---
_id: '35426'
author:
- first_name: Cedric
  full_name: Richter, Cedric
  id: '50003'
  last_name: Richter
- first_name: Jan Frederik
  full_name: Haltermann, Jan Frederik
  id: '44413'
  last_name: Haltermann
- first_name: Marie-Christine
  full_name: Jakobs, Marie-Christine
  last_name: Jakobs
- first_name: Felix
  full_name: Pauck, Felix
  id: '22398'
  last_name: Pauck
- first_name: Stefan
  full_name: Schott, Stefan
  id: '54847'
  last_name: Schott
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Richter C, Haltermann JF, Jakobs M-C, Pauck F, Schott S, Wehrheim H. Are Neural
    Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? In: <i>37th
    IEEE/ACM International Conference on Automated Software Engineering</i>. ACM;
    2023. doi:<a href="https://doi.org/10.1145/3551349.3561156">10.1145/3551349.3561156</a>'
  apa: Richter, C., Haltermann, J. F., Jakobs, M.-C., Pauck, F., Schott, S., &#38;
    Wehrheim, H. (2023). Are Neural Bug Detectors Comparable to Software Developers
    on Variable Misuse Bugs? <i>37th IEEE/ACM International Conference on Automated
    Software Engineering</i>. <a href="https://doi.org/10.1145/3551349.3561156">https://doi.org/10.1145/3551349.3561156</a>
  bibtex: '@inproceedings{Richter_Haltermann_Jakobs_Pauck_Schott_Wehrheim_2023, title={Are
    Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?},
    DOI={<a href="https://doi.org/10.1145/3551349.3561156">10.1145/3551349.3561156</a>},
    booktitle={37th IEEE/ACM International Conference on Automated Software Engineering},
    publisher={ACM}, author={Richter, Cedric and Haltermann, Jan Frederik and Jakobs,
    Marie-Christine and Pauck, Felix and Schott, Stefan and Wehrheim, Heike}, year={2023}
    }'
  chicago: Richter, Cedric, Jan Frederik Haltermann, Marie-Christine Jakobs, Felix
    Pauck, Stefan Schott, and Heike Wehrheim. “Are Neural Bug Detectors Comparable
    to Software Developers on Variable Misuse Bugs?” In <i>37th IEEE/ACM International
    Conference on Automated Software Engineering</i>. ACM, 2023. <a href="https://doi.org/10.1145/3551349.3561156">https://doi.org/10.1145/3551349.3561156</a>.
  ieee: 'C. Richter, J. F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, and H. Wehrheim,
    “Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse
    Bugs?,” 2023, doi: <a href="https://doi.org/10.1145/3551349.3561156">10.1145/3551349.3561156</a>.'
  mla: Richter, Cedric, et al. “Are Neural Bug Detectors Comparable to Software Developers
    on Variable Misuse Bugs?” <i>37th IEEE/ACM International Conference on Automated
    Software Engineering</i>, ACM, 2023, doi:<a href="https://doi.org/10.1145/3551349.3561156">10.1145/3551349.3561156</a>.
  short: 'C. Richter, J.F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, H. Wehrheim,
    in: 37th IEEE/ACM International Conference on Automated Software Engineering,
    ACM, 2023.'
date_created: 2023-01-09T06:28:44Z
date_updated: 2023-01-19T13:50:18Z
department:
- _id: '77'
doi: 10.1145/3551349.3561156
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://doi.org/10.1145/3551349.3561156
oa: '1'
project:
- _id: '3'
  name: 'SFB 901 - B: SFB 901 - Project Area B'
- _id: '12'
  name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '1'
  name: 'SFB 901: SFB 901'
publication: 37th IEEE/ACM International Conference on Automated Software Engineering
publication_status: published
publisher: ACM
status: public
title: Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse
  Bugs?
type: conference
user_id: '477'
year: '2023'
...
---
_id: '45886'
author:
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
- first_name: Eyke
  full_name: Hüllermeier, Eyke
  id: '48129'
  last_name: Hüllermeier
- first_name: Steffen
  full_name: Becker, Steffen
  last_name: Becker
- first_name: Matthias
  full_name: Becker, Matthias
  last_name: Becker
- first_name: Cedric
  full_name: Richter, Cedric
  id: '50003'
  last_name: Richter
- first_name: Arnab
  full_name: Sharma, Arnab
  id: '67200'
  last_name: Sharma
citation:
  ama: 'Wehrheim H, Hüllermeier E, Becker S, Becker M, Richter C, Sharma A. Composition
    Analysis in Unknown Contexts. In: Haake C-J, Meyer auf der Heide F, Platzner M,
    Wachsmuth H, Wehrheim H, eds. <i>On-The-Fly Computing -- Individualized IT-Services
    in Dynamic Markets</i>. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts.
    Heinz Nixdorf Institut, Universität Paderborn; 2023:105-123. doi:<a href="https://doi.org/10.5281/zenodo.8068510">10.5281/zenodo.8068510</a>'
  apa: Wehrheim, H., Hüllermeier, E., Becker, S., Becker, M., Richter, C., &#38; Sharma,
    A. (2023). Composition Analysis in Unknown Contexts. In C.-J. Haake, F. Meyer
    auf der Heide, M. Platzner, H. Wachsmuth, &#38; H. Wehrheim (Eds.), <i>On-The-Fly
    Computing -- Individualized IT-services in dynamic markets</i> (Vol. 412, pp.
    105–123). Heinz Nixdorf Institut, Universität Paderborn. <a href="https://doi.org/10.5281/zenodo.8068510">https://doi.org/10.5281/zenodo.8068510</a>
  bibtex: '@inbook{Wehrheim_Hüllermeier_Becker_Becker_Richter_Sharma_2023, place={Paderborn},
    series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Composition
    Analysis in Unknown Contexts}, volume={412}, DOI={<a href="https://doi.org/10.5281/zenodo.8068510">10.5281/zenodo.8068510</a>},
    booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets},
    publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Wehrheim, Heike
    and Hüllermeier, Eyke and Becker, Steffen and Becker, Matthias and Richter, Cedric
    and Sharma, Arnab}, editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm
    and Platzner, Marco and Wachsmuth, Henning and Wehrheim, Heike}, year={2023},
    pages={105–123}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts}
    }'
  chicago: 'Wehrheim, Heike, Eyke Hüllermeier, Steffen Becker, Matthias Becker, Cedric
    Richter, and Arnab Sharma. “Composition Analysis in Unknown Contexts.” In <i>On-The-Fly
    Computing -- Individualized IT-Services in Dynamic Markets</i>, edited by Claus-Jochen
    Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike
    Wehrheim, 412:105–23. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn:
    Heinz Nixdorf Institut, Universität Paderborn, 2023. <a href="https://doi.org/10.5281/zenodo.8068510">https://doi.org/10.5281/zenodo.8068510</a>.'
  ieee: 'H. Wehrheim, E. Hüllermeier, S. Becker, M. Becker, C. Richter, and A. Sharma,
    “Composition Analysis in Unknown Contexts,” in <i>On-The-Fly Computing -- Individualized
    IT-services in dynamic markets</i>, vol. 412, C.-J. Haake, F. Meyer auf der Heide,
    M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut,
    Universität Paderborn, 2023, pp. 105–123.'
  mla: Wehrheim, Heike, et al. “Composition Analysis in Unknown Contexts.” <i>On-The-Fly
    Computing -- Individualized IT-Services in Dynamic Markets</i>, edited by Claus-Jochen
    Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp.
