---
_id: '3162'
author:
- first_name: Steffen
  full_name: Ziegert, Steffen
  last_name: Ziegert
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Ziegert S, Wehrheim H. Temporal plans for software architecture reconfiguration.
    <i>Computer Science - R &#38; D</i>. 2015;(3-4):303--320. doi:<a href="https://doi.org/10.1007/s00450-014-0259-7">10.1007/s00450-014-0259-7</a>
  apa: Ziegert, S., &#38; Wehrheim, H. (2015). Temporal plans for software architecture
    reconfiguration. <i>Computer Science - R &#38; D</i>, (3–4), 303--320. <a href="https://doi.org/10.1007/s00450-014-0259-7">https://doi.org/10.1007/s00450-014-0259-7</a>
  bibtex: '@article{Ziegert_Wehrheim_2015, title={Temporal plans for software architecture
    reconfiguration}, DOI={<a href="https://doi.org/10.1007/s00450-014-0259-7">10.1007/s00450-014-0259-7</a>},
    number={3–4}, journal={Computer Science - R &#38; D}, author={Ziegert, Steffen
    and Wehrheim, Heike}, year={2015}, pages={303--320} }'
  chicago: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture
    Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4 (2015): 303--320.
    <a href="https://doi.org/10.1007/s00450-014-0259-7">https://doi.org/10.1007/s00450-014-0259-7</a>.'
  ieee: S. Ziegert and H. Wehrheim, “Temporal plans for software architecture reconfiguration,”
    <i>Computer Science - R &#38; D</i>, no. 3–4, pp. 303--320, 2015.
  mla: Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture
    Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4, 2015, pp. 303--320,
    doi:<a href="https://doi.org/10.1007/s00450-014-0259-7">10.1007/s00450-014-0259-7</a>.
  short: S. Ziegert, H. Wehrheim, Computer Science - R &#38; D (2015) 303--320.
date_created: 2018-06-13T07:47:56Z
date_updated: 2022-01-06T06:59:01Z
ddc:
- '000'
department:
- _id: '77'
doi: 10.1007/s00450-014-0259-7
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T15:52:13Z
  date_updated: 2018-11-02T15:52:13Z
  file_id: '5315'
  file_name: TemporalPlansForSoftwareArchit.pdf
  file_size: 2136451
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T15:52:13Z
has_accepted_license: '1'
issue: 3-4
language:
- iso: eng
page: 303--320
project:
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subproject B3
publication: Computer Science - R & D
status: public
title: Temporal plans for software architecture reconfiguration
type: journal_article
user_id: '477'
year: '2015'
...
---
_id: '3163'
author:
- first_name: Roland
  full_name: Meyer, Roland
  last_name: Meyer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Meyer R, Wehrheim H. From Program Verification to Time and Space: The Scientific
    Life of Ernst-R{\"{u}}diger Olderog. In: Meyer R, Platzer A, Wehrheim H, eds.
    <i>Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on
    the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>.
    Lecture Notes in Computer Science. ; 2015:3--4. doi:<a href="https://doi.org/10.1007/978-3-319-23506-6_1">10.1007/978-3-319-23506-6_1</a>'
  apa: 'Meyer, R., &#38; Wehrheim, H. (2015). From Program Verification to Time and
    Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog. In R. Meyer, A. Platzer,
    &#38; H. Wehrheim (Eds.), <i>Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger
    Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9,
    2015. Proceedings</i> (pp. 3--4). <a href="https://doi.org/10.1007/978-3-319-23506-6_1">https://doi.org/10.1007/978-3-319-23506-6_1</a>'
  bibtex: '@inproceedings{Meyer_Wehrheim_2015, series={Lecture Notes in Computer Science},
    title={From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger
    Olderog}, DOI={<a href="https://doi.org/10.1007/978-3-319-23506-6_1">10.1007/978-3-319-23506-6_1</a>},
    booktitle={Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog
    on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015.
    Proceedings}, author={Meyer, Roland and Wehrheim, Heike}, editor={Meyer, Roland
    and Platzer, Andr{\’{e}} and Wehrheim, HeikeEditors}, year={2015}, pages={3--4},
    collection={Lecture Notes in Computer Science} }'
  chicago: 'Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time
    and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog.” In <i>Correct
    System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion
    of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>,
    edited by Roland Meyer, Andr{\’{e}} Platzer, and Heike Wehrheim, 3--4. Lecture
    Notes in Computer Science, 2015. <a href="https://doi.org/10.1007/978-3-319-23506-6_1">https://doi.org/10.1007/978-3-319-23506-6_1</a>.'
  ieee: 'R. Meyer and H. Wehrheim, “From Program Verification to Time and Space: The
    Scientific Life of Ernst-R{\"{u}}diger Olderog,” in <i>Correct System Design -
    Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th
    Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, 2015, pp.
    3--4.'
  mla: 'Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and
    Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog.” <i>Correct System
    Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of
    His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, edited
    by Roland Meyer et al., 2015, pp. 3--4, doi:<a href="https://doi.org/10.1007/978-3-319-23506-6_1">10.1007/978-3-319-23506-6_1</a>.'
  short: 'R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct
    System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion
    of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015,
    pp. 3--4.'
date_created: 2018-06-13T07:49:28Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-23506-6_1
editor:
- first_name: Roland
  full_name: Meyer, Roland
  last_name: Meyer
- first_name: Andr{\'{e}}
  full_name: Platzer, Andr{\'{e}}
  last_name: Platzer
- first_name: Heike
  full_name: Wehrheim, Heike
  last_name: Wehrheim
page: 3--4
publication: Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog
  on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: 'From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger
  Olderog'
type: conference
user_id: '29719'
year: '2015'
...
---
_id: '3164'
author:
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Brijesh
  full_name: Dongol, Brijesh
  last_name: Dongol
- first_name: Gerhard
  full_name: Schellhorn, Gerhard
  last_name: Schellhorn
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Derrick J, Dongol B, Schellhorn G, Travkin O, Wehrheim H. Verifying Opacity
    of a Transactional Mutex Lock. In: Bj{\o}rner N, S. de Boer F, eds. <i>{FM} 2015:
    Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015,
    Proceedings</i>. Lecture Notes in Computer Science. ; 2015:161--177. doi:<a href="https://doi.org/10.1007/978-3-319-19249-9_11">10.1007/978-3-319-19249-9_11</a>'
  apa: 'Derrick, J., Dongol, B., Schellhorn, G., Travkin, O., &#38; Wehrheim, H. (2015).
    Verifying Opacity of a Transactional Mutex Lock. In N. Bj{\o}rner &#38; F. S.
    de Boer (Eds.), <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo,
    Norway, June 24-26, 2015, Proceedings</i> (pp. 161--177). <a href="https://doi.org/10.1007/978-3-319-19249-9_11">https://doi.org/10.1007/978-3-319-19249-9_11</a>'
  bibtex: '@inproceedings{Derrick_Dongol_Schellhorn_Travkin_Wehrheim_2015, series={Lecture
    Notes in Computer Science}, title={Verifying Opacity of a Transactional Mutex
    Lock}, DOI={<a href="https://doi.org/10.1007/978-3-319-19249-9_11">10.1007/978-3-319-19249-9_11</a>},
    booktitle={{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
    June 24-26, 2015, Proceedings}, author={Derrick, John and Dongol, Brijesh and
    Schellhorn, Gerhard and Travkin, Oleg and Wehrheim, Heike}, editor={Bj{\o}rner,
    Nikolaj and S. de Boer, FrankEditors}, year={2015}, pages={161--177}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, and Heike
    Wehrheim. “Verifying Opacity of a Transactional Mutex Lock.” In <i>{FM} 2015:
    Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015,
    Proceedings</i>, edited by Nikolaj Bj{\o}rner and Frank S. de Boer, 161--177.
