default search action
Heike Wehrheim
Person information
- affiliation: University of Oldenburg, Germany
- affiliation (former): University of Paderborn, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Wolfgang Ahrendt, Frédéric Loulergue, Heike Wehrheim:
Introduction to the Special Collection from the International Conference on Tests and Proofs (TAP) 2020 and 2021. Formal Aspects Comput. 36(1): 1:1-1:2 (2024) - [j41]Jan Haltermann, Marie-Christine Jakobs, Cedric Richter, Heike Wehrheim:
Parallel program analysis on path ranges. Sci. Comput. Program. 238: 103154 (2024) - [j40]Jan Haltermann, Heike Wehrheim:
Exchanging information in cooperative software validation. Softw. Syst. Model. 23(3): 695-719 (2024) - [c156]Christian Janßen, Cedric Richter, Heike Wehrheim:
Can ChatGPT support software verification? FASE 2024: 266-279 - [c155]Lara Bargmann, Brijesh Dongol, Heike Wehrheim:
Unifying Weak Memory Verification Using Potentials. FM (1) 2024: 519-537 - [c154]Cedric Richter, Heike Wehrheim:
On the Role of Artificial and Real Bug Fixes on the Training of Neural Bug Detectors. Software Engineering 2024: 111-112 - [c153]Jan Haltermann, Marie-Christine Jakobs, Cedric Richter, Heike Wehrheim:
Ranged Program Analysis: A Parallel Divide-and-Conquer Approach for Software Verification. Software Engineering 2024: 157-158 - [c152]Stefan Bodenmüller, John Derrick, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
A Fully Verified Persistency Library. VMCAI (2) 2024: 26-47 - [i27]Jan Haltermann, Marie-Christine Jakobs, Cedric Richter, Heike Wehrheim:
Parallel Program Analysis on Path Ranges. CoRR abs/2402.11938 (2024) - 2023
- [c151]Ori Lahav, Brijesh Dongol, Heike Wehrheim:
Rely-Guarantee Reasoning for Causally Consistent Shared Memory. CAV (1) 2023: 206-229 - [c150]Jan Haltermann, Marie-Christine Jakobs, Cedric Richter, Heike Wehrheim:
Parallel Program Analysis via Range Splitting. FASE 2023: 195-219 - [c149]Heike Wehrheim, Lara Bargmann, Brijesh Dongol:
Reasoning About Promises in Weak Memory Models with Event Structures. FM 2023: 282-300 - [c148]Lara Bargmann, Heike Wehrheim:
Lifting the Reasoning Level in Generic Weak Memory Verification. iFM 2023: 175-192 - [c147]Cedric Richter, Heike Wehrheim:
How to Train Your Neural Bug Detector: Artificial vs Real Bugs. ASE 2023: 1036-1048 - [c146]Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim:
Component-based CEGAR - Building Software Verifiers from Off-the-Shelf Components. Software Engineering 2023: 37-38 - [c145]Felix Pauck, Heike Wehrheim:
Jicer: Slicing Android Apps for Cooperative Analysis. Software Engineering 2023: 101-102 - [c144]Cedric Richter, Jan Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, Heike Wehrheim:
Variable Misuse Detection: Software Developers versus Neural Bug Detectors. Software Engineering 2023: 103-104 - [c143]Arnab Sharma, Vitalik Melnikov, Eyke Hüllermeier, Heike Wehrheim:
Property-Driven Black-Box Testing of Numeric Functions. Software Engineering 2023: 111-112 - [c142]Florian Dyck, Cedric Richter, Heike Wehrheim:
Robustness Testing of Software Verifiers. SEFM 2023: 66-84 - [c141]Jan Haltermann, Marie-Christine Jakobs, Cedric Richter, Heike Wehrheim:
Ranged Program Analysis via Instrumentation. SEFM 2023: 145-164 - [c140]Nicola Thoben, Jan Haltermann, Heike Wehrheim:
Timeout Prediction for Software Analyses. SEFM 2023: 340-358 - [c139]Lara Bargmann, Heike Wehrheim:
View-Based Axiomatic Reasoning for PSO. TASE 2023: 286-304 - [d9]Christian Janßen, Cedric Richter, Heike Wehrheim:
PeSCo 2.1: An algorithm selector for sequential portfolios (Competition contribution). Zenodo, 2023 - [d8]Christian Janßen, Cedric Richter, Heike Wehrheim:
PeSCo 2.1: An algorithm selector for sequential portfolios (Competition contribution). Zenodo, 2023 - [d7]Cedric Richter, Heike Wehrheim:
How to Train Your Neural Bug Detector: Artificial vs Real Bugs. Zenodo, 2023 - [i26]Lara Bargmann, Heike Wehrheim:
View-Based Axiomatic Reasoning for PSO (Extended Version). CoRR abs/2301.07967 (2023) - [i25]Ori Lahav, Brijesh Dongol, Heike Wehrheim:
Rely-Guarantee Reasoning for Causally Consistent Shared Memory (Extended Version). CoRR abs/2305.08486 (2023) - [i24]Lara Bargmann, Heike Wehrheim:
Lifting the Reasoning Level in Generic Weak Memory Verification (Extended Version). CoRR abs/2309.01433 (2023) - [i23]Christian Janßen, Cedric Richter, Heike Wehrheim:
Can ChatGPT support software verification? CoRR abs/2311.02433 (2023) - 2022
- [j39]Sadegh Dalvandi, Brijesh Dongol, Simon Doherty, Heike Wehrheim:
Integrating Owicki-Gries for C11-Style Memory Models into Isabelle/HOL. J. Autom. Reason. 66(1): 141-171 (2022) - [j38]Eleni Bila, John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
Modularising Verification Of Durable Opacity. Log. Methods Comput. Sci. 18(3) (2022) - [j37]Simon Doherty, Sadegh Dalvandi, Brijesh Dongol, Heike Wehrheim:
Unifying Operational Weak Memory Verification: An Axiomatic Approach. ACM Trans. Comput. Log. 23(4): 27:1-27:39 (2022) - [c138]Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
Weak Progressive Forward Simulation Is Necessary and Sufficient for Strong Observational Refinement. CONCUR 2022: 31:1-31:23 - [c137]Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim:
Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR. ICSE 2022: 536-548 - [c136]Arnab Sharma, Vitalik Melnikov, Eyke Hüllermeier, Heike Wehrheim:
Property-Driven Testing of Black-Box Functions. FormaliSE@ICSE 2022: 113-123 - [c135]Jan Haltermann, Heike Wehrheim:
Machine Learning Based Invariant Generation: A Framework and Reproducibility Study. ICST 2022: 12-23 - [c134]Cedric Richter, Heike Wehrheim:
Learning Realistic Mutations: Bug Creation for Neural Bug Detectors. ICST 2022: 162-173 - [c133]Cedric Richter, Jan Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, Heike Wehrheim:
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? ASE 2022: 9:1-9:12 - [c132]Cedric Richter, Heike Wehrheim:
TSSB-3M: Mining single statement bugs at massive scale. MSR 2022: 418-422 - [c131]Jan Haltermann, Heike Wehrheim:
CoVEGI: Cooperative Verification via Externally Generated Invariants. Software Engineering 2022: 41-42 - [c130]Jan Haltermann, Heike Wehrheim:
Information Exchange Between Over- and Underapproximating Software Analyses. SEFM 2022: 37-54 - [d6]Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim:
Reproduction Package (VM Version) for ICSE 2022 Article 'Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR'. Zenodo, 2022 - [d5]Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim:
Reproduction Package (VM Version) for ICSE 2022 Article 'Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR'. Zenodo, 2022 - [d4]Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim, Philipp Wendler:
CPAchecker Release 2.1.1 (unix). Zenodo, 2022 - [i22]Cedric Richter, Heike Wehrheim:
TSSB-3M: Mining single statement bugs at massive scale. CoRR abs/2201.12046 (2022) - [i21]Cedric Richter, Heike Wehrheim:
Can we learn from developer mistakes? Learning to localize and repair real bugs from real bug fixes. CoRR abs/2207.00301 (2022) - [i20]Heike Wehrheim, Lara Bargmann, Brijesh Dongol:
Reasoning about Promises in Weak Memory Models with Event Structures (Extended Version). CoRR abs/2211.16330 (2022) - 2021
- [j36]Marie-Christine Jakobs, Felix Pauck, Marco Platzner, Heike Wehrheim, Tobias Wiersema:
Software/Hardware Co-Verification for Custom Instruction Set Processors. IEEE Access 9: 160559-160579 (2021) - [j35]John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
Verifying correctness of persistent concurrent data structures: a sound and complete method. Formal Aspects Comput. 33(4-5): 547-573 (2021) - [j34]Wolfgang Ahrendt, Silvia Lizeth Tapia Tarifa, Heike Wehrheim:
Editorial. Formal Aspects Comput. 33(6): 827 (2021) - [j33]Jordi Cabot, Heike Wehrheim, Eerke A. Boiten:
Editorial. Formal Aspects Comput. 33(6): 1037 (2021) - [c129]Jan Haltermann, Heike Wehrheim:
CoVEGI: Cooperative Verification via Externally Generated Invariants. FASE 2021: 108-129 - [c128]Arnab Sharma, Caglar Demir, Axel-Cyrille Ngonga Ngomo, Heike Wehrheim:
MLCHECK- Property-Driven Testing of Machine Learning Classifiers. ICMLA 2021: 738-745 - [c127]Jürgen König, Heike Wehrheim:
On the Correctness Problem for Serializability. ICTAC 2021: 47-64 - [c126]Felix Pauck, Heike Wehrheim:
Jicer: Simplifying Cooperative Android App Analysis Tasks. SCAM 2021: 187-197 - [c125]Felix Pauck, Heike Wehrheim:
Cooperative Android App Analysis with CoDiDroid. Software Engineering 2021: 83-84 - [c124]John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
