


default search action
International Journal on Software Tools for Technology Transfer, Volume 23
Volume 23, Number 1, February 2021
- Georgios Giantamidis, Stavros Tripakis, Stylianos Basagiannis

:
Learning Moore machines from input-output traces. 1-29 - Chris Alvin

, Brian Peterson, Supratik Mukhopadhyay:
Static generation of UML sequence diagrams. 31-53 - Yue Yuan, Yi Li, Wenchang Shi:

Detecting multiphase linear ranking functions for single-path linear-constraint loops. 55-67 - Florian Kammüller, Axel Legay, Stefano Schivo:

Masterminding change by combining secure system design with security risk assessment. 69-70 - Pietro Ferrara

, Amit Kr Mandal, Agostino Cortesi
, Fausto Spoto
:
Static analysis for discovering IoT vulnerabilities. 71-88 - René Rydhof Hansen

, Kim Guldstrand Larsen
, Axel Legay, Peter Gjøl Jensen
, Danny Bøgsted Poulsen
:
ADTLang: a programming language approach to attack defense trees. 89-104 - Vladimir V. Shakhov, Insoo Koo:

Graph-based technique for survivability assessment and optimization of IoT applications. 105-114
Volume 23, Number 2, April 2021
- Omar M. Alhawi, Herbert Rocha

, Mikhail R. Gadelha, Lucas C. Cordeiro
, Eddie Batista de Lima Filho:
Verification and refutation of C programs based on k-induction and invariant inference. 115-135 - Raphaël Khoury, Sylvain Hallé, Yannick Lebrun:

Automata-based monitoring for LTL-FO+. 137-154 - Martin Leucker

, Christian Colombo:
Preface. 155-156 - Felipe Gorostiaga

, César Sánchez
:
Stream runtime verification of real-time event streams with the Striver language. 157-183 - Joshua Schneider

, David A. Basin
, Frederik Brix, Srdan Krstic
, Dmitriy Traytel
:
Scalable online first-order monitoring. 185-208 - Giles Reger, David E. Rydeheard:

From parametric trace slicing to rule systems. 209-228 - Patricia Bouyer, Léo Henry

, Samy Jaziri, Thierry Jéron, Nicolas Markey:
Diagnosing timed automata using timed markings. 229-253 - Yliès Falcone, Srdan Krstic, Giles Reger, Dmitriy Traytel

:
A taxonomy for classifying runtime verification tools. 255-284
Volume 23, Number 3, June 2021
- Reiner Hähnle

, Wil M. P. van der Aalst
:
Automated model analysis tools and techniques presented at FASE 2019. 285-287 - Artur Boronat

:
Incremental execution of rule-based model transformation. 289-311 - Dirk Beyer

, Marie-Christine Jakobs
:
Cooperative verifier-based testing with CoVeriTest. 313-333 - Lars Fritsche

, Jens Kosiol, Andy Schürr, Gabriele Taentzer:
Avoiding unnecessary information loss: correct and efficient model synchronization based on triple graph grammars. 335-368 - Sven Schneider

, Leen Lambers
, Fernando Orejas
:
A logic-based incremental approach to graph repair featuring delta preservation. 369-410 - Sven Schneider

, Maria Maximova
, Lucas Sakizloglou
, Holger Giese
:
Formal testing of timed graph transformation systems using metric temporal graph logic. 411-488 - Paul Dubrulle

, Nikolai Kosmatov
, Christophe Gaston
, Arnault Lapitre
:
PolyGraph: a data flow model with frequency arithmetic. 489-517 - Paul Dubrulle

, Nikolai Kosmatov
, Christophe Gaston
, Arnault Lapitre
:
Correction to: PolyGraph: a data flow model with frequency arithmetic. 519
Volume 23, Number 4, August 2021
- Markus Frohme

, Bernhard Steffen:
Compositional learning of mutually recursive procedural systems. 521-543 - Bernd Finkbeiner, Leonardo Mariani:

Introduction to the special issue of the 19th International Conference on Runtime Verification. 545-546 - Klaus Havelund, Doron Peled:

An extension of first-order LTL with rules with application to runtime verification. 547-563 - Dejan Nickovic

, Xin Qin, Thomas Ferrère, Cristinel Mateis
, Jyotirmoy Deshmukh:
Specifying and detecting temporal patterns with shape expressions. 565-577 - Sean Kauffman, Klaus Havelund, Sebastian Fischmeister:

What can we monitor over unreliable channels? 579-600 - Luca Aceto, Ian Cassar, Adrian Francalanza, Anna Ingólfsdóttir:

Comparing controlled system synthesis and suppression enforcement. 601-614 - Luca Bortolussi, Francesca Cairoli, Nicola Paoletti