    Lecture Notes in Computer Science, 2015. <a href="https://doi.org/10.1007/978-3-319-19249-9_11">https://doi.org/10.1007/978-3-319-19249-9_11</a>.'
  ieee: 'J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, and H. Wehrheim, “Verifying
    Opacity of a Transactional Mutex Lock,” in <i>{FM} 2015: Formal Methods - 20th
    International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, 2015,
    pp. 161--177.'
  mla: 'Derrick, John, et al. “Verifying Opacity of a Transactional Mutex Lock.” <i>{FM}
    2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26,
    2015, Proceedings</i>, edited by Nikolaj Bj{\o}rner and Frank S. de Boer, 2015,
    pp. 161--177, doi:<a href="https://doi.org/10.1007/978-3-319-19249-9_11">10.1007/978-3-319-19249-9_11</a>.'
  short: 'J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\o}rner,
    F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium,
    Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.'
date_created: 2018-06-13T07:50:43Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-19249-9_11
editor:
- first_name: Nikolaj
  full_name: Bj{\o}rner, Nikolaj
  last_name: Bj{\o}rner
- first_name: Frank
  full_name: S. de Boer, Frank
  last_name: S. de Boer
page: 161--177
project:
- _id: '78'
  name: Validation of Software Transactional Memory
publication: '{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
  June 24-26, 2015, Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: Verifying Opacity of a Transactional Mutex Lock
type: conference
user_id: '29719'
year: '2015'
...
---
_id: '3165'
author:
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
citation:
  ama: 'Wehrheim H, Travkin O. {TSO} to {SC} via Symbolic Execution. In: Piterman
    N, ed. <i>Hardware and Software: Verification and Testing - 11th International
    Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015,
    Proceedings</i>. Lecture Notes in Computer Science. ; 2015:104--119. doi:<a href="https://doi.org/10.1007/978-3-319-26287-1_7">10.1007/978-3-319-26287-1_7</a>'
  apa: 'Wehrheim, H., &#38; Travkin, O. (2015). {TSO} to {SC} via Symbolic Execution.
    In N. Piterman (Ed.), <i>Hardware and Software: Verification and Testing - 11th
    International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November
    17-19, 2015, Proceedings</i> (pp. 104--119). <a href="https://doi.org/10.1007/978-3-319-26287-1_7">https://doi.org/10.1007/978-3-319-26287-1_7</a>'
  bibtex: '@inproceedings{Wehrheim_Travkin_2015, series={Lecture Notes in Computer
    Science}, title={{TSO} to {SC} via Symbolic Execution}, DOI={<a href="https://doi.org/10.1007/978-3-319-26287-1_7">10.1007/978-3-319-26287-1_7</a>},
    booktitle={Hardware and Software: Verification and Testing - 11th International
    Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015,
    Proceedings}, author={Wehrheim, Heike and Travkin, Oleg}, editor={Piterman, NirEditor},
    year={2015}, pages={104--119}, collection={Lecture Notes in Computer Science}
    }'
  chicago: 'Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.”
    In <i>Hardware and Software: Verification and Testing - 11th International Haifa
    Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>,
    edited by Nir Piterman, 104--119. Lecture Notes in Computer Science, 2015. <a
    href="https://doi.org/10.1007/978-3-319-26287-1_7">https://doi.org/10.1007/978-3-319-26287-1_7</a>.'
  ieee: 'H. Wehrheim and O. Travkin, “{TSO} to {SC} via Symbolic Execution,” in <i>Hardware
    and Software: Verification and Testing - 11th International Haifa Verification
    Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>,
    2015, pp. 104--119.'
  mla: 'Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.”
    <i>Hardware and Software: Verification and Testing - 11th International Haifa
    Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>,
    edited by Nir Piterman, 2015, pp. 104--119, doi:<a href="https://doi.org/10.1007/978-3-319-26287-1_7">10.1007/978-3-319-26287-1_7</a>.'
  short: 'H. Wehrheim, O. Travkin, in: N. Piterman (Ed.), Hardware and Software: Verification
    and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa,
    Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119.'
date_created: 2018-06-13T07:52:44Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-26287-1_7
editor:
- first_name: Nir
  full_name: Piterman, Nir
  last_name: Piterman
page: 104--119
publication: 'Hardware and Software: Verification and Testing - 11th International
  Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015,
  Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: '{TSO} to {SC} via Symbolic Execution'
type: conference
user_id: '29719'
year: '2015'
...
---
_id: '3166'
citation:
  ama: Meyer R, Platzer A, Wehrheim H, eds. <i>Correct System Design - Symposium in
    Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg,
    Germany, September 8-9, 2015. Proceedings</i>.; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-23506-6">10.1007/978-3-319-23506-6</a>
  apa: Meyer, R., Platzer, A., &#38; Wehrheim, H. (Eds.). (2015). <i>Correct System
    Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of
    His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. <a
    href="https://doi.org/10.1007/978-3-319-23506-6">https://doi.org/10.1007/978-3-319-23506-6</a>
  bibtex: '@book{Meyer_Platzer_Wehrheim_2015, series={Lecture Notes in Computer Science},
    title={Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog
    on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015.
    Proceedings}, DOI={<a href="https://doi.org/10.1007/978-3-319-23506-6">10.1007/978-3-319-23506-6</a>},
    year={2015}, collection={Lecture Notes in Computer Science} }'
  chicago: Meyer, Roland, Andr{\’{e}} Platzer, and Heike Wehrheim, eds. <i>Correct
    System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion
    of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>.
    Lecture Notes in Computer Science, 2015. <a href="https://doi.org/10.1007/978-3-319-23506-6">https://doi.org/10.1007/978-3-319-23506-6</a>.
  ieee: R. Meyer, A. Platzer, and H. Wehrheim, Eds., <i>Correct System Design - Symposium
    in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday,
    Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. 2015.
  mla: Meyer, Roland, et al., editors. <i>Correct System Design - Symposium in Honor
    of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg,
    Germany, September 8-9, 2015. Proceedings</i>. 2015, doi:<a href="https://doi.org/10.1007/978-3-319-23506-6">10.1007/978-3-319-23506-6</a>.
  short: R. Meyer, A. Platzer, H. Wehrheim, eds., Correct System Design - Symposium
    in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday,
    Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015.
date_created: 2018-06-13T07:54:06Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-23506-6
editor:
- first_name: Roland
  full_name: Meyer, Roland
  last_name: Meyer
- first_name: Andr{\'{e}}
  full_name: Platzer, Andr{\'{e}}
  last_name: Platzer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
publication_identifier:
  isbn:
  - 978-3-319-23505-9
series_title: Lecture Notes in Computer Science
status: public
title: Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on
  the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings
type: conference_editor
user_id: '29719'
year: '2015'
...
---
_id: '336'
abstract:
- lang: eng
  text: Today, service compositions often need to be assembled or changed on-the-fly,
    which leaves only little time for quality assurance. Moreover, quality assurance
    is complicated by service providers only giving information on their services
    in terms of domain specific concepts with only limited semantic meaning. In this
    paper, we propose a method to construct service compositions based on pre-verifiedtemplates.
    Templates, given as workflow descriptions, are typed over a (domain-independent)
    template ontology defining concepts and predicates. Templates are proven correct
    using an abstract semantics, leaving the specific meaning of ontology concepts
    open, however, only up to given ontology rules. Construction of service compositions
    amounts to instantiation of templates with domain-specific services.Correctness
    of an instantiation can then simply be checked by verifying that the domain ontology(a)
    adheres to the rules of the template ontology, and (b) fulfills the constraints
    of the employed template.
author:
- first_name: Sven
  full_name: Walther, Sven
  last_name: Walther
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Walther S, Wehrheim H. Verified Service Compositions by Template-Based Construction.
    In: Lanese I, Madelaine E, eds. <i>Proceedings of the 11th International Symposium
    on Formal Aspects of Component Software (FACS)</i>. LNCS. ; 2014:31-48. doi:<a
    href="https://doi.org/10.1007/978-3-319-15317-9_3">10.1007/978-3-319-15317-9_3</a>'
  apa: Walther, S., &#38; Wehrheim, H. (2014). Verified Service Compositions by Template-Based
    Construction. In I. Lanese &#38; E. Madelaine (Eds.), <i>Proceedings of the 11th
    International Symposium on Formal Aspects of Component Software (FACS)</i> (pp.
    31–48). <a href="https://doi.org/10.1007/978-3-319-15317-9_3">https://doi.org/10.1007/978-3-319-15317-9_3</a>
  bibtex: '@inproceedings{Walther_Wehrheim_2014, series={LNCS}, title={Verified Service
    Compositions by Template-Based Construction}, DOI={<a href="https://doi.org/10.1007/978-3-319-15317-9_3">10.1007/978-3-319-15317-9_3</a>},
    booktitle={Proceedings of the 11th International Symposium on Formal Aspects of
    Component Software (FACS)}, author={Walther, Sven and Wehrheim, Heike}, editor={Lanese,
    Ivan and Madelaine, EricEditors}, year={2014}, pages={31–48}, collection={LNCS}
    }'
  chicago: Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based
    Construction.” In <i>Proceedings of the 11th International Symposium on Formal
    Aspects of Component Software (FACS)</i>, edited by Ivan Lanese and Eric Madelaine,
    31–48. LNCS, 2014. <a href="https://doi.org/10.1007/978-3-319-15317-9_3">https://doi.org/10.1007/978-3-319-15317-9_3</a>.
  ieee: S. Walther and H. Wehrheim, “Verified Service Compositions by Template-Based
    Construction,” in <i>Proceedings of the 11th International Symposium on Formal
    Aspects of Component Software (FACS)</i>, 2014, pp. 31–48.
  mla: Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based
    Construction.” <i>Proceedings of the 11th International Symposium on Formal Aspects
    of Component Software (FACS)</i>, edited by Ivan Lanese and Eric Madelaine, 2014,
    pp. 31–48, doi:<a href="https://doi.org/10.1007/978-3-319-15317-9_3">10.1007/978-3-319-15317-9_3</a>.
  short: 'S. Walther, H. Wehrheim, in: I. Lanese, E. Madelaine (Eds.), Proceedings
    of the 11th International Symposium on Formal Aspects of Component Software (FACS),
    2014, pp. 31–48.'
date_created: 2017-10-17T12:41:57Z
date_updated: 2022-01-06T06:59:13Z
ddc:
- '040'
department:
- _id: '77'
doi: 10.1007/978-3-319-15317-9_3
editor:
- first_name: Ivan
  full_name: Lanese, Ivan
  last_name: Lanese
- first_name: Eric
  full_name: Madelaine, Eric
  last_name: Madelaine
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:29:29Z
  date_updated: 2018-03-20T07:29:29Z
  file_id: '1423'
  file_name: 336-facs2014_walther.pdf
  file_size: 484422
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:29:29Z
has_accepted_license: '1'
language:
- iso: eng
page: 31-48
project:
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subprojekt B3
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 11th International Symposium on Formal Aspects of
  Component Software (FACS)
series_title: LNCS
status: public
title: Verified Service Compositions by Template-Based Construction
type: conference
user_id: '477'
year: '2014'
...
---
_id: '340'
author:
- first_name: Philipp
  full_name: Korth, Philipp
  last_name: Korth
citation:
  ama: Korth P. <i>Untersuchung transitiver Eigenschaften der Technik “Programs from
    Proofs.”</i> Universität Paderborn; 2014.
  apa: Korth, P. (2014). <i>Untersuchung transitiver Eigenschaften der Technik “Programs
    from Proofs.”</i> Universität Paderborn.
  bibtex: '@book{Korth_2014, title={Untersuchung transitiver Eigenschaften der Technik
    “Programs from Proofs”}, publisher={Universität Paderborn}, author={Korth, Philipp},
    year={2014} }'
  chicago: Korth, Philipp. <i>Untersuchung transitiver Eigenschaften der Technik “Programs
    from Proofs.”</i> Universität Paderborn, 2014.
  ieee: P. Korth, <i>Untersuchung transitiver Eigenschaften der Technik “Programs
    from Proofs.”</i> Universität Paderborn, 2014.
  mla: Korth, Philipp. <i>Untersuchung transitiver Eigenschaften der Technik “Programs
    from Proofs.”</i> Universität Paderborn, 2014.
  short: P. Korth, Untersuchung transitiver Eigenschaften der Technik “Programs from
    Proofs,” Universität Paderborn, 2014.
date_created: 2017-10-17T12:41:58Z
date_updated: 2022-01-06T06:59:14Z
department:
- _id: '77'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Heike
  full_name: Wehrheim, Heike
  last_name: Wehrheim
title: Untersuchung transitiver Eigenschaften der Technik "Programs from Proofs"
type: bachelorsthesis
user_id: '15504'
year: '2014'
...
---
_id: '344'
author:
- first_name: Matthias
  full_name: Becker, Matthias
  last_name: Becker
- first_name: Steffen
  full_name: Becker, Steffen
  last_name: Becker
- first_name: Galina
  full_name: Besova, Galina
  last_name: Besova
- first_name: Sven
  full_name: Walther, Sven
  last_name: Walther
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Becker M, Becker S, Besova G, Walther S, Wehrheim H. Towards Systematic Configuration
    for Architecture Validation. In: <i>Proceedings of the 40th Euromicro Conference
    on Software Engineering and Advanced Applications (Work in Progress Session)</i>.
    ; 2014.'
  apa: Becker, M., Becker, S., Besova, G., Walther, S., &#38; Wehrheim, H. (2014).
    Towards Systematic Configuration for Architecture Validation. In <i>Proceedings
    of the 40th Euromicro Conference on Software Engineering and Advanced Applications
    (Work in Progress Session)</i>.
  bibtex: '@inproceedings{Becker_Becker_Besova_Walther_Wehrheim_2014, title={Towards
    Systematic Configuration for Architecture Validation}, booktitle={Proceedings
    of the 40th Euromicro Conference on Software Engineering and Advanced Applications
    (Work in Progress Session)}, author={Becker, Matthias and Becker, Steffen and
    Besova, Galina and Walther, Sven and Wehrheim, Heike}, year={2014} }'
  chicago: Becker, Matthias, Steffen Becker, Galina Besova, Sven Walther, and Heike
    Wehrheim. “Towards Systematic Configuration for Architecture Validation.” In <i>Proceedings
    of the 40th Euromicro Conference on Software Engineering and Advanced Applications
    (Work in Progress Session)</i>, 2014.
  ieee: M. Becker, S. Becker, G. Besova, S. Walther, and H. Wehrheim, “Towards Systematic
    Configuration for Architecture Validation,” in <i>Proceedings of the 40th Euromicro
    Conference on Software Engineering and Advanced Applications (Work in Progress
    Session)</i>, 2014.
  mla: Becker, Matthias, et al. “Towards Systematic Configuration for Architecture
    Validation.” <i>Proceedings of the 40th Euromicro Conference on Software Engineering
    and Advanced Applications (Work in Progress Session)</i>, 2014.
  short: 'M. Becker, S. Becker, G. Besova, S. Walther, H. Wehrheim, in: Proceedings
    of the 40th Euromicro Conference on Software Engineering and Advanced Applications
    (Work in Progress Session), 2014.'
date_created: 2017-10-17T12:41:59Z
date_updated: 2022-01-06T06:59:17Z
ddc:
- '040'
department:
- _id: '77'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:27:54Z
  date_updated: 2018-03-20T07:27:54Z
  file_id: '1420'
  file_name: 344-paper_CAMERA_READY.pdf
  file_size: 80674
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:27:54Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subprojekt B3
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 40th Euromicro Conference on Software Engineering
  and Advanced Applications (Work in Progress Session)
status: public
title: Towards Systematic Configuration for Architecture Validation
type: conference
user_id: '477'
year: '2014'
...
---
_id: '353'
abstract:
- lang: eng
  text: 'There are many technologies for the automation of processesthat deal with
    services; examples are service discovery and composition.Automation of these processes
    requires that the services are described semantically. However, semantically described
    services are currently not oronly rarely available, which limits the applicability
    of discovery and composition approaches. The systematic support for creating new
    semanticservices usable by automated technologies is an open problem.We tackle
    this problem with a template based approach: Domain independent templates are
    instantiated with domain specific services andboolean expressions. The obtained
    services have semantic descriptionswhose correctness directly follows from the
    correctness of the template.Besides the theory, we present experimental results
    for a service repository in which 85% of the services were generated automatically.'
author:
- first_name: Felix
  full_name: Mohr, Felix
  last_name: Mohr
- first_name: Sven
  full_name: Walther, Sven
  last_name: Walther
citation:
  ama: 'Mohr F, Walther S. Template-based Generation of Semantic Services. In: <i>Proceedings
    of the 14th International Conference on Software Reuse (ICSR)</i>. LNCS. ; 2014:188-203.
    doi:<a href="https://doi.org/10.1007/978-3-319-14130-5_14">10.1007/978-3-319-14130-5_14</a>'
  apa: Mohr, F., &#38; Walther, S. (2014). Template-based Generation of Semantic Services.
    In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>
    (pp. 188–203). <a href="https://doi.org/10.1007/978-3-319-14130-5_14">https://doi.org/10.1007/978-3-319-14130-5_14</a>
  bibtex: '@inproceedings{Mohr_Walther_2014, series={LNCS}, title={Template-based
    Generation of Semantic Services}, DOI={<a href="https://doi.org/10.1007/978-3-319-14130-5_14">10.1007/978-3-319-14130-5_14</a>},
    booktitle={Proceedings of the 14th International Conference on Software Reuse
    (ICSR)}, author={Mohr, Felix and Walther, Sven}, year={2014}, pages={188–203},
    collection={LNCS} }'
  chicago: Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.”
    In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>,
    188–203. LNCS, 2014. <a href="https://doi.org/10.1007/978-3-319-14130-5_14">https://doi.org/10.1007/978-3-319-14130-5_14</a>.
  ieee: F. Mohr and S. Walther, “Template-based Generation of Semantic Services,”
    in <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>,
    2014, pp. 188–203.
  mla: Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.”
    <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>,
    2014, pp. 188–203, doi:<a href="https://doi.org/10.1007/978-3-319-14130-5_14">10.1007/978-3-319-14130-5_14</a>.
  short: 'F. Mohr, S. Walther, in: Proceedings of the 14th International Conference
    on Software Reuse (ICSR), 2014, pp. 188–203.'
date_created: 2017-10-17T12:42:00Z
date_updated: 2022-01-06T06:59:22Z
ddc:
- '040'
department:
- _id: '77'
- _id: '355'
doi: 10.1007/978-3-319-14130-5_14
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:23:32Z
  date_updated: 2018-03-20T07:23:32Z
  file_id: '1414'
  file_name: 353-icsr2015_submission_17.pdf
  file_size: 431778
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:23:32Z
has_accepted_license: '1'
language:
- iso: eng
page: 188-203
project:
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subprojekt B3
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '10'
  name: SFB 901 - Subproject B2
publication: Proceedings of the 14th International Conference on Software Reuse (ICSR)
series_title: LNCS
status: public
title: Template-based Generation of Semantic Services
type: conference
user_id: '477'
year: '2014'
...
---
_id: '383'
abstract:
- lang: eng
  text: Proof-carrying code approaches aim at safe execution of untrusted code by
    having the code producer attach a safety proof to the code which the code consumer
    only has to validate. Depending on the type of safety property, proofs can however
    become quite large and their validation - though faster than their construction
    - still time consuming. In this paper we introduce a new concept for safe execution
    of untrusted code. It keeps the idea of putting the time consuming part of proving
    on the side of the code producer, however, attaches no proofs to code anymore
    but instead uses the proof to transform the program into an equivalent but more
    eﬃciently veriﬁable program. Code consumers thus still do proving themselves,
    however, on a computationally inexpensive level only. Experimental results show
    that the proof eﬀort can be reduced by several orders of magnitude, both with
    respect to time and space.
author:
- first_name: Daniel
  full_name: Wonisch, Daniel
  last_name: Wonisch
- first_name: Alexander
  full_name: Schremmer, Alexander
  last_name: Schremmer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs -- Approach and Applications.
    In: <i>Proceedings of the Software Engineering Conference (SE)</i>. Lecture Notes
    in Informatics (LNI). ; 2014:67-68.'
  apa: Wonisch, D., Schremmer, A., &#38; Wehrheim, H. (2014). Programs from Proofs
    -- Approach and Applications. In <i>Proceedings of the Software Engineering Conference
    (SE)</i> (pp. 67–68).
  bibtex: '@inproceedings{Wonisch_Schremmer_Wehrheim_2014, series={Lecture Notes in
    Informatics (LNI)}, title={Programs from Proofs -- Approach and Applications},
    booktitle={Proceedings of the Software Engineering Conference (SE)}, author={Wonisch,
    Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2014}, pages={67–68},
    collection={Lecture Notes in Informatics (LNI)} }'
  chicago: Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from
    Proofs -- Approach and Applications.” In <i>Proceedings of the Software Engineering
    Conference (SE)</i>, 67–68. Lecture Notes in Informatics (LNI), 2014.
  ieee: D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs -- Approach
    and Applications,” in <i>Proceedings of the Software Engineering Conference (SE)</i>,
    2014, pp. 67–68.
  mla: Wonisch, Daniel, et al. “Programs from Proofs -- Approach and Applications.”
    <i>Proceedings of the Software Engineering Conference (SE)</i>, 2014, pp. 67–68.
  short: 'D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the Software Engineering
    Conference (SE), 2014, pp. 67–68.'
date_created: 2017-10-17T12:42:06Z
date_updated: 2022-01-06T06:59:38Z
ddc:
- '040'
department:
- _id: '77'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:04:52Z
  date_updated: 2018-03-20T07:04:52Z
  file_id: '1392'
  file_name: 383-programmsFromProofsSE.pdf
  file_size: 66474
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:04:52Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: http://eprints.uni-kiel.de/23752/
page: 67-68
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the Software Engineering Conference (SE)
series_title: Lecture Notes in Informatics (LNI)
status: public
title: Programs from Proofs -- Approach and Applications
type: conference
user_id: '477'
year: '2014'
...
---
_id: '3167'
author:
- first_name: Steve
  full_name: Schneider, Steve
  last_name: Schneider
- first_name: Helen
  full_name: Treharne, Helen
  last_name: Treharne
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Schneider S, Treharne H, Wehrheim H. The behavioural semantics of Event-B refinement.
    <i>Formal Asp Comput</i>. 2014;(2):251--280. doi:<a href="https://doi.org/10.1007/s00165-012-0265-0">10.1007/s00165-012-0265-0</a>
  apa: Schneider, S., Treharne, H., &#38; Wehrheim, H. (2014). The behavioural semantics
    of Event-B refinement. <i>Formal Asp. Comput.</i>, (2), 251--280. <a href="https://doi.org/10.1007/s00165-012-0265-0">https://doi.org/10.1007/s00165-012-0265-0</a>
  bibtex: '@article{Schneider_Treharne_Wehrheim_2014, title={The behavioural semantics
    of Event-B refinement}, DOI={<a href="https://doi.org/10.1007/s00165-012-0265-0">10.1007/s00165-012-0265-0</a>},
    number={2}, journal={Formal Asp. Comput.}, author={Schneider, Steve and Treharne,
    Helen and Wehrheim, Heike}, year={2014}, pages={251--280} }'
  chicago: 'Schneider, Steve, Helen Treharne, and Heike Wehrheim. “The Behavioural
    Semantics of Event-B Refinement.” <i>Formal Asp. Comput.</i>, no. 2 (2014): 251--280.
    <a href="https://doi.org/10.1007/s00165-012-0265-0">https://doi.org/10.1007/s00165-012-0265-0</a>.'
  ieee: S. Schneider, H. Treharne, and H. Wehrheim, “The behavioural semantics of
    Event-B refinement,” <i>Formal Asp. Comput.</i>, no. 2, pp. 251--280, 2014.
  mla: Schneider, Steve, et al. “The Behavioural Semantics of Event-B Refinement.”
    <i>Formal Asp. Comput.</i>, no. 2, 2014, pp. 251--280, doi:<a href="https://doi.org/10.1007/s00165-012-0265-0">10.1007/s00165-012-0265-0</a>.
  short: S. Schneider, H. Treharne, H. Wehrheim, Formal Asp. Comput. (2014) 251--280.
date_created: 2018-06-13T07:55:10Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/s00165-012-0265-0
issue: '2'
page: 251--280
publication: Formal Asp. Comput.
status: public
title: The behavioural semantics of Event-B refinement
type: journal_article
user_id: '29719'
year: '2014'
...
---
_id: '3168'
author:
- first_name: Bogdan
  full_name: Tofan, Bogdan
  last_name: Tofan
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Gerhard
  full_name: Schellhorn, Gerhard
  last_name: Schellhorn
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Tofan B, Travkin O, Schellhorn G, Wehrheim H. Two approaches for proving linearizability
    of multiset. <i>Sci Comput Program</i>. 2014:297--314. doi:<a href="https://doi.org/10.1016/j.scico.2014.04.001">10.1016/j.scico.2014.04.001</a>
  apa: Tofan, B., Travkin, O., Schellhorn, G., &#38; Wehrheim, H. (2014). Two approaches
    for proving linearizability of multiset. <i>Sci. Comput. Program.</i>, 297--314.
    <a href="https://doi.org/10.1016/j.scico.2014.04.001">https://doi.org/10.1016/j.scico.2014.04.001</a>
  bibtex: '@article{Tofan_Travkin_Schellhorn_Wehrheim_2014, title={Two approaches
    for proving linearizability of multiset}, DOI={<a href="https://doi.org/10.1016/j.scico.2014.04.001">10.1016/j.scico.2014.04.001</a>},
    journal={Sci. Comput. Program.}, author={Tofan, Bogdan and Travkin, Oleg and Schellhorn,
    Gerhard and Wehrheim, Heike}, year={2014}, pages={297--314} }'
  chicago: Tofan, Bogdan, Oleg Travkin, Gerhard Schellhorn, and Heike Wehrheim. “Two
    Approaches for Proving Linearizability of Multiset.” <i>Sci. Comput. Program.</i>,
    2014, 297--314. <a href="https://doi.org/10.1016/j.scico.2014.04.001">https://doi.org/10.1016/j.scico.2014.04.001</a>.
  ieee: B. Tofan, O. Travkin, G. Schellhorn, and H. Wehrheim, “Two approaches for
    proving linearizability of multiset,” <i>Sci. Comput. Program.</i>, pp. 297--314,
    2014.
  mla: Tofan, Bogdan, et al. “Two Approaches for Proving Linearizability of Multiset.”
    <i>Sci. Comput. Program.</i>, 2014, pp. 297--314, doi:<a href="https://doi.org/10.1016/j.scico.2014.04.001">10.1016/j.scico.2014.04.001</a>.
  short: B. Tofan, O. Travkin, G. Schellhorn, H. Wehrheim, Sci. Comput. Program. (2014)
    297--314.
date_created: 2018-06-13T07:56:12Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1016/j.scico.2014.04.001
page: 297--314
publication: Sci. Comput. Program.
status: public
title: Two approaches for proving linearizability of multiset
type: journal_article
user_id: '29719'
year: '2014'
...
---
_id: '3169'
author:
- first_name: Gerhard
  full_name: Schellhorn, Gerhard
  last_name: Schellhorn
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Schellhorn G, Derrick J, Wehrheim H. A Sound and Complete Proof Technique for
    Linearizability of Concurrent Data Structures. <i>{ACM} Trans Comput Log</i>.
    2014;(4):31:1--31:37. doi:<a href="https://doi.org/10.1145/2629496">10.1145/2629496</a>
  apa: Schellhorn, G., Derrick, J., &#38; Wehrheim, H. (2014). A Sound and Complete
    Proof Technique for Linearizability of Concurrent Data Structures. <i>{ACM} Trans.
    Comput. Log.</i>, (4), 31:1--31:37. <a href="https://doi.org/10.1145/2629496">https://doi.org/10.1145/2629496</a>
  bibtex: '@article{Schellhorn_Derrick_Wehrheim_2014, title={A Sound and Complete
    Proof Technique for Linearizability of Concurrent Data Structures}, DOI={<a href="https://doi.org/10.1145/2629496">10.1145/2629496</a>},
    number={4}, journal={{ACM} Trans. Comput. Log.}, author={Schellhorn, Gerhard and
    Derrick, John and Wehrheim, Heike}, year={2014}, pages={31:1--31:37} }'
  chicago: 'Schellhorn, Gerhard, John Derrick, and Heike Wehrheim. “A Sound and Complete
    Proof Technique for Linearizability of Concurrent Data Structures.” <i>{ACM} Trans.
    Comput. Log.</i>, no. 4 (2014): 31:1--31:37. <a href="https://doi.org/10.1145/2629496">https://doi.org/10.1145/2629496</a>.'
  ieee: G. Schellhorn, J. Derrick, and H. Wehrheim, “A Sound and Complete Proof Technique
    for Linearizability of Concurrent Data Structures,” <i>{ACM} Trans. Comput. Log.</i>,
    no. 4, pp. 31:1--31:37, 2014.
  mla: Schellhorn, Gerhard, et al. “A Sound and Complete Proof Technique for Linearizability
    of Concurrent Data Structures.” <i>{ACM} Trans. Comput. Log.</i>, no. 4, 2014,
    pp. 31:1--31:37, doi:<a href="https://doi.org/10.1145/2629496">10.1145/2629496</a>.
  short: G. Schellhorn, J. Derrick, H. Wehrheim, {ACM} Trans. Comput. Log. (2014)
    31:1--31:37.
date_created: 2018-06-13T07:57:31Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1145/2629496
issue: '4'
page: 31:1--31:37
publication: '{ACM} Trans. Comput. Log.'
status: public
title: A Sound and Complete Proof Technique for Linearizability of Concurrent Data
  Structures
type: journal_article
user_id: '29719'
year: '2014'
...
---
_id: '3170'
author:
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Brijesh
  full_name: Dongol, Brijesh
  last_name: Dongol
- first_name: Gerhard
  full_name: Schellhorn, Gerhard
  last_name: Schellhorn
- first_name: Bogdan
  full_name: Tofan, Bogdan
  last_name: Tofan
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Derrick J, Dongol B, Schellhorn G, Tofan B, Travkin O, Wehrheim H. Quiescent
    Consistency: Defining and Verifying Relaxed Linearizability. In: B. Jones C, Pihlajasaari
    P, Sun J, eds. <i>{FM} 2014: Formal Methods - 19th International Symposium, Singapore,
    May 12-16, 2014. Proceedings</i>. Lecture Notes in Computer Science. ; 2014:200--214.
    doi:<a href="https://doi.org/10.1007/978-3-319-06410-9_15">10.1007/978-3-319-06410-9_15</a>'
  apa: 'Derrick, J., Dongol, B., Schellhorn, G., Tofan, B., Travkin, O., &#38; Wehrheim,
    H. (2014). Quiescent Consistency: Defining and Verifying Relaxed Linearizability.
    In C. B. Jones, P. Pihlajasaari, &#38; J. Sun (Eds.), <i>{FM} 2014: Formal Methods
    - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings</i> (pp.
    200--214). <a href="https://doi.org/10.1007/978-3-319-06410-9_15">https://doi.org/10.1007/978-3-319-06410-9_15</a>'
  bibtex: '@inproceedings{Derrick_Dongol_Schellhorn_Tofan_Travkin_Wehrheim_2014, series={Lecture
    Notes in Computer Science}, title={Quiescent Consistency: Defining and Verifying
    Relaxed Linearizability}, DOI={<a href="https://doi.org/10.1007/978-3-319-06410-9_15">10.1007/978-3-319-06410-9_15</a>},
    booktitle={{FM} 2014: Formal Methods - 19th International Symposium, Singapore,
    May 12-16, 2014. Proceedings}, author={Derrick, John and Dongol, Brijesh and Schellhorn,
    Gerhard and Tofan, Bogdan and Travkin, Oleg and Wehrheim, Heike}, editor={B. Jones,
    Cliff and Pihlajasaari, Pekka and Sun, JunEditors}, year={2014}, pages={200--214},
    collection={Lecture Notes in Computer Science} }'
  chicago: 'Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Bogdan Tofan, Oleg
    Travkin, and Heike Wehrheim. “Quiescent Consistency: Defining and Verifying Relaxed
    Linearizability.” In <i>{FM} 2014: Formal Methods - 19th International Symposium,
    Singapore, May 12-16, 2014. Proceedings</i>, edited by Cliff B. Jones, Pekka Pihlajasaari,
    and Jun Sun, 200--214. Lecture Notes in Computer Science, 2014. <a href="https://doi.org/10.1007/978-3-319-06410-9_15">https://doi.org/10.1007/978-3-319-06410-9_15</a>.'
  ieee: 'J. Derrick, B. Dongol, G. Schellhorn, B. Tofan, O. Travkin, and H. Wehrheim,
    “Quiescent Consistency: Defining and Verifying Relaxed Linearizability,” in <i>{FM}
    2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014.
    Proceedings</i>, 2014, pp. 200--214.'
  mla: 'Derrick, John, et al. “Quiescent Consistency: Defining and Verifying Relaxed
    Linearizability.” <i>{FM} 2014: Formal Methods - 19th International Symposium,
    Singapore, May 12-16, 2014. Proceedings</i>, edited by Cliff B. Jones et al.,
    2014, pp. 200--214, doi:<a href="https://doi.org/10.1007/978-3-319-06410-9_15">10.1007/978-3-319-06410-9_15</a>.'
  short: 'J. Derrick, B. Dongol, G. Schellhorn, B. Tofan, O. Travkin, H. Wehrheim,
    in: C. B. Jones, P. Pihlajasaari, J. Sun (Eds.), {FM} 2014: Formal Methods - 19th
    International Symposium, Singapore, May 12-16, 2014. Proceedings, 2014, pp. 200--214.'
date_created: 2018-06-13T07:58:40Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-319-06410-9_15
editor:
- first_name: Cliff
  full_name: B. Jones, Cliff
  last_name: B. Jones
- first_name: Pekka
  full_name: Pihlajasaari, Pekka
  last_name: Pihlajasaari
- first_name: Jun
  full_name: Sun, Jun
  last_name: Sun
page: 200--214
publication: '{FM} 2014: Formal Methods - 19th International Symposium, Singapore,
  May 12-16, 2014. Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: 'Quiescent Consistency: Defining and Verifying Relaxed Linearizability'
type: conference
user_id: '29719'
year: '2014'
...
---
_id: '3171'
author:
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Travkin O, Wehrheim H. Handling {TSO} in Mechanized Linearizability Proofs.
    In: Yahav E, ed. <i>Hardware and Software: Verification and Testing - 10th International
    Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014.
    Proceedings</i>. Lecture Notes in Computer Science. ; 2014:132--147. doi:<a href="https://doi.org/10.1007/978-3-319-13338-6_11">10.1007/978-3-319-13338-6_11</a>'
  apa: 'Travkin, O., &#38; Wehrheim, H. (2014). Handling {TSO} in Mechanized Linearizability
    Proofs. In E. Yahav (Ed.), <i>Hardware and Software: Verification and Testing
    - 10th International Haifa Verification Conference, {HVC} 2014, Haifa, Israel,
    November 18-20, 2014. Proceedings</i> (pp. 132--147). <a href="https://doi.org/10.1007/978-3-319-13338-6_11">https://doi.org/10.1007/978-3-319-13338-6_11</a>'
  bibtex: '@inproceedings{Travkin_Wehrheim_2014, series={Lecture Notes in Computer
    Science}, title={Handling {TSO} in Mechanized Linearizability Proofs}, DOI={<a
    href="https://doi.org/10.1007/978-3-319-13338-6_11">10.1007/978-3-319-13338-6_11</a>},
    booktitle={Hardware and Software: Verification and Testing - 10th International
    Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014.
    Proceedings}, author={Travkin, Oleg and Wehrheim, Heike}, editor={Yahav, EranEditor},
    year={2014}, pages={132--147}, collection={Lecture Notes in Computer Science}
    }'
  chicago: 'Travkin, Oleg, and Heike Wehrheim. “Handling {TSO} in Mechanized Linearizability
    Proofs.” In <i>Hardware and Software: Verification and Testing - 10th International
    Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014.
    Proceedings</i>, edited by Eran Yahav, 132--147. Lecture Notes in Computer Science,
    2014. <a href="https://doi.org/10.1007/978-3-319-13338-6_11">https://doi.org/10.1007/978-3-319-13338-6_11</a>.'
  ieee: 'O. Travkin and H. Wehrheim, “Handling {TSO} in Mechanized Linearizability
    Proofs,” in <i>Hardware and Software: Verification and Testing - 10th International
    Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014.
    Proceedings</i>, 2014, pp. 132--147.'
  mla: 'Travkin, Oleg, and Heike Wehrheim. “Handling {TSO} in Mechanized Linearizability
    Proofs.” <i>Hardware and Software: Verification and Testing - 10th International
    Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014.
    Proceedings</i>, edited by Eran Yahav, 2014, pp. 132--147, doi:<a href="https://doi.org/10.1007/978-3-319-13338-6_11">10.1007/978-3-319-13338-6_11</a>.'
  short: 'O. Travkin, H. Wehrheim, in: E. Yahav (Ed.), Hardware and Software: Verification
    and Testing - 10th International Haifa Verification Conference, {HVC} 2014, Haifa,
    Israel, November 18-20, 2014. Proceedings, 2014, pp. 132--147.'
date_created: 2018-06-13T07:59:46Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-319-13338-6_11
editor:
- first_name: Eran
  full_name: Yahav, Eran
  last_name: Yahav
page: 132--147
publication: 'Hardware and Software: Verification and Testing - 10th International
  Haifa Verification Conference, {HVC} 2014, Haifa, Israel, November 18-20, 2014.
  Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: Handling {TSO} in Mechanized Linearizability Proofs
type: conference
user_id: '29719'
year: '2014'
...
---
_id: '3172'
author:
- first_name: Tobias
  full_name: Isenberg, Tobias
  last_name: Isenberg
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Isenberg T, Wehrheim H. Timed Automata Verification via {IC3} with Zones.
    In: Merz S, Pang J, eds. <i>Formal Methods and Software Engineering - 16th International
    Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg,
    November 3-5, 2014. Proceedings</i>. Lecture Notes in Computer Science. ; 2014:203--218.
    doi:<a href="https://doi.org/10.1007/978-3-319-11737-9_14">10.1007/978-3-319-11737-9_14</a>'
  apa: Isenberg, T., &#38; Wehrheim, H. (2014). Timed Automata Verification via {IC3}
    with Zones. In S. Merz &#38; J. Pang (Eds.), <i>Formal Methods and Software Engineering
    - 16th International Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg,
    Luxembourg, November 3-5, 2014. Proceedings</i> (pp. 203--218). <a href="https://doi.org/10.1007/978-3-319-11737-9_14">https://doi.org/10.1007/978-3-319-11737-9_14</a>
  bibtex: '@inproceedings{Isenberg_Wehrheim_2014, series={Lecture Notes in Computer
    Science}, title={Timed Automata Verification via {IC3} with Zones}, DOI={<a href="https://doi.org/10.1007/978-3-319-11737-9_14">10.1007/978-3-319-11737-9_14</a>},
    booktitle={Formal Methods and Software Engineering - 16th International Conference
    on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November
    3-5, 2014. Proceedings}, author={Isenberg, Tobias and Wehrheim, Heike}, editor={Merz,
    Stephan and Pang, JunEditors}, year={2014}, pages={203--218}, collection={Lecture
    Notes in Computer Science} }'
  chicago: Isenberg, Tobias, and Heike Wehrheim. “Timed Automata Verification via
    {IC3} with Zones.” In <i>Formal Methods and Software Engineering - 16th International
    Conference on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg,
    November 3-5, 2014. Proceedings</i>, edited by Stephan Merz and Jun Pang, 203--218.
    Lecture Notes in Computer Science, 2014. <a href="https://doi.org/10.1007/978-3-319-11737-9_14">https://doi.org/10.1007/978-3-319-11737-9_14</a>.
  ieee: T. Isenberg and H. Wehrheim, “Timed Automata Verification via {IC3} with Zones,”
    in <i>Formal Methods and Software Engineering - 16th International Conference
    on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November
    3-5, 2014. Proceedings</i>, 2014, pp. 203--218.
  mla: Isenberg, Tobias, and Heike Wehrheim. “Timed Automata Verification via {IC3}
    with Zones.” <i>Formal Methods and Software Engineering - 16th International Conference
    on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November
    3-5, 2014. Proceedings</i>, edited by Stephan Merz and Jun Pang, 2014, pp. 203--218,
    doi:<a href="https://doi.org/10.1007/978-3-319-11737-9_14">10.1007/978-3-319-11737-9_14</a>.
  short: 'T. Isenberg, H. Wehrheim, in: S. Merz, J. Pang (Eds.), Formal Methods and
    Software Engineering - 16th International Conference on Formal Engineering Methods,
    {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings, 2014, pp.
    203--218.'
date_created: 2018-06-13T08:01:04Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-319-11737-9_14
editor:
- first_name: Stephan
  full_name: Merz, Stephan
  last_name: Merz
- first_name: Jun
  full_name: Pang, Jun
  last_name: Pang
page: 203--218
publication: Formal Methods and Software Engineering - 16th International Conference
  on Formal Engineering Methods, {ICFEM} 2014, Luxembourg, Luxembourg, November 3-5,
  2014. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Timed Automata Verification via {IC3} with Zones
type: conference
user_id: '29719'
year: '2014'
...
---
_id: '3173'
author:
- first_name: Steve
  full_name: A. Schneider, Steve
  last_name: A. Schneider
- first_name: Helen
  full_name: Treharne, Helen
  last_name: Treharne
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
- first_name: David
  full_name: M. Williams, David
  last_name: M. Williams
citation:
  ama: 'A. Schneider S, Treharne H, Wehrheim H, M. Williams D. Managing {LTL} Properties
    in Event-B Refinement. In: Albert E, Sekerinski E, eds. <i>Integrated Formal Methods
    - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11,
    2014, Proceedings</i>. Lecture Notes in Computer Science. ; 2014:221--237. doi:<a
    href="https://doi.org/10.1007/978-3-319-10181-1_14">10.1007/978-3-319-10181-1_14</a>'
  apa: A. Schneider, S., Treharne, H., Wehrheim, H., &#38; M. Williams, D. (2014).
    Managing {LTL} Properties in Event-B Refinement. In E. Albert &#38; E. Sekerinski
    (Eds.), <i>Integrated Formal Methods - 11th International Conference, {IFM} 2014,
    Bertinoro, Italy, September 9-11, 2014, Proceedings</i> (pp. 221--237). <a href="https://doi.org/10.1007/978-3-319-10181-1_14">https://doi.org/10.1007/978-3-319-10181-1_14</a>
  bibtex: '@inproceedings{A. Schneider_Treharne_Wehrheim_M. Williams_2014, series={Lecture
    Notes in Computer Science}, title={Managing {LTL} Properties in Event-B Refinement},
    DOI={<a href="https://doi.org/10.1007/978-3-319-10181-1_14">10.1007/978-3-319-10181-1_14</a>},
    booktitle={Integrated Formal Methods - 11th International Conference, {IFM} 2014,
    Bertinoro, Italy, September 9-11, 2014, Proceedings}, author={A. Schneider, Steve
    and Treharne, Helen and Wehrheim, Heike and M. Williams, David}, editor={Albert,
    Elvira and Sekerinski, EmilEditors}, year={2014}, pages={221--237}, collection={Lecture
    Notes in Computer Science} }'
  chicago: A. Schneider, Steve, Helen Treharne, Heike Wehrheim, and David M. Williams.
    “Managing {LTL} Properties in Event-B Refinement.” In <i>Integrated Formal Methods
    - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11,
    2014, Proceedings</i>, edited by Elvira Albert and Emil Sekerinski, 221--237.
    Lecture Notes in Computer Science, 2014. <a href="https://doi.org/10.1007/978-3-319-10181-1_14">https://doi.org/10.1007/978-3-319-10181-1_14</a>.
  ieee: S. A. Schneider, H. Treharne, H. Wehrheim, and D. M. Williams, “Managing {LTL}
    Properties in Event-B Refinement,” in <i>Integrated Formal Methods - 11th International
    Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings</i>,
    2014, pp. 221--237.
  mla: A. Schneider, Steve, et al. “Managing {LTL} Properties in Event-B Refinement.”
    <i>Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro,
    Italy, September 9-11, 2014, Proceedings</i>, edited by Elvira Albert and Emil
    Sekerinski, 2014, pp. 221--237, doi:<a href="https://doi.org/10.1007/978-3-319-10181-1_14">10.1007/978-3-319-10181-1_14</a>.
  short: 'S. A. Schneider, H. Treharne, H. Wehrheim, D. M. Williams, in: E. Albert,
    E. Sekerinski (Eds.), Integrated Formal Methods - 11th International Conference,
    {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings, 2014, pp. 221--237.'
date_created: 2018-06-13T08:04:33Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-319-10181-1_14
editor:
- first_name: Elvira
  full_name: Albert, Elvira
  last_name: Albert
- first_name: Emil
  full_name: Sekerinski, Emil
  last_name: Sekerinski
page: 221--237
publication: Integrated Formal Methods - 11th International Conference, {IFM} 2014,
  Bertinoro, Italy, September 9-11, 2014, Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Managing {LTL} Properties in Event-B Refinement
type: conference
user_id: '29719'
year: '2014'
...
---
_id: '3174'
author:
- first_name: Steve
  full_name: Schneider, Steve
  last_name: Schneider
- first_name: Helen
  full_name: Treharne, Helen
  last_name: Treharne
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
- first_name: David
  full_name: M. Williams, David
  last_name: M. Williams
citation:
  ama: Schneider S, Treharne H, Wehrheim H, M. Williams D. Managing {LTL} properties
    in Event-B refinement. <i>CoRR</i>. 2014.
  apa: Schneider, S., Treharne, H., Wehrheim, H., &#38; M. Williams, D. (2014). Managing
    {LTL} properties in Event-B refinement. <i>CoRR</i>.
  bibtex: '@article{Schneider_Treharne_Wehrheim_M. Williams_2014, title={Managing
    {LTL} properties in Event-B refinement}, journal={CoRR}, author={Schneider, Steve
    and Treharne, Helen and Wehrheim, Heike and M. Williams, David}, year={2014} }'
  chicago: Schneider, Steve, Helen Treharne, Heike Wehrheim, and David M. Williams.
    “Managing {LTL} Properties in Event-B Refinement.” <i>CoRR</i>, 2014.
  ieee: S. Schneider, H. Treharne, H. Wehrheim, and D. M. Williams, “Managing {LTL}
    properties in Event-B refinement,” <i>CoRR</i>, 2014.
  mla: Schneider, Steve, et al. “Managing {LTL} Properties in Event-B Refinement.”
    <i>CoRR</i>, 2014.
  short: S. Schneider, H. Treharne, H. Wehrheim, D. M. Williams, CoRR (2014).
date_created: 2018-06-13T08:05:39Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
publication: CoRR
status: public
title: Managing {LTL} properties in Event-B refinement
type: journal_article
user_id: '29719'
year: '2014'
...
---
_id: '3175'
author:
- first_name: Tobias
  full_name: Isenberg, Tobias
  last_name: Isenberg
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Isenberg T, Wehrheim H. Proof-Carrying Hardware via {IC3}. <i>CoRR</i>. 2014.
  apa: Isenberg, T., &#38; Wehrheim, H. (2014). Proof-Carrying Hardware via {IC3}.
    <i>CoRR</i>.
  bibtex: '@article{Isenberg_Wehrheim_2014, title={Proof-Carrying Hardware via {IC3}},
    journal={CoRR}, author={Isenberg, Tobias and Wehrheim, Heike}, year={2014} }'
  chicago: Isenberg, Tobias, and Heike Wehrheim. “Proof-Carrying Hardware via {IC3}.”
    <i>CoRR</i>, 2014.
  ieee: T. Isenberg and H. Wehrheim, “Proof-Carrying Hardware via {IC3},” <i>CoRR</i>,
    2014.
  mla: Isenberg, Tobias, and Heike Wehrheim. “Proof-Carrying Hardware via {IC3}.”
    <i>CoRR</i>, 2014.
  short: T. Isenberg, H. Wehrheim, CoRR (2014).
date_created: 2018-06-13T08:07:24Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
publication: CoRR
status: public
title: Proof-Carrying Hardware via {IC3}
type: journal_article
user_id: '29719'
year: '2014'
...
---
_id: '450'
abstract:
- lang: eng
  text: 'Configurable program analysis (CPA) is a generic concept for the formalization
    of different software analysis techniques in a single framework. With the tool
    CPAchecker, this framework allows for an easy configuration and subsequent automatic
    execution of analysis procedures ranging from data-flow analysis to model checking.
    The focus of the tool CPAchecker is thus on analysis. In this paper, we study
    configurability from the point of view of software certification. Certification
    aims at providing (via a prior analysis) a certificate of correctness for a program
    which is (a) tamper-proof and (b) more efficient to check for validity than a
    full analysis. Here, we will show how, given an analysis instance of a CPA, to
    construct a corresponding sound certification instance, thereby arriving at configurable
    program certification. We report on experiments with certification based on different
    analysis techniques, and in particular explain which characteristics of an underlying
    analysis allow us to design an efficient (in the above (b) sense) certification
    procedure. '
author:
- first_name: Marie-Christine
  full_name: Jakobs, Marie-Christine
  last_name: Jakobs
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Jakobs M-C, Wehrheim H. Certification for Configurable Program Analysis. In:
    <i>Proceedings of the 21st International Symposium on Model Checking of Software
    (SPIN)</i>. SPIN 2014. ; 2014:30-39. doi:<a href="https://doi.org/10.1145/2632362.2632372">10.1145/2632362.2632372</a>'
  apa: Jakobs, M.-C., &#38; Wehrheim, H. (2014). Certification for Configurable Program
    Analysis. In <i>Proceedings of the 21st International Symposium on Model Checking
    of Software (SPIN)</i> (pp. 30–39). <a href="https://doi.org/10.1145/2632362.2632372">https://doi.org/10.1145/2632362.2632372</a>
  bibtex: '@inproceedings{Jakobs_Wehrheim_2014, series={SPIN 2014}, title={Certification
    for Configurable Program Analysis}, DOI={<a href="https://doi.org/10.1145/2632362.2632372">10.1145/2632362.2632372</a>},
    booktitle={Proceedings of the 21st International Symposium on Model Checking of
    Software (SPIN)}, author={Jakobs, Marie-Christine and Wehrheim, Heike}, year={2014},
    pages={30–39}, collection={SPIN 2014} }'
  chicago: Jakobs, Marie-Christine, and Heike Wehrheim. “Certification for Configurable
    Program Analysis.” In <i>Proceedings of the 21st International Symposium on Model
    Checking of Software (SPIN)</i>, 30–39. SPIN 2014, 2014. <a href="https://doi.org/10.1145/2632362.2632372">https://doi.org/10.1145/2632362.2632372</a>.
  ieee: M.-C. Jakobs and H. Wehrheim, “Certification for Configurable Program Analysis,”
    in <i>Proceedings of the 21st International Symposium on Model Checking of Software
    (SPIN)</i>, 2014, pp. 30–39.
  mla: Jakobs, Marie-Christine, and Heike Wehrheim. “Certification for Configurable
    Program Analysis.” <i>Proceedings of the 21st International Symposium on Model
    Checking of Software (SPIN)</i>, 2014, pp. 30–39, doi:<a href="https://doi.org/10.1145/2632362.2632372">10.1145/2632362.2632372</a>.
  short: 'M.-C. Jakobs, H. Wehrheim, in: Proceedings of the 21st International Symposium
    on Model Checking of Software (SPIN), 2014, pp. 30–39.'
date_created: 2017-10-17T12:42:19Z
date_updated: 2022-01-06T07:01:07Z
ddc:
- '040'
department:
- _id: '77'
doi: 10.1145/2632362.2632372
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-16T11:25:35Z
  date_updated: 2018-03-16T11:25:35Z
  file_id: '1345'
  file_name: 450-p30-jakobs.pdf
  file_size: 487366
  relation: main_file
  success: 1
file_date_updated: 2018-03-16T11:25:35Z
has_accepted_license: '1'
language:
- iso: eng
page: 30-39
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 21st International Symposium on Model Checking of
  Software (SPIN)
series_title: SPIN 2014
status: public
title: Certification for Configurable Program Analysis
type: conference
user_id: '477'
year: '2014'
...
