callback( { "result":{ "query":":facetid:toc:\"db/series/natosec/natosec36.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.52" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"12", "@dc":"12", "@oc":"12", "@id":"43478740", "text":":facetid:toc:db/series/natosec/natosec36.bht" } }, "hits":{ "@total":"12", "@computed":"12", "@sent":"12", "@first":"0", "hit":[{ "@score":"1", "@id":"3960485", "info":{"authors":{"author":[{"@pid":"118/1541","text":"Bart van Delft"},{"@pid":"55/1793","text":"Niklas Broberg"},{"@pid":"s/DavidSands","text":"David Sands 0001"}]},"title":"Programming in Paragon.","venue":"Software Systems Safety","pages":"279-308","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/DelftBS14","doi":"10.3233/978-1-61499-385-8-279","ee":"https://doi.org/10.3233/978-1-61499-385-8-279","url":"https://dblp.org/rec/series/natosec/DelftBS14"}, "url":"URL#3960485" }, { "@score":"1", "@id":"3960487", "info":{"authors":{"author":{"@pid":"20/1639","text":"Patrice Godefroid"}},"title":"May/Must Abstraction-Based Software Model Checking for Sound Verification and Falsification.","venue":"Software Systems Safety","pages":"1-16","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/Godefroid14","doi":"10.3233/978-1-61499-385-8-1","ee":"https://doi.org/10.3233/978-1-61499-385-8-1","url":"https://dblp.org/rec/series/natosec/Godefroid14"}, "url":"URL#3960487" }, { "@score":"1", "@id":"3960488", "info":{"authors":{"author":[{"@pid":"g/OrnaGrumberg","text":"Orna Grumberg"},{"@pid":"92/128","text":"Sharon Shoham"},{"@pid":"86/2578","text":"Yakir Vizel"}]},"title":"SAT-based Model Checking: Interpolation, IC3, and Beyond.","venue":"Software Systems Safety","pages":"17-41","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/GrumbergSV14","doi":"10.3233/978-1-61499-385-8-17","ee":"https://doi.org/10.3233/978-1-61499-385-8-17","url":"https://dblp.org/rec/series/natosec/GrumbergSV14"}, "url":"URL#3960488" }, { "@score":"1", "@id":"3960490", "info":{"authors":{"author":{"@pid":"g/SumitGulwani","text":"Sumit Gulwani"}},"title":"Program Synthesis.","venue":"Software Systems Safety","pages":"43-75","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/Gulwani14","doi":"10.3233/978-1-61499-385-8-43","ee":"https://doi.org/10.3233/978-1-61499-385-8-43","url":"https://dblp.org/rec/series/natosec/Gulwani14"}, "url":"URL#3960490" }, { "@score":"1", "@id":"3960499", "info":{"authors":{"author":[{"@pid":"74/2171","text":"Gerwin Klein"},{"@pid":"n/TobiasNipkow","text":"Tobias Nipkow"}]},"title":"Applications of Interactive Proof to Data Flow Analysis and Security.","venue":"Software Systems Safety","pages":"77-134","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/KleinN14","doi":"10.3233/978-1-61499-385-8-77","ee":"https://doi.org/10.3233/978-1-61499-385-8-77","url":"https://dblp.org/rec/series/natosec/KleinN14"}, "url":"URL#3960499" }, { "@score":"1", "@id":"3960501", "info":{"authors":{"author":{"@pid":"k/RKusters","text":"Ralf Küsters"}},"title":"E-Voting Systems.","venue":"Software Systems Safety","pages":"135-164","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/Kusters14","doi":"10.3233/978-1-61499-385-8-135","ee":"https://doi.org/10.3233/978-1-61499-385-8-135","url":"https://dblp.org/rec/series/natosec/Kusters14"}, "url":"URL#3960501" }, { "@score":"1", "@id":"3960503", "info":{"authors":{"author":[{"@pid":"k/MartaZKwiatkowska","text":"Marta Z. Kwiatkowska"},{"@pid":"34/4294","text":"Chris Thachuk"}]},"title":"Probabilistic Model Checking for Biology.","venue":"Software Systems Safety","pages":"165-189","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/KwiatkowskaT14","doi":"10.3233/978-1-61499-385-8-165","ee":"https://doi.org/10.3233/978-1-61499-385-8-165","url":"https://dblp.org/rec/series/natosec/KwiatkowskaT14"}, "url":"URL#3960503" }, { "@score":"1", "@id":"3960505", "info":{"authors":{"author":{"@pid":"71/1981","text":"Rupak Majumdar"}},"title":"Foundations of Infinite-State Verification.","venue":"Software Systems Safety","pages":"191-222","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/Majumdar14","doi":"10.3233/978-1-61499-385-8-191","ee":"https://doi.org/10.3233/978-1-61499-385-8-191","url":"https://dblp.org/rec/series/natosec/Majumdar14"}, "url":"URL#3960505" }, { "@score":"1", "@id":"3960522", "info":{"authors":{"author":[{"@pid":"s/HelmutSeidl","text":"Helmut Seidl"},{"@pid":"66/11140","text":"Kalmer Apinis"},{"@pid":"90/7226","text":"Vesal Vojdani"}]},"title":"Frameworks for Interprocedural Analysis of Concurrent Programs.","venue":"Software Systems Safety","pages":"309-347","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/SeidlAV14","doi":"10.3233/978-1-61499-385-8-309","ee":"https://doi.org/10.3233/978-1-61499-385-8-309","url":"https://dblp.org/rec/series/natosec/SeidlAV14"}, "url":"URL#3960522" }, { "@score":"1", "@id":"3960528", "info":{"authors":{"author":[{"@pid":"15/3636","text":"Georg Weissenbacher"},{"@pid":"27/8110","text":"Pramod Subramanyan"},{"@pid":"79/6934","text":"Sharad Malik"}]},"title":"Boolean Satisfiability: Solvers and Extensions.","venue":"Software Systems Safety","pages":"223-278","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/WeissenbacherSM14","doi":"10.3233/978-1-61499-385-8-223","ee":"https://doi.org/10.3233/978-1-61499-385-8-223","url":"https://dblp.org/rec/series/natosec/WeissenbacherSM14"}, "url":"URL#3960528" }, { "@score":"1", "@id":"3960529", "info":{"authors":{"author":{"@pid":"54/5133","text":"Eran Yahav"}},"title":"Practical Software Synthesis.","venue":"Software Systems Safety","pages":"349-377","year":"2014","type":"Parts in Books or Collections","access":"closed","key":"series/natosec/Yahav14","doi":"10.3233/978-1-61499-385-8-349","ee":"https://doi.org/10.3233/978-1-61499-385-8-349","url":"https://dblp.org/rec/series/natosec/Yahav14"}, "url":"URL#3960529" }, { "@score":"1", "@id":"3963898", "info":{"authors":{"author":[{"@pid":"g/OrnaGrumberg","text":"Orna Grumberg"},{"@pid":"s/HelmutSeidl","text":"Helmut Seidl"},{"@pid":"57/9778","text":"Maximilian Irlbeck"}]},"title":"Software Systems Safety","venue":["Software Systems Safety","NATO Science for Peace and Security Series, D - Information and Communication Security"],"volume":"36","publisher":"IOS Press","year":"2014","type":"Editorship","access":"unavailable","key":"series/natosec/36","url":"https://dblp.org/rec/series/natosec/36"}, "url":"URL#3963898" } ] } } } )