


default search action
International Journal on Software Tools for Technology Transfer, Volume 23
Volume 23, Number 1, February 2021
- Georgios Giantamidis, Stavros Tripakis, Stylianos Basagiannis
:
Learning Moore machines from input-output traces. 1-29 - Chris Alvin
, Brian Peterson, Supratik Mukhopadhyay:
Static generation of UML sequence diagrams. 31-53 - Yue Yuan, Yi Li, Wenchang Shi:
Detecting multiphase linear ranking functions for single-path linear-constraint loops. 55-67 - Florian Kammüller, Axel Legay, Stefano Schivo:
Masterminding change by combining secure system design with security risk assessment. 69-70 - Pietro Ferrara
, Amit Kr Mandal, Agostino Cortesi
, Fausto Spoto
:
Static analysis for discovering IoT vulnerabilities. 71-88 - René Rydhof Hansen
, Kim Guldstrand Larsen
, Axel Legay, Peter Gjøl Jensen
, Danny Bøgsted Poulsen
:
ADTLang: a programming language approach to attack defense trees. 89-104 - Vladimir V. Shakhov, Insoo Koo:
Graph-based technique for survivability assessment and optimization of IoT applications. 105-114
Volume 23, Number 2, April 2021
- Omar M. Alhawi, Herbert Rocha
, Mikhail R. Gadelha, Lucas C. Cordeiro
, Eddie Batista de Lima Filho:
Verification and refutation of C programs based on k-induction and invariant inference. 115-135 - Raphaël Khoury, Sylvain Hallé, Yannick Lebrun:
Automata-based monitoring for LTL-FO+. 137-154 - Martin Leucker
, Christian Colombo:
Preface. 155-156 - Felipe Gorostiaga
, César Sánchez
:
Stream runtime verification of real-time event streams with the Striver language. 157-183 - Joshua Schneider
, David A. Basin
, Frederik Brix, Srdan Krstic
, Dmitriy Traytel
:
Scalable online first-order monitoring. 185-208 - Giles Reger, David E. Rydeheard:
From parametric trace slicing to rule systems. 209-228 - Patricia Bouyer, Léo Henry
, Samy Jaziri, Thierry Jéron, Nicolas Markey:
Diagnosing timed automata using timed markings. 229-253 - Yliès Falcone, Srdan Krstic, Giles Reger, Dmitriy Traytel
:
A taxonomy for classifying runtime verification tools. 255-284
Volume 23, Number 3, June 2021
- Reiner Hähnle
, Wil M. P. van der Aalst
:
Automated model analysis tools and techniques presented at FASE 2019. 285-287 - Artur Boronat:
Incremental execution of rule-based model transformation. 289-311 - Dirk Beyer
, Marie-Christine Jakobs
:
Cooperative verifier-based testing with CoVeriTest. 313-333 - Lars Fritsche
, Jens Kosiol, Andy Schürr, Gabriele Taentzer:
Avoiding unnecessary information loss: correct and efficient model synchronization based on triple graph grammars. 335-368 - Sven Schneider
, Leen Lambers
, Fernando Orejas
:
A logic-based incremental approach to graph repair featuring delta preservation. 369-410 - Sven Schneider
, Maria Maximova
, Lucas Sakizloglou
, Holger Giese
:
Formal testing of timed graph transformation systems using metric temporal graph logic. 411-488 - Paul Dubrulle
, Nikolai Kosmatov
, Christophe Gaston
, Arnault Lapitre
:
PolyGraph: a data flow model with frequency arithmetic. 489-517 - Paul Dubrulle
, Nikolai Kosmatov
, Christophe Gaston
, Arnault Lapitre
:
Correction to: PolyGraph: a data flow model with frequency arithmetic. 519
Volume 23, Number 4, August 2021
- Markus Frohme, Bernhard Steffen:
Compositional learning of mutually recursive procedural systems. 521-543 - Bernd Finkbeiner, Leonardo Mariani:
Introduction to the special issue of the 19th International Conference on Runtime Verification. 545-546 - Klaus Havelund, Doron Peled:
An extension of first-order LTL with rules with application to runtime verification. 547-563 - Dejan Nickovic
, Xin Qin, Thomas Ferrère, Cristinel Mateis
, Jyotirmoy Deshmukh:
Specifying and detecting temporal patterns with shape expressions. 565-577 - Sean Kauffman, Klaus Havelund, Sebastian Fischmeister:
What can we monitor over unreliable channels? 579-600 - Luca Aceto, Ian Cassar, Adrian Francalanza, Anna Ingólfsdóttir:
Comparing controlled system synthesis and suppression enforcement. 601-614 - Luca Bortolussi, Francesca Cairoli, Nicola Paoletti
, Scott A. Smolka
, Scott D. Stoller:
Neural predictive monitoring and a comparison of frequentist and Bayesian approaches. 615-640 - Saeid Tizpaz-Niari, Pavol Cerný, Sriram Sankaranarayanan, Ashutosh Trivedi:
Quantitative estimation of side-channel leaks with neural networks. 641-654
Volume 23, Number 5, October 2021
- Dawid Kopetzki, Michael Lybecait, Stefan Naujokat
, Bernhard Steffen:
Towards language-to-language transformation. 655-677 - Simon Bliudze, Panagiotis Katsaros, Saddek Bensalem, Martin Wirsing:
On methods and tools for rigorous system design. 679-684 - Christos Grompanopoulos, Antonios Gouglidis, Anastasia Mavridou:
Specifying and verifying usage control models and policies in TLA+. 685-700 - Rim El Ballouli, Saddek Bensalem, Marius Bozga, Joseph Sifakis:
Programming dynamic reconfigurable systems. 701-719 - Pujie Han, Zhengjun Zhai, Brian Nielsen
, Ulrik Nyman:
Model-based optimization of ARINC-653 partition scheduling. 721-740 - Stefan Blom, Saeed Darabi, Marieke Huisman
, Mohsen Safari:
Correct program parallelisations. 741-763 - Alexios Lekidis
, Panagiotis Katsaros:
Energy characterization of IoT systems through design aspect monitoring. 765-781 - Ezio Bartocci
, Niveditha Manjunath, Leonardo Mariani, Cristinel Mateis
, Dejan Nickovic
:
CPSDebug: Automatic failure explanation in CPS models. 783-796 - Nathalie Bertrand, Igor Konnov, Marijana Lazic, Josef Widder:
Verification of randomized consensus algorithms under round-rigid adversaries. 797-821 - Nathalie Bertrand, Igor Konnov, Marijana Lazic, Josef Widder:
Correction to: Verification of randomized consensus algorithms under round-rigid adversaries. 823 - Parosh Aziz Abdulla, Frédéric Haziza, Lukás Holík, Bengt Jonsson, Ahmed Rezine:
Correction to: An integrated specification and verification technique for highly concurrent data structures. 825 - Jan-David Quesel, Stefan Mitsch, Sarah M. Loos, Nikos Aréchiga, André Platzer:
Correction to: How to model and prove hybrid systems with KeYmaera: a tutorial on safety. 827
Volume 23, Number 6, December 2021
- Dirk Beyer
, Marieke Huisman
:
TOOLympics I: Competition on software testing. 829-832 - Dirk Beyer
:
First international competition on software testing. 833-846 - Marie-Christine Jakobs
:
CoVeriTest: interleaving value and predicate analysis for test-case generation. 847-851 - Sebastian Ruland, Malte Lochau, Oliver Fehse, Andy Schürr:
CPA/Tiger-MGP: test-goal set partitioning for efficient multi-goal test-suite generation. 853-856 - Mikhail R. Gadelha, Rafael S. Menezes
, Lucas C. Cordeiro
:
ESBMC 6.1: automated test case generation using bounded model checking. 857-861 - Caroline Lemieux, Koushik Sen:
FairFuzz-TC: a fuzzer targeting rare branches. 863-866 - Cristian Cadar
, Martin Nowack
:
KLEE symbolic execution engine in 2019. 867-870 - Thomas Lemberger:
Plain random test generation with PRTest. 871-873 - Marek Chalupa
, Martina Vitovská, Tomás Jasek, Michael Simácek, Jan Strejcek:
Symbiotic 6: generating test cases by slicing and symbolic execution. 875-877 - Dirk Beyer
, Marieke Huisman
, Fabrice Kordon
, Bernhard Steffen
:
TOOLympics II: competitions on formal methods. 879-881 - Claire Dross, Carlo A. Furia, Marieke Huisman
, Rosemary Monahan, Peter Müller:
VerifyThis 2019: a program verification competition. 883-893 - Mihaela Sighireanu:
SL-COMP: competition of solvers for separation logic. 895-903 - Aart Middeldorp, Julian Nagele
, Kiraku Shintani:
CoCo 2019: report on the eighth confluence competition. 905-916 - Falk Howar
, Marc Jasper, Malte Mues
, David Schmidt
, Bernhard Steffen:
The RERS challenge: towards controllable and scalable benchmark synthesis. 917-930 - Fabrice Kordon, Lom-Messan Hillah, Francis Hulin-Hubard, Loïg Jezequel, Emmanuel Paviot-Adet:
Study of the efficiency of model checking techniques using results of the MCC from 2015 To 2019. 931-952

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.