Brief Announcement: On Strong Observational Refinement and Forward Simulation. DISC 2021: 55:1-55:4 - [d3]Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim:
Reproduction Package (Reduced Version) for Article "Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR". Zenodo, 2021 - [d2]Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim:
Reproduction Package (Full Version) for ICSE 2022 Article 'Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR'. Zenodo, 2021 - [i19]Arnab Sharma, Caglar Demir, Axel-Cyrille Ngonga Ngomo, Heike Wehrheim:
MLCheck- Property-Driven Testing of Machine Learning Models. CoRR abs/2105.00741 (2021) - [i18]Heike Wehrheim:
On the (Non-)Applicability of a Small Model Theorem to Model Checking STMs. CoRR abs/2107.00271 (2021) - [i17]Cedric Richter, Heike Wehrheim:
DeepMutants: Training neural bug detectors with contextual mutations. CoRR abs/2107.06657 (2021) - [i16]John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
On Strong Observational Refinement and Forward Simulation. CoRR abs/2107.14509 (2021) - 2020
- [j32]Cedric Richter, Eyke Hüllermeier, Marie-Christine Jakobs, Heike Wehrheim:
Algorithm selection for software validation based on graph kernels. Autom. Softw. Eng. 27(1): 153-186 (2020) - [j31]Holger Karl, Dennis Kundisch, Friedhelm Meyer auf der Heide, Heike Wehrheim:
A Case for a New IT Ecosystem: On-The-Fly Computing. Bus. Inf. Syst. Eng. 62(6): 467-481 (2020) - [j30]Sadegh Dalvandi, Simon Doherty, Brijesh Dongol, Heike Wehrheim:
Owicki-Gries Reasoning for C11 RAR (Artifact). Dagstuhl Artifacts Ser. 6(2): 15:1-15:2 (2020) - [c123]Sadegh Dalvandi, Simon Doherty, Brijesh Dongol, Heike Wehrheim:
Owicki-Gries Reasoning for C11 RAR. ECOOP 2020: 11:1-11:26 - [c122]Eleni Bila, Simon Doherty, Brijesh Dongol, John Derrick, Gerhard Schellhorn, Heike Wehrheim:
Defining and Verifying Durable Opacity: Correctness for Persistent Software Transactional Memory. FORTE 2020: 39-58 - [c121]Steffen Beringer, Heike Wehrheim:
Consistency Analysis of AUTOSAR Timing Requirements. ICSOFT 2020: 15-26 - [c120]Dirk Beyer, Heike Wehrheim:
Verification Artifacts in Cooperative Verification: Survey and Unifying Component Framework. ISoLA (1) 2020: 143-167 - [c119]Arnab Sharma, Heike Wehrheim:
Higher income, larger loan? monotonicity testing of machine learning models. ISSTA 2020: 200-210 - [c118]Cedric Richter, Heike Wehrheim:
Attend and Represent: A Novel View on Algorithm Selection for Software Verification. ASE 2020: 1016-1028 - [c117]Arnab Sharma, Heike Wehrheim:
Automatic Fairness Testing of Machine Learning Models. ICTSS 2020: 255-271 - [c116]Felix Pauck, Eric Bodden, Heike Wehrheim:
Reproducing Taint-Analysis Results with ReproDroid. SE 2020: 123-124 - [e5]Heike Wehrheim, Jordi Cabot:
Fundamental Approaches to Software Engineering - 23rd International Conference, FASE 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25-30, 2020, Proceedings. Lecture Notes in Computer Science 12076, Springer 2020, ISBN 978-3-030-45233-9 [contents] - [e4]Wolfgang Ahrendt, Heike Wehrheim:
Tests and Proofs - 14th International Conference, TAP@STAF 2020, Bergen, Norway, June 22-23, 2020, Proceedings [postponed]. Lecture Notes in Computer Science 12165, Springer 2020, ISBN 978-3-030-50994-1 [contents] - [i15]Arnab Sharma, Heike Wehrheim:
Testing Monotonicity of Machine Learning Models. CoRR abs/2002.12278 (2020) - [i14]Eleni Bila, Simon Doherty, Brijesh Dongol, John Derrick, Gerhard Schellhorn, Heike Wehrheim:
Defining and Verifying Durable Opacity: Correctness for Persistent Software Transactional Memory. CoRR abs/2004.08200 (2020) - [i13]Jan Haltermann, Heike Wehrheim:
Cooperative Verification via Collective Invariant Generation. CoRR abs/2008.04551 (2020) - [i12]Eleni Bila, John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
Modularising Verification Of Durable Opacity. CoRR abs/2011.15013 (2020)
2010 – 2019
- 2019
- [j29]Martin Fränzle, Deepak Kapur, Heike Wehrheim, Naijun Zhan:
Editorial. Formal Aspects Comput. 31(1): 1 (2019) - [j28]Alessandra Russo, Andy Schürr, Heike Wehrheim:
Editorial. Formal Aspects Comput. 31(5): 457-458 (2019) - [c115]John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim:
Verifying Correctness of Persistent Concurrent Data Structures. FM 2019: 179-195 - [c114]Arnab Sharma, Heike Wehrheim:
Testing Machine Learning Algorithms for Balanced Data Usage. ICST 2019: 125-135 - [c113]Stefan Schneider, Arnab Sharma, Holger Karl, Heike Wehrheim:
Specifying and Analyzing Virtual Network Services Using Queuing Petri Nets. IM 2019: 116-124 - [c112]Jürgen König, Heike Wehrheim:
Data Independence for Software Transactional Memory. NFM 2019: 263-279 - [c111]Simon Doherty, Brijesh Dongol, Heike Wehrheim, John Derrick:
Verifying C11 programs operationally. PPoPP 2019: 355-365 - [c110]Dirk Beyer, Marie-Christine Jakobs, Thomas Lemberger, Heike Wehrheim:
Combining Verifiers in Conditional Model Checking via Reducers. SE/SWM 2019: 151-152 - [c109]Arnab Sharma, Heike Wehrheim:
Testing Balancedness of ML Algorithms. SE/SWM 2019: 157-158 - [c108]Felix Pauck, Heike Wehrheim:
Together strong: cooperative Android app analysis. ESEC/SIGSOFT FSE 2019: 374-384 - [c107]Cedric Richter, Heike Wehrheim:
PeSCo: Predicting Sequential Combinations of Verifiers - (Competition Contribution). TACAS (3) 2019: 229-233 - [c106]Tobias Isenberg, Marie-Christine Jakobs, Felix Pauck, Heike Wehrheim:
When Are Software Verification Results Valid for Approximate Hardware? TAP@FM 2019: 3-20 - [i11]Dirk Beyer, Heike Wehrheim:
Verification Artifacts in Cooperative Verification: Survey and Unifying Component Framework. CoRR abs/1905.08505 (2019) - 2018
- [j27]Tobias Isenberg, Marie-Christine Jakobs, Felix Pauck, Heike Wehrheim:
Validity of Software Verification Results on Approximate Hardware. IEEE Embed. Syst. Lett. 10(1): 22-25 (2018) - [j26]John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, Heike Wehrheim:
Mechanized proofs of opacity: a comparison of two techniques. Formal Aspects Comput. 30(5): 597-625 (2018) - [c105]Dirk Beyer, Marie-Christine Jakobs, Thomas Lemberger, Heike Wehrheim:
Reducer-based construction of conditional verifiers. ICSE 2018: 1182-1193 - [c104]Manuel Töws, Heike Wehrheim:
Information Flow Certificates. ICTAC 2018: 435-454 - [c103]Simon Doherty, Brijesh Dongol, Heike Wehrheim, John Derrick:
Making Linearizability Compositional for Partially Ordered Executions. IFM 2018: 110-129 - [c102]Paul Börding, Jan Haltermann, Marie-Christine Jakobs, Heike Wehrheim:
JMCTest: Automatically Testing Inter-Method Contracts in Java. ICTSS 2018: 39-55 - [c101]Gerhard Schellhorn, Monika Wedel, Oleg Travkin, Jürgen König, Heike Wehrheim:
FastLane Is Opaque - a Case Study in Mechanized Proofs of Opacity. SEFM 2018: 105-120 - [c100]Felix Pauck, Eric Bodden, Heike Wehrheim:
Do Android taint analysis tools keep their promises? ESEC/SIGSOFT FSE 2018: 331-341 - [c99]Simon Doherty, Brijesh Dongol, Heike Wehrheim, John Derrick:
Brief Announcement: Generalising Concurrent Correctness to Weak Memory. DISC 2018: 45:1-45:3 - [d1]Dirk Beyer, Marie-Christine Jakobs, Thomas Lemberger, Heike Wehrheim:
Reproduction Package for ICSE 2018 Article 'Reducer-Based Construction of Conditional Verifiers'. Zenodo, 2018 - [i10]Simon Doherty, John Derrick, Brijesh Dongol, Heike Wehrheim:
Causal Linearizability: Compositionality for Partially Ordered Executions. CoRR abs/1802.01866 (2018) - [i9]Stefan Schneider, Arnab Sharma, Holger Karl, Heike Wehrheim:
Specifying and Analyzing Virtual Network Services Using Queuing Petri Nets. CoRR abs/1803.07007 (2018) - [i8]Felix Pauck, Eric Bodden, Heike Wehrheim:
Do Android Taint Analysis Tools Keep their Promises? CoRR abs/1804.02903 (2018) - [i7]Simon Doherty, Brijesh Dongol, Heike Wehrheim, John Derrick:
Verifying C11 Programs Operationally. CoRR abs/1811.09143 (2018) - 2017
- [j25]Tobias Isenberg, Marco Platzner, Heike Wehrheim, Tobias Wiersema:
Proof-Carrying Hardware via Inductive Invariants. ACM Trans. Design Autom. Electr. Syst. 22(4): 61:1-61:23 (2017) - [j24]Marie-Christine Jakobs, Heike Wehrheim:
Programs from Proofs: A Framework for the Safe Execution of Untrusted Software. ACM Trans. Program. Lang. Syst. 39(2): 7:1-7:56 (2017) - [c98]Heike Wehrheim:
Fault Localization in Service Compositions. FACS 2017: 216-232 - [c97]Manuel Töws, Heike Wehrheim:
Policy Dependent and Independent Information Flow Analyses. ICFEM 2017: 362-378 - [c96]Jürgen König, Heike Wehrheim:
Value-Based or Conflict-Based? Opacity Definitions for STMs. ICTAC 2017: 118-135 - [c95]Marie-Christine Jakobs, Heike Wehrheim:
