Search dblp for Publications

export results for "Steve Schneider"

 download as .bib file

@article{DBLP:journals/cmpb/MartinJFGMEPAS24,
  author       = {Liam Martin and
                  Pranav Jain and
                  Zachary Ferguson and
                  Torkan Gholamalizadeh and
                  Faezeh Moshfeghifar and
                  Kenny Erleben and
                  Daniele Panozzo and
                  Steven D. Abramowitch and
                  Teseo Schneider},
  title        = {A systematic comparison between FEBio and PolyFEM for biomechanical
                  systems},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {244},
  pages        = {107938},
  year         = {2024}
}
@article{DBLP:journals/interactions/SchneidersBTAR24,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Nick Tandavanitj and
                  Matt Adams and
                  Ju Row{-}Farr},
  title        = {Cat Royale},
  journal      = {Interactions},
  volume       = {31},
  number       = {1},
  pages        = {64},
  year         = {2024}
}
@article{DBLP:journals/tdp/BaleFSWC24,
  author       = {Cameron D. Bale and
                  Jordan L. Fischer and
                  Matthew J. Schneider and
                  Steven Weber and
                  Suzanne Chang},
  title        = {Legally Anonymizing Location Data Under the {GDPR}},
  journal      = {Trans. Data Priv.},
  volume       = {17},
  number       = {1},
  pages        = {1--30},
  year         = {2024}
}
@article{DBLP:journals/tdsc/AlsadiCDDRSSTWW24,
  author       = {Mohammed Alsadi and
                  Matthew Casey and
                  Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Luke Riley and
                  Muntadher Sallal and
                  Steve Schneider and
                  Helen Treharne and
                  Joe Wadsworth and
                  Phil Wright},
  title        = {Towards End-to-End Verifiable Online Voting: Adding Verifiability
                  to Established Voting Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3357--3374},
  year         = {2024}
}
@inproceedings{DBLP:conf/chi/BenfordMCSCFKSN24,
  author       = {Steven David Benford and
                  Clara Mancini and
                  Alan Chamberlain and
                  Eike Schneiders and
                  Simon D. Castle{-}Green and
                  Joel E. Fischer and
                  Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and
                  Guido Salimbeni and
                  Victor Zhi Heung Ngo and
                  Pepita Barnard and
                  Matt Adams and
                  Nick Tandavanitj and
                  Ju Row{-}Farr},
  title        = {Charting Ethical Tensions in Multispecies Technology Research through
                  Beneficiary-Epistemology Space},
  booktitle    = {{CHI}},
  pages        = {626:1--626:15},
  publisher    = {{ACM}},
  year         = {2024}
}
@inproceedings{DBLP:conf/chi/SchneidersBCMCN24,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Alan Chamberlain and
                  Clara Mancini and
                  Simon Castle{-}Green and
                  Victor Zhi Heung Ngo and
                  Ju Row{-}Farr and
                  Matt Adams and
                  Nick Tandavanitj and
                  Joel E. Fischer},
  title        = {Designing Multispecies Worlds for Robots, Cats, and Humans},
  booktitle    = {{CHI}},
  pages        = {593:1--593:16},
  publisher    = {{ACM}},
  year         = {2024}
}
@inproceedings{DBLP:conf/hri/SchneidersBRTA24,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Ju Row{-}Farr and
                  Nick Tandavanitj and
                  Matt Adams},
  title        = {The Purr-suit of Happiness: {A} Tale of Three Kittens. Robots, Humans,
                  Cats, and {AI}},
  booktitle    = {{HRI} (Companion)},
  pages        = {71--73},
  publisher    = {{ACM}},
  year         = {2024}
}
@article{DBLP:journals/corr/abs-2402-15431,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Alan Chamberlain and
                  Clara Mancini and
                  Simon Castle{-}Green and
                  Victor Zhi Heung Ngo and
                  Ju Row{-}Farr and
                  Matt Adams and
                  Nick Tandavanitj and
                  Joel E. Fischer},
  title        = {Designing Multispecies Worlds for Robots, Cats, and Humans},
  journal      = {CoRR},
  volume       = {abs/2402.15431},
  year         = {2024}
}
@article{DBLP:journals/corr/abs-2402-15439,
  author       = {Steve Benford and
                  Clara Mancini and
                  Alan Chamberlain and
                  Eike Schneiders and
                  Simon Castle{-}Green and
                  Joel E. Fischer and
                  Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and
                  Guido Salimbeni and
                  Victor Zhi Heung Ngo and
                  Pepita Barnard and
                  Matt Adams and
                  Nick Tandavanitj and
                  Ju Row{-}Farr},
  title        = {Charting Ethical Tensions in Multispecies Technology Research through
                  Beneficiary-Epistemology Space},
  journal      = {CoRR},
  volume       = {abs/2402.15439},
  year         = {2024}
}
@article{DBLP:journals/corr/abs-2407-13240,
  author       = {Marie{-}Laure Zollinger and
                  Peter B. R{\o}nne and
                  Steve Schneider and
                  Peter Y. A. Ryan and
                  Wojtek Jamroga},
  title        = {Intelligo ut Confido: Understanding, Trust and User Experience in
                  Verifiable Receipt-Free E-Voting (long version)},
  journal      = {CoRR},
  volume       = {abs/2407.13240},
  year         = {2024}
}
@article{DBLP:journals/ce/KrieglsteinSGBN23,
  author       = {Felix Krieglstein and
                  Sascha Schneider and
                  Jessica Gr{\"{o}}ninger and
                  Maik Beege and
                  Steve Nebel and
                  Lukas Wesenberg and
                  Markus Suren and
                  G{\"{u}}nter Daniel Rey},
  title        = {Exploring the effects of content-related segmentations and metacognitive
                  prompts on learning with whiteboard animations},
  journal      = {Comput. Educ.},
  volume       = {194},
  pages        = {104702},
  year         = {2023}
}
@inproceedings{DBLP:conf/6gnet/FrieseGBZNMZSPB23,
  author       = {Ingo Friese and
                  Mandy Galkow{-}Schneider and
                  Louay Bassbouss and
                  Alexander Zoubarev and
                  Andy Neparidze and
                  Sergiy Melnyk and
                  Qiuheng Zhou and
                  Hans D. Schotten and
                  Tobias Pfandzelter and
                  David Bermbach and
                  Arndt Kritzner and
                  Enrico Zschau and
                  Prasenjit Dhara and
                  Steve G{\"{o}}ring and
                  William Menz and
                  Alexander Raake and
                  Wolfgang R{\"{u}}ther{-}Kindel and
                  Fabian Quaeck and
                  Nick Stuckert and
                  Robert Vilter},
  title        = {True 3D Holography: {A} Communication Service of Tomorrow and Its
                  Requirements for a New Converged Cloud and Network Architecture on
                  the Path to 6G},
  booktitle    = {6GNet},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/blocksys/DesaiMSSR23,
  author       = {Nidhi Desai and
                  Damiano Di Francesco Maesa and
                  Nishanth Sastry and
                  Steve Schneider and
                  Laura Ricci},
  title        = {Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive
                  Sensor Data Streams using Smart Contracts},
  booktitle    = {BlockSys},
  pages        = {2--8},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/imw2/MarkovFSLJK23,
  author       = {Viktor Markov and
                  Gilles Festes and
                  Louisa Schneider and
                  Steven Lemke and
                  Serguei Jourba and
                  Alexander Kotov},
  title        = {Effect of High-Temperature Bake on {RTN} Statistics in Floating Gate
                  Flash Memory Arrays},
  booktitle    = {{IMW}},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/imw2/TkachevLSFG23,
  author       = {Yuri Tkachev and
                  Steven Lemke and
                  Louisa Schneider and
                  Gilles Festes and
                  Parviz Ghazavi},
  title        = {Analog Tuning of Floating-Gate Cells with Sub-Elementary Charge Accuracy
                  for In-Memory Computing Applications},
  booktitle    = {{IMW}},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/iui/SchneiderHRMGGL23,
  author       = {Tobias Schneider and
                  Joana Hois and
                  Alischa Rosenstein and
                  Sandra Metzl and
                  Ansgar R. S. Gerlicher and
                  Sabiha Ghellal and
                  Steve Love},
  title        = {Don't fail me! The Level 5 Autonomous Driving Information Dilemma
                  regarding Transparency and User Experience},
  booktitle    = {{IUI}},
  pages        = {540--552},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/miccai/FilipiakSBZPSBB23,
  author       = {Patryk Filipiak and
                  Timothy M. Shepherd and
                  Lee Basler and
                  Anthony Zuccolotto and
                  Dimitris G. Placantonakis and
                  Walter Schneider and
                  Fernando E. Boada and
                  Steven H. Baete},
  title        = {Diffusion Phantom Study of Fiber Crossings at Varied Angles Reconstructed
                  with ODF-Fingerprinting},
  booktitle    = {CDMRI@MICCAI},
  series       = {Lecture Notes in Computer Science},
  volume       = {14328},
  pages        = {23--34},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/ndss/BudykhoBWRLRRS23,
  author       = {Ksenia Budykho and
                  Ioana Boureanu and
                  Stephan Wesemeyer and
                  Daniel Romero and
                  Matt Lewis and
                  Yogaratnam Rahulan and
                  Fortunat Rajaona and
                  Steve Schneider},
  title        = {Fine-Grained Trackability in Protocol Executions},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2023}
}
@inproceedings{DBLP:conf/sc/Atchley0LBVBBBC23,
  author       = {Scott Atchley and
                  Christopher Zimmer and
                  John Lange and
                  David E. Bernholdt and
                  Ver{\'{o}}nica G. Melesse Vergara and
                  Thomas Beck and
                  Michael J. Brim and
                  Reuben D. Budiardja and
                  Sunita Chandrasekaran and
                  Markus Eisenbach and
                  Thomas M. Evans and
                  Matthew Ezell and
                  Nicholas Frontiere and
                  Antigoni Georgiadou and
                  Joe Glenski and
                  Philipp Grete and
                  Steven P. Hamilton and
                  John K. Holmen and
                  Axel Huebl and
                  Daniel A. Jacobson and
                  Wayne Joubert and
                  Kim H. McMahon and
                  Elia Merzari and
                  Stan G. Moore and
                  Andrew Myers and
                  Stephen Nichols and
                  Sarp Oral and
                  Thomas Papatheodore and
                  Danny Perez and
                  David M. Rogers and
                  Evan Schneider and
                  Jean{-}Luc Vay and
                  P. K. Yeung},
  title        = {Frontier: Exploring Exascale},
  booktitle    = {{SC}},
  pages        = {52:1--52:16},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/tas/SchneidersCFBCN23,
  author       = {Eike Schneiders and
                  Alan Chamberlain and
                  Joel E. Fischer and
                  Steve Benford and
                  Simon Castle{-}Green and
                  Victor Zhi Heung Ngo and
                  Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and
                  Pepita Barnard and
                  Ju Row{-}Farr and
                  Matt Adams and
                  Nick Tandavanitj and
                  Kate Devlin and
                  Clara Mancini and
                  Daniel Mills},
  title        = {{TAS} for Cats: An Artist-led Exploration of Trustworthy Autonomous
                  Systems for Companion Animals},
  booktitle    = {{TAS}},
  pages        = {36:1--36:5},
  publisher    = {{ACM}},
  year         = {2023}
}
@proceedings{DBLP:conf/wisec/2023,
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  publisher    = {{ACM}},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2311-03372,
  author       = {Wojciech Jamroga and
                  Peter Y. A. Ryan and
                  Steve Schneider and
                  Carsten Sch{\"{u}}rmann and
                  Philip B. Stark},
  title        = {A Declaration of Software Independence},
  journal      = {CoRR},
  volume       = {abs/2311.03372},
  year         = {2023}
}
@article{DBLP:journals/fac/KulikDLMSTW22,
  author       = {Tomas Kulik and
                  Brijesh Dongol and
                  Peter Gorm Larsen and
                  Hugo Daniel Macedo and
                  Steve Schneider and
                  Peter W. V. Tran{-}J{\o}rgensen and
                  Jim Woodcock},
  title        = {A Survey of Practical Formal Methods for Security},
  journal      = {Formal Aspects Comput.},
  volume       = {34},
  number       = {1},
  pages        = {1--39},
  year         = {2022}
}
@article{DBLP:journals/jair/AdriaensenBSAEL22,
  author       = {Steven Adriaensen and
                  Andr{\'{e}} Biedenkapp and
                  Gresa Shala and
                  Noor H. Awad and
                  Theresa Eimer and
                  Marius Lindauer and
                  Frank Hutter},
  title        = {Automated Dynamic Algorithm Configuration},
  journal      = {J. Artif. Intell. Res.},
  volume       = {75},
  pages        = {1633--1699},
  year         = {2022}
}
@article{DBLP:journals/sensors/LorenzenRRSBFS22,
  author       = {Steven Robert Lorenzen and
                  Henrik Riedel and
                  Maximilian Michael Rupp and
                  Leon Schmeiser and
                  Hagen Berthold and
                  Andrei Firus and
                  Jens Schneider},
  title        = {Virtual Axle Detector Based on Analysis of Bridge Acceleration Measurements
                  by Fully Convolutional Network},
  journal      = {Sensors},
  volume       = {22},
  number       = {22},
  pages        = {8963},
  year         = {2022}
}
@article{DBLP:journals/toit/HossainHSJKV22,
  author       = {Md. Arafat Hossain and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Jiaojiao Jiang and
                  Muhammad Ashad Kabir and
                  Steve Versteeg},
  title        = {Extracting Formats of Service Messages with Varying Payloads},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {3},
  pages        = {71:1--71:31},
  year         = {2022}
}
@inproceedings{DBLP:conf/cvpr/Perez-Pellitero22,
  author       = {Eduardo P{\'{e}}rez{-}Pellitero and
                  Sibi Catley{-}Chandar and
                  Richard Shaw and
                  Ales Leonardis and
                  Radu Timofte and
                  Zexin Zhang and
                  Cen Liu and
                  Yunbo Peng and
                  Yue Lin and
                  Gaocheng Yu and
                  Jin Zhang and
                  Zhe Ma and
                  Hongbin Wang and
                  Xiangyu Chen and
                  Xintao Wang and
                  Haiwei Wu and
                  Lin Liu and
                  Chao Dong and
                  Jiantao Zhou and
                  Qingsen Yan and
                  Song Zhang and
                  Weiye Chen and
                  Yuhang Liu and
                  Zhen Zhang and
                  Yanning Zhang and
                  Javen Qinfeng Shi and
                  Dong Gong and
                  Dan Zhu and
                  Mengdi Sun and
                  Guannan Chen and
                  Yang Hu and
                  Haowei Li and
                  Baozhu Zou and
                  Zhen Liu and
                  Wenjie Lin and
                  Ting Jiang and
                  Chengzhi Jiang and
                  Xinpeng Li and
                  Mingyan Han and
                  Haoqiang Fan and
                  Jian Sun and
                  Shuaicheng Liu and
                  Juan Mar{\'{\i}}n{-}Vega and
                  Michael Sloth and
                  Peter Schneider{-}Kamp and
                  Richard R{\"{o}}ttger and
                  Chunyang Li and
                  Long Bao and
                  Gang He and
                  Ziyao Xu and
                  Li Xu and
                  Gen Zhan and
                  Ming Sun and
                  Xing Wen and
                  Junlin Li and
                  Jinjing Li and
                  Chenghua Li and
                  Ruipeng Gang and
                  Fangya Li and
                  Chenming Liu and
                  Shuang Feng and
                  Fei Lei and
                  Rui Liu and
                  Junxiang Ruan and
                  Tianhong Dai and
                  Wei Li and
                  Zhan Lu and
                  Hengyan Liu and
                  Peian Huang and
                  Guangyu Ren and
                  Yonglin Luo and
                  Chang Liu and
                  Qiang Tu and
                  Sai Ma and
                  Yizhen Cao and
                  Steven Tel and
                  Barthelemy Heyrman and
                  Dominique Ginhac and
                  Chul Lee and
                  Gahyeon Kim and
                  Seonghyun Park and
                  An Gia Vien and
                  Truong Thanh Nhat Mai and
                  Howoon Yoon and
                  Tu Vo and
                  Alexander Holston and
                  Sheir Zaheer and
                  Chan Y. Park},
  title        = {{NTIRE} 2022 Challenge on High Dynamic Range Imaging: Methods and
                  Results},
  booktitle    = {{CVPR} Workshops},
  pages        = {1008--1022},
  publisher    = {{IEEE}},
  year         = {2022}
}
@inproceedings{DBLP:conf/miccai/FilipiakSBZPSBB22,
  author       = {Patryk Filipiak and
                  Timothy M. Shepherd and
                  Lee Basler and
                  Anthony Zuccolotto and
                  Dimitris G. Placantonakis and
                  Walter Schneider and
                  Fernando E. Boada and
                  Steven H. Baete},
  title        = {Stepwise Stochastic Dictionary Adaptation Improves Microstructure
                  Reconstruction with Orientation Distribution Function Fingerprinting},
  booktitle    = {CDMRI@MICCAI},
  series       = {Lecture Notes in Computer Science},
  volume       = {13722},
  pages        = {89--100},
  publisher    = {Springer},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2205-12633,
  author       = {Eduardo P{\'{e}}rez{-}Pellitero and
                  Sibi Catley{-}Chandar and
                  Richard Shaw and
                  Ales Leonardis and
                  Radu Timofte and
                  Zexin Zhang and
                  Cen Liu and
                  Yunbo Peng and
                  Yue Lin and
                  Gaocheng Yu and
                  Jin Zhang and
                  Zhe Ma and
                  Hongbin Wang and
                  Xiangyu Chen and
                  Xintao Wang and
                  Haiwei Wu and
                  Lin Liu and
                  Chao Dong and
                  Jiantao Zhou and
                  Qingsen Yan and
                  Song Zhang and
                  Weiye Chen and
                  Yuhang Liu and
                  Zhen Zhang and
                  Yanning Zhang and
                  Javen Qinfeng Shi and
                  Dong Gong and
                  Dan Zhu and
                  Mengdi Sun and
                  Guannan Chen and
                  Yang Hu and
                  Haowei Li and
                  Baozhu Zou and
                  Zhen Liu and
                  Wenjie Lin and
                  Ting Jiang and
                  Chengzhi Jiang and
                  Xinpeng Li and
                  Mingyan Han and
                  Haoqiang Fan and
                  Jian Sun and
                  Shuaicheng Liu and
                  Juan Mar{\'{\i}}n{-}Vega and
                  Michael Sloth and
                  Peter Schneider{-}Kamp and
                  Richard R{\"{o}}ttger and
                  Chunyang Li and
                  Long Bao and
                  Gang He and
                  Ziyao Xu and
                  Li Xu and
                  Gen Zhan and
                  Ming Sun and
                  Xing Wen and
                  Junlin Li and
                  Jinjing Li and
                  Chenghua Li and
                  Ruipeng Gang and
                  Fangya Li and
                  Chenming Liu and
                  Shuang Feng and
                  Fei Lei and
                  Rui Liu and
                  Junxiang Ruan and
                  Tianhong Dai and
                  Wei Li and
                  Zhan Lu and
                  Hengyan Liu and
                  Peian Huang and
                  Guangyu Ren and
                  Yonglin Luo and
                  Chang Liu and
                  Qiang Tu and
                  Sai Ma and
                  Yizhen Cao and
                  Steven Tel and
                  Barthelemy Heyrman and
                  Dominique Ginhac and
                  Chul Lee and
                  Gahyeon Kim and
                  Seonghyun Park and
                  An Gia Vien and
                  Truong Thanh Nhat Mai and
                  Howoon Yoon and
                  Tu Vo and
                  Alexander Holston and
                  Sheir Zaheer and
                  Chan Y. Park},
  title        = {{NTIRE} 2022 Challenge on High Dynamic Range Imaging: Methods and
                  Results},
  journal      = {CoRR},
  volume       = {abs/2205.12633},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2205-13881,
  author       = {Steven Adriaensen and
                  Andr{\'{e}} Biedenkapp and
                  Gresa Shala and
                  Noor H. Awad and
                  Theresa Eimer and
                  Marius Lindauer and
                  Frank Hutter},
  title        = {Automated Dynamic Algorithm Configuration},
  journal      = {CoRR},
  volume       = {abs/2205.13881},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2207-03758,
  author       = {Steven Robert Lorenzen and
                  Henrik Riedel and
                  Maximilian Michael Rupp and
                  Leon Schmeiser and
                  Hagen Berthold and
                  Andrei Firus and
                  Jens Schneider},
  title        = {Virtual Axle Detector based on Analysis of Bridge Acceleration Measurements
                  by Fully Convolutional Network},
  journal      = {CoRR},
  volume       = {abs/2207.03758},
  year         = {2022}
}
@article{DBLP:journals/cp/BeegeNSR21,
  author       = {Maik Beege and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {The effect of signaling in dependence on the extraneous cognitive
                  load in learning environments},
  journal      = {Cogn. Process.},
  volume       = {22},
  number       = {2},
  pages        = {209--225},
  year         = {2021}
}
@article{DBLP:journals/cp/BeegeNSR21a,
  author       = {Maik Beege and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {Correction to: The effect of signaling in dependence on the extraneous
                  cognitive load in learning environments},
  journal      = {Cogn. Process.},
  volume       = {22},
  number       = {4},
  pages        = {735},
  year         = {2021}
}
@article{DBLP:journals/cse/DoerflerGGSS21,
  author       = {Douglas Doerfler and
                  Steven Gottlieb and
                  William Gropp and
                  Barry I. Schneider and
                  Alan Sussman},
  title        = {Performance Portability for Advanced Architectures},
  journal      = {Comput. Sci. Eng.},
  volume       = {23},
  number       = {5},
  pages        = {7--9},
  year         = {2021}
}
@article{DBLP:journals/jnca/JiangSVHHL21,
  author       = {Jiaojiao Jiang and
                  Jean{-}Guy Schneider and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Chengfei Liu},
  title        = {R-gram: Inferring message formats of service protocols with relative
                  positional n-grams},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {196},
  pages        = {103247},
  year         = {2021}
}
@article{DBLP:journals/tdsc/HanCSTW21,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1836--1849},
  year         = {2021}
}
@inproceedings{DBLP:conf/birthday/JamrogaRSSS21,
  author       = {Wojciech Jamroga and
                  Peter Y. A. Ryan and
                  Steve Schneider and
                  Carsten Sch{\"{u}}rmann and
                  Philip B. Stark},
  title        = {A Declaration of Software Independence},
  booktitle    = {Protocols, Strands, and Logic},
  series       = {Lecture Notes in Computer Science},
  volume       = {13066},
  pages        = {198--217},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/eacl/RehmPBHAVBGGCFH21,
  author       = {Georg Rehm and
                  Stelios Piperidis and
                  Kalina Bontcheva and
                  Jan Hajic and
                  Victoria Arranz and
                  Andrejs Vasiljevs and
                  Gerhard Backfried and
                  Jos{\'{e}} Manu{\'{e}}l G{\'{o}}mez{-}P{\'{e}}rez and
                  Ulrich Germann and
                  R{\'{e}}mi Calizzano and
                  Nils Feldhus and
                  Stefanie Hegele and
                  Florian Kintzel and
                  Katrin Marheinecke and
                  Juli{\'{a}}n Moreno Schneider and
                  Dimitris Galanis and
                  Penny Labropoulou and
                  Miltos Deligiannis and
                  Katerina Gkirtzou and
                  Athanasia Kolovou and
                  Dimitris Gkoumas and
                  Leon Voukoutis and
                  Ian Roberts and
                  Jana Hamrlov{\'{a}} and
                  Dusan Varis and
                  Luk{\'{a}}s Kacena and
                  Khalid Choukri and
                  Val{\'{e}}rie Mapelli and
                  Micka{\"{e}}l Rigault and
                  Julija Melnika and
                  Miroslav J{\'{a}}nos{\'{\i}}k and
                  Katja Prinz and
                  Andr{\'{e}}s Garc{\'{\i}}a{-}Silva and
                  Cristian Berrio and
                  Ondrej Klejch and
                  Steve Renals},
  title        = {European Language Grid: {A} Joint Platform for the European Language
                  Technology Community},
  booktitle    = {{EACL} (System Demonstrations)},
  pages        = {221--230},
  publisher    = {Association for Computational Linguistics},
  year         = {2021}
}
@inproceedings{DBLP:conf/ijcai/EimerBRAHL21,
  author       = {Theresa Eimer and
                  Andr{\'{e}} Biedenkapp and
                  Maximilian Reimer and
                  Steven Adriaensen and
                  Frank Hutter and
                  Marius Lindauer},
  title        = {DACBench: {A} Benchmark Library for Dynamic Algorithm Configuration},
  booktitle    = {{IJCAI}},
  pages        = {1668--1674},
  publisher    = {ijcai.org},
  year         = {2021}
}
@inproceedings{DBLP:conf/iui/SchneiderGLG21,
  author       = {Tobias Schneider and
                  Sabiha Ghellal and
                  Steve Love and
                  Ansgar R. S. Gerlicher},
  title        = {Increasing the User Experience in Autonomous Driving through different
                  Feedback Modalities},
  booktitle    = {{IUI}},
  pages        = {7--10},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/sui/SchneiderHRLLG21,
  author       = {Tobias Schneider and
                  Joana Hois and
                  Alischa Rosenstein and
                  Raimondo Lazzara and
                  Steve Love and
                  Ansgar R. S. Gerlicher},
  title        = {Velocity Styles for Autonomous Vehicles affecting Control, Safety,
                  and User Experience},
  booktitle    = {{SUI}},
  pages        = {29:1--29:2},
  publisher    = {{ACM}},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2105-08541,
  author       = {Theresa Eimer and
                  Andr{\'{e}} Biedenkapp and
                  Maximilian Reimer and
                  Steven Adriaensen and
                  Frank Hutter and
                  Marius Lindauer},
  title        = {DACBench: {A} Benchmark Library for Dynamic Algorithm Configuration},
  journal      = {CoRR},
  volume       = {abs/2105.08541},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2109-01362,
  author       = {Tomas Kulik and
                  Brijesh Dongol and
                  Peter Gorm Larsen and
                  Hugo Daniel Macedo and
                  Steve Schneider and
                  Peter W{\"{u}}rtz Vinther Tran{-}J{\o}rgensen and
                  Jim Woodcock},
  title        = {A Survey of Practical Formal Methods for Security},
  journal      = {CoRR},
  volume       = {abs/2109.01362},
  year         = {2021}
}
@article{DBLP:journals/ce/BeegeNSNSWMR20,
  author       = {Maik Beege and
                  Manuel Ninaus and
                  Sascha Schneider and
                  Steve Nebel and
                  Julia Schlemmel and
                  Jasmin Weidenm{\"{u}}ller and
                  Korbinian Moeller and
                  G{\"{u}}nter Daniel Rey},
  title        = {Investigating the effects of beat and deictic gestures of a lecturer
                  in educational videos},
  journal      = {Comput. Educ.},
  volume       = {156},
  pages        = {103955},
  year         = {2020}
}
@article{DBLP:journals/chb/BeegeSNR20,
  author       = {Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  G{\"{u}}nter Daniel Rey},
  title        = {Does the effect of enthusiasm in a pedagogical Agent's voice depend
                  on mental load in the Learner's working memory?},
  journal      = {Comput. Hum. Behav.},
  volume       = {112},
  pages        = {106483},
  year         = {2020}
}
@article{DBLP:journals/fac/WilliamsDSM20,
  author       = {David M. Williams and
                  Salaheddin Darwish and
                  Steve Schneider and
                  David R. Michael},
  title        = {Legislation-driven development of a Gift Aid system using Event-B},
  journal      = {Formal Aspects Comput.},
  volume       = {32},
  number       = {2-3},
  pages        = {251--273},
  year         = {2020}
}
@article{DBLP:journals/fgcs/JiangVHHS20,
  author       = {Jiaojiao Jiang and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Jean{-}Guy Schneider},
  title        = {A positional keyword-based approach to inferring fine-grained message
                  formats},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {102},
  pages        = {369--381},
  year         = {2020}
}
@article{DBLP:journals/tifs/HanCSTWW20,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer and
                  Nick Wilson},
  title        = {Anonymous Single Sign-On With Proxy Re-Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {223--236},
  year         = {2020}
}
@inproceedings{DBLP:conf/accv/GittingsSC20,
  author       = {Thomas Gittings and
                  Steve Schneider and
                  John P. Collomosse},
  title        = {Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks},
  booktitle    = {{ACCV} {(4)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12625},
  pages        = {235--251},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/cogsci/PittSFGBP20,
  author       = {Benjamin Pitt and
                  Rose M. Schneider and
                  Stephen Ferrigno and
                  Edward Gibson and
                  David Barner and
                  Steven T. Piantadosi},
  title        = {Procedures and principles of number: Evidence from the Tsimane'},
  booktitle    = {CogSci},
  publisher    = {cognitivesciencesociety.org},
  year         = {2020}
}
@inproceedings{DBLP:conf/icdcs/SallalSCDTDRW20,
  author       = {Muntadher Sallal and
                  Steve Schneider and
                  Matthew Casey and
                  Fran{\c{c}}ois Dupressoir and
                  Helen Treharne and
                  Constantin Catalin Dragan and
                  Luke Riley and
                  Phil Wright},
  title        = {Augmenting an Internet Voting System with Selene Verifiability using
                  Permissioned Distributed Ledger},
  booktitle    = {{ICDCS}},
  pages        = {1167--1168},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/ppsn/ShalaBAALH20,
  author       = {Gresa Shala and
                  Andr{\'{e}} Biedenkapp and
                  Noor H. Awad and
                  Steven Adriaensen and
                  Marius Lindauer and
                  Frank Hutter},
  title        = {Learning Step-Size Adaptation in {CMA-ES}},
  booktitle    = {{PPSN} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12269},
  pages        = {691--706},
  publisher    = {Springer},
  year         = {2020}
}
@proceedings{DBLP:conf/esorics/2020-1,
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  publisher    = {Springer},
  year         = {2020}
}
@proceedings{DBLP:conf/esorics/2020-2,
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  publisher    = {Springer},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2009-08194,
  author       = {Thomas Gittings and
                  Steve A. Schneider and
                  John P. Collomosse},
  title        = {Vax-a-Net: Training-time Defence Against Adversarial Patch Attacks},
  journal      = {CoRR},
  volume       = {abs/2009.08194},
  year         = {2020}
}
@article{DBLP:journals/access/JiangVHHSLF19,
  author       = {Jiaojiao Jiang and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Jean{-}Guy Schneider and
                  Christopher Leckie and
                  Zeinab Farahmandpour},
  title        = {P-Gram: Positional N-Gram for the Clustering of Machine-Generated
                  Messages},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {88504--88516},
  year         = {2019}
}
@article{DBLP:journals/chb/BeegeNSR19,
  author       = {Maik Beege and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {Social entities in educational videos: Combining the effects of addressing
                  and professionalism},
  journal      = {Comput. Hum. Behav.},
  volume       = {93},
  pages        = {40--52},
  year         = {2019}
}
@article{DBLP:journals/tbe/PriesterWKSZASR19,
  author       = {Alan Priester and
                  Holden H. Wu and
                  Pooria Khoshnoodi and
                  Douglas Schneider and
                  Zhaohuan Zhang and
                  Nazanin H. Asvadi and
                  Anthony Sisk and
                  Steven S. Raman and
                  Robert E. Reiter and
                  Warren S. Grundfest and
                  Leonard S. Marks and
                  Shyam Natarajan},
  title        = {Registration Accuracy of Patient-Specific, Three-Dimensional-Printed
                  Prostate Molds for Correlating Pathology With Magnetic Resonance Imaging},
  journal      = {{IEEE} Trans. Biomed. Eng.},
  volume       = {66},
  number       = {1},
  pages        = {14--22},
  year         = {2019}
}
@inproceedings{DBLP:conf/bmvc/GittingsSC19,
  author       = {Thomas Gittings and
                  Steve A. Schneider and
                  John P. Collomosse},
  title        = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image
                  Prior},
  booktitle    = {{BMVC}},
  pages        = {283},
  publisher    = {{BMVA} Press},
  year         = {2019}
}
@inproceedings{DBLP:conf/eurosp/WhitefieldCSSTW19,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Ralf Sasse and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {A Symbolic Analysis of ECC-Based Direct Anonymous Attestation},
  booktitle    = {EuroS{\&}P},
  pages        = {127--141},
  publisher    = {{IEEE}},
  year         = {2019}
}
@proceedings{DBLP:conf/esorics/2019-1,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  publisher    = {Springer},
  year         = {2019}
}
@proceedings{DBLP:conf/esorics/2019-2,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  publisher    = {Springer},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1907-01996,
  author       = {Thomas Gittings and
                  Steve A. Schneider and
                  John P. Collomosse},
  title        = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image
                  Prior},
  journal      = {CoRR},
  volume       = {abs/1907.01996},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1912-00288,
  author       = {Muntadher Sallal and
                  Steve A. Schneider and
                  Matthew Casey and
                  Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Luke Riley and
                  Helen Treharne and
                  Joe Wadsworth and
                  Phil Wright},
  title        = {{VMV:} Augmenting an Internet Voting System with Selene Verifiability},
  journal      = {CoRR},
  volume       = {abs/1912.00288},
  year         = {2019}
}
@article{DBLP:journals/aci/LaneMAGKSL18,
  author       = {Steven R. Lane and
                  Holly Miller and
                  Elizabeth Ames and
                  Lawrence Garber and
                  David C. Kibbe and
                  Joseph Schneider and
                  Christoph U. Lehmann},
  title        = {Consensus Statement: Feature and Function Recommendations to Optimize
                  Clinician Usability of Direct Interoperability to Enhance Patient
                  Care},
  journal      = {Appl. Clin. Inform.},
  volume       = {09},
  number       = {01},
  pages        = {205--220},
  year         = {2018}
}
@article{DBLP:journals/ce/BeegeSNHR18,
  author       = {Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  Alexandra H{\"{a}}{\ss}ler and
                  G{\"{u}}nter Daniel Rey},
  title        = {Mood-affect congruency. Exploring the relation between learners' mood
                  and the affective charge of educational videos},
  journal      = {Comput. Educ.},
  volume       = {123},
  pages        = {85--96},
  year         = {2018}
}
@inproceedings{DBLP:conf/esorics/HanCSTW18,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Anonymous Single-Sign-On for n Designated Services with Traceability},
  booktitle    = {{ESORICS} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {470--490},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icst/WendlandHSU18,
  author       = {Marc{-}Florian Wendland and
                  Niels Hoppe and
                  Martin A. Schneider and
                  Steven Ulrich},
  title        = {Extending the {UML} Testing Profile with a Fine-Grained Test Logging
                  Model},
  booktitle    = {{ICST} Workshops},
  pages        = {257--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2018}
}
@inproceedings{DBLP:conf/wcre/HossainVHKJS18,
  author       = {Md. Arafat Hossain and
                  Steve Versteeg and
                  Jun Han and
                  Muhammad Ashad Kabir and
                  Jiaojiao Jiang and
                  Jean{-}Guy Schneider},
  title        = {Mining accurate message formats for service APIs},
  booktitle    = {{SANER}},
  pages        = {266--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2018}
}
@proceedings{DBLP:conf/isw/2018,
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  publisher    = {Springer},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1804-07201,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Anonymous Single-Sign-On for n designated services with traceability},
  journal      = {CoRR},
  volume       = {abs/1804.07201},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1811-07642,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer and
                  Nick Wilson},
  title        = {Anonymous Single Sign-on with Proxy Re-Verification},
  journal      = {CoRR},
  volume       = {abs/1811.07642},
  year         = {2018}
}
@article{DBLP:journals/ce/NebelSBR17,
  author       = {Steve Nebel and
                  Sascha Schneider and
                  Maik Beege and
                  G{\"{u}}nter Daniel Rey},
  title        = {Leaderboards within educational videogames: The impact of difficulty,
                  effort and gameplay},
  journal      = {Comput. Educ.},
  volume       = {113},
  pages        = {28--41},
  year         = {2017}
}
@article{DBLP:journals/chb/BeegeSNMR17,
  author       = {Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  Jessica Mittangk and
                  G{\"{u}}nter Daniel Rey},
  title        = {Ageism - Age coherence within learning material fosters learning},
  journal      = {Comput. Hum. Behav.},
  volume       = {75},
  pages        = {510--519},
  year         = {2017}
}
@article{DBLP:journals/cj/YuHSHV17,
  author       = {Jian Yu and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Cameron M. Hine and
                  Steve Versteeg},
  title        = {A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise
                  Software Systems},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {1},
  pages        = {27--44},
  year         = {2017}
}
@article{DBLP:journals/ieeesp/BenalohRST17,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {A Vote of Confidence?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {3},
  pages        = {12--13},
  year         = {2017}
}
@article{DBLP:journals/remotesensing/DalanSWSV17,
  author       = {Rinita Dalan and
                  Jay Sturdevant and
                  Rebecca Wallace and
                  Blair Schneider and
                  Steven De Vore},
  title        = {Cutbank Geophysics: {A} New Method for Expanding Magnetic Investigations
                  to the Subsurface Using Magnetic Susceptibility Testing at an Awatixa
                  Hidatsa Village, North Dakota},
  journal      = {Remote. Sens.},
  volume       = {9},
  number       = {2},
  pages        = {112},
  year         = {2017}
}
@inproceedings{DBLP:conf/candc/AndolinaSCKJD17,
  author       = {Salvatore Andolina and
                  Hendrik Schneider and
                  Joel Chan and
                  Khalil Klouche and
                  Giulio Jacucci and
                  Steven Dow},
  title        = {Crowdboard: Augmenting In-Person Idea Generation with Real-Time Crowds},
  booktitle    = {Creativity {\&} Cognition},
  pages        = {106--118},
  publisher    = {{ACM}},
  year         = {2017}
}
@inproceedings{DBLP:conf/cri/MilosevicGCDLSN17,
  author       = {Nikola Milosevic and
                  Anay Gupta and
                  Austin Chen and
                  Steven DeMarco and
                  Joshua P. Le and
                  Jodi Schneider and
                  Yifan Ning and
                  Goran Nenadic and
                  Richard D. Boyce},
  title        = {Extraction of Drug-Drug Interactions from Drug Product Labeling Tables},
  booktitle    = {{CRI}},
  publisher    = {{AMIA}},
  year         = {2017}
}
@inproceedings{DBLP:conf/stm/WhitefieldCKPST17,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Frank Kargl and
                  Andrew Paverd and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Formal Analysis of {V2X} Revocation Protocols},
  booktitle    = {{STM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/vnc/WhitefieldCGST17,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Thanassis Giannetsos and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Privacy-enhanced capabilities for VANETs using direct anonymous attestation},
  booktitle    = {{VNC}},
  pages        = {123--130},
  publisher    = {{IEEE}},
  year         = {2017}
}
@proceedings{DBLP:conf/ifm/2017,
  editor       = {Nadia Polikarpova and
                  Steve A. Schneider},
  title        = {Integrated Formal Methods - 13th International Conference, {IFM} 2017,
                  Turin, Italy, September 20-22, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10510},
  publisher    = {Springer},
  year         = {2017}
}
@article{DBLP:journals/corr/HanCST17,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {{PPETS-FGP:} Privacy-Preserving Electronic Ticket Scheme with Fine-Grained
                  Pricing},
  journal      = {CoRR},
  volume       = {abs/1706.03016},
  year         = {2017}
}
@article{DBLP:journals/corr/WhitefieldCKPST17,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Frank Kargl and
                  Andrew Paverd and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Formal Analysis of {V2X} Revocation Protocols},
  journal      = {CoRR},
  volume       = {abs/1704.07216},
  year         = {2017}
}
@article{DBLP:journals/f1000research/JimenezKABBBCHC17,
  author       = {Rafael C. Jim{\'{e}}nez and
                  Mateusz Kuzak and
                  Monther Alhamdoosh and
                  Michelle Barker and
                  B{\'{e}}r{\'{e}}nice Batut and
                  Mikael Borg and
                  Salvador Capella{-}Guti{\'{e}}rrez and
                  Neil P. Chue Hong and
                  Martin Cook and
                  Manuel Corpas and
                  Madison Flannery and
                  Leyla J. Garc{\'{\i}}a and
                  Josep Lluis Gelp{\'{\i}} and
                  Simon L. Gladman and
                  Carole A. Goble and
                  Montserrat Gonz{\'{a}}lez Ferreiro and
                  Alejandra N. Gonz{\'{a}}lez{-}Beltr{\'{a}}n and
                  Philippa C. Griffin and
                  Bj{\"{o}}rn A. Gr{\"{u}}ning and
                  Jonas Hagberg and
                  Petr Holub and
                  Rob W. W. Hooft and
                  Jon C. Ison and
                  Daniel S. Katz and
                  Brane Leskosek and
                  Federico L{\'{o}}pez{-}G{\'{o}}mez and
                  Luis J. Oliveira and
                  David Mellor and
                  Rowland Mosbergen and
                  Nicola J. Mulder and
                  Yasset P{\'{e}}rez{-}Riverol and
                  Robert Pergl and
                  Horst Pichler and
                  Bernard J. Pope and
                  Ferran Sanz and
                  Maria Victoria Schneider and
                  Victoria Stodden and
                  Radoslaw Suchecki and
                  Radka Svobodov{\'{a}} Varekov{\'{a}} and
                  Harry{-}Anton Talvik and
                  Ilian T. Todorov and
                  Andrew E. Treloar and
                  Sonika Tyagi and
                  Maarten van Gompel and
                  Daniel Vaughan and
                  Allegra Via and
                  Xiaochuan Wang and
                  Nathan S. Watson{-}Haigh and
                  Steve Crouch},
  title        = {Four simple recommendations to encourage best practices in research
                  software},
  journal      = {F1000Research},
  volume       = {6},
  pages        = {876},
  year         = {2017}
}
@article{DBLP:journals/ce/WirzbergerBSNR16,
  author       = {Maria Wirzberger and
                  Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  G{\"{u}}nter Daniel Rey},
  title        = {One for all?! Simultaneous examination of load-inducing factors for
                  advancing media-related instructional research},
  journal      = {Comput. Educ.},
  volume       = {100},
  pages        = {18--31},
  year         = {2016}
}
@article{DBLP:journals/chb/NebelBSR16,
  author       = {Steve Nebel and
                  Maik Beege and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {The higher the score, the higher the learning outcome? Heterogeneous
                  impacts of leaderboards and choice within educational videogames},
  journal      = {Comput. Hum. Behav.},
  volume       = {65},
  pages        = {391--401},
  year         = {2016}
}
@article{DBLP:journals/chb/NebelSR16,
  author       = {Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {From duels to classroom competition: Social competition and learning
                  in educational videogames within different group sizes},
  journal      = {Comput. Hum. Behav.},
  volume       = {55},
  pages        = {384--398},
  year         = {2016}
}
@article{DBLP:journals/chb/SkulmowskiAPNSR16,
  author       = {Alexander Skulmowski and
                  Yannik Augustin and
                  Simon Pradel and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {The negative impact of saturation on website trustworthiness and appeal:
                  {A} temporal model of aesthetic website perception},
  journal      = {Comput. Hum. Behav.},
  volume       = {61},
  pages        = {386--393},
  year         = {2016}
}
@article{DBLP:journals/ets/NebelSR16,
  author       = {Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {Mining Learning and Crafting Scientific Experiments: {A} Literature
                  Review on the Use of Minecraft in Education and Research},
  journal      = {J. Educ. Technol. Soc.},
  volume       = {19},
  number       = {2},
  pages        = {355--366},
  year         = {2016}
}
@article{DBLP:journals/fac/HoangSTW16,
  author       = {Thai Son Hoang and
                  Steve A. Schneider and
                  Helen Treharne and
                  David M. Williams},
  title        = {Foundations for using linear temporal logic in Event-B refinement},
  journal      = {Formal Aspects Comput.},
  volume       = {28},
  number       = {6},
  pages        = {909--935},
  year         = {2016}
}
@article{DBLP:journals/ieeesp/BurtonCS16,
  author       = {Craig Burton and
                  Chris Culnane and
                  Steve A. Schneider},
  title        = {vVote: Verifiable Electronic Voting in Practice},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {64--73},
  year         = {2016}
}
@article{DBLP:journals/sosym/MoranHS16,
  author       = {Murat Moran and
                  James Heather and
                  Steve A. Schneider},
  title        = {Automated anonymity verification of the ThreeBallot and {VAV} voting
                  systems},
  journal      = {Softw. Syst. Model.},
  volume       = {15},
  number       = {4},
  pages        = {1049--1062},
  year         = {2016}
}
@inproceedings{DBLP:conf/cpp/SchaferSS16,
  author       = {Steven Sch{\"{a}}fer and
                  Sigurd Schneider and
                  Gert Smolka},
  title        = {Axiomatic semantics for compiler verification},
  booktitle    = {{CPP}},
  pages        = {188--196},
  publisher    = {{ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/icse/HineSHV16,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steve Versteeg},
  title        = {Enterprise software service emulation: constructing large-scale testbeds},
  booktitle    = {CSED@ICSE},
  pages        = {56--62},
  publisher    = {{ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/icse/VersteegDBSGH16,
  author       = {Steve Versteeg and
                  Miao Du and
                  John Bird and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han},
  title        = {Enhanced playback of automated service emulation models using entropy
                  analysis},
  booktitle    = {CSED@ICSE},
  pages        = {49--55},
  publisher    = {{ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/icse/VersteegDSGHG16,
  author       = {Steven Versteeg and
                  Miao Du and
                  Jean{-}Guy Schneider and
                  John Grundy and
                  Jun Han and
                  Menka Goyal},
  title        = {Opaque service virtualisation: a practical tool for emulating endpoint
                  systems},
  booktitle    = {{ICSE} (Companion Volume)},
  pages        = {202--211},
  publisher    = {{ACM}},
  year         = {2016}
}
@incollection{DBLP:books/crc/p/SchneiderTW16,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  David M. Williams},
  title        = {Event-B and Linear Temporal Logic},
  booktitle    = {From Action Systems to Distributed Systems},
  pages        = {113--123},
  publisher    = {Chapman and Hall/CRC},
  year         = {2016}
}
@proceedings{DBLP:conf/acns/2016,
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  publisher    = {Springer},
  year         = {2016}
}
@article{DBLP:journals/corr/HineSHV16,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steve Versteeg},
  title        = {Enterprise Software Service Emulation: Constructing Large-Scale Testbeds},
  journal      = {CoRR},
  volume       = {abs/1605.06729},
  year         = {2016}
}
@article{DBLP:journals/corr/SchneiderMV16,
  author       = {Jean{-}Guy Schneider and
                  Peter Mandile and
                  Steve Versteeg},
  title        = {Generalized Suffix Tree based Multiple Sequence Alignment for Service
                  Virtualization},
  journal      = {CoRR},
  volume       = {abs/1606.01593},
  year         = {2016}
}
@article{DBLP:journals/corr/VersteegDBSGH16,
  author       = {Steve Versteeg and
                  Miao Du and
                  John Bird and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han},
  title        = {Enhanced Playback of Automated Service Emulation Models Using Entropy
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/1605.06668},
  year         = {2016}
}
@article{DBLP:journals/corr/VersteegDSGHG16,
  author       = {Steve Versteeg and
                  Miao Du and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han and
                  Menka Goyal},
  title        = {Opaque Service Virtualisation: {A} Practical Tool for Emulating Endpoint
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1605.06670},
  year         = {2016}
}
@article{DBLP:journals/cars/SongTTJBSGDOHC15,
  author       = {Yi Song and
                  Johannes Totz and
                  Steve Thompson and
                  Stian Flage Johnsen and
                  Dean C. Barratt and
                  Crispin Schneider and
                  Kurinchi Gurusamy and
                  Brian R. Davidson and
                  S{\'{e}}bastien Ourselin and
                  David J. Hawkes and
                  Matthew J. Clarkson},
  title        = {Locally rigid, vessel-based registration for laparoscopic liver surgery},
  journal      = {Int. J. Comput. Assist. Radiol. Surg.},
  volume       = {10},
  number       = {12},
  pages        = {1951--1961},
  year         = {2015}
}
@article{DBLP:journals/chb/SchneiderNPR15,
  author       = {Sascha Schneider and
                  Steve Nebel and
                  Simon Pradel and
                  G{\"{u}}nter Daniel Rey},
  title        = {Introducing the familiarity mechanism: {A} unified explanatory approach
                  for the personalization effect and the examination of youth slang
                  in multimedia learning},
  journal      = {Comput. Hum. Behav.},
  volume       = {43},
  pages        = {129--138},
  year         = {2015}
}
@article{DBLP:journals/chb/SchneiderNPR15a,
  author       = {Sascha Schneider and
                  Steve Nebel and
                  Simon Pradel and
                  G{\"{u}}nter Daniel Rey},
  title        = {Mind your Ps and Qs! How polite instructions affect learning with
                  multimedia},
  journal      = {Comput. Hum. Behav.},
  volume       = {51},
  pages        = {546--555},
  year         = {2015}
}
@article{DBLP:journals/ieeesp/RyanST15,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {End-to-End Verifiability in Voting Systems, from Theory to Practice},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {59--62},
  year         = {2015}
}
@article{DBLP:journals/jcs/AlshehriS15,
  author       = {Abdullah Ali Alshehri and
                  Steve A. Schneider},
  title        = {A formal framework for security analysis of {NFC} mobile coupon protocols},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {685--707},
  year         = {2015}
}
@article{DBLP:journals/scp/SchneiderT15,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {Special issue on Automated Verification of Critical Systems (AVoCS
                  2013)},
  journal      = {Sci. Comput. Program.},
  volume       = {111},
  pages        = {213},
  year         = {2015}
}
@article{DBLP:journals/sigsoft/DuVSHG15,
  author       = {Miao Du and
                  Steven Versteeg and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  John C. Grundy},
  title        = {Interaction Traces Mining for Efficient System Responses Generation},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {40},
  number       = {1},
  pages        = {1--8},
  year         = {2015}
}
@article{DBLP:journals/tissec/CulnaneRST15,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: {A} Verifiable Voting System},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {3:1--3:30},
  year         = {2015}
}
@inproceedings{DBLP:conf/aswec/SchneiderMV15,
  author       = {Jean{-}Guy Schneider and
                  Peter Mandile and
                  Steven Versteeg},
  title        = {Generalized Suffix Tree Based Multiple Sequence Alignment for Service
                  Virtualization},
  booktitle    = {{ASWEC}},
  pages        = {48--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2015}
}
@article{DBLP:journals/corr/BurtonCS15,
  author       = {Craig Burton and
                  Chris Culnane and
                  Steve A. Schneider},
  title        = {Secure and Verifiable Electronic Voting in Practice: the use of vVote
                  in the Victorian State Election},
  journal      = {CoRR},
  volume       = {abs/1504.07098},
  year         = {2015}
}
@article{DBLP:journals/corr/DuVSGH15,
  author       = {Miao Du and
                  Steven Versteeg and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han},
  title        = {From Network Traces to System Responses: Opaquely Emulating Software
                  Services},
  journal      = {CoRR},
  volume       = {abs/1510.01421},
  year         = {2015}
}
@article{DBLP:journals/corr/SchiobergSSUF15,
  author       = {Doris Schi{\"{o}}berg and
                  Fabian Schneider and
                  Stefan Schmid and
                  Steve Uhlig and
                  Anja Feldmann},
  title        = {Evolution of Directed Triangle Motifs in the Google+ {OSN}},
  journal      = {CoRR},
  volume       = {abs/1502.04321},
  year         = {2015}
}
@article{DBLP:journals/cbm/NordboLLNALSMGTTLSRSOV14,
  author       = {{\O}yvind Nordb{\o} and
                  Pablo Lamata and
                  Sander Land and
                  Steven A. Niederer and
                  Jan M. Aronsen and
                  William E. Louch and
                  Ivar Sjaastad and
                  Harald Martens and
                  Arne B. Gjuvsland and
                  Kristin T{\o}ndel and
                  Hans Torp and
                  Ma{\'{e}}l{\`{e}}ne Lohezic and
                  J{\"{u}}rgen E. Schneider and
                  Espen W. Remme and
                  Nicolas Smith and
                  Stig W. Omholt and
                  Jon Olav Vik},
  title        