    105–23, doi:<a href="https://doi.org/10.5281/zenodo.8068510">10.5281/zenodo.8068510</a>.
  short: 'H. Wehrheim, E. Hüllermeier, S. Becker, M. Becker, C. Richter, A. Sharma,
    in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim
    (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets,
    Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 105–123.'
date_created: 2023-07-07T07:56:08Z
date_updated: 2023-07-07T11:19:40Z
ddc:
- '004'
department:
- _id: '7'
doi: 10.5281/zenodo.8068510
editor:
- first_name: Claus-Jochen
  full_name: Haake, Claus-Jochen
  last_name: Haake
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  last_name: Meyer auf der Heide
- first_name: Marco
  full_name: Platzner, Marco
  last_name: Platzner
- first_name: Henning
  full_name: Wachsmuth, Henning
  last_name: Wachsmuth
- first_name: Heike
  full_name: Wehrheim, Heike
  last_name: Wehrheim
file:
- access_level: open_access
  content_type: application/pdf
  creator: florida
  date_created: 2023-07-07T07:55:57Z
  date_updated: 2023-07-07T11:19:40Z
  file_id: '45887'
  file_name: B3-Chapter-SFB-Buch-Final.pdf
  file_size: 370888
  relation: main_file
file_date_updated: 2023-07-07T11:19:40Z
has_accepted_license: '1'
intvolume: '       412'
language:
- iso: eng
oa: '1'
page: 105-123
place: Paderborn
project:
- _id: '1'
  grant_number: '160364472'
  name: 'SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen
    in dynamischen Märkten '
- _id: '3'
  name: 'SFB 901 - B: SFB 901 - Project Area B'
- _id: '11'
  name: 'SFB 901 - B3: SFB 901 - Subproject B3'
publication: On-The-Fly Computing -- Individualized IT-services in dynamic markets
publisher: Heinz Nixdorf Institut, Universität Paderborn
series_title: Verlagsschriftenreihe des Heinz Nixdorf Instituts
status: public
title: Composition Analysis in Unknown Contexts
type: book_chapter
user_id: '477'
volume: 412
year: '2023'
...
---
_id: '32590'
author:
- first_name: Cedric
  full_name: Richter, Cedric
  id: '50003'
  last_name: Richter
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Richter C, Wehrheim H. Learning Realistic Mutations: Bug Creation for Neural
    Bug Detectors. In: <i>2022 IEEE Conference on Software Testing, Verification and
    Validation (ICST)</i>. ; 2022:162-173. doi:<a href="https://doi.org/10.1109/ICST53961.2022.00027">10.1109/ICST53961.2022.00027</a>'
  apa: 'Richter, C., &#38; Wehrheim, H. (2022). Learning Realistic Mutations: Bug
    Creation for Neural Bug Detectors. <i>2022 IEEE Conference on Software Testing,
    Verification and Validation (ICST)</i>, 162–173. <a href="https://doi.org/10.1109/ICST53961.2022.00027">https://doi.org/10.1109/ICST53961.2022.00027</a>'
  bibtex: '@inproceedings{Richter_Wehrheim_2022, title={Learning Realistic Mutations:
    Bug Creation for Neural Bug Detectors}, DOI={<a href="https://doi.org/10.1109/ICST53961.2022.00027">10.1109/ICST53961.2022.00027</a>},
    booktitle={2022 IEEE Conference on Software Testing, Verification and Validation
    (ICST)}, author={Richter, Cedric and Wehrheim, Heike}, year={2022}, pages={162–173}
    }'
  chicago: 'Richter, Cedric, and Heike Wehrheim. “Learning Realistic Mutations: Bug
    Creation for Neural Bug Detectors.” In <i>2022 IEEE Conference on Software Testing,
    Verification and Validation (ICST)</i>, 162–73, 2022. <a href="https://doi.org/10.1109/ICST53961.2022.00027">https://doi.org/10.1109/ICST53961.2022.00027</a>.'
  ieee: 'C. Richter and H. Wehrheim, “Learning Realistic Mutations: Bug Creation for
    Neural Bug Detectors,” in <i>2022 IEEE Conference on Software Testing, Verification
    and Validation (ICST)</i>, 2022, pp. 162–173, doi: <a href="https://doi.org/10.1109/ICST53961.2022.00027">10.1109/ICST53961.2022.00027</a>.'
