callback( { "result":{ "query":":facetid:toc:\"db/conf/vmcai/vmcai2013.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"73.74" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"32", "@dc":"32", "@oc":"32", "@id":"43430338", "text":":facetid:toc:db/conf/vmcai/vmcai2013.bht" } }, "hits":{ "@total":"32", "@computed":"32", "@sent":"32", "@first":"0", "hit":[{ "@score":"1", "@id":"4237070", "info":{"authors":{"author":[{"@pid":"a/PAAbdulla","text":"Parosh Aziz Abdulla"},{"@pid":"79/4476","text":"Frédéric Haziza"},{"@pid":"64/6177","text":"Lukás Holík"}]},"title":"All for the Price of Few.","venue":"VMCAI","pages":"476-495","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/AbdullaHH13","doi":"10.1007/978-3-642-35873-9_28","ee":"https://doi.org/10.1007/978-3-642-35873-9_28","url":"https://dblp.org/rec/conf/vmcai/AbdullaHH13"}, "url":"URL#4237070" }, { "@score":"1", "@id":"4237071", "info":{"authors":{"author":[{"@pid":"124/8991","text":"Fabrizio Biondi"},{"@pid":"52/579","text":"Axel Legay"},{"@pid":"00/1614","text":"Pasquale Malacaria"},{"@pid":"18/3339","text":"Andrzej Wasowski"}]},"title":"Quantifying Information Leakage of Randomized Protocols.","venue":"VMCAI","pages":"68-87","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/BiondiLMW13","doi":"10.1007/978-3-642-35873-9_7","ee":"https://doi.org/10.1007/978-3-642-35873-9_7","url":"https://dblp.org/rec/conf/vmcai/BiondiLMW13"}, "url":"URL#4237071" }, { "@score":"1", "@id":"4237072", "info":{"authors":{"author":[{"@pid":"25/2814","text":"Martin Brain"},{"@pid":"184/4036","text":"Vijay Victor D'Silva"},{"@pid":"27/7137","text":"Leopold Haller"},{"@pid":"19/3686","text":"Alberto Griggio"},{"@pid":"k/DanielKroening","text":"Daniel Kroening"}]},"title":"An Abstract Interpretation of DPLL(T).","venue":"VMCAI","pages":"455-475","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/BrainDHGK13","doi":"10.1007/978-3-642-35873-9_27","ee":"https://doi.org/10.1007/978-3-642-35873-9_27","url":"https://dblp.org/rec/conf/vmcai/BrainDHGK13"}, "url":"URL#4237072" }, { "@score":"1", "@id":"4237073", "info":{"authors":{"author":[{"@pid":"79/5752","text":"Sagar Chaki"},{"@pid":"44/3532","text":"Arie Gurfinkel"},{"@pid":"43/7541","text":"Soonho Kong"},{"@pid":"s/OferStrichman","text":"Ofer Strichman"}]},"title":"Compositional Sequentialization of Periodic Programs.","venue":"VMCAI","pages":"536-554","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/ChakiGKS13","doi":"10.1007/978-3-642-35873-9_31","ee":"https://doi.org/10.1007/978-3-642-35873-9_31","url":"https://dblp.org/rec/conf/vmcai/ChakiGKS13"}, "url":"URL#4237073" }, { "@score":"1", "@id":"4237074", "info":{"authors":{"author":[{"@pid":"41/11466","text":"Jürgen Christ"},{"@pid":"17/10794","text":"Evren Ermis"},{"@pid":"41/7506","text":"Martin Schäf"},{"@pid":"23/5398","text":"Thomas Wies"}]},"title":"Flow-Sensitive Fault Localization.","venue":"VMCAI","pages":"189-208","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/ChristESW13","doi":"10.1007/978-3-642-35873-9_13","ee":"https://doi.org/10.1007/978-3-642-35873-9_13","url":"https://dblp.org/rec/conf/vmcai/ChristESW13"}, "url":"URL#4237074" }, { "@score":"1", "@id":"4237075", "info":{"authors":{"author":[{"@pid":"c/PCousot","text":"Patrick Cousot"},{"@pid":"c/RCousot","text":"Radhia Cousot"},{"@pid":"f/ManuelFahndrich","text":"Manuel Fähndrich"},{"@pid":"92/3","text":"Francesco Logozzo"}]},"title":"Automatic Inference of Necessary Preconditions.","venue":"VMCAI","pages":"128-148","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/CousotCFL13","doi":"10.1007/978-3-642-35873-9_10","ee":"https://doi.org/10.1007/978-3-642-35873-9_10","url":"https://dblp.org/rec/conf/vmcai/CousotCFL13"}, "url":"URL#4237075" }, { "@score":"1", "@id":"4237076", "info":{"authors":{"author":[{"@pid":"124/8948","text":"Simon Cruanes"},{"@pid":"29/1298","text":"Grégoire Hamon"},{"@pid":"06/503","text":"Sam Owre"},{"@pid":"33/1623","text":"Natarajan Shankar"}]},"title":"Tool Integration with the Evidential Tool Bus.","venue":"VMCAI","pages":"275-294","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/CruanesHOS13","doi":"10.1007/978-3-642-35873-9_18","ee":"https://doi.org/10.1007/978-3-642-35873-9_18","url":"https://dblp.org/rec/conf/vmcai/CruanesHOS13"}, "url":"URL#4237076" }, { "@score":"1", "@id":"4237077", "info":{"authors":{"author":[{"@pid":"85/770","text":"Loris D'Antoni"},{"@pid":"42/6841","text":"Margus Veanes"}]},"title":"Static Analysis of String Encoders and Decoders.","venue":"VMCAI","pages":"209-228","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/DAntoniV13","doi":"10.1007/978-3-642-35873-9_14","ee":"https://doi.org/10.1007/978-3-642-35873-9_14","url":"https://dblp.org/rec/conf/vmcai/DAntoniV13"}, "url":"URL#4237077" }, { "@score":"1", "@id":"4237078", "info":{"authors":{"author":[{"@pid":"184/4036","text":"Vijay Victor D'Silva"},{"@pid":"k/DanielKroening","text":"Daniel Kroening"}]},"title":"Abstraction of Syntax.","venue":"VMCAI","pages":"396-413","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/DSilvaK13","doi":"10.1007/978-3-642-35873-9_24","ee":"https://doi.org/10.1007/978-3-642-35873-9_24","url":"https://dblp.org/rec/conf/vmcai/DSilvaK13"}, "url":"URL#4237078" }, { "@score":"1", "@id":"4237079", "info":{"authors":{"author":[{"@pid":"124/8982","text":"Christian Dehnert"},{"@pid":"k/JoostPieterKatoen","text":"Joost-Pieter Katoen"},{"@pid":"33/3095","text":"David Parker 0001"}]},"title":"SMT-Based Bisimulation Minimisation of Markov Models.","venue":"VMCAI","pages":"28-47","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/DehnertKP13","doi":"10.1007/978-3-642-35873-9_5","ee":"https://doi.org/10.1007/978-3-642-35873-9_5","url":"https://dblp.org/rec/conf/vmcai/DehnertKP13"}, "url":"URL#4237079" }, { "@score":"1", "@id":"4237080", "info":{"authors":{"author":[{"@pid":"124/8937","text":"Stefan Heule"},{"@pid":"l/KRMLeino","text":"K. Rustan M. Leino"},{"@pid":"m/PMuller1","text":"Peter Müller 0001"},{"@pid":"76/5160","text":"Alexander J. Summers"}]},"title":"Abstract Read Permissions: Fractional Permissions without the Fractions.","venue":"VMCAI","pages":"315-334","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/HeuleLMS13","doi":"10.1007/978-3-642-35873-9_20","ee":"https://doi.org/10.1007/978-3-642-35873-9_20","url":"https://dblp.org/rec/conf/vmcai/HeuleLMS13"}, "url":"URL#4237080" }, { "@score":"1", "@id":"4237081", "info":{"authors":{"author":[{"@pid":"73/6880","text":"Swen Jacobs"},{"@pid":"k/ViktorKuncak","text":"Viktor Kuncak"},{"@pid":"21/7729","text":"Philippe Suter"}]},"title":"Reductions for Synthesis Procedures.","venue":"VMCAI","pages":"88-107","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/JacobsKS13","doi":"10.1007/978-3-642-35873-9_8","ee":"https://doi.org/10.1007/978-3-642-35873-9_8","url":"https://dblp.org/rec/conf/vmcai/JacobsKS13"}, "url":"URL#4237081" }, { "@score":"1", "@id":"4237082", "info":{"authors":{"author":[{"@pid":"20/5443","text":"Mathias John"},{"@pid":"n/MNebut","text":"Mirabelle Nebut"},{"@pid":"n/JNiehren","text":"Joachim Niehren"}]},"title":"Knockout Prediction for Reaction Networks with Partial Kinetic Information.","venue":"VMCAI","pages":"355-374","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/JohnNN13","doi":"10.1007/978-3-642-35873-9_22","ee":"https://doi.org/10.1007/978-3-642-35873-9_22","url":"https://dblp.org/rec/conf/vmcai/JohnNN13"}, "url":"URL#4237082" }, { "@score":"1", "@id":"4237083", "info":{"authors":{"author":[{"@pid":"124/8925","text":"Ayrat Khalimov 0001"},{"@pid":"73/6880","text":"Swen Jacobs"},{"@pid":"80/1300","text":"Roderick Bloem"}]},"title":"Towards Efficient Parameterized Synthesis.","venue":"VMCAI","pages":"108-127","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/KhalimovJB13","doi":"10.1007/978-3-642-35873-9_9","ee":"https://doi.org/10.1007/978-3-642-35873-9_9","url":"https://dblp.org/rec/conf/vmcai/KhalimovJB13"}, "url":"URL#4237083" }, { "@score":"1", "@id":"4237084", "info":{"authors":{"author":[{"@pid":"124/8995","text":"Daniel Larraz"},{"@pid":"73/2589","text":"Enric Rodríguez-Carbonell"},{"@pid":"29/6684","text":"Albert Rubio"}]},"title":"SMT-Based Array Invariant Generation.","venue":"VMCAI","pages":"169-188","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/LarrazRR13","doi":"10.1007/978-3-642-35873-9_12","ee":"https://doi.org/10.1007/978-3-642-35873-9_12","url":"https://dblp.org/rec/conf/vmcai/LarrazRR13"}, "url":"URL#4237084" }, { "@score":"1", "@id":"4237085", "info":{"authors":{"author":[{"@pid":"59/7952","text":"Florian Leitner-Fischer"},{"@pid":"20/6822","text":"Stefan Leue"}]},"title":"Causality Checking for Complex System Models.","venue":"VMCAI","pages":"248-267","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/Leitner-FischerL13","doi":"10.1007/978-3-642-35873-9_16","ee":"https://doi.org/10.1007/978-3-642-35873-9_16","url":"https://dblp.org/rec/conf/vmcai/Leitner-FischerL13"}, "url":"URL#4237085" }, { "@score":"1", "@id":"4237086", "info":{"authors":{"author":[{"@pid":"d/LeonardoMdeMoura","text":"Leonardo Mendonça de Moura"},{"@pid":"56/2451","text":"Dejan Jovanovic"}]},"title":"A Model-Constructing Satisfiability Calculus.","venue":"VMCAI","pages":"1-12","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/MouraJ13","doi":"10.1007/978-3-642-35873-9_1","ee":"https://doi.org/10.1007/978-3-642-35873-9_1","url":"https://dblp.org/rec/conf/vmcai/MouraJ13"}, "url":"URL#4237086" }, { "@score":"1", "@id":"4237087", "info":{"authors":{"author":[{"@pid":"96/6348","text":"Kedar S. Namjoshi"},{"@pid":"10/2922","text":"Richard J. Trefler"}]},"title":"Uncovering Symmetries in Irregular Process Networks.","venue":"VMCAI","pages":"496-514","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/NamjoshiT13","doi":"10.1007/978-3-642-35873-9_29","ee":"https://doi.org/10.1007/978-3-642-35873-9_29","url":"https://dblp.org/rec/conf/vmcai/NamjoshiT13"}, "url":"URL#4237087" }, { "@score":"1", "@id":"4237088", "info":{"authors":{"author":{"@pid":"p/DavidJPearce","text":"David J. Pearce 0001"}},"title":"Sound and Complete Flow Typing with Unions, Intersections and Negations.","venue":"VMCAI","pages":"335-354","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/Pearce13","doi":"10.1007/978-3-642-35873-9_21","ee":"https://doi.org/10.1007/978-3-642-35873-9_21","url":"https://dblp.org/rec/conf/vmcai/Pearce13"}, "url":"URL#4237088" }, { "@score":"1", "@id":"4237089", "info":{"authors":{"author":[{"@pid":"51/7479","text":"Marie Pelleau"},{"@pid":"68/1479","text":"Antoine Miné"},{"@pid":"76/1220","text":"Charlotte Truchet"},{"@pid":"b/FredericBenhamou","text":"Frédéric Benhamou"}]},"title":"A Constraint Solver Based on Abstract Domains.","venue":"VMCAI","pages":"434-454","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/PelleauMTB13","doi":"10.1007/978-3-642-35873-9_26","ee":"https://doi.org/10.1007/978-3-642-35873-9_26","url":"https://dblp.org/rec/conf/vmcai/PelleauMTB13"}, "url":"URL#4237089" }, { "@score":"1", "@id":"4237090", "info":{"authors":{"author":{"@pid":"p/APodelski","text":"Andreas Podelski"}},"title":"Automata as Proofs.","venue":"VMCAI","pages":"13-14","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/Podelski13","doi":"10.1007/978-3-642-35873-9_2","ee":"https://doi.org/10.1007/978-3-642-35873-9_2","url":"https://dblp.org/rec/conf/vmcai/Podelski13"}, "url":"URL#4237090" }, { "@score":"1", "@id":"4237091", "info":{"authors":{"author":[{"@pid":"74/6354","text":"Pavithra Prabhakar"},{"@pid":"94/8863","text":"Parasara Sridhar Duggirala"},{"@pid":"07/3797","text":"Sayan Mitra"},{"@pid":"23/2759-1","text":"Mahesh Viswanathan 0001"}]},"title":"Hybrid Automata-Based CEGAR for Rectangular Hybrid Systems.","venue":"VMCAI","pages":"48-67","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/PrabhakarDMV13","doi":"10.1007/978-3-642-35873-9_6","ee":"https://doi.org/10.1007/978-3-642-35873-9_6","url":"https://dblp.org/rec/conf/vmcai/PrabhakarDMV13"}, "url":"URL#4237091" }, { "@score":"1", "@id":"4237092", "info":{"authors":{"author":{"@pid":"r/FRanzato","text":"Francesco Ranzato"}},"title":"Complete Abstractions Everywhere.","venue":"VMCAI","pages":"15-26","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/Ranzato13","doi":"10.1007/978-3-642-35873-9_3","ee":"https://doi.org/10.1007/978-3-642-35873-9_3","url":"https://dblp.org/rec/conf/vmcai/Ranzato13"}, "url":"URL#4237092" }, { "@score":"1", "@id":"4237093", "info":{"authors":{"author":[{"@pid":"78/7445","text":"Roopsha Samanta"},{"@pid":"42/160","text":"Jyotirmoy V. Deshmukh"},{"@pid":"37/6100","text":"Swarat Chaudhuri"}]},"title":"Robustness Analysis of Networked Systems.","venue":"VMCAI","pages":"229-247","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/SamantaDC13","doi":"10.1007/978-3-642-35873-9_15","ee":"https://doi.org/10.1007/978-3-642-35873-9_15","url":"https://dblp.org/rec/conf/vmcai/SamantaDC13"}, "url":"URL#4237093" }, { "@score":"1", "@id":"4237094", "info":{"authors":{"author":[{"@pid":"23/8898","text":"Peter Schrammel"},{"@pid":"124/8970","text":"Pavle Subotic"}]},"title":"Logico-Numerical Max-Strategy Iteration.","venue":"VMCAI","pages":"414-433","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/SchrammelS13","doi":"10.1007/978-3-642-35873-9_25","ee":"https://doi.org/10.1007/978-3-642-35873-9_25","url":"https://dblp.org/rec/conf/vmcai/SchrammelS13"}, "url":"URL#4237094" }, { "@score":"1", "@id":"4237095", "info":{"authors":{"author":[{"@pid":"68/8262","text":"Yassamine Seladji"},{"@pid":"56/6515","text":"Olivier