callback( { "result":{ "query":":facetid:toc:\"db/journals/sttt/sttt16.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"63.22" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"46", "@dc":"46", "@oc":"46", "@id":"43471631", "text":":facetid:toc:db/journals/sttt/sttt16.bht" } }, "hits":{ "@total":"46", "@computed":"46", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"3785293", "info":{"authors":{"author":[{"@pid":"16/7970","text":"Awny Alnusair"},{"@pid":"56/3690-2","text":"Tian Zhao 0002"},{"@pid":"57/299","text":"Gongjun Yan"}]},"title":"Rule-based detection of design patterns in program code.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"3","pages":"315-334","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/AlnusairZY14","doi":"10.1007/S10009-013-0292-Z","ee":"https://doi.org/10.1007/s10009-013-0292-z","url":"https://dblp.org/rec/journals/sttt/AlnusairZY14"}, "url":"URL#3785293" }, { "@score":"1", "@id":"3785294", "info":{"authors":{"author":[{"@pid":"119/1615","text":"Oliver Bauer"},{"@pid":"130/3637","text":"Maren Geske"},{"@pid":"54/1436","text":"Malte Isberner"}]},"title":"Analyzing program behavior through active automata learning.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"5","pages":"531-542","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/BauerGI14","doi":"10.1007/S10009-014-0333-2","ee":"https://doi.org/10.1007/s10009-014-0333-2","url":"https://dblp.org/rec/journals/sttt/BauerGI14"}, "url":"URL#3785294" }, { "@score":"1", "@id":"3785295", "info":{"authors":{"author":[{"@pid":"01/5624","text":"Saddek Bensalem"},{"@pid":"84/3029","text":"Klaus Havelund"},{"@pid":"89/6226","text":"Andrea Orlandini"}]},"title":"Verification and validation meet planning and scheduling.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"1","pages":"1-12","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/BensalemHO14","doi":"10.1007/S10009-013-0294-X","ee":"https://doi.org/10.1007/s10009-013-0294-x","url":"https://dblp.org/rec/journals/sttt/BensalemHO14"}, "url":"URL#3785295" }, { "@score":"1", "@id":"3785296", "info":{"authors":{"author":[{"@pid":"b/DirkBeyer1","text":"Dirk Beyer 0001"},{"@pid":"125/3008","text":"Andreas Stahlbauer"}]},"title":"BDD-based software verification - Applications to event-condition-action systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"5","pages":"507-518","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/BeyerS14","doi":"10.1007/S10009-014-0334-1","ee":"https://doi.org/10.1007/s10009-014-0334-1","url":"https://dblp.org/rec/journals/sttt/BeyerS14"}, "url":"URL#3785296" }, { "@score":"1", "@id":"3785297", "info":{"authors":{"author":[{"@pid":"b/AhmedBouajjani","text":"Ahmed Bouajjani"},{"@pid":"76/5819","text":"Michael Emmi"}]},"title":"Bounded phase analysis of message-passing programs.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"2","pages":"127-146","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/BouajjaniE14","doi":"10.1007/S10009-013-0276-Z","ee":"https://doi.org/10.1007/s10009-013-0276-z","url":"https://dblp.org/rec/journals/sttt/BouajjaniE14"}, "url":"URL#3785297" }, { "@score":"1", "@id":"3785298", "info":{"authors":{"author":[{"@pid":"04/7014","text":"Gabriella Carrozza"},{"@pid":"07/504","text":"Roberto Pietrantuono"},{"@pid":"20/665","text":"Stefano Russo 0001"}]},"title":"Dynamic test planning: a study in an industrial context.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"5","pages":"593-607","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/CarrozzaPR14","doi":"10.1007/S10009-014-0319-0","ee":"https://doi.org/10.1007/s10009-014-0319-0","url":"https://dblp.org/rec/journals/sttt/CarrozzaPR14"}, "url":"URL#3785298" }, { "@score":"1", "@id":"3785299", "info":{"authors":{"author":[{"@pid":"76/2872","text":"Hélène Collavizza"},{"@pid":"44/9588","text":"Nguyen Le Vinh"},{"@pid":"58/5484","text":"Olivier Ponsini"},{"@pid":"r/MichelRueher","text":"Michel Rueher"},{"@pid":"r/AntoineRollet","text":"Antoine Rollet"}]},"title":"Constraint-based BMC: a backjumping strategy.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"1","pages":"103-121","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/CollavizzaVPRR14","doi":"10.1007/S10009-012-0258-6","ee":"https://doi.org/10.1007/s10009-012-0258-6","url":"https://dblp.org/rec/journals/sttt/CollavizzaVPRR14"}, "url":"URL#3785299" }, { "@score":"1", "@id":"3785300", "info":{"authors":{"author":[{"@pid":"61/11109","text":"Arlen Cox"},{"@pid":"82/1542","text":"Sriram Sankaranarayanan 0001"},{"@pid":"68/6029","text":"Bor-Yuh Evan Chang"}]},"title":"A bit too precise? Verification of quantized digital filters.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"2","pages":"175-190","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/CoxSC14","doi":"10.1007/S10009-013-0279-9","ee":"https://doi.org/10.1007/s10009-013-0279-9","url":"https://dblp.org/rec/journals/sttt/CoxSC14"}, "url":"URL#3785300" }, { "@score":"1", "@id":"3785301", "info":{"authors":{"author":[{"@pid":"c/JasonCrampton","text":"Jason Crampton"},{"@pid":"h/MichaelHuth","text":"Michael Huth 0001"},{"@pid":"119/6765","text":"Jim Huan-Pu Kuo"}]},"title":"Authorized workflow schemas: deciding realizability through $$\\mathsf{LTL }(\\mathsf{F })$$ model checking.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"1","pages":"31-48","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/CramptonHK14","doi":"10.1007/S10009-012-0269-3","ee":"https://doi.org/10.1007/s10009-012-0269-3","url":"https://dblp.org/rec/journals/sttt/CramptonHK14"}, "url":"URL#3785301" }, { "@score":"1", "@id":"3785302", "info":{"authors":{"author":[{"@pid":"02/7950","text":"Gencer Erdogan"},{"@pid":"87/660","text":"Yan Li"},{"@pid":"87/3211","text":"Ragnhild Kobro Runde"},{"@pid":"20/3951","text":"Fredrik Seehusen"},{"@pid":"58/1759","text":"Ketil Stølen"}]},"title":"Approaches for the combined use of risk analysis and testing: a systematic literature review.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"5","pages":"627-642","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/ErdoganLRSS14","doi":"10.1007/S10009-014-0330-5","ee":"https://doi.org/10.1007/s10009-014-0330-5","url":"https://dblp.org/rec/journals/sttt/ErdoganLRSS14"}, "url":"URL#3785302" }, { "@score":"1", "@id":"3785303", "info":{"authors":{"author":[{"@pid":"117/5496","text":"Huixing Fang"},{"@pid":"58/3735","text":"Jianqi Shi"},{"@pid":"40/1796","text":"Huibiao Zhu"},{"@pid":"96/2596-5","text":"Jian Guo 0005"},{"@pid":"l/KimGuldstrandLarsen","text":"Kim Guldstrand Larsen"},{"@pid":"06/5602","text":"Alexandre David"}]},"title":"Formal verification and simulation for platform screen doors and collision avoidance in subway control systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"4","pages":"339-361","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/FangSZGLD14","doi":"10.1007/S10009-014-0318-1","ee":"https://doi.org/10.1007/s10009-014-0318-1","url":"https://dblp.org/rec/journals/sttt/FangSZGLD14"}, "url":"URL#3785303" }, { "@score":"1", "@id":"3785304", "info":{"authors":{"author":[{"@pid":"f/AlessandroFantechi","text":"Alessandro Fantechi"},{"@pid":"f/FrancescoFlammini","text":"Francesco Flammini"},{"@pid":"g/StefaniaGnesi","text":"Stefania Gnesi"}]},"title":"Formal methods for railway control systems.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"6","pages":"643-646","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/FantechiFG14","doi":"10.1007/S10009-014-0342-1","ee":"https://doi.org/10.1007/s10009-014-0342-1","url":"https://dblp.org/rec/journals/sttt/FantechiFG14"}, "url":"URL#3785304" }, { "@score":"1", "@id":"3785305", "info":{"authors":{"author":[{"@pid":"49/2990","text":"Michael Felderer"},{"@pid":"95/4255","text":"Rudolf Ramler"}]},"title":"A multiple case study on risk-based testing in industry.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"5","pages":"609-625","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/FeldererR14","doi":"10.1007/S10009-014-0328-Z","ee":"https://doi.org/10.1007/s10009-014-0328-z","url":"https://dblp.org/rec/journals/sttt/FeldererR14"}, "url":"URL#3785305" }, { "@score":"1", "@id":"3785306", "info":{"authors":{"author":[{"@pid":"49/2990","text":"Michael Felderer"},{"@pid":"s/InaSchieferdecker","text":"Ina Schieferdecker"}]},"title":"A taxonomy of risk-based testing.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"5","pages":"559-568","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/FeldererS14","doi":"10.1007/S10009-014-0332-3","ee":"https://doi.org/10.1007/s10009-014-0332-3","url":"https://dblp.org/rec/journals/sttt/FeldererS14"}, "url":"URL#3785306" }, { "@score":"1", "@id":"3785307", "info":{"authors":{"author":[{"@pid":"21/7271","text":"Alessio Ferrari 0001"},{"@pid":"119/1636","text":"Giorgio Oronzo Spagnolo"},{"@pid":"119/1601","text":"Giacomo Martelli"},{"@pid":"119/1617","text":"Simone Menabeni"}]},"title":"From commercial documents to system requirements: an approach for the engineering of novel CBTC solutions.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"6","pages":"647-667","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/FerrariSMM14","doi":"10.1007/S10009-013-0298-6","ee":"https://doi.org/10.1007/s10009-013-0298-6","url":"https://dblp.org/rec/journals/sttt/FerrariSMM14"}, "url":"URL#3785307" }, { "@score":"1", "@id":"3785308", "info":{"authors":{"author":[{"@pid":"f/JoaoFFerreira","text":"João F. Ferreira 0001"},{"@pid":"48/6278","text":"Cristian Gherghina"},{"@pid":"85/5460","text":"Guanhua He"},{"@pid":"q/ShengchaoQin","text":"Shengchao Qin"},{"@pid":"c/WeiNganChin","text":"Wei-Ngan Chin"}]},"title":"Automated verification of the FreeRTOS scheduler in Hip/Sleek.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"4","pages":"381-397","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/FerreiraGHQC14","doi":"10.1007/S10009-014-0307-4","ee":"https://doi.org/10.1007/s10009-014-0307-4","url":"https://dblp.org/rec/journals/sttt/FerreiraGHQC14"}, "url":"URL#3785308" }, { "@score":"1", "@id":"3785309", "info":{"authors":{"author":[{"@pid":"f/CormacFlanagan","text":"Cormac Flanagan"},{"@pid":"k/BarbaraKonig1","text":"Barbara König 0001"}]},"title":"Developments in automated verification techniques.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"2","pages":"123-125","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/FlanaganK14","doi":"10.1007/S10009-013-0297-7","ee":"https://doi.org/10.1007/s10009-013-0297-7","url":"https://dblp.org/rec/journals/sttt/FlanaganK14"}, "url":"URL#3785309" }, { "@score":"1", "@id":"3785310", "info":{"authors":{"author":[{"@pid":"99/7917","text":"Stefan J. Galler"},{"@pid":"a/BKAichernig","text":"Bernhard K. Aichernig"}]},"title":"Survey on test data generation tools - An evaluation of white- and gray-box testing tools for C#, C++, Eiffel, and Java.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"6","pages":"727-751","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/GallerA14","doi":"10.1007/S10009-013-0272-3","ee":"https://doi.org/10.1007/s10009-013-0272-3","url":"https://dblp.org/rec/journals/sttt/GallerA14"}, "url":"URL#3785310" }, { "@score":"1", "@id":"3785311", "info":{"authors":{"author":[{"@pid":"48/6278","text":"Cristian Gherghina"},{"@pid":"01/3840","text":"Cristina David"},{"@pid":"q/ShengchaoQin","text":"Shengchao Qin"},{"@pid":"c/WeiNganChin","text":"Wei-Ngan Chin"}]},"title":"Expressive program verification via structured specifications.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"4","pages":"363-380","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/GherghinaDQC14","doi":"10.1007/S10009-014-0306-5","ee":"https://doi.org/10.1007/s10009-014-0306-5","url":"https://dblp.org/rec/journals/sttt/GherghinaDQC14"}, "url":"URL#3785311" }, { "@score":"1", "@id":"3785312", "info":{"authors":{"author":[{"@pid":"93/2423","text":"Robert P. Goldman"},{"@pid":"99/3670","text":"Michael J. S. Pelican"},{"@pid":"m/DavidJMusliner","text":"David J. Musliner"}]},"title":"A loop acceleration technique to speed up verification of automatically generated plans.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"1","pages":"13-29","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/GoldmanPM14","doi":"10.1007/S10009-013-0284-Z","ee":"https://doi.org/10.1007/s10009-013-0284-z","url":"https://dblp.org/rec/journals/sttt/GoldmanPM14"}, "url":"URL#3785312" }, { "@score":"1", "@id":"3785313", "info":{"authors":{"author":[{"@pid":"g/JensGrabowski","text":"Jens Grabowski"},{"@pid":"s/InaSchieferdecker","text":"Ina Schieferdecker"},{"@pid":"04/7011","text":"Andreas Ulrich"}]},"title":"History, status, and recent trends of the testing and test control notation version 3 (TTCN-3) - With a brief introduction to selected articles from the TTCN-3 user conference 2011.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"3","pages":"215-225","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/GrabowskiSU14","doi":"10.1007/S10009-014-0302-9","ee":"https://doi.org/10.1007/s10009-014-0302-9","url":"https://dblp.org/rec/journals/sttt/GrabowskiSU14"}, "url":"URL#3785313" }, { "@score":"1", "@id":"3785314", "info":{"authors":{"author":{"@pid":"00/6938","text":"Juergen Grossmann"}},"title":"Testing hybrid systems with TTCN-3 embedded - An extension of the TTCN-3 language.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"3","pages":"247-267","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/Grossmann14","doi":"10.1007/S10009-013-0283-0","ee":"https://doi.org/10.1007/s10009-013-0283-0","url":"https://dblp.org/rec/journals/sttt/Grossmann14"}, "url":"URL#3785314" }, { "@score":"1", "@id":"3785315", "info":{"authors":{"author":[{"@pid":"42/5646","text":"Hai-Feng Guo"},{"@pid":"s/MSubramaniam","text":"Mahadevan Subramaniam"}]},"title":"Model-based test generation using extended symbolic grammars.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"4","pages":"437-455","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/GuoS14","doi":"10.1007/S10009-014-0316-3","ee":"https://doi.org/10.1007/s10009-014-0316-3","url":"https://dblp.org/rec/journals/sttt/GuoS14"}, "url":"URL#3785315" }, { "@score":"1", "@id":"3785316", "info":{"authors":{"author":{"@pid":"70/2068","text":"Anne E. Haxthausen"}},"title":"Automated generation of formal safety conditions from railway interlocking tables.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"6","pages":"713-726","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/Haxthausen14","doi":"10.1007/S10009-013-0295-9","ee":"https://doi.org/10.1007/s10009-013-0295-9","url":"https://dblp.org/rec/journals/sttt/Haxthausen14"}, "url":"URL#3785316" }, { "@score":"1", "@id":"3785317", "info":{"authors":{"author":[{"@pid":"12/8669","text":"Falk Howar"},{"@pid":"54/1436","text":"Malte Isberner"},{"@pid":"30/2677","text":"Maik Merten"},{"@pid":"s/BernhardSteffen","text":"Bernhard Steffen"},{"@pid":"b/DirkBeyer1","text":"Dirk Beyer 0001"},{"@pid":"03/4368","text":"Corina S. Pasareanu"}]},"title":"Rigorous examination of reactive systems - The RERS challenges 2012 and 2013.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"5","pages":"457-464","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/HowarIMSBP14","doi":"10.1007/S10009-014-0337-Y","ee":"https://doi.org/10.1007/s10009-014-0337-y","url":"https://dblp.org/rec/journals/sttt/HowarIMSBP14"}, "url":"URL#3785317" }, { "@score":"1", "@id":"3785318", "info":{"authors":{"author":[{"@pid":"31/10525","text":"Phillip James"},{"@pid":"m/FaronMoller","text":"Faron Moller"},{"@pid":"21/2630","text":"Nguyen Hoang Nga"},{"@pid":"86/743","text":"Markus Roggenbach"},{"@pid":"s/SASchneider","text":"Steve A. Schneider"},{"@pid":"37/5761","text":"Helen Treharne"}]},"title":"Techniques for modelling and verifying railway interlockings.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"6","pages":"685-711","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/JamesMNRST14","doi":"10.1007/S10009-014-0304-7","ee":"https://doi.org/10.1007/s10009-014-0304-7","url":"https://dblp.org/rec/journals/sttt/JamesMNRST14"}, "url":"URL#3785318" }, { "@score":"1", "@id":"3785319", "info":{"authors":{"author":[{"@pid":"24/5158","text":"Yosr Jarraya"},{"@pid":"d/MDebbabi","text":"Mourad Debbabi"}]},"title":"Quantitative and qualitative analysis of SysML activity diagrams.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"4","pages":"399-419","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/JarrayaD14","doi":"10.1007/S10009-014-0305-6","ee":"https://doi.org/10.1007/s10009-014-0305-6","url":"https://dblp.org/rec/journals/sttt/JarrayaD14"}, "url":"URL#3785319" }, { "@score":"1", "@id":"3785320", "info":{"authors":{"author":[{"@pid":"64/8070","text":"Zhihao Jiang"},{"@pid":"74/7446","text":"Miroslav Pajic"},{"@pid":"a/RAlur","text":"Rajeev Alur"},{"@pid":"93/1307","text":"Rahul Mangharam"}]},"title":"Closed-loop verification of medical devices with model abstraction and refinement.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"2","pages":"191-213","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/JiangPAM14","doi":"10.1007/S10009-013-0289-7","ee":"https://doi.org/10.1007/s10009-013-0289-7","url":"https://dblp.org/rec/journals/sttt/JiangPAM14"}, "url":"URL#3785320" }, { "@score":"1", "@id":"3785321", "info":{"authors":{"author":[{"@pid":"145/3630","text":"Philip Makedonski"},{"@pid":"g/JensGrabowski","text":"Jens Grabowski"},{"@pid":"145/3634","text":"Florian Philipp"}]},"title":"Quantifying the evolution of TTCN-3 as a language.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"3","pages":"227-246","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/MakedonskiGP14","doi":"10.1007/S10009-013-0282-1","ee":"https://doi.org/10.1007/s10009-013-0282-1","url":"https://dblp.org/rec/journals/sttt/MakedonskiGP14"}, "url":"URL#3785321" }, { "@score":"1", "@id":"3785322", "info":{"authors":{"author":[{"@pid":"m/TizianaMargaria","text":"Tiziana Margaria"},{"@pid":"52/958","text":"Zongyan Qiu"},{"@pid":"92/6174","text":"Hongli Yang"}]},"title":"Program verification and testing technologies.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"16","number":"4","pages":"335-337","year":"2014","type":"Journal Articles","access":"closed","key":"journals/sttt/MargariaQY14","doi":"10.1007/S10009-014-0327-0","ee":"https://doi.org/10.1007/s10009-014-0327-0","url":"https://dblp.org/rec/journals/sttt/MargariaQY14"}, "url":"URL#3785322" } ] } } } )