  mla: 'Richter, Cedric, and Heike Wehrheim. “Learning Realistic Mutations: Bug Creation
    for Neural Bug Detectors.” <i>2022 IEEE Conference on Software Testing, Verification
    and Validation (ICST)</i>, 2022, pp. 162–73, doi:<a href="https://doi.org/10.1109/ICST53961.2022.00027">10.1109/ICST53961.2022.00027</a>.'
  short: 'C. Richter, H. Wehrheim, in: 2022 IEEE Conference on Software Testing, Verification
    and Validation (ICST), 2022, pp. 162–173.'
date_created: 2022-08-08T07:40:04Z
date_updated: 2022-11-18T09:45:40Z
department:
- _id: '77'
doi: 10.1109/ICST53961.2022.00027
language:
- iso: eng
page: 162-173
project:
- _id: '12'
  name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '3'
  name: 'SFB 901 - B: SFB 901 - Project Area B'
publication: 2022 IEEE Conference on Software Testing, Verification and Validation
  (ICST)
status: public
title: 'Learning Realistic Mutations: Bug Creation for Neural Bug Detectors'
type: conference
user_id: '477'
year: '2022'
...
---
_id: '32591'
author:
- first_name: Cedric
  full_name: Richter, Cedric
  id: '50003'
  last_name: Richter
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Richter C, Wehrheim H. TSSB-3M: Mining single statement bugs at massive scale.
    In: <i>2022 IEEE/ACM 19th International Conference on Mining Software Repositories
    (MSR)</i>. ; 2022:418-422. doi:<a href="https://doi.org/10.1145/3524842.3528505">10.1145/3524842.3528505</a>'
  apa: 'Richter, C., &#38; Wehrheim, H. (2022). TSSB-3M: Mining single statement bugs
    at massive scale. <i>2022 IEEE/ACM 19th International Conference on Mining Software
    Repositories (MSR)</i>, 418–422. <a href="https://doi.org/10.1145/3524842.3528505">https://doi.org/10.1145/3524842.3528505</a>'
  bibtex: '@inproceedings{Richter_Wehrheim_2022, title={TSSB-3M: Mining single statement
    bugs at massive scale}, DOI={<a href="https://doi.org/10.1145/3524842.3528505">10.1145/3524842.3528505</a>},
    booktitle={2022 IEEE/ACM 19th International Conference on Mining Software Repositories
    (MSR)}, author={Richter, Cedric and Wehrheim, Heike}, year={2022}, pages={418–422}
    }'
  chicago: 'Richter, Cedric, and Heike Wehrheim. “TSSB-3M: Mining Single Statement
    Bugs at Massive Scale.” In <i>2022 IEEE/ACM 19th International Conference on Mining
    Software Repositories (MSR)</i>, 418–22, 2022. <a href="https://doi.org/10.1145/3524842.3528505">https://doi.org/10.1145/3524842.3528505</a>.'
  ieee: 'C. Richter and H. Wehrheim, “TSSB-3M: Mining single statement bugs at massive
    scale,” in <i>2022 IEEE/ACM 19th International Conference on Mining Software Repositories
    (MSR)</i>, 2022, pp. 418–422, doi: <a href="https://doi.org/10.1145/3524842.3528505">10.1145/3524842.3528505</a>.'
  mla: 'Richter, Cedric, and Heike Wehrheim. “TSSB-3M: Mining Single Statement Bugs
    at Massive Scale.” <i>2022 IEEE/ACM 19th International Conference on Mining Software
    Repositories (MSR)</i>, 2022, pp. 418–22, doi:<a href="https://doi.org/10.1145/3524842.3528505">10.1145/3524842.3528505</a>.'
  short: 'C. Richter, H. Wehrheim, in: 2022 IEEE/ACM 19th International Conference
    on Mining Software Repositories (MSR), 2022, pp. 418–422.'
date_created: 2022-08-08T07:42:19Z
date_updated: 2022-11-18T09:45:05Z
department:
- _id: '77'
doi: 10.1145/3524842.3528505
language:
- iso: eng
page: 418-422
project:
- _id: '12'
  name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '3'
  name: 'SFB 901 - B: SFB 901 - Project Area B'
publication: 2022 IEEE/ACM 19th International Conference on Mining Software Repositories
  (MSR)
status: public
title: 'TSSB-3M: Mining single statement bugs at massive scale'
type: conference
user_id: '477'
year: '2022'
...
---
_id: '21018'
author:
- first_name: Cedric
  full_name: Richter, Cedric
  id: '50003'
  last_name: Richter
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Richter C, Wehrheim H. Attend and Represent: A Novel View on Algorithm Selection
    for Software Verification. In: <i>35th {IEEE/ACM} International Conference on
    Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September 21-25,
    2020</i>. {IEEE}; 2020:1016-1028.'
  apa: 'Richter, C., &#38; Wehrheim, H. (2020). Attend and Represent: A Novel View
    on Algorithm Selection for Software Verification. In <i>35th {IEEE/ACM} International
    Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia,
    September 21-25, 2020</i> (pp. 1016–1028). {IEEE}.'
  bibtex: '@inproceedings{Richter_Wehrheim_2020, title={Attend and Represent: A Novel
    View on Algorithm Selection for Software Verification}, booktitle={35th {IEEE/ACM}
    International Conference on Automated Software Engineering, {ASE} 2020, Melbourne,
    Australia, September 21-25, 2020}, publisher={{IEEE}}, author={Richter, Cedric
    and Wehrheim, Heike}, year={2020}, pages={1016–1028} }'
  chicago: 'Richter, Cedric, and Heike Wehrheim. “Attend and Represent: A Novel View
    on Algorithm Selection for Software Verification.” In <i>35th {IEEE/ACM} International
    Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia,
    September 21-25, 2020</i>, 1016–28. {IEEE}, 2020.'
  ieee: 'C. Richter and H. Wehrheim, “Attend and Represent: A Novel View on Algorithm
    Selection for Software Verification,” in <i>35th {IEEE/ACM} International Conference
    on Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September
    21-25, 2020</i>, 2020, pp. 1016–1028.'
  mla: 'Richter, Cedric, and Heike Wehrheim. “Attend and Represent: A Novel View on
    Algorithm Selection for Software Verification.” <i>35th {IEEE/ACM} International
    Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia,
    September 21-25, 2020</i>, {IEEE}, 2020, pp. 1016–28.'
  short: 'C. Richter, H. Wehrheim, in: 35th {IEEE/ACM} International Conference on
    Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September 21-25,
    2020, {IEEE}, 2020, pp. 1016–1028.'
date_created: 2021-01-19T10:32:17Z
date_updated: 2022-01-06T06:54:42Z
department:
- _id: '77'
language:
- iso: eng
page: 1016-1028
publication: 35th {IEEE/ACM} International Conference on Automated Software Engineering,
  {ASE} 2020, Melbourne, Australia, September 21-25, 2020
publisher: '{IEEE}'
status: public
title: 'Attend and Represent: A Novel View on Algorithm Selection for Software Verification'
type: conference
user_id: '29719'
year: '2020'
...
---
_id: '16725'
author:
- first_name: Cedric
  full_name: Richter, Cedric
  id: '50003'
  last_name: Richter
- first_name: Eyke
  full_name: Hüllermeier, Eyke
  id: '48129'
  last_name: Hüllermeier
- first_name: Marie-Christine
  full_name: Jakobs, Marie-Christine
  last_name: Jakobs
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Richter C, Hüllermeier E, Jakobs M-C, Wehrheim H. Algorithm Selection for Software
    Validation Based on Graph Kernels. <i>Journal of Automated Software Engineering</i>.
  apa: Richter, C., Hüllermeier, E., Jakobs, M.-C., &#38; Wehrheim, H. (n.d.). Algorithm
    Selection for Software Validation Based on Graph Kernels. <i>Journal of Automated
    Software Engineering</i>.
  bibtex: '@article{Richter_Hüllermeier_Jakobs_Wehrheim, title={Algorithm Selection
    for Software Validation Based on Graph Kernels}, journal={Journal of Automated
    Software Engineering}, publisher={Springer}, author={Richter, Cedric and Hüllermeier,
    Eyke and Jakobs, Marie-Christine and Wehrheim, Heike} }'
  chicago: Richter, Cedric, Eyke Hüllermeier, Marie-Christine Jakobs, and Heike Wehrheim.
    “Algorithm Selection for Software Validation Based on Graph Kernels.” <i>Journal
    of Automated Software Engineering</i>, n.d.
  ieee: C. Richter, E. Hüllermeier, M.-C. Jakobs, and H. Wehrheim, “Algorithm Selection
    for Software Validation Based on Graph Kernels,” <i>Journal of Automated Software
    Engineering</i>.
  mla: Richter, Cedric, et al. “Algorithm Selection for Software Validation Based
    on Graph Kernels.” <i>Journal of Automated Software Engineering</i>, Springer.
  short: C. Richter, E. Hüllermeier, M.-C. Jakobs, H. Wehrheim, Journal of Automated
    Software Engineering (n.d.).
date_created: 2020-04-19T14:08:06Z
date_updated: 2022-01-06T06:52:55Z
department:
- _id: '7'
- _id: '77'
- _id: '355'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '11'
  name: SFB 901 - Subproject B3
- _id: '12'
  name: SFB 901 - Subproject B4
publication: Journal of Automated Software Engineering
publication_status: accepted
publisher: Springer
status: public
title: Algorithm Selection for Software Validation Based on Graph Kernels
type: journal_article
user_id: '477'
year: '2020'
...
---
_id: '10095'
author:
- first_name: Cedric
  full_name: Richter, Cedric
  id: '50003'
  last_name: Richter
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Richter C, Wehrheim H. PeSCo: Predicting Sequential Combinations of Verifiers
    - (Competition Contribution). In: Beyer D, Huisman M, Kordon F, Steffen B, eds.
    <i>Tools and Algorithms for the Construction and Analysis of Systems - 25 Years
    of {TACAS:} TOOLympics, Held as Part of {ETAPS} 2019, Prague, Czech Republic,
    April 6-11, 2019, Proceedings, Part {III}</i>. Vol 11429. Lecture Notes in Computer
    Science. Springer; 2019:229-233. doi:<a href="https://doi.org/10.1007/978-3-030-17502-3_19">10.1007/978-3-030-17502-3_19</a>'
  apa: 'Richter, C., &#38; Wehrheim, H. (2019). PeSCo: Predicting Sequential Combinations
    of Verifiers - (Competition Contribution). In D. Beyer, M. Huisman, F. Kordon,
    &#38; B. Steffen (Eds.), <i>Tools and Algorithms for the Construction and Analysis
    of Systems - 25 Years of {TACAS:} TOOLympics, Held as Part of {ETAPS} 2019, Prague,
    Czech Republic, April 6-11, 2019, Proceedings, Part {III}</i> (Vol. 11429, pp.