Bouissou"}]},"title":"Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools.","venue":"VMCAI","pages":"149-168","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/SeladjiB13","doi":"10.1007/978-3-642-35873-9_11","ee":"https://doi.org/10.1007/978-3-642-35873-9_11","url":"https://dblp.org/rec/conf/vmcai/SeladjiB13"}, "url":"URL#4237095" }, { "@score":"1", "@id":"4237096", "info":{"authors":{"author":[{"@pid":"11/9867","text":"Jiri Slaby"},{"@pid":"37/1716","text":"Jan Strejcek"},{"@pid":"24/9889","text":"Marek Trtík"}]},"title":"ClabureDB: Classified Bug-Reports Database.","venue":"VMCAI","pages":"268-274","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/SlabyST13","doi":"10.1007/978-3-642-35873-9_17","ee":"https://doi.org/10.1007/978-3-642-35873-9_17","url":"https://dblp.org/rec/conf/vmcai/SlabyST13"}, "url":"URL#4237096" }, { "@score":"1", "@id":"4237097", "info":{"authors":{"author":[{"@pid":"124/9001","text":"Antoine Toubhans"},{"@pid":"68/6029","text":"Bor-Yuh Evan Chang"},{"@pid":"r/XavierRival","text":"Xavier Rival"}]},"title":"Reduced Product Combination of Abstract Domains for Shapes.","venue":"VMCAI","pages":"375-395","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/ToubhansCR13","doi":"10.1007/978-3-642-35873-9_23","ee":"https://doi.org/10.1007/978-3-642-35873-9_23","url":"https://dblp.org/rec/conf/vmcai/ToubhansCR13"}, "url":"URL#4237097" }, { "@score":"1", "@id":"4237098", "info":{"authors":{"author":{"@pid":"54/5133","text":"Eran Yahav"}},"title":"Abstraction-Guided Synthesis.","venue":"VMCAI","pages":"27","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/Yahav13","doi":"10.1007/978-3-642-35873-9_4","ee":"https://doi.org/10.1007/978-3-642-35873-9_4","url":"https://dblp.org/rec/conf/vmcai/Yahav13"}, "url":"URL#4237098" }, { "@score":"1", "@id":"4237099", "info":{"authors":{"author":[{"@pid":"92/10310","text":"Manchun Zheng"},{"@pid":"22/111","text":"David Sanán"},{"@pid":"s/JunSun1","text":"Jun Sun 0001"},{"@pid":"51/3710-3","text":"Yang Liu 0003"},{"@pid":"33/6517","text":"Jin Song Dong"},{"@pid":"15/4208-1","text":"Yu Gu 0001"}]},"title":"State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction.","venue":"VMCAI","pages":"515-535","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/ZhengS0LD013","doi":"10.1007/978-3-642-35873-9_30","ee":"https://doi.org/10.1007/978-3-642-35873-9_30","url":"https://dblp.org/rec/conf/vmcai/ZhengS0LD013"}, "url":"URL#4237099" }, { "@score":"1", "@id":"4237100", "info":{"authors":{"author":[{"@pid":"59/2802-1","text":"He Zhu 0001"},{"@pid":"j/SJagannathan","text":"Suresh Jagannathan"}]},"title":"Compositional and Lightweight Dependent Type Inference for ML.","venue":"VMCAI","pages":"295-314","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vmcai/ZhuJ13","doi":"10.1007/978-3-642-35873-9_19","ee":"https://doi.org/10.1007/978-3-642-35873-9_19","url":"https://dblp.org/rec/conf/vmcai/ZhuJ13"}, "url":"URL#4237100" }, { "@score":"1", "@id":"4250539", "info":{"authors":{"author":[{"@pid":"g/RobertoGiacobazzi","text":"Roberto Giacobazzi"},{"@pid":"61/1623","text":"Josh Berdine"},{"@pid":"25/5944","text":"Isabella Mastroeni"}]},"title":"Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013, Rome, Italy, January 20-22, 2013. Proceedings","venue":["VMCAI","Lecture Notes in Computer Science"],"volume":"7737","publisher":"Springer","year":"2013","type":"Editorship","key":"conf/vmcai/2013","doi":"10.1007/978-3-642-35873-9","ee":"https://doi.org/10.1007/978-3-642-35873-9","url":"https://dblp.org/rec/conf/vmcai/2013"}, "url":"URL#4250539" } ] } } } )