking {CSP-OZ} with {UML} and Java: {A} Case Study ER - TY - CONF AU - Wehrheim, Heike ED - B{\'{e}}zivin, Jean ED - Heckel, Reiko ID - 3235 T2 - Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004 TI - Refinement and Consistency in Multiview Models ER - TY - JOUR AU - Wehrheim, Heike ID - 3236 IS - 2 JF - Formal Methods in System Design TI - Behavioral Subtyping Relations for Active Objects ER - TY - CONF AU - Wehrheim, Heike ED - S. de Boer, Frank ED - M. Bonsangue, Marcello ED - Graf, Susanne ED - P. de Roever, Willem ID - 3237 T2 - Formal Methods for Components and Objects, Second International Symposium, {FMCO} 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures TI - Preserving Properties Under Change ER - TY - CONF AU - Wehrheim, Heike ED - Najm, Elie ED - Nestmann, Uwe ED - Stevens, Perdita ID - 3238 T2 - Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings TI - Inheritance of Temporal Logic Properties ER - TY - CONF AU - Rasch, Holger AU - Wehrheim, Heike ED - Najm, Elie ED - Nestmann, Uwe ED - Stevens, Perdita ID - 3239 T2 - Formal Methods for Open Object-Based Distributed Systems, 6th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2003, Paris, France, November 19.21, 2003, Proceedings TI - Checking Consistency in {UML} Diagramms: Classes and State Machines ER - TY - CONF AU - Derrick, John AU - Wehrheim, Heike ED - Bert, Didier ED - P. Bowen, Jonathan ED - King, Steve ED - A. Wald{\'{e}}n, Marina ID - 3240 T2 - {ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings TI - Using Coupled Simulations in Non-atomic Refinement ER - TY - JOUR AU - Wehrheim, Heike ID - 3241 IS - 4 JF - Nord. J. Comput. TI - Relating State-based and Behaviour-oriented Subtyping ER - TY - CONF AU - Olderog, Ernst-Rüdiger AU - Wehrheim, Heike ED - S. de Boer, Frank ED - M. Bonsangue, Marcello ED - Graf, Susanne ED - P. de Roever, Willem ID - 3242 T2 - Formal Methods for Components and Objects, First International Symposium, {FMCO} 2002, Leiden, The Netherlands, November 5-8, 2002, Revised Lectures TI - Specification and Inheritance in {CSP-OZ} ER - TY - CONF AU - Wehrheim, Heike ED - Jacobs, Bart ED - Rensink, Arend ID - 3243 T2 - Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands TI - Checking Behavioural Subtypes via Refinement ER - TY - JOUR AU - Rensink, Arend AU - Wehrheim, Heike ID - 3244 IS - 3 JF - Acta Inf. TI - Process algebra with action dependencies ER - TY - JOUR AU - Bartetzko, Detlef AU - Fischer, Clemens AU - Möller, Michael AU - Wehrheim, Heike ID - 3245 IS - 2 JF - Electr. Notes Theor. Comput. Sci. TI - Jass - Java with Assertions ER - TY - CONF AU - Fischer, Clemens AU - Olderog, Ernst-Rüdiger AU - Wehrheim, Heike ED - Hu{\ss}mann, Heinrich ID - 3246 T2 - Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings TI - A {CSP} View on {UML-RT} Structure Diagrams ER - TY - JOUR AU - Fischer, Clemens AU - Wehrheim, Heike ID - 3247 JF - Bulletin of the {EATCS} TI - Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method ER - TY - JOUR AU - Wehrheim, Heike ID - 3248 IS - 3 JF - Formal Asp. Comput. TI - Data Abstraction Techniques in the Validation of {CSP-OZ} Specifications ER -