    229–233). Springer. <a href="https://doi.org/10.1007/978-3-030-17502-3_19">https://doi.org/10.1007/978-3-030-17502-3_19</a>'
  bibtex: '@inproceedings{Richter_Wehrheim_2019, series={Lecture Notes in Computer
    Science}, title={PeSCo: Predicting Sequential Combinations of Verifiers - (Competition
    Contribution)}, volume={11429}, DOI={<a href="https://doi.org/10.1007/978-3-030-17502-3_19">10.1007/978-3-030-17502-3_19</a>},
    booktitle={Tools and Algorithms for the Construction and Analysis of Systems -
    25 Years of {TACAS:} TOOLympics, Held as Part of {ETAPS} 2019, Prague, Czech Republic,
    April 6-11, 2019, Proceedings, Part {III}}, publisher={Springer}, author={Richter,
    Cedric and Wehrheim, Heike}, editor={Beyer, Dirk and Huisman, Marieke and Kordon,
    Fabrice and Steffen, BernhardEditors}, year={2019}, pages={229–233}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Richter, Cedric, and Heike Wehrheim. “PeSCo: Predicting Sequential Combinations
    of Verifiers - (Competition Contribution).” In <i>Tools and Algorithms for the
    Construction and Analysis of Systems - 25 Years of {TACAS:} TOOLympics, Held as
    Part of {ETAPS} 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part
    {III}</i>, edited by Dirk Beyer, Marieke Huisman, Fabrice Kordon, and Bernhard
    Steffen, 11429:229–33. Lecture Notes in Computer Science. Springer, 2019. <a href="https://doi.org/10.1007/978-3-030-17502-3_19">https://doi.org/10.1007/978-3-030-17502-3_19</a>.'
  ieee: 'C. Richter and H. Wehrheim, “PeSCo: Predicting Sequential Combinations of
    Verifiers - (Competition Contribution),” in <i>Tools and Algorithms for the Construction
    and Analysis of Systems - 25 Years of {TACAS:} TOOLympics, Held as Part of {ETAPS}
    2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part {III}</i>, 2019,
    vol. 11429, pp. 229–233.'
  mla: 'Richter, Cedric, and Heike Wehrheim. “PeSCo: Predicting Sequential Combinations
    of Verifiers - (Competition Contribution).” <i>Tools and Algorithms for the Construction
    and Analysis of Systems - 25 Years of {TACAS:} TOOLympics, Held as Part of {ETAPS}
    2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part {III}</i>, edited
    by Dirk Beyer et al., vol. 11429, Springer, 2019, pp. 229–33, doi:<a href="https://doi.org/10.1007/978-3-030-17502-3_19">10.1007/978-3-030-17502-3_19</a>.'
  short: 'C. Richter, H. Wehrheim, in: D. Beyer, M. Huisman, F. Kordon, B. Steffen
    (Eds.), Tools and Algorithms for the Construction and Analysis of Systems - 25
    Years of {TACAS:} TOOLympics, Held as Part of {ETAPS} 2019, Prague, Czech Republic,
    April 6-11, 2019, Proceedings, Part {III}, Springer, 2019, pp. 229–233.'
date_created: 2019-06-03T08:12:55Z
date_updated: 2022-01-06T06:50:29Z
ddc:
- '004'
department:
- _id: '77'
doi: 10.1007/978-3-030-17502-3_19
editor:
- first_name: Dirk
  full_name: Beyer, Dirk
  last_name: Beyer
- first_name: Marieke
  full_name: Huisman, Marieke
  last_name: Huisman
- first_name: Fabrice
  full_name: Kordon, Fabrice
  last_name: Kordon
- first_name: Bernhard
  full_name: Steffen, Bernhard
  last_name: Steffen
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2019-08-26T11:01:00Z
  date_updated: 2019-08-26T11:01:00Z
  file_id: '12961'
  file_name: PeSCo.pdf
  file_size: 254772
  relation: main_file
  success: 1
file_date_updated: 2019-08-26T11:01:00Z
has_accepted_license: '1'
intvolume: '     11429'
language:
- iso: eng
page: 229-233
project:
- _id: '12'
  name: SFB 901 - Subproject B4
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
publication: Tools and Algorithms for the Construction and Analysis of Systems - 25
  Years of {TACAS:} TOOLympics, Held as Part of {ETAPS} 2019, Prague, Czech Republic,
  April 6-11, 2019, Proceedings, Part {III}
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: 'PeSCo: Predicting Sequential Combinations of Verifiers - (Competition Contribution)'
type: conference
user_id: '29719'
volume: 11429
year: '2019'
...
