C. Ghezzi, G. Gibilisco, C. Menghi, Marco Miglierina
{"title":"A Control-Theoretic Approach to Self-adaptive Systems and an Application to Cloud-Based Software","authors":"C. Ghezzi, G. Gibilisco, C. Menghi, Marco Miglierina","doi":"10.1007/978-3-319-28406-4_3","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_3","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122334394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behaviours as Design Components of Cyber-Physical Systems","authors":"M. Jackson","doi":"10.1007/978-3-319-28406-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_2","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126586195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Build a Recommendation System for Software Engineering","authors":"Sebastian Proksch, V. Bauer, G. Murphy","doi":"10.1007/978-3-319-28406-4_1","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_1","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129676475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consistency in Distributed Systems","authors":"S. Burckhardt","doi":"10.1007/978-3-319-28406-4_4","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_4","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Mining Studies: Goals, Approaches, Artifacts, and Replicability","authors":"Sven Amann, S. Beyer, Katja Kevic, H. Gall","doi":"10.1007/978-3-319-28406-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_5","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Clarke, William Klieber, Milos Novácek, P. Zuliani
{"title":"Model Checking and the State Explosion Problem","authors":"E. Clarke, William Klieber, Milos Novácek, P. Zuliani","doi":"10.1007/978-3-642-35746-6_1","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_1","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121396476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Program to Logic: An Introduction","authors":"Patrice Godefroid, Shuvendu K. Lahiri","doi":"10.1007/978-3-642-35746-6_2","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_2","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121597728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Dafny, an Automatic Program Verifier","authors":"L. Herbert, K. Leino, Jose Quaresma","doi":"10.1007/978-3-642-35746-6_6","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_6","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Theorem Proving Techniques in PVS and Applications","authors":"C. Muñoz, Ramiro Demasi","doi":"10.1007/978-3-642-35746-6_4","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_4","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Julian Tschannen, Carlo A. Furia, M. Nordio, B. Meyer
{"title":"Automatic Verification of Advanced Object-Oriented Features: The AutoProof Approach","authors":"Julian Tschannen, Carlo A. Furia, M. Nordio, B. Meyer","doi":"10.1007/978-3-642-35746-6_5","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_5","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}