Compact Proof Witnesses. NFM 2017: 389-403 - [c94]Mike Czech, Eyke Hüllermeier, Marie-Christine Jakobs, Heike Wehrheim:
Predicting rankings of software verification tools. SWAN@ESEC/SIGSOFT FSE 2017: 23-26 - [i6]Mike Czech, Eyke Hüllermeier, Marie-Christine Jakobs, Heike Wehrheim:
Predicting Rankings of Software Verification Competitions. CoRR abs/1703.00757 (2017) - 2016
- [j23]Sven Walther, Heike Wehrheim:
On-the-fly construction of provably correct service compositions - templates and proofs. Sci. Comput. Program. 127: 2-23 (2016) - [c93]Julia Krämer, Heike Wehrheim:
A Short Survey on Using Software Error Localization for Service Compositions. ESOCC 2016: 248-262 - [c92]Steffen Beringer, Heike Wehrheim:
Verification of AUTOSAR Software Architectures with Timed Automata. FMICS-AVoCS 2016: 189-204 - [c91]Manuel Töws, Heike Wehrheim:
A CEGAR Scheme for Information Flow Analysis. ICFEM 2016: 466-483 - [c90]Oleg Travkin, Heike Wehrheim:
Verification of Concurrent Programs on Weak Memory Models. ICTAC 2016: 3-24 - [c89]Gerhard Schellhorn, Oleg Travkin, Heike Wehrheim:
Towards a Thread-Local Proof Technique for Starvation Freedom. IFM 2016: 193-209 - [c88]Simon Doherty, Brijesh Dongol, John Derrick, Gerhard Schellhorn, Heike Wehrheim:
Proving Opacity of a Pessimistic STM. OPODIS 2016: 35:1-35:17 - [c87]Mike Czech, Marie-Christine Jakobs, Heike Wehrheim:
Just test what you cannot verify! Software Engineering 2016: 17-18 - [c86]Julia Krämer, Heike Wehrheim:
A Formal Approach to Error Localization and Correction in Service Compositions. STAF Workshops 2016: 445-457 - [i5]Tobias Isenberg, Marie-Christine Jakobs, Felix Pauck, Heike Wehrheim:
Deriving approximation tolerance constraints from verification runs. CoRR abs/1604.08784 (2016) - 2015
- [j22]Galina Besova, Dominik Steenken, Heike Wehrheim:
Grammar-based model transformations: Definition, execution, and quality properties. Comput. Lang. Syst. Struct. 43: 116-138 (2015) - [j21]Steffen Ziegert, Heike Wehrheim:
Temporal plans for software architecture reconfiguration. Comput. Sci. Res. Dev. 30(3-4): 303-320 (2015) - [c85]Roland Meyer, Heike Wehrheim:
From Program Verification to Time and Space: The Scientific Life of Ernst-Rüdiger Olderog. Correct System Design 2015: 3-4 - [c84]Mike Czech, Marie-Christine Jakobs, Heike Wehrheim:
Just Test What You Cannot Verify! FASE 2015: 100-114 - [c83]John Derrick, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, Heike Wehrheim:
Verifying Opacity of a Transactional Mutex Lock. FM 2015: 161-177 - [c82]Heike Wehrheim, Oleg Travkin:
TSO to SC via Symbolic Execution. Haifa Verification Conference 2015: 104-119 - [c81]Marie-Christine Jakobs, Heike Wehrheim:
Programs from proofs of predicated dataflow analyses. SAC 2015: 1729-1736 - [e3]Roland Meyer, André Platzer, Heike Wehrheim:
Correct System Design - Symposium in Honor of Ernst-Rüdiger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. Lecture Notes in Computer Science 9360, Springer 2015, ISBN 978-3-319-23505-9 [contents] - 2014
- [j20]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
The behavioural semantics of Event-B refinement. Formal Aspects Comput. 26(2): 251-280 (2014) - [j19]Bogdan Tofan, Oleg Travkin, Gerhard Schellhorn, Heike Wehrheim:
Two approaches for proving linearizability of multiset. Sci. Comput. Program. 96: 297-314 (2014) - [j18]Gerhard Schellhorn, John Derrick, Heike Wehrheim:
A Sound and Complete Proof Technique for Linearizability of Concurrent Data Structures. ACM Trans. Comput. Log. 15(4): 31:1-31:37 (2014) - [c80]Sven Walther, Heike Wehrheim:
Verified Service Compositions by Template-Based Construction. FACS 2014: 31-48 - [c79]Galina Besova, Dominik Steenken, Heike Wehrheim:
Grammar-Based Model Transformations. FedCSIS 2014: 1601-1610 - [c78]John Derrick, Brijesh Dongol, Gerhard Schellhorn, Bogdan Tofan, Oleg Travkin, Heike Wehrheim:
Quiescent Consistency: Defining and Verifying Relaxed Linearizability. FM 2014: 200-214 - [c77]Oleg Travkin, Heike Wehrheim:
Handling TSO in Mechanized Linearizability Proofs. Haifa Verification Conference 2014: 132-147 - [c76]Tobias Isenberg, Heike Wehrheim:
Timed Automata Verification via IC3 with Zones. ICFEM 2014: 203-218 - [c75]Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL Properties in Event-B Refinement. IFM 2014: 221-237 - [c74]Marie-Christine Jakobs, Marco Platzner, Heike Wehrheim, Tobias Wiersema:
Integrating Software and Hardware Verification. IFM 2014: 307-322 - [c73]Daniel Wonisch, Alexander Schremmer, Heike Wehrheim:
Programs from Proofs - Approach and Applications. Software Engineering 2014: 67-68 - [c72]Marie-Christine Jakobs, Heike Wehrheim:
Certification for configurable program analysis. SPIN 2014: 30-39 - [i4]Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL properties in Event-B refinement. CoRR abs/1406.6622 (2014) - [i3]Tobias Isenberg, Heike Wehrheim:
Proof-Carrying Hardware via IC3. CoRR abs/1410.4507 (2014) - 2013
- [c71]Daniel Wonisch, Alexander Schremmer, Heike Wehrheim:
Programs from Proofs - A PCC Alternative. CAV 2013: 912-927 - [c70]Tobias Isenberg, Dominik Steenken, Heike Wehrheim:
Bounded Model Checking of Graph Transformation Systems via SMT Solving. FMOODS/FORTE 2013: 178-192 - [c69]Oleg Travkin, Annika Mütze, Heike Wehrheim:
SPIN as a Linearizability Checker under Weak Memory Models. Haifa Verification Conference 2013: 311-326 - [c68]Sven Walther, Heike Wehrheim:
Knowledge-Based Verification of Service Compositions - An SMT Approach. ICECCS 2013: 24-32 - [c67]Brijesh Dongol, Oleg Travkin, John Derrick, Heike Wehrheim:
A High-Level Semantics for Program Execution under Total Store Order Memory. ICTAC 2013: 177-194 - [c66]Steffen Ziegert, Heike Wehrheim:
Temporal Reconfiguration Plans for Self-Adaptive Systems. Software Engineering 2013: 271-284 - [c65]Daniel Wonisch, Alexander Schremmer, Heike Wehrheim:
Zero Overhead Runtime Monitoring. SEFM 2013: 244-258 - 2012
- [j17]Oleg Travkin, Heike Wehrheim, Gerhard Schellhorn:
Proving Linearizability of Multiset with Local Proof Obligations. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 53 (2012) - [j16]Thomas Ruhroth, Heike Wehrheim:
Model evolution and refinement. Sci. Comput. Program. 77(3): 270-289 (2012) - [c64]Gerhard Schellhorn, Heike Wehrheim, John Derrick:
How to Prove Algorithms Linearisable. CAV 2012: 243-259 - [c63]Daniel Wonisch, Heike Wehrheim:
Predicate Analysis with Block-Abstraction Memoization. ICFEM 2012: 332-347 - [c62]Nils Timm, Heike Wehrheim, Mike Czech:
Heuristic-Guided Abstraction Refinement for Concurrent Systems. ICFEM 2012: 348-363 - [c61]Galina Besova, Sven Walther, Heike Wehrheim, Steffen Becker:
Weaving-Based Configuration and Modular Transformation of Multi-layer Systems. MoDELS 2012: 776-792 - 2011
- [j15]Michael Leuschel, Heike Wehrheim:
Selected papers on Integrated Formal Methods (iFM09). Sci. Comput. Program. 76(10): 835-836 (2011) - [j14]John Derrick, Gerhard Schellhorn, Heike Wehrheim:
Mechanically verified proof obligations for linearizability. ACM Trans. Program. Lang. Syst. 33(1): 4:1-4:43 (2011) - [c60]Thomas Ruhroth, Heike Wehrheim, Steffen Ziegert:
ReL: A Generic Refactoring Language for Specification and Execution. EUROMICRO-SEAA 2011: 83-90 - [c59]John Derrick, Gerhard Schellhorn, Heike Wehrheim:
Verifying Linearisability with Potential Linearisation Points. FM 2011: 323-337 - [c58]Dominik Steenken, Heike Wehrheim, Daniel Wonisch:
Sound and Complete Abstract Graph Transformation. SBMF 2011: 92-107 - [c57]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
A CSP Account of Event-B Refinement. Refine@FM 2011: 139-154 - [c56]Galina Besova, Heike Wehrheim, Annika Wagner:
Reputation-based Reliability Prediction of Service Compositions. FESCA@ETAPS 2011: 3-16 - [c55]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
Bounded Retransmission in Event-B∥CSP: a Case Study. B@FM 2011: 69-80 - 2010
- [j13]John Derrick, Heike Wehrheim:
Model transformations across views. Sci. Comput. Program. 75(3): 192-210 (2010) - [c54]Wilhelm Schäfer, Heike Wehrheim:
Model-Driven Development with Mechatronic UML. Graph Transformations and Model-Driven Engineering 2010: 533-554 - [c53]Nils Timm, Heike Wehrheim:
On Symmetries and Spotlights - Verifying Parameterised Systems. ICFEM 2010: 534-548 - [c52]Mathias Hülsbusch, Barbara König, Arend Rensink, Maria Semenyak, Christian Soltenborn, Heike Wehrheim:
Showing Full Semantics Preservation in Model Transformation - A Comparison of Techniques. IFM 2010: 183-198 - [c51]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
A CSP Approach to Control in Event-B. IFM 2010: 260-274 - [c50]Klaus Dräger, Andrey Kupriyanov, Bernd Finkbeiner, Heike Wehrheim:
SLAB: A Certifying Model Checker for Infinite-State Concurrent Systems. TACAS 2010: 271-274 - [i2]Dominik Steenken, Heike Wehrheim, Daniel Wonisch:
Towards A Shape Analysis for Graph Transformation Systems. CoRR abs/1010.4423 (2010)
2000 – 2009
- 2009
- [c49]Thomas Ruhroth, Hendrik Voigt, Heike Wehrheim:
Measure, Diagnose, Refactor: A Formal Quality Cycle for Software Models. EUROMICRO-SEAA 2009: 360-367 - [c48]Jonas Schrieb, Heike Wehrheim, Daniel Wonisch:
Three-Valued Spotlight Abstractions. FM 2009: 106-122 - [c47]Thomas Ruhroth, Heike Wehrheim:
Refinement-Preserving Co-evolution. ICFEM 2009: 620-638 - [c46]Thomas Ruhroth, Heike Wehrheim:
Static Class Elements for Object-Z. REFINE@FMWeek 2009: 193-205 - [e2]Michael Leuschel, Heike Wehrheim:
Integrated Formal Methods, 7th International Conference, IFM 2009, Düsseldorf, Germany, February 16-19, 2009. Proceedings. Lecture Notes in Computer Science 5423, Springer 2009, ISBN 978-3-642-00254-0 [contents] - 2008
- [j12]Michael Möller, Ernst-Rüdiger Olderog, Holger Rasch, Heike Wehrheim:
Integrating a formal method into a software engineering process with UML and Java. Formal Aspects Comput. 20(2): 161-204 (2008) - [j11]Ingo Brückner, Klaus Dräger, Bernd Finkbeiner, Heike Wehrheim:
Slicing Abstractions. Fundam. Informaticae 89(4): 369-392 (2008) - [c45]Gregor Engels, Anneke Kleppe, Arend Rensink, Maria Semenyak, Christian Soltenborn, Heike Wehrheim:
From UML Activities to TAAL - Towards Behaviour-Preserving Model Transformations. ECMDA-FA 2008: 94-109 - [c44]John Derrick, Gerhard Schellhorn, Heike Wehrheim:
Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack. FMOODS 2008: 78-95 - [c43]Björn Metzler, Heike Wehrheim, Daniel Wonisch:
Decomposition for Compositional Verification. ICFEM 2008: 105-125 - [c42]Heike Wehrheim:
Bounded Model Checking for Partial Kripke Structures. ICTAC 2008: 380-394 - [c41]Heike Wehrheim, Daniel Wonisch:
Compositional CSP Traces Refinement Checking. AVoCS 2008: 135-151 - [c40]H.-Christian Estler, Heike Wehrheim:
Alloy as a Refactoring Checker? Refine@FM 2008: 331-357 - 2007
- [j10]John Derrick, Heike Wehrheim:
On using data abstractions for model checking refinements. Acta Informatica 44(1): 41-71 (2007) - [c39]Gregor Engels, Baris Güldali, Christian Soltenborn, Heike Wehrheim:
Assuring Consistency of Business Process Models and Web Services Using Visual Contracts. AGTIVE 2007: 17-31 - [c38]Gregor Engels, Christian Soltenborn, Heike Wehrheim:
Analysis of UML Activities Using Dynamic Meta Modeling. FMOODS 2007: 76-90 - [c37]Thomas Ruhroth, Heike Wehrheim:
Refactoring Object-Oriented Specifications with Data and Processes. FMOODS 2007: 236-251 - [c36]Ingo Brückner, Klaus Dräger, Bernd Finkbeiner, Heike Wehrheim:
Slicing Abstractions. FSEN 2007: 17-32 - [c35]Wilhelm Schäfer, Heike Wehrheim:
The Challenges of Building Advanced Mechatronic Systems. FOSE 2007: 72-84 - [c34]John Derrick, Gerhard Schellhorn, Heike Wehrheim:
Proving Linearizability Via Non-atomic Refinement. IFM 2007: 195-214 - [c33]Heike Wehrheim:
Refinement in the Presence of Unknowns. REFINE@IFM 2007: 255-264 - 2006
- [j9]Ingo Brückner, Björn Metzler, Heike Wehrheim:
Optimizing Slicing of Formal Specifications by Deductive Verification. Nord. J. Comput. 13(1-2): 22-45 (2006) - [c32]John Derrick, Heike Wehrheim:
Model Transformations Incorporating Multiple Views. AMAST 2006: 111-126 - [c31]Heike Wehrheim:
Incremental Slicing. ICFEM 2006: 514-528 - [c30]H.-Christian Estler, Thomas Ruhroth, Heike Wehrheim:
Modelchecking Correctness of Refactorings - Some Experiments. Refine@ICFEM 2006: 3-17 - [c29]Björn Metzler, Heike Wehrheim:
Extending a Component Specification Language with Time. FESCA@ETAPS 2006: 47-67 - [e1]Roberto Gorrieri, Heike Wehrheim:
Formal Methods for Open Object-Based Distributed Systems, 8th IFIP WG 6.1 International Conference, FMOODS 2006, Bologna, Italy, June 14-16, 2006, Proceedings. Lecture Notes in Computer Science 4037, Springer 2006, ISBN 3-540-34893-X [contents] - 2005
- [j8]Ernst-Rüdiger Olderog, Heike Wehrheim:
Specification and (property) inheritance in CSP-OZ. Sci. Comput. Program. 55(1-3): 227-257 (2005) - [j7]Heike Wehrheim:
Slicing techniques for verification re-use. Theor. Comput. Sci. 343(3): 509-528 (2005) - [c28]Holger Rasch, Heike Wehrheim:
Checking the Validity of Scenarios in UML Models. FMOODS 2005: 67-82 - [c27]Ingo Brückner, Heike Wehrheim:
Slicing an Integrated Formal Method for Verification. ICFEM 2005: 360-374 - [c26]John Derrick, Heike Wehrheim:
Non-atomic Refinement in Z and CSP. ZB 2005: 24-44 - [c25]Ingo Brückner, Heike Wehrheim:
Slicing Object-Z Specifications for Verification. ZB 2005: 414-433 - 2004
- [c24]Heike Wehrheim:
Refinement and Consistency in Component Models with Multiple Views. Architecting Systems with Trustworthy Components 2004: 84-102 - [c23]Michael Möller, Ernst-Rüdiger Olderog, Holger Rasch, Heike Wehrheim:
Linking CSP-OZ with UML and Java: A Case Study. IFM 2004: 267-286 - [i1]Heike Wehrheim:
Refinement and Consistency in Multiview Models. Language Engineering for Model-Driven Software Development 2004 - 2003
- [j6]Heike Wehrheim:
Behavioral Subtyping Relations for Active Objects. Formal Methods Syst. Des. 23(2): 143-170 (2003) - [c22]Heike Wehrheim:
Preserving Properties Under Change. FMCO 2003: 330-343 - [c21]Heike Wehrheim:
Inheritance of Temporal Logic Properties. FMOODS 2003: 79-93 - [c20]Holger Rasch, Heike Wehrheim:
Checking Consistency in UML Diagramms: Classes and State Machines. FMOODS 2003: 229-243 - [c19]John Derrick, Heike Wehrheim:
Using Coupled Simulations in Non-atomic Refinement. ZB 2003: 127-147 - 2002
- [j5]Heike Wehrheim:
Relating State-based and Behaviour-oriented Subtyping. Nord. J. Comput. 9(4): 405-435 (2002) - [c18]Ernst-Rüdiger Olderog, Heike Wehrheim:
Specification and Inheritance in CSP-OZ. FMCO 2002: 361-379 - [c17]Heike Wehrheim:
Checking Behavioural Subtypes via Refinement. FMOODS 2002: 79-93 - 2001
- [j4]Arend Rensink, Heike Wehrheim:
Process algebra with action dependencies. Acta Informatica 38(3): 155-234 (2001) - [c16]Clemens Fischer, Ernst-Rüdiger Olderog, Heike Wehrheim:
A CSP View on UML-RT Structure Diagrams. FASE 2001: 91-108 - [c15]Heike Wehrheim:
Patterns and Rules for Behavioural Subtyping. FORTE 2001: 335-352 - [c14]Detlef Bartetzko, Clemens Fischer, Michael Möller, Heike Wehrheim:
Jass - Java with Assertions. RV@CAV 2001: 103-117 - 2000
- [j3]Clemens Fischer, Heike Wehrheim:
Failure-Divergence Semantics as a Formal Basis for an Object-Oriented Integrated Formal Method. Bull. EATCS 71: 92-101 (2000) - [j2]Heike Wehrheim:
Data Abstraction Techniques in the Validation of CSP-OZ Specifications. Formal Aspects Comput. 12(3): 147-164 (2000) - [c13]Clemens Fischer, Heike Wehrheim:
Behavioural Subtyping Relations for Object-Oriented Formalisms. AMAST 2000: 469-483 - [c12]Heike Wehrheim:
Specification of an Automatic Manufacturing System: A Case Study in Using Integrated Formal Methods. FASE 2000: 334-348 - [c11]Heike Wehrheim:
Behavioural Subtyping and Property Preservation. FMOODS 2000: 213-231
1990 – 1999
- 1999
- [c10]Heike Wehrheim:
Data Abstraction for CSP-OZ. World Congress on Formal Methods 1999: 1028-1047 - [c9]Clemens Fischer, Heike Wehrheim:
Model-Checking CSP-OZ Specifications with FDR. IFM 1999: 315-334 - [c8]Heike Wehrheim:
Partial order reductions for failures refinement. EXPRESS 1999: 71-84 - 1998
- [c7]Thomas Gehrke, Michaela Huhn, Peter Niebert, Arend Rensink, Heike Wehrheim:
A Process Algebra Semantics for MSC Including Conditions. FBT 1998: 185-196 - [c6]Thomas Gehrke, Michaela Huhn, Arend Rensink, Heike Wehrheim:
An Algebraic Semantics for Message Sequence Chart Documents. FORTE 1998: 3-18 - [c5]Michaela Huhn, Peter Niebert, Heike Wehrheim:
Partial Order Reductions for Bisimulation Checking. FSTTCS 1998: 271-282 - 1997
- [c4]Arend Rensink, Heike Wehrheim:
Dependency-Based Action Refinement. MFCS 1997: 468-477 - 1996
- [b1]Heike Wehrheim:
Specifying reactive systems with action dependencies: modelling and hierarchical design. University of Hildesheim, Germany, 1996, pp. 1-189 - [j1]Ursula Goltz, Heike Wehrheim:
Modelling Causality via Action Dependencies in Branching Time Semantics. Inf. Process. Lett. 59(4): 179-184 (1996) - [c3]Ursula Goltz, Heike Wehrheim:
Causal Testing. MFCS 1996: 394-406 - 1994
- [c2]Arend Rensink, Heike Wehrheim:
Weak Sequential Composition in Process Algebras. CONCUR 1994: 226-241 - [c1]Heike Wehrheim:
Parametric Action Refinement. PROCOMET 1994: 247-266
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint