default search action
Néstor Cataño
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Néstor Cataño:
Program Synthesis for Cyber-Resilience. IEEE Trans. Software Eng. 49(3): 962-972 (2023) - 2022
- [c24]Joanna C. S. Santos, Selma Suloglu, Néstor Cataño, Mehdi Mirakhorli:
A Methodological Approach to Verify Architecture Resiliency. ECSA (Tracks and Workshops) 2022: 321-336
2010 – 2019
- 2019
- [c23]Néstor Cataño:
Teaching Formal Methods: Lessons Learnt from Using Event-B. FMTea 2019: 212-227 - 2018
- [c22]Ijaz Ahmed, Néstor Cataño:
Checking JML-encoded finite state machine properties. ICACS 2018: 1-9 - [i4]Néstor Cataño:
Improving the Reliability of Mobility Applications. CoRR abs/1806.03513 (2018) - [i3]Néstor Cataño:
A Logical Framework for Verifying Privacy Breaches of Social Networks. CoRR abs/1806.03519 (2018) - [i2]Néstor Cataño:
Engaging Millennials into Learning Formal Methods. CoRR abs/1806.03527 (2018) - 2017
- [j5]Victor Rivera, Néstor Cataño, Tim Wahls, Camilo Rueda:
Code generation for Event-B. Int. J. Softw. Tools Technol. Transf. 19(1): 31-52 (2017) - [c21]Néstor Cataño:
An Empirical Study on Teaching Formal Methods to Millennials. SECM@ICSE 2017: 3-8 - 2016
- [c20]Victor Rivera, Sukriti Bhattacharya, Néstor Cataño:
Undertaking the tokeneer challenge in event-b. FormaliSE@ICSE 2016: 8-14 - [c19]Néstor Cataño, Shigeo Nishi:
Soundness Proof of EventB2Java. LADC 2016: 25-34 - [c18]Néstor Cataño, Victor Rivera:
EventB2Java: A Code Generator for Event-B. NFM 2016: 166-171 - 2015
- [c17]Sorren Hanvey, Néstor Cataño:
Identifying Transitivity Threats in Social Networks. TELERISE@ICSE 2015: 14-19 - [c16]Néstor Cataño, Tim Wahls:
A Case Study on Code Generation of an ERP System from Event-B. QRS 2015: 183-188 - 2014
- [j4]Néstor Cataño, Ijaz Ahmed, Radu I. Siminiceanu, Jonathan Aldrich:
A case study on the lightweight verification of a multi-threaded task server. Sci. Comput. Program. 80: 169-187 (2014) - [c15]Víctor Rivera, Néstor Cataño:
Translating event-B to JML-specified Java programs. SAC 2014: 1264-1271 - 2013
- [i1]Néstor Cataño, Camilo Rueda, Tim Wahls:
A Machine-Checked Proof for a Translation of Event-B Machines to JML. CoRR abs/1309.2339 (2013) - 2012
- [j3]Radu I. Siminiceanu, Ijaz Ahmed, Néstor Cataño:
Automated Verification of Specifications with Typestates and Access Permissions. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 53 (2012) - [c14]Néstor Cataño, K. Rustan M. Leino, Víctor Rivera:
The EventB2Dafny rodin plug-in. TOPI@ICSE 2012: 49-54 - [c13]Carlos Olarte, Elaine Pimentel, Camilo Rueda, Néstor Cataño:
A linear concurrent constraint approach for the automatic verification of access permissions. PPDP 2012: 207-216 - [c12]Néstor Cataño, Tim Wahls, Camilo Rueda, Víctor Rivera, Danni Yu:
Translating B machines to JML specifications. SAC 2012: 1271-1277 - [c11]Néstor Cataño, Sorren Hanvey, Camilo Rueda:
Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies. TOOLS (50) 2012: 9-16 - 2011
- [c10]Néstor Cataño, Ijaz Ahmed:
Lightweight Verification of a Multi-Task Threaded Server: A Case Study With The Plural Tool. FMICS 2011: 6-20 - 2010
- [c9]Néstor Cataño, Camilo Rueda:
Matelas: A Predicate Calculus Common Formal Definition for Social Networking. ASM 2010: 259-272 - [c8]Néstor Cataño, Radu I. Siminiceanu:
A Machine-Checked Proof of A State-Space Construction Algorithm. NASA Formal Methods 2010: 47-56
2000 – 2009
- 2009
- [c7]Néstor Cataño, Tim Wahls:
Executing JML specifications of Java card applications: a case study. SAC 2009: 404-408 - [c6]Néstor Cataño, Camilo Rueda:
Teaching Formal Methods for the Unconquered Territory. TFM 2009: 2-19 - 2008
- [c5]Néstor Cataño, Fernando Barraza, Daniel García, Pablo Ortega, Camilo Rueda:
A Case Study in JML-Assisted Software Development. SBMF 2008: 5-21 - 2005
- [j2]Néstor Cataño:
Combining Symbolic Execution and Model Checking to Reduce Dynamic Program Analysis Overhead. Rev. Colomb. de Computación 6(1) (2005) - [j1]Cees-Bart Breunesse, Néstor Cataño, Marieke Huisman, Bart Jacobs:
Formal methods for smart cards: an experience report. Sci. Comput. Program. 55(1-3): 53-80 (2005) - [c4]Néstor Cataño:
Formal Modeling of a Slicing Algorithm for Java Event Spaces in PVS. TPHOLs 2005: 82-97 - 2003
- [c3]Néstor Cataño, Marieke Huisman:
CHASE: A Static Checker for JML's Assignable Clause. VMCAI 2003: 26-40 - [c2]Néstor Cataño:
Slicing Event Spaces: Towards a Java Programs Checking Framework. FMICS 2003: 59-74 - 2002
- [c1]Néstor Cataño, Marieke Huisman:
Formal Specification and Static Checking of Gemplus' Electronic Purse Using ESC/Java. FME 2002: 272-289
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint