default search action
10th Ershov Memorial Conference 2015: Kazan and Innopolis, Russia
- Manuel Mazzara, Andrei Voronkov:
Perspectives of System Informatics - 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9609, Springer 2016, ISBN 978-3-319-41578-9 - Jane Hillston:
Quantitative Analysis of Collective Adaptive Systems. 1-5 - Igor V. Konnov, Helmut Veith, Josef Widder:
What You Always Wanted to Know About Model Checking of Fault-Tolerant Distributed Algorithms. 6-21 - Darkhan Akhmed-Zaki, Madina Mansurova, Bazargul Matkerim, Ekateryna Dadykina, Bolatzhan Kumalakov:
Applying MDA to Generate Hadoop Based Scientific Computing Applications. 22-35 - Julián Alarte, David Insa, Josep Silva, Salvador Tamarit:
Site-Level Web Template Extraction Based on DOM Analysis. 36-49 - Thomas Baar:
Verification Support for a State-Transition-DSL Defined with Xtext. 50-60 - Franz Brauße, Margarita V. Korovina, Norbert Th. Müller:
Towards Using Exact Real Arithmetic for Initial Value Problems. 61-74 - Hadrien Bride, Olga Kouchnarenko, Fabien Peureux:
Constraint Solving for Verifying Modal Specifications of Workflow Nets with Data. 75-90 - Gabriel Ciobanu, Ross Horne:
Behavioural Analysis of Sessions Using the Calculus of Structures. 91-106 - Petr N. Devyanin, Alexey V. Khoroshilov, Victor V. Kuliamin, Alexander K. Petrenko, Ilya V. Shchepetkov:
Using Refinement in Formal Development of OS Security Model. 107-115 - Natalia Olegovna Garanina, Elena A. Sidorova, Stepan Anokhin:
Conflict Resolution in Multi-agent Systems with Typed Connections for Ontology Population. 116-129 - Robert Glück:
Maximally-Polyvariant Partial Evaluation in Polynomial Time. 130-148 - Damas P. Gruska:
Dynamics Security Policies and Process Opacity for Timed Process Algebras. 149-157 - Mohamad Kassab, Giuseppe Destefanis:
Estimating Development Effort for Software Architectural Tactics. 158-169 - Dmitrij V. Koznov, Dmitry V. Luciv, Hamid Abdul Basit, Ouh Eng Lieh, Mikhail Smirnov:
Clone Detection in Reuse of Software Technical Documentation. 170-185 - Ilham W. Kurnia, Arnd Poetzsch-Heffter:
Modeling Actor Systems Using Dynamic I/O Automata. 186-202 - Torben Ægidius Mogensen:
RSSA: A Reversible SSA Form. 203-217 - Vitaly O. Mordan, Vadim S. Mutilin:
Checking Several Requirements at once by CEGAR. 218-232 - Alexandr Naumchev, Bertrand Meyer, Víctor Rivera:
Unifying Requirements and Code: An Example. 233-244 - Nikolay Shilov:
Program Schemata Technique to Solve Propositional Program Logics Revised. 245-259 - Maciej Szreter:
Automated Two-Phase Composition of Timed Web Services. 260-275 - Margus Veanes, Nikolaj S. Bjørner:
Equivalence of Finite-Valued Symbolic Finite Transducers. 276-290 - Ekaterina Verbitskaia, Semyon V. Grigorev, Dmitry Avdyukhin:
Relaxed Parsing of Regular Approximations of String-Embedded Languages. 291-302 - Irina B. Virbitskaite, Victor Borovlyov, Louchka Popova-Zeugmann:
Branching Processes of Timed Petri Nets. 303-313 - Bruno Woltzenlogel Paleo:
Implementation and Evaluation of Contextual Natural Deduction for Minimal Logic. 314-324 - Zhengheng Yuan, Tingliang Zhou, Jing Liu, Juan Luo, Yi Zhang, Xiaohong Chen:
Hybrid Lustre. 325-340
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.