EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Editor: Huisman, M.
Home Policy Brochure Browse Search User Area Contact Help

Number of items: 12.

2016

Abraham, E. and Huisman, M., ed. (2016) Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Lecture Notes in Computer Science 9681. Springer Verlag, London. ISSN 0302-9743 ISBN 978-3-319-33692-3
Bendisposto, J. and Körner, P. and Leuschel, M. and Meijer, J.J.G. and van de Pol, J.C. and Treharne, H. and Whitefield, J. (2016) Symbolic Reachability Analysis of B through ProB and LTSmin. In: Proceedings of the 12th International Conference on integrated Formal Methods, iFM 2016, 1-5 Jun 2016, Reykjavik, Iceland. pp. 275-291. Lecture Notes in Computer Science 9681. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-33692-3
Huisman, M. and van de Pol, J.C. (2016) Preface of Special issue on Automated Verification of Critical Systems (AVoCS'14). Science of computer programming, 128. pp. 1-1. ISSN 0167-6423 *** ISI Impact 0,828 ***

2014

Huisman, M. and van de Pol, J.C. (2014) Preface. In: Proceedings of the 14th International Workshop on Automated Verification of Critical Systems (AVoCS 2014), 24-26 Sep 2014, Enschede, The Netherlands. pp. 1-3. Electronic Communications of the EASST 70. European Association of Software Science and Technology. ISSN 1863-2122
Huisman, M. and Stoelinga, M.I.A. (2014) Meer vrouwen in de ict, waarom eigenlijk? Bits en chips, 9 (9). pp. 20-21. ISSN 1879-6443

2013

Huisman, M. and Jobstmann, B. and Schaefer, I. and Stoelinga, M.I.A. (2013) Divide and conquer: the quest for compositional design and analysis (Dagstuhl Seminar 12511). Dagstuhl Reports, 2 (12). pp. 64-88. ISSN 2192-5283
Bruns, D. and Mostowski, W.I. and Ulbrich, M. (2013) Implementation-level verification of algorithms with KeY. International journal on software tools for technology transfer, 17 (6). pp. 729-744. ISSN 1433-2779

2009

Huisman, M. and Aldrich, J. and Barnett, M. and Giannakopoulou, D. and Leavens, G.T. and Sharagyna, N. (2009) Foreword. In: SAVCBS '09 - Proceedings of the 8th International Workshop on Specification and Verification of Component-Based Systems, 25 August 2009, Amsterdam. pp. 3-3. ACM. ISBN 978-1-60558-680-9
Stoelinga, M.I.A. (2009) Compositional dependability modeling using arcade. (Invited) In: Proceedings of the 8th international workshop on Specification and verification of component-based systems (SAVCBS 2009), 25 August 2009, Amsterdam, The Netherlands. pp. 1-2. ACM. ISBN 978-1-60558-680-9
Haack, C. and Hurlin, C. (2009) Resource Usage Protocols for Iterators. Journal of Object Technology, 8 (4). pp. 55-83. ISSN 1660-1769

2007

Ruys, T.C. and Aan de Brugh, N.H.M. (2007) MMC: the Mono Model Checker. In: Proceedings of the Second Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2007), 31 March 2007, Braga, Portugal. pp. 149-160. Electronic Notes in Theoretical Computer Science 190 (1). Elsevier. ISSN 1571-0661

2004

Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. (Invited) In: Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), March 10-14, 2004, Marseille, France. pp. 172-191. Lecture Notes in Computer Science 3362. Springer-Verlag. ISBN 3-540-24287-2

This list was generated on Mon Mar 20 01:53:23 CET 2017.