, Scott A. Smolka
, Scott D. Stoller:
Neural predictive monitoring and a comparison of frequentist and Bayesian approaches. 615-640 - Saeid Tizpaz-Niari, Pavol Cerný, Sriram Sankaranarayanan, Ashutosh Trivedi:

Quantitative estimation of side-channel leaks with neural networks. 641-654
Volume 23, Number 5, October 2021
- Dawid Kopetzki, Michael Lybecait, Stefan Naujokat

, Bernhard Steffen:
Towards language-to-language transformation. 655-677 - Simon Bliudze, Panagiotis Katsaros, Saddek Bensalem, Martin Wirsing:

On methods and tools for rigorous system design. 679-684 - Christos Grompanopoulos, Antonios Gouglidis, Anastasia Mavridou:

Specifying and verifying usage control models and policies in TLA+. 685-700 - Rim El Ballouli, Saddek Bensalem, Marius Bozga, Joseph Sifakis:

Programming dynamic reconfigurable systems. 701-719 - Pujie Han, Zhengjun Zhai, Brian Nielsen

, Ulrik Nyman:
Model-based optimization of ARINC-653 partition scheduling. 721-740 - Stefan Blom, Saeed Darabi, Marieke Huisman

, Mohsen Safari:
Correct program parallelisations. 741-763 - Alexios Lekidis

, Panagiotis Katsaros:
Energy characterization of IoT systems through design aspect monitoring. 765-781 - Ezio Bartocci

, Niveditha Manjunath, Leonardo Mariani, Cristinel Mateis
, Dejan Nickovic
:
CPSDebug: Automatic failure explanation in CPS models. 783-796 - Nathalie Bertrand, Igor Konnov, Marijana Lazic, Josef Widder:

Verification of randomized consensus algorithms under round-rigid adversaries. 797-821 - Nathalie Bertrand, Igor Konnov, Marijana Lazic, Josef Widder:

Correction to: Verification of randomized consensus algorithms under round-rigid adversaries. 823 - Parosh Aziz Abdulla, Frédéric Haziza, Lukás Holík, Bengt Jonsson, Ahmed Rezine:

Correction to: An integrated specification and verification technique for highly concurrent data structures. 825 - Jan-David Quesel, Stefan Mitsch, Sarah M. Loos, Nikos Aréchiga, André Platzer:

Correction to: How to model and prove hybrid systems with KeYmaera: a tutorial on safety. 827
Volume 23, Number 6, December 2021
- Dirk Beyer

, Marieke Huisman
:
TOOLympics I: Competition on software testing. 829-832 - Dirk Beyer

:
First international competition on software testing. 833-846 - Marie-Christine Jakobs

:
CoVeriTest: interleaving value and predicate analysis for test-case generation. 847-851 - Sebastian Ruland, Malte Lochau, Oliver Fehse, Andy Schürr:

CPA/Tiger-MGP: test-goal set partitioning for efficient multi-goal test-suite generation. 853-856 - Mikhail R. Gadelha, Rafael S. Menezes

, Lucas C. Cordeiro
:
ESBMC 6.1: automated test case generation using bounded model checking. 857-861 - Caroline Lemieux, Koushik Sen:

FairFuzz-TC: a fuzzer targeting rare branches. 863-866 - Cristian Cadar

, Martin Nowack
:
KLEE symbolic execution engine in 2019. 867-870 - Thomas Lemberger:

Plain random test generation with PRTest. 871-873 - Marek Chalupa

, Martina Vitovská, Tomás Jasek, Michael Simácek, Jan Strejcek:
Symbiotic 6: generating test cases by slicing and symbolic execution. 875-877 - Dirk Beyer

, Marieke Huisman
, Fabrice Kordon
, Bernhard Steffen
:
TOOLympics II: competitions on formal methods. 879-881 - Claire Dross, Carlo A. Furia, Marieke Huisman

, Rosemary Monahan
, Peter Müller:
VerifyThis 2019: a program verification competition. 883-893 - Mihaela Sighireanu:

SL-COMP: competition of solvers for separation logic. 895-903 - Aart Middeldorp, Julian Nagele

, Kiraku Shintani:
CoCo 2019: report on the eighth confluence competition. 905-916 - Falk Howar

, Marc Jasper, Malte Mues
, David Schmidt
, Bernhard Steffen:
The RERS challenge: towards controllable and scalable benchmark synthesis. 917-930 - Fabrice Kordon, Lom-Messan Hillah, Francis Hulin-Hubard, Loïg Jezequel, Emmanuel Paviot-Adet:

Study of the efficiency of model checking techniques using results of the MCC from 2015 To 2019. 931-952

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














