Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

213 Publications


2016 | Journal Article | LibreCat-ID: 175
Walther, S., & Wehrheim, H. (2016). On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs. Science of Computer Programming, 2--23. https://doi.org/10.1016/j.scico.2016.04.002
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 186
Czech, M., Jakobs, M.-C., & Wehrheim, H. (2016). Just test what you cannot verify! In U. Z. Jens Knoop (Ed.), Software Engineering 2016 (pp. 17–18).
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 224
Krämer, J., & Wehrheim, H. (2016). A short survey on using software error localization for service compositions. In Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016) (pp. 248--262). https://doi.org/10.1007/978-3-319-44482-6_16
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 226
Krämer, J., & Wehrheim, H. (2016). A Formal Approach to Error Localization and Correction in Service Compositions. In Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016) (pp. 445--457). https://doi.org/10.1007/978-3-319-50230-4_35
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 227
Töws, M., & Wehrheim, H. (2016). A CEGAR Scheme for Information Flow Analysis. In Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016) (pp. 466--483). https://doi.org/10.1007/978-3-319-47846-3_29
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 170
Jakobs, M.-C., Töws, M., & Pauck, F. (2016). PAndA 2 : Analyzing Permission Use and Interplay in Android Apps (Tool Paper). In T. E. Ishikawa F, Romanovsky A (Ed.), Workshop on Formal and Model-Driven Techniques for Developing Trustworthy Systems.
LibreCat | Files available
 

2016 | Dissertation | LibreCat-ID: 1190
Isenberg, T. (2016). Induction-based Verification of Timed Systems. Universität Paderborn.
LibreCat | Files available
 

2016 | Mastersthesis | LibreCat-ID: 162
Zhang, G. (2016). Program Slicing: A Way of Separating WHILE Programs into Precise and Approximate Portions. Universität Paderborn.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 164
Czech, M. (2016). Predicting Rankings of Software Verification Tools Using Kernels for Structured Data. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 133
Dewender, M. (2016). Verifikation von Service Kompositionen mit Spin. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 134
Heinisch, P. (2016). Verifikation von Service Kompositionen mit Prolog. Universität Paderborn.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 250
Jakobs, M.-C. (2015). Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning. In Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM) (pp. 159--174). https://doi.org/10.1007/978-3-319-22969-0_12
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 283
Czech, M., Jakobs, M.-C., & Wehrheim, H. (2015). Just test what you cannot verify! In A. Egyed & I. Schaefer (Eds.), Fundamental Approaches to Software Engineering (pp. 100–114). https://doi.org/10.1007/978-3-662-46675-9_7
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 285
Isenberg, T. (2015). Incremental Inductive Verification of Parameterized Timed Systems. In Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD) (pp. 1–9). https://doi.org/10.1109/ACSD.2015.13
LibreCat | Files available | DOI
 

2015 | Dissertation | LibreCat-ID: 246
Besova, G. (2015). Systematic Development and Re-Use of Model Tranformations. Universität Paderborn.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 262
Jakobs, M.-C., & Wehrheim, H. (2015). Programs from Proofs of Predicated Dataflow Analyses. In Proceedings of the 30th Annual ACM Symposium on Applied Computing (pp. 1729–1736). https://doi.org/10.1145/2695664.2695690
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Besova, G., Steenken, D., & Wehrheim, H. (2015). Grammar-based model transformations: Definition, execution, and quality properties. Computer Languages, Systems & Structures, 116–138. https://doi.org/10.1016/j.cl.2015.05.003
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 3162
Ziegert, S., & Wehrheim, H. (2015). Temporal plans for software architecture reconfiguration. Computer Science - R & D, (3–4), 303--320. https://doi.org/10.1007/s00450-014-0259-7
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
Meyer, R., & Wehrheim, H. (2015). From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog. In R. Meyer, A. Platzer, & H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings (pp. 3--4). https://doi.org/10.1007/978-3-319-23506-6_1
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
Derrick, J., Dongol, B., Schellhorn, G., Travkin, O., & Wehrheim, H. (2015). Verifying Opacity of a Transactional Mutex Lock. In N. Bj{\o}rner & F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings (pp. 161--177). https://doi.org/10.1007/978-3-319-19249-9_11
LibreCat | DOI
 

Filters and Search Terms

department=77

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed