Items where Research Area is "A. > School of Science and Technology > Computer Science > Foundations of Computing group"

See full list of headings
Export as [feed] RSS 1.0 [feed] RSS 2.0
Jump to: 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2002
Number of items at this level: 204.

2018

Allo, Patrick and Primiero, Giuseppe (2018) Annotated natural deduction for adaptive reasoning. In: Graham Priest on Dialetheism and Paraconsistency. Baskent, Can and Ferguson, Thomas, eds. Outstanding Contributions in Logic . Springer. (Accepted/In press)

Angius, Nicola and Primiero, Giuseppe (2018) The logic of identity and copy for computational artefacts. Journal of Logic and Computation . ISSN 0955-792X (Published online first)

Ardeshir-Larijani, Ebrahim, Gay, Simon J. and Nagarajan, Rajagopal (2018) Automated equivalence checking of concurrent quantum systems. ACM Transactions on Computational Logic (TOCL), 19 (4). pp. 28-32. ISSN 1529-3785

Bauereiß, Thomas, Pesenti Gritti, Armando, Popescu, Andrei and Raimondi, Franco (2018) CoSMed: a confidentiality-verified social media platform. Journal of Automated Reasoning, 61 (1-4). pp. 113-119. ISSN 0168-7433

Blackshear, Sam, Gorogiannis, Nikos, O'Hearn, Peter and Sergey, Ilya (2018) RacerD: compositional static race detection. Proceedings of the ACM on Programming Languages, 2 (OOPSLA). ISSN 2475-1421

Bonnet, Edouard and Giannopoulos, Panos (2018) Orthogonal terrain guarding is NP-complete. In: 34th International Symposium on Computational Geometry (SoCG 2018), 11-14 Jun 2018, Budapest, Hungary.

Bonnet, Edouard, Giannopoulos, Panos, Kim, Eun Jung, Rzążewski, Paweł and Sikora, Florian (2018) QPTAS and subexponential algorithm for maximum clique on disk graphs. In: 34th International Symposium on Computational Geometry, 11-14 Jun 2018, Budapest, Hungary. (Accepted/In press)

Bonnet, Edouard, Giannopoulos, Panos and Lampis, Michael (2018) On the parameterized complexity of red-blue points separation. In: 12th International Symposium on Parameterized and Exact Computation (IPEC 2017), 06-08 Sep 2017, Vienna, Austria.

Martorana, Agostino, Primiero, Giuseppe and Tagliabue, Jacopo (2018) Simulation of a trust and reputation based mitigation protocol for a black hole style attack on VANETs. In: 2018 IEEE European Symposium on Security and Privacy Workshops - S4CIP’18: 3rd Workshop on Safety & Security aSSurance for Critical Infrastructures Protection, 27 Apr 2018, London, United Kingdom.

Pandey, Hari Mohan, Chaudhary, Ankit and Mehrotra, Deepti (2018) Bit mask-oriented genetic algorithm for grammatical inference and premature convergence. International Journal of Bio-Inspired Computation, 12 (1). pp. 54-69. ISSN 1758-0366

Windridge, David, Mengoni, Riccardo and Nagarajan, Rajagopal (2018) Quantum error-correcting output codes. International Journal of Quantum Information, 16 (8). p. 1840003. ISSN 1793-6918

2017

Alt, Helmut, Cabello, Sergio, Giannopoulos, Panos and Knauer, Christian (2017) Minimum cell connection in line segment arrangements. International Journal of Computational Geometry and Applications, 27 (3). pp. 159-176. ISSN 1793-6357

Bauereiß, Thomas, Pesenti Gritti, Armando, Popescu, Andrei and Raimondi, Franco (2017) CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. In: 38th IEEE Symposium on Security and Privacy, 22-26 May 2017, San Jose, CA, USA.

Blanchette, Jasmin, Böhme, Sascha, Popescu, Andrei and Smallbone, Nicholas (2017) Encoding monomorphic and polymorphic types. Logical Methods in Computer Science, 12 (4). ISSN 1860-5974

Blanchette, Jasmin Christian, Bouzy, Aymeric, Lochbihler, Andreas, Popescu, Andrei and Traytel, Dmitriy (2017) Friends with benefits: implementing corecursion in foundational proof assistants. In: 26th European Symposium on Programming, ESOP 2017, 22-29 Apr 2017, Uppsala, Sweden.

Blanchette, Jasmin Christian, Meier, Fabian, Popescu, Andrei and Traytel, Dmitriy (2017) Foundational nonuniform (co)datatypes for higher-order logic. In: 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 20-23 Jun 2017, Reykjavik, Iceland.

Blanchette, Jasmin Christian, Popescu, Andrei and Traytel, Dmitriy (2017) Soundness and completeness proofs by coinductive methods. Journal of Automated Reasoning, 58 (1). pp. 149-179. ISSN 0168-7433

Brotherston, James, Gorogiannis, Nikos and Kanovich, Max (2017) Biabduction (and related problems) in array separation logic. In: International Conference on Automated Deduction, 8-11 August 2017, Gothenburg.

Chen, Taolue, Song, Fu and Wu, Zhilin (2017) Formal reasoning on infinite data values: an ongoing quest. In: SETSS 2016: Second International School Engineering Trustworthy Software Systems, Tutorial Lectures, 28 Mar - 02 Apr 2016, Chongqing, China.

Gheri, Lorenzo and Popescu, Andrei (2017) A formalized general theory of syntax with bindings. In: 8th International Conference Interactive Theorem Proving (ITP), 26-29 Sept 2017, Brasília, Brazil.

Gorogiannis, Nikos, Raimondi, Franco and Boureanu, Ioana (2017) A novel symbolic approach to verifying epistemic properties of programs. In: Twenty-Sixth International Joint Conference on Artificial Intelligence, 19-25 August 2017, Melbourne, Australia.

Martin, Barnaby, Raimondi, Franco, Chen, Taolue and Martin, Jos (2017) The packing chromatic number of the infinite square lattice is between 13 and 15. Discrete Applied Mathematics, 225 . pp. 136-142. ISSN 0166-218X

Primiero, Giuseppe (2017) Algorithmic iteration for computational intelligence. Minds and Machines, 27 (3). pp. 521-543. ISSN 0924-6495

Primiero, Giuseppe and Boender, Jaap (2017) Managing software uninstall with negative trust. In: 11th IFIP WG 11.11 International Conference, IFIPTM 2017, 12-16 Jun 2017, Gothenburg, Sweden.

Primiero, Giuseppe, Raimondi, Franco, Bottone, Michele and Tagliabue, Jacopo (2017) Trust and distrust in contradictory information transmission. Applied Network Science, 2 (1). ISSN 2364-8228

Primiero, Giuseppe, Raimondi, Franco, Chen, Taolue and Nagarajan, Rajagopal (2017) A proof-theoretic trust and reputation model for VANET. In: S4CIP’17: 2nd Workshop on Safety & Security aSSurance for Critical Infrastructures Protection, 29 Apr 2017, Paris, France.

Su, Guoxin, Chen, Taolue, Feng, Yuan and Rosenblum, David S. (2017) ProEva: runtime proactive performance evaluation based on continuous-time markov chains. In: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 20-28 May 2017, Buenos Aires, Argentina.

Tirunagari, Santosh, Poh, Norman, Wells, Kevin, Bober, Miroslaw, Gorden, Isky and Windridge, David (2017) Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition. Machine Vision and Applications, 28 (3-4). pp. 393-407. ISSN 0932-8092

Windridge, David and Nagarajan, Rajagopal (2017) Quantum Bootstrap Aggregation. In: Quantum Interaction, 20-22 Jul 2016, San Francisco, CA, USA.

Zhou, Yu, Gu, Ruihang, Chen, Taolue, Huang, Zhiqiu, Panichella, Sebastiano and Gall, Harald C. (2017) Analyzing APIs documentation and code to detect directive defects. In: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 20-28 May 2017, Buenos Aires, Argentina.

2016

Bauereiß, Thomas, Pesenti Gritti, Armando, Popescu, Andrei and Raimondi, Franco (2016) CoSMed: a confidentiality-verified social media platform. In: ITP 2016: 7th International Conference on Interactive Theorem Proving, 22-25 Aug 2016, Nancy, France.

Bottone, Michele, Primiero, Giuseppe, Raimondi, Franco and De Florio, Vincenzo (2016) A model for trustworthy orchestration in the internet of things. In: 2016 12th International Conference on Intelligent Environments (IE), 14-16 Sept 2016, London, United Kingdom.

Brotherston, James, Gorogiannis, Nikos, Kanovich, Max and Rowe, Reuben (2016) Model checking for symbolic-heap separation logic with inductive predicates. In: POPL 2016: 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 20-22 Jan 2016, St. Petersburg, FL, USA.

Cabello, Sergio and Giannopoulos, Panos (2016) The complexity of separating points in the plane. Algorithmica, 74 (2). pp. 643-663. ISSN 0178-4617

Chen, Taolue, Primiero, Giuseppe, Raimondi, Franco and Rungta, Neha (2016) A computationally grounded, weighted doxastic logic. Studia Logica, 104 (4). pp. 679-703. ISSN 0039-3215

Chen, Taolue, Song, Fu and Wu, Zhilin (2016) Verifying pushdown multi-agent systems against strategy logics. In: IJCAI 2016: 25th International Joint Conferences on Artificial Intelligence (IJCAI), 09-15 Jul 2016, New York, New York, USA.

Gu, Xincai, Chen, Taolue and Wu, Zhilin (2016) A complete decision procedure for linearly compositional separation logic with data constraints. In: IJCAR 2016: 8th International Joint Conference on Automated Reasoning, 27 Jun - 02 Jul 2016, University of Coimbra, Portugal.

Kammueller, Florian (2016) Isabelle Modelchecking for insider threats. In: 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016, 26-27 Sept 2016, Heraklion, Crete, Greece.

Kammueller, Florian (2016) Refactoring preserves security. In: 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016, 26-27 Sept 2016, Heraklion, Crete, Greece.

Kammueller, Florian, Kerber, Manfred and Probst, Christian (2016) Towards formal analysis of insider threats for auctions. In: ACM-CCS Workshop on Management of Security of Insider Threats, 28 Oct 2016, Vienna, Austria.

Kunčar, Ondřej and Popescu, Andrei (2016) From types to sets by local type definitions in higher-order logic. In: ITP 2016: 7th International Conference on Interactive Theorem Proving, 22-25 Aug 2016, Nancy, France.

Primiero, Giuseppe (2016) A calculus for distrust and mistrust. In: Tenth IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016, 18-22 Jul 2016, Darmstadt, Germany.

Primiero, Giuseppe, Bottone, Michele, Raimondi, Franco and Tagliabue, Jacopo (2016) Contradictory information flow in networks with trust and distrust. In: 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), 01-06 Dec 2016, Milan.

Primiero, Giuseppe (2016) Information in the philosophy of computer science. In: The Routledge Handbook of Philosophy of Information. Floridi, Luciano, ed. Routledge, pp. 90-106. ISBN 9781138796935

Primiero, Giuseppe and Laszlo, Kosolosky (2016) The semantics of untrustworthiness. Topoi, 35 (1). ISSN 0167-7411

Su, Guoxin, Chen, Taolue, Feng, Yuan, Rosenblum, David S. and Thiagarajan, P. S. (2016) An iterative decision-making scheme for Markov decision processes and its application to self-adaptive systems. In: 19th International Conference Fundamental Approaches to Software Engineering (FASE 2016), 02-08 Apr 2016, Eindhoven, The Netherlands.

Su, Guoxin, Feng, Yuan, Chen, Taolue and Rosenblum, David S. (2016) Asymptotic perturbation bounds for probabilistic model checking with empirically determined probability parameters. IEEE Transactions on Software Engineering, 42 (7). pp. 623-639. ISSN 0098-5589 (Published online first)

2015

Barn, Balbir ORCID: https://orcid.org/0000-0002-7251-5033, Barn, Ravinder and Raimondi, Franco (2015) On the role of value sensitive concerns in software engineering practice. In: 37th International Conference on Software Engineering, ICSE 2015, 16-24 May 2015, Florence, Italy.

Barn, Balbir ORCID: https://orcid.org/0000-0002-7251-5033, Primiero, Giuseppe and Barn, Ravinder (2015) An approach to early evaluation of informational privacy requirements. In: 30th ACM Symposium on Applied Computing 2015, 13-17 Apr 2015, Salamanca, Spain.

Blanchette, Jasmin, Popescu, Andrei and Traytel, Dmitriy (2015) Foundational extensible corecursion: a proof assistant perspective. In: 20th ACM SIGPLAN International Conference on Functional Programming (ICFP), 31 Aug - 02 Sept 2015, Vancouver, Canada.

Blanchette, Jasmin Christian, Popescu, Andrei and Traytel, Dmitriy (2015) Witnessing (co)datatypes. In: 24th European Symposium on Programming (ESOP 2015), 11-18 Apr 2015, London, UK.

Bodirsky, Manuel, Martin, Barnaby and Mottet, Antoine (2015) Constraint satisfaction problems over the integers with successor. In: 42nd International Colloquium Automata, Languages, and Programming (ICALP 2015), 1-10 Jul 2015, Kyoto, Japan.

Boender, Jaap, Kammueller, Florian and Nagarajan, Rajagopal (2015) Formalization of quantum protocols using Coq. In: The 12th International Workshop on Quantum Physics and Logic (QPL 2015), 15-17 Jul 2015, Oxford, United Kingdom.

Boender, Jaap, Primiero, Giuseppe and Raimondi, Franco (2015) Minimizing transitive trust threats in software management systems. In: 13th Annual Conference on Privacy, Security and Trust (PST 2015), 21-23 Jul 2015, Izmir, Turkey.

Bordoni, Mirco, Bottone, Michele, Fields, Bob, Gorogiannis, Nikos, Margolis, Michael, Primiero, Giuseppe and Raimondi, Franco (2015) Towards cyber-physical systems as services: the ASIP protocol. In: 2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), 17-17 May 2015, Florence, Italy.

Brotherston, James and Gorogiannis, Nikos (2015) Disproving inductive entailments in separation logic via base pair approximation. In: TABLEAUX 2015: 24th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods, 21-24 Sep 2015, Wroclaw, Poland.

Carvalho, Catarina, Madelaine, Florent R. and Martin, Barnaby (2015) From complexity to algebra and back: digraph classes, collapsibility and the PGP. In: 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 6-10 Jul 2015, Kyoto, Japan.

Chen, Taolue, Fokkink, Wan and Van Glabbeek, Rob J. (2015) On the axiomatizability of impossible futures. Logical Methods in Computer Science, 11 (3). pp. 1-30. ISSN 1860-5974

Chen, Taolue, Song, Fu and Wu, Zhilin (2015) On the satisfiability of indexed linear temporal logics. In: 26th International Conference on Concurrency Theory, CONCUR 2015, 1-4 Sept 2015, Madrid, Spain.

De Florio, Vincenzo and Primiero, Giuseppe (2015) A framework for trustworthiness assessment based on fidelity in cyber and physical domains. In: 2nd International Workshop on Computational Antifragility and Antifragile Engineering (ANTIFRAGILE 2015), 2-5 Jun 2015, London, UK.

De Mol, Liesbeth and Primiero, Giuseppe (2015) When logic meets engineering: introduction to logical issues in the history and philosophy of computer science. History and Philosophy of Logic, 36 (3). pp. 195-204. ISSN 0144-5340

Floridi, Luciano, Fresco, Nir and Primiero, Giuseppe (2015) On malfunctioning software. Synthese, 192 (4). pp. 1199-1220. ISSN 1573-0964

Gu, Jiayi, Zhou, Yu, Wu, Weigang and Chen, Taolue (2015) Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking. In: First International Conference on Cloud Computing and Security (ICCCS 2015), 13-15 Aug 2015, Nanjing, China.

Kammueller, Florian (2015) Confinement for active objects. International Journal of Advanced Computer Science and Applications, 6 (2). pp. 246-261. ISSN 2158-107X

Kunčar, Ondřej and Popescu, Andrei (2015) A consistent foundation for Isabelle/HOL. In: 6th conference on Interactive Theorem Proving (ITP), 24-27 Aug 2015, Nanjing, China.

Popescu, Andrei and Roşu, Grigore (2015) Term-generic logic. Theoretical Computer Science, 577 . pp. 1-24. ISSN 0304-3975

Tong, Yanxiang, Zhou, Yu, Fang, Lisheng and Chen, Taolue (2015) Towards a novel approach for defect localization based on part-of-speech and invocation. In: Internetware 2015: 7th Asia-Pacific Symposium on Internetware, 06 Nov 2016, Wuhan, China.

2014

Amadio, Roberto M., Ayache, Nicolas, Bobot, Francois, Boender, Jaap, Campbell, Brian, Garnier, Ilias, Madet, Antoine, McKinna, James, Mulligan, Dominic P., Piccolo, Mauro, Pollack, Randy, Régis-Gianas, Yann, Sacerdoti Coen, Claudio, Stark, Ian and Tranquilli, Paolo (2014) Certified Complexity (CerCo). In: Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA 2013), 29-31 Aug 2013, Bertinoro, Italy.

Androutsopoulos, Kelly, Gorogiannis, Nikos, Loomes, Martin J., Margolis, M., Primiero, Giuseppe, Raimondi, Franco, Varsani, Puja, Weldin, N. and Zivanovic, Aleksandar (2014) A racket-based robot to teach first-year computer science. In: 7 th European Lisp Symposium, May 5 – 6 2014, IRCAM, Paris, France.

Antonopoulos, Timos, Gorogiannis, Nikos, Haase, Christoph, Kanovich, Max and Ouaknine, Joël (2014) Foundations for decision problems in separation logic with general inductive predicates. In: 17th International Conference on the Foundations of Software Science and Computation Structures, FOSSACS 2014, 5-13 Apr 2014, Grenoble, France.

Ardeshir-Larijani, Ebrahim, Gay, Simon J. and Nagarajan, Rajagopal (2014) Verification of concurrent quantum protocols by equivalence checking. In: 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2014, 5-13 Apr 2014, Grenoble, France.

Barn, Balbir ORCID: https://orcid.org/0000-0002-7251-5033, Barn, Ravinder and Primiero, Giuseppe (2014) The role of resilience and value for effective co-design of information systems. In: Proceedings of the Conference of the International Association for Computing and Philosophy (IACAP 14). Springer Synthese Library. (Accepted/In press)

Blanchette, Jasmin Christian, Hölzl, Johannes, Lochbihler, Andreas, Panny, Lorenz, Popescu, Andrei and Traytel, Dmitriy (2014) Truly modular (co)datatypes for Isabelle/HOL. In: 5th International Conference on Interactive Theorem Proving (ITP), 14-17 Jul 2014, Vienna, Austria.

Blanchette, Jasmin Christian, Popescu, Andrei and Taytel, Dmitriy (2014) Cardinals in Isabelle/HOL. In: 5th International Conference on Interactive Theorem Proving, 14-17 Jul 2014, Vienna, Austria.

Blanchette, Jasmin Christian, Popescu, Andrei and Traytel, Dmitriy (2014) Unified classical logic completeness: a coinductive pearl. In: 7th International Joint Conference on Automated Reasoning (IJCAR), 19-22 Jul 2014, Vienna, Austria.

Boender, Jaap and Fernandes, Sara (2014) Small world characteristics of FLOSS distributions. In: Software Engineering and Formal Methods : SEFM 2013 Collocated Workshops: BEAT2, WS-FMDS, FM-RAIL-Bok, MoKMaSD, and OpenCert, Madrid, Spain, September 23-24, 2013, Revised Selected Papers. Counsell, Steve and Núñez, Manuel, eds. Lecture Notes in Computer Science . Springer International Publishing, pp. 417-429. ISBN 9783319050317

Boender, Jaap, Ivanova, Marieta Georgieva, Kammueller, Florian and Primiero, Giuseppe (2014) Modeling human behaviour with higher order logic: insider threats. In: 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014), 18 Jul 2014, Vienna, Austria.

Boender, Jaap and Sacerdoti Coen, Claudio (2014) On the correctness of a branch displacement algorithm. In: Tools and Algorithms for the Construction and Analysis of Systems : 20th International Conference, TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings. Ábrahám, Erika and Havelund, Klaus, eds. Lecture Notes in Computer Science (8413). Springer, pp. 605-619. ISBN 9783642548611

Brotherston, James, Fuhs, Carsten, Pérez, Juan A. Navarro and Gorogiannis, Nikos (2014) A decision procedure for satisfiability in separation logic with inductive predicates. In: Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) - CSL-LICS 2014, 14-18 Jul 2014, Vienna, Austria.

Brotherston, James and Gorogiannis, Nikos (2014) Cyclic abduction of inductively defined safety and termination preconditions. In: 21st International Static Analysis Symposium, SAS 2014, 11-13 Sept 2014, Munich, Germany.

Chen, Taolue, Diciolla, Marco, Kwiatkowska, Marta Z. and Mereacre, Alexandru (2014) Quantitative verification of implantable cardiac pacemakers over hybrid heart models. Information and Computation, 236 . pp. 87-101. ISSN 0890-5401

Chen, Taolue and Han, Tingting (2014) On the complexity of computing maximum entropy for Markovian models. In: 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2014, 15-17 Dec 2014, New Delhi, India.

Dapić, Petar, Marković, Petar and Martin, Barnaby (2014) QCSP on semicomplete digraphs. In: 41st International Colloquium on Automata, Languages and Programming, ICALP 2014, 8-11 Jul 2014, Copenhagen, Denmark.

De Mol, Liesbeth and Primiero, Giuseppe (2014) Facing computing as technique: towards a history and philosophy of computing. Philosophy & Technology, 27 (3). pp. 321-326. ISSN 2210-5433

Giannopoulos, Panos, Konzack, Maximilian and Mulzer, Wolfgang (2014) Low-crossing spanning trees: an alternative proof and experiments. In: European Workshop on Computational Geometry, 03-05 Mar 2014, Ein-Gedi, Israel.

Kammueller, Florian and Probst, Christian (2014) Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (2). pp. 59-79. ISSN 2093-5374

Martin, Barnaby and Stacho, Juraj (2014) Constraint satisfaction with counting quantifiers 2. In: 9th International Computer Science Symposium in Russia, CSR 2014, 7-11 Jun 2014, Moscow, Russia.

Nipkow, Tobias and Popescu, Andrei (2014) Making security type systems less ad hoc. Information Technology, 56 (6). pp. 267-272. ISSN 1611-2776

Pouliasis, Konstantinos and Primiero, Giuseppe (2014) J-Calc: a typed lambda calculus for intuitionistic justification logic. Electronic Notes in Theoretical Computer Science, 300 . pp. 71-87. ISSN 1571-0661

Primiero, Giuseppe (2014) On the ontology of the computing process and the epistemology of the computed. Philosophy & Technology, 27 (3). pp. 485-489. ISSN 2210-5433

Primiero, Giuseppe (2014) A taxonomy of errors for information systems. Minds and Machines, 24 (3). pp. 249-273. ISSN 0924-6495

Primiero, Giuseppe (2014) Algorithmic check of standards for information quality dimensions. In: The philosophy of information quality. Floridi, Luciano and Illari, Phyllis, eds. Synthese Library (358). Springer, pp. 107-134. ISBN 9783319071206

Primiero, Giuseppe and Raimondi, Franco (2014) A typed natural deduction calculus to reason about secure trust. In: 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST), 23-24 Jul 2014, Toronto, Canada.

Primiero, Giuseppe, Raimondi, Franco and Rungta, Neha (2014) Model checking degrees of belief in a system of agents. In: 13th International Conference on Autonomous Agents and Multiagent Systems, AAMAS '14, 5-9 May 2014, Paris, France.

Raheem, Ali, Lasebae, Aboubaker and Loo, Jonathan (2014) A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP). In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 24-26 Sept. 2014, Beijing, China.

2013

Ardeshir-Larijani, Ebrahim, Gay, Simon J. and Nagarajan, Rajagopal (2013) Equivalence checking of quantum protocols. In: Tools and Algorithms for the Construction and Analysis of Systems : 19th International Conference Proceedings (TACAS 2013). Piterman, Nir and Smolka, Scott A., eds. Lecture Notes in Computer Science (7795). Springer, Berlin, pp. 478-492. ISBN 9783642367410

Blanchette, Jasmin Christian, Böhme, Sascha, Popescu, Andrei and Smallbone, Nicholas (2013) Encoding monomorphic and polymorphic types. In: 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 16-24 Mar 2013, Rome.

Blanchette, Jasmin Christian and Popescu, Andrei (2013) Mechanizing the metatheory of sledgehammer. In: 9th International Symposium on Frontiers of Combining Systems (FroCoS 2013), 18-20 Sept 2013, Nancy, France.

Chen, Taolue, Forejt, Vojtěch, Kwiatkowska, Marta, Parker, David and Simaitis, Aistis (2013) Automatic verification of competitive stochastic systems. Formal Methods in System Design, 43 (1). pp. 61-92. ISSN 0925-9856

Dantchev, Stefan and Martin, Barnaby (2013) Rank complexity gap for Lovász-Schrijver and Sherali-Adams proof systems. Computational Complexity, 22 (1). pp. 191-213. ISSN 1016-3328

Ivanova, Marieta Georgieva, Probst, Christian, Hansen, R. R. and Kammueller, Florian (2013) Externalizing behaviour for analysing system models. In: 5th International Workshop on Managing Insider Security Threats, MIST, 2013..

Kammueller, Florian (2013) A semi-lattice model for multi-lateral security. In: Data privacy management and autonomous spontaneous security. Lecture Notes in Computer Science (7731). Springer, Berlin, Germany, pp. 118-132. ISBN 9783642358890

Popescu, Andrei, Hölzl, Johannes and Nipkow, Tobias (2013) Formal verification of language-based concurrent noninterference. Journal of Formalized Reasoning, 6 (1). pp. 1-30. ISSN 1972-5787

Popescu, Andrei, Hölzl, Johannes and Nipkow, Tobias (2013) Formalizing probabilistic noninterference. In: 3rd International Conference on Certified Programs and Proofs (CPP 2013), 11-13 Dec 2013, Melbourne, VIC, Australia.

Popescu, Andrei, Hölzl, Johannes and Nipkow, Tobias (2013) Noninterfering schedulers: when possibilistic noninterference implies probabilistic noninterference. In: 5th Conference on Algebra and Coalgebra in Computer Science (CALCO), 3-6 Sep 2013, Warsaw, Poland.

Schropp, Andreas and Popescu, Andrei (2013) Nonfree datatypes in Isabelle/HOL: animating a many-sorted metatheory. In: Certified Programs and Proofs (CPP), 11-13 Dec 2013, Melbourne, Australia.

2012

Blanchette, Jasmin Christian, Popescu, Andrei, Wand, Daniel and Weidenbach, Cristoph (2012) More SPASS with Isabelle: superposition with hard sorts and configurable simplification. In: Interactive Theorem Proving (ITP), Third International Conference, 13-15 Aug 2012, Princeton, New Jersey, US.

Bodirsky, Manuel, Kara, Jan and Martin, Barnaby (2012) The complexity of surjective homomorphism problems - a survey. Discrete Applied Mathematics, 160 (12). pp. 1680-1690. ISSN 0166-218X

Brotherston, James, Gorogiannis, Nikos and Petersen, Rasmus L. (2012) A generic cyclic theorem prover. In: APLAS 2012.

Cipolla Ficarra, F. V., Veltman, K., Verber, D., Cipolla-Ficarra, M. and Kammueller, Florian, eds. (2012) Advances in new technologies, interactive interfaces and communicability. Lecture Notes in Computer Science, 7547 . Springer-Verlag. ISBN 9783642340109

Davidson, Tim, Gay, Simon J., Mlnařík, Hynek, Nagarajan, Rajagopal and Papanikolaou, Nikolaos K. (2012) Model checking for communicating quantum processes. International Journal of Unconventional Computing, 8 (1). pp. 73-98. ISSN 1548-7199

Golovach, Petr A., Lidický, Bernard, Martin, Barnaby and Paulusma, Daniël (2012) Finding vertex-surjective graph homomorphisms. In: 7th International Computer Science Symposium (CSR 2012), 3-7 Jul 2012, Nizhny Novgorod, Russia.

Henrio, Ludovic, Kammueller, Florian and Lutz, Bianca (2012) ASPfun: a typed functional active object calculus. Science of Computer Programming, 77 (7-8). pp. 823-847. ISSN 0167-6423

Kammueller, Florian (2012) Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews (283123). ISSN 21675163

Kammueller, Florian (2012) Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews (281788).

Kammueller, Florian (2012) A security model for functional active objects. In: Communicability, computer graphics and innovative design for interactive systems. Francisco, Cipolla-Ficarra, Kim, Veltman, Miguel, Cipolla-Ficarra and Andreas, Kratky, eds. Lecture Notes in Computer Science (7545). Springer, Berlin, pp. 42-50. ISBN 9783642337598

Kammueller, Florian, Mapp, Glenford E., Patel, Sandip and Sani, Abubaker Sadiq (2012) Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. In: International Conference on Internet Monitoring and Protection (ICIMP 2012), 27 May - 01 Jun 2012, Stuttgart, Germany.

Kammueller, Florian, Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy.

Madelaine, Florent and Martin, Barnaby (2012) The complexity of positive first-order logic without equality. ACM Transactions on Computational Logic (TOCL), 13 (1). ISSN 1529-3785

Madelaine, Florent, Martin, Barnaby and Stacho, Juraj (2012) Constraint satisfaction with counting quantifiers. In: The 7th International Computer Science Symposium (CSR 2012), 3-7 Jul 2012, Nizhny Novgorod, Russia.

Popescu, Andrei, Hölzl, Johannes and Nipkow, Tobias (2012) Proving concurrent noninterference. In: 2nd International Conference on Certified Programs and Proofs (CPP 2012), 13-15 Dec 2012, Kyoto, Japan.

Primiero, Giuseppe and Taddeo, Mariarosaria (2012) A modal type theory for formalizing trusted communications. Journal of Applied Logic, 10 (1). pp. 92-114. ISSN 1570-8683

Traytel, Dmitriy, Popescu, Andrei and Blanchette, Jasmin (2012) Foundational, compositional (co)datatypes for higher-order logic: category theory applied to theorem proving. In: 27th Annual IEEE Symposium on Logic in Computer Science (LICS), 25-28 June 2012, Dubrovnik, Croatia.

2011

Aceto, Luca, Chen, Taolue, Ingolfsdottir, Anna, Luttik, Bas and Van de Pol, Jaco (2011) On the axiomatizability of priority II. Theoretical Computer Science, 412 (28). pp. 3035-3044. ISSN 0304-3975

Boender, Jaap (2011) Efficient computation of dominance in component systems (short paper). In: Software engineering and formal methods: 9th International Conference, SEFM 2011, Montevideo, Uruguay, November 14-18, 2011. Proceedings. Lecture Notes in Computer Science (7041). Springer, Berlin and Heidelberg, Germany, pp. 399-406. ISBN 9783642246890

Boender, Jaap (2011) Formal verification of a theory of packages. ECEASST, 48 .

Bornat, Richard and Amjad, Hasan (2011) Explanation of two non-blocking shared-variable communication algorithms. Formal Aspects of Computing . ISSN 0934-5043

Chen, Taolue, Han, Tingting, Katoen, Joost-Pieter, Mereacre, Alexandru and Jagadeesan, Radha (2011) Model checking of continuous-time Markov chains against timed automata specifications. Logical Methods in Computer Science, 7 (1). ISSN 1860-5974

Dantchev, Stefan and Martin, Barnaby (2011) Cutting planes and the parameter cutwidth. Theory of Computing Systems, 51 (1). pp. 50-64. ISSN 1432-4350

Dantchev, Stefan and Martin, Barnaby (2011) The limits of tractability in resolution-based propositional proof systems. Annals of Pure and Applied Logic, 163 (6). pp. 656-668. ISSN 0168-0072

Dantchev, Stefan, Martin, Barnaby and Szeider, Stefan (2011) Parameterized proof complexity. Computational Complexity, 20 (1). pp. 51-85. ISSN 1016-3328

Fleck, Andreas and Kammueller, Florian (2011) A security model for functional active objects with an implementation in Erlang. In: Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion. Ficarra, Francisco V. C., Kratky, Andreas, Veltman, Kim H., Ficarra, Miguel C., Nicol, Emma and Brie, Mary, eds. Computational Science and Engineering Collection (I). Blue Herons, Bergamo, Italy, pp. 105-120. ISBN 9788896471043

Gorogiannis, Nikos, Kanovich, Max and O’Hearn, Peter W. (2011) The complexity of abduction for separated heap abstractions. In: SAS 2011.

Kammueller, Florian (2011) Mechanical analysis of finite idempotent relations. Fundamenta Informaticae, 107 (1). pp. 43-65. ISSN 1875-8681

Kammueller, Florian (2011) Privacy enforcement and analysis for functional active objects. Lecture Notes in Computer Science, 6514 . pp. 93-107. ISSN 0302-9743

Kammueller, Florian and Patel, Sandip (2011) Radius-SHA256 – verified remote authentication with secure hashing. In: First Global Conference on Communication, Science and Information Engineering, CCSIE’11, 25 - 27 July 2011, Middlesex University.

Madelaine, Florent and Martin, Barnaby (2011) A tetrachotomy for positive first-order logic without equality. In: Logic in Computer Science (LICS), 2011 26th Annual IEEE Symposium on. IEEE, pp. 311-320. ISBN 9781457704512

Martin, Barnaby (2011) Low-level dichotomy for quantified constraint satisfaction problems. Information Processing Letters, 111 (20). pp. 999-1003. ISSN 0020-0190

Martin, Barnaby (2011) QCSP on partially reflexive forests. In: The 17th International Conference on Principles and Practice of Constraint Programming (CP 2011), 12-16 September 2011, Perugia, Italy.

Martin, Barnaby and Paulusma, Daniël (2011) The computational complexity of disconnected cut and 2K2-partition. In: The 17th International Conference on Principles and Practice of Constraint Programming (CP 2011), 12-16 Sep 2011, Perugia, Italy.

Popescu, Andrei and Gunter, Elsa (2011) Recursion principles for syntax with bindings and substitution. In: The 16th ACM SIGPLAN International Conference on Functional Programming, 19-21 Sep 2011, Tokyo.

Roda, Fabio, Liberti, Leo and Raimondi, Franco (2011) Evaluation of collaborative filtering algorithms using a small dataset. In: WEBIST 2011, http://www.webist.org/WEBIST2011/.

2010

Bodirsky, Manuel, Dalmau, Victor, Martin, Barnaby and Pinsker, Michael (2010) Distance constraint satisfaction problems. In: 35th International Symposium on Mathematical Foundations of Computer Science (MFCS 2010), 23-27 August 2010, Brno, Czech Republic.

Bodirsky, Manuel, Hils, Martin and Martin, Barnaby (2010) On the scope of the universal-algebraic approach to constraint satisfaction. In: Logic in Computer Science (LICS), 2010 25th Annual IEEE Symposium on. Institute of Electrical and Electronics Engineers, pp. 90-99. ISBN 9781424475889

Bornat, Richard and Amjad, Hasan (2010) Inter-process buffers in separation logic with rely-guarantee. Formal Aspects of Computing, 22 (6). pp. 735-772. ISSN 0934-5043

Bornat, Richard (2010) Separation logic and concurrency. In: Formal Methods: State of the Art and New Directions. Boca, Paul, Bowen, Jonathan P. and Siddiqi, Jawed, eds. Springer-Verlag, London, pp. 217-248. ISBN 9781848827356

Dantchev, Stefan and Martin, Barnaby (2010) The limits of tractability in resolution-based propositional proof systems. In: 6th International Conference on Computability in Europe: Programs, Proofs, Processes (CIE 2010), 30 June - 4 July 2010, Portugal.

Di Cosmo, Roberto and Boender, Jaap (2010) Using strong conflicts to detect quality issues in component-based complex systems. In: ISEC '10 Proceedings of the 3rd India software engineering conference. ISEC '10 . ACM, New York, pp. 163-172. ISBN 9781605589220

Fleck, Andreas and Kammueller, Florian (2010) Implementing privacy with Erlang active objects. In: Internet Monitoring and Protection (ICIMP), 2010 Fifth International Conference. IEEE, pp. 141-146. ISBN 9781424467266

Fleck, Andreas and Kammueller, Florian (2010) Privacy by flexible parameterization with Erlang active objects. International Journal on Advances in Software, 3 (3-4). pp. 461-473. ISSN 1942-2628

Helke, Steffen and Kammueller, Florian (2010) Formalizing statecharts using hierarchical automata. Archive of Formal Proof . ISSN 2150-914X

Henrio, Ludovic, Kammueller, Florian and Khan, Muhammad Uzair (2010) A framework for reasoning on component composition. Lecture Notes in Computer Science, 6286 . pp. 1-20. ISSN 0302-9743

Henrio, Ludovic, Kammueller, Florian, Lutz, Bianca and Sudhof, Henry (2010) Locally nameless sigma calculus. Archive of Formal Proof . ISSN 2150-914X

Henrio, Ludovic, Kammueller, Florian, Lutz, Bianca and Sudhof, Henry (2010) A locally nameless theory of objects. In: SAFA Annual Workshop on Formal Techniques (SAFA’2010), October 6th and 7th, 2010, 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France.

Kammueller, Florian (2010) Using functional active objects to enforce privacy. In: 5th Conference on Network Architectures and Information Systems Security, 18-21 May, 2010, Menton, France.

Kammueller, Florian, Rein, Alexander and Reiser, Mark-Oliver (2010) Feature link propagation across variability representations with Isabelle/HOL. In: Proceedings of the 2010 ICSE Workshop on Product Line Approaches in Software Engineering. Rubin, Julia, Botterweck, Goetz, Mezini, Mira, Maman, Itay and Lero, Andreas, eds. ACM, New York, pp. 48-53. ISBN 9781605589688

Martin, Barnaby (2010) The lattice structure of sets of surjective hyper-operations. In: Principles and practice of constraint programming – CP 2010. Lecture Notes in Computer Science (6308). Springer-Verlag, pp. 368-382. ISBN 9783642153952

Martin, Barnaby and Martin, Jos (2010) The complexity of positive first-order logic without equality II: the four-element case. In: 24th International Workshop (CSL 2010), 19th Annual Conference of the EACSL, 23-27 August 2010, Brno, Czech Republic.

Popescu, Andrei and Gunter, Elsa (2010) Incremental pattern-based coinduction for process algebra and its Isabelle formalization. In: Foundations of Software Science and Computation Structures (FOSSACS), 20-28 Mar 2010, Paphos, Cyprus.

Popescu, Andrei, Gunter, Elsa and Osborn, Christopher J. (2010) Strong normalization for System F by HOAS on top of FOAS. In: 25th Annual IEEE Symposium on Logic in Computer Science (LICS), 11-14 July 2010, Edinburgh, United Kingdom.

Sama, Michele, Elbaum, Sebastian, Raimondi, Franco, Rosenblum, David S. and Wang, Zhimin (2010) Context-aware adaptive applications: fault patterns and their automated identification. IEEE Transactions on Software Engineering, 36 (5). pp. 644-661. ISSN 0098-5589

Skene, James, Raimondi, Franco and Emmerich, Wolfgang (2010) Service-level agreements for electronic services. IEEE Transactions on Software Engineering, 36 (2). pp. 288-304. ISSN 0098-5589

2009

Abate, Pietro, Di Cosmo, Roberto, Boender, Jaap and Zacchiroli, Stefano (2009) Strong dependencies between software components. In: 2009 3rd International Symposium on Empirical Software Engineering and Measurement (ESEM 2009). IEEE, 89 -99. ISBN 9781424448425

Amjad, Hasan and Bornat, Richard (2009) Towards automatic stability analysis for rely-guarantee proofs. In: Verification, model checking, and abstract interpretation: 10th International Conference, VMCAI 2009, Savannah, GA, USA, January 18-20, 2009. Proceedings. Jones, Neil D. and Müller-Olm, Markus, eds. Lecture Notes in Computer Science (5403). Springer, pp. 14-28. ISBN 9783540938996

Bettinelli, Andrea, Liberti, Leo, Raimondi, Franco and Savourey, David (2009) The Anonymous subgraph problem. In: Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization, June 2-4, 2009, Paris.

Cubo, Javier, Sama, Michele, Raimondi, Franco and Rosenblum, David (2009) A model to design and verify context-aware adaptive service composition. In: 6th IEEE International Conference on Services Computing (SCC 2009), September 21-25, 2009, Bangalore.

Dantchev, Stefan, Martin, Barnaby and Rhodes, Mark (2009) Tight rank lower bounds for the Sherali–Adams proof system. Theoretical Computer Science, 410 (21-23). pp. 2054-2063. ISSN 0304-3975

Henrio, Ludovic and Kammueller, Florian (2009) Functional active objects: typing and formalisation. Electronic Notes in Theoretical Computer Science, 255 . pp. 83-101. ISSN 1571-0661

Henrio, Ludovic, Kammueller, Florian and Rivera, Marcela (2009) An asynchronous distributed component model and its semantics. Lecture Notes in Computer Science, 5751 . pp. 159-179. ISSN 0302-9743

Kammueller, Florian and Kammueller, Reiner (2009) Enhancing privacy implementations of database enquiries. In: Internet Monitoring and Protection, 2009. ICIMP '09. Fourth International Conference. IEEE, pp. 45-50. ISBN 9781424438396

Kammueller, Florian and Kammueller, Reiner (2009) Security analysis of private data enquiries in Erlang. International Journal on Advances in Security, 2 (2&3). pp. 242-255. ISSN 1942-2636

Lomuscio, Alessio, Qu, Hongyang and Raimondi, Franco (2009) MCMAS: a model checker for the verification of multi-agent systems. Lecture Notes in Computer Science, 5643 . pp. 682-688. ISSN 0302-9743

Müller, Markus, Rogers, Caroline and Nagarajan, Rajagopal (2009) Lossless quantum prefix compression for communication channels that are always open. Physical Review A, 79 (1). ISSN 1050-2947

Pecheur, Charles, Raimondi, Franco and Brat, Guillaume (2009) A formal analysis of requirements-based testing. In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis. Rothermel, Gregg and Dillon, Laura, eds. Association for Computing Machinery, pp. 47-56. ISBN 9781605583389

Popescu, Andrei (2009) Weak bisimilarity coalgebraically. In: Algebra and Coalgebra in Computer Science, Third International Conference, CALCO 2009, 7-10 Sep 2009, Udine, Italy.

Popescu, Andrei, Şerbănuţă, Traian Florin and Roşu, Grigore (2009) A semantic approach to interpolation. Theoretical Computer Science, 410 (12-13). pp. 1109-1128. ISSN 0304-3975

Primiero, Giuseppe (2009) Proceeding in abstraction. From concepts to types and the recent perspective on information. History and Philosophy of Logic, 30 (3). pp. 257-282. ISSN 0144-5340

Primiero, Giuseppe (2009) An epistemic logic for becoming informed. Synthese, 167 (2). pp. 363-389. ISSN 0039-7857

Raimondi, Franco, Pecheur, Charles and Brat, Guillaume (2009) PDVer, a tool to verify PDDL planning domains. In: ICAPS'09 Workshop on Verification and Validation of Planning and Scheduling Systems, September 20, 2009, Thessaloniki, Greece.

Roda, Fabio, Liberti, Leo and Raimondi, Franco (2009) Combinatorial optimization based recommender systems. In: Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization, June 2-4, 2009, Paris.

2008

Brotherston, James, Bornat, Richard and Calcagno, Cristiano (2008) Cyclic proofs of program termination in separation logic. ACM SIGPLAN Notices - POPL '08, 43 (1). pp. 101-112. ISSN 0362-1340

Chen, Hubie, Madelaine, Florent and Martin, Barnaby (2008) Quantified constraints and containment problems. In: 23rd Annual IEEE Symposium on Logic in Computer Science (LICS 2008), 24-27 June 2008, Pittsburgh, PA.

Chen, Taolue, Fokkink, Wan, Luttik, Bas and Nain, Sumit (2008) On finite alphabets and infinite bases. Information and Computation, 206 (5). pp. 492-519. ISSN 0890-5401

Chen, Taolue, Fokkink, Wan and Van Glabbeek, Rob (2008) Ready to preorder: the case of weak process semantics. Information Processing Letters, 109 (2). pp. 104-111. ISSN 0020-0190

Gay, Simon J., Nagarajan, Rajagopal and Papanikolaou, Nikolaos (2008) QMC: a model checker for quantum systems. In: Computer Aided Verification : 20th International Conference, (CAV 2008) Proceedings. Gupta, Aarti and Malik, Sharad, eds. Lecture Notes in Computer Science (5123). Springer, Berlin, pp. 543-547. ISBN 9783540705437

Kammueller, Florian (2008) Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing, 20 (3). pp. 259-275. ISSN 0934-5043

Kammueller, Florian (2008) Interactive theorem proving in software engineering. VDM Verlag Dr. Mueller, Saarbrücken, Germany. ISBN 9783836457699

Kammueller, Florian and Preibusch, Sören (2008) Modelchecking non-functional requirements for interface specifications. In: European Joint Conference on Theory and Practice of Software, 2008, (Foundations of Interface technologies), 29th March - 6th April, 2008, Budapest.

Kammueller, Florian and Sudhof, Henry (2008) Composing safely: a type system for aspects. Lecture Notes in Computer Science, 4954 . pp. 231-247. ISSN 0302-9743

Kammueller, Florian and Sudhof, Henry (2008) Compositionality of aspect weaving. In: Autonomous systems: self-organisation, management, and control. Mahr, Bernd and Sheng, Huanye, eds. Springer-Verlag, pp. 87-96. ISBN 9781402088889

Liberti, Leo and Raimondi, Franco (2008) The secret santa problem. Lecture Notes in Computer Science, 5034 . pp. 271-279. ISSN 0302-9743

Martin, Barnaby (2008) First-order model checking problems parameterized by the model. In: The 4th Conference on Computability in Europe: Logic and Theory of Algorithms (CiE 2008), 15-20 June, 2008, University of Athens, Greece.

Preibusch, Sören and Kammueller, Florian (2008) Checking the TWIN elevator system by translating object-Z to SMV. Lecture Notes in Computer Science, 4916 . pp. 38-55. ISSN 0302-9743

Raimondi, Franco, Skene, James and Emmerich, Wolfgang (2008) Efficient online monitoring of web-service SLAs. In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering. Harrold, Jean and Murphy, Gail, eds. Association for Computing Machinery, pp. 170-180. ISBN 9781595939951

Sama, Michele, Raimondi, Franco, Rosenblum, David and Emmerich, Wolfgang (2008) Algorithms for efficient symbolic detection of faults in context-aware applications. In: Automated Software Engineering - Workshops, 2008. ASE Workshops 2008. 23rd IEEE/ACM International Conference. Institute of Electrical and Electronics Engineers, pp. 1-8. ISBN 9781424427765

2007

Boender, Jaap (2007) Sound tools for package dependency management in free and open source software distributions. In: Open source development, adoption and innovation: IFIP Working Group 2.13 on Open Source Software, June 11-14, 2007, Limerick, Ireland. Feller, Joseph, Fitzgerald, Brian, Scacchi, Walt and Sillitti, Alberto, eds. IFIP Advances in Information and Communication Technology (234). Springer, Berlin and Heidelberg, Germany, p. 391. ISBN 9780387724850

Bornat, Richard, Parkinson, Matthew and O'Hearn, Peter (2007) Modular verification of a non-blocking stack. 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '07), Nice, France. Proceedings. . pp. 297-302. ISSN 0362-1340

Gorogiannis, Nikos and Ryan, Mark (2007) Minimal refinements of specifications in modal and temporal logics. Formal Aspects of Computing, 19 (4). pp. 417-444. ISSN 0934-5043

Martin, Barnaby and Madelaine, Florent (2007) Hierarchies in fragments of monadic strict NP. In: Computation and logic in the real world: Third Conference on Computability in Europe, CiE 2007, Siena, Italy, June 18-23, 2007, Proceedings. Cooper, Barry S., Löwe, Benedikt and Sorbi, Andrea, eds. Lecture Notes in Computer Science, 4497 . Springer Berlin Heidelberg, pp. 542-550. ISBN 9783540730002

2006

Bornat, Richard, Calcagno, Cristiano and Parkinson, Matthew (2006) Variables as resource in Hoare logic. In: 21st Annual IEEE Symposium on Logic in Computer Science (LICS 2006), Seattle, Washington. Proceedings. IEEE Computer Society., pp. 137-146. ISBN 0-7695-2631-4

Bornat, Richard, Calcagno, Cristiano and Yang, Hongseok (2006) Variables as resources in separation logic. 21st Annual Conference on Mathematical Foundations of Programming Semantics (MFPS XXI), Birmingham, UK. Proceedings in Electronic Notes in Theoretical Computer Science. Elsevier B.V., 155 . pp. 247-276. ISSN 1571-0661

Mancinelli, Fabio, Boender, Jaap, Di Cosmo, Roberto, Vouillon, Jérôme, Durak, Berke, Leroy, Xavier and Treinen, Ralf (2006) Managing the complexity of large free and open source package-based software distributions. Automated Software Engineering, 2006. ASE '06. 21st IEEE/ACM International Conference on . pp. 199-208. ISSN 1938-4300

2005

Bornat, Richard, Calcagno, Cristiano, Parkinson, Matthew and O'Hearn, Peter (2005) Permission accounting in separation logic. 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '05), Long Beach, California, USA. Proceedings . pp. 259-270. ISSN 0362-1340

2002

Gorogiannis, Nikos and Ryan, Mark (2002) Requirements, specifications, and minimal refinement. In: WOLLIC 2002.

This list was generated on Mon May 27 04:25:03 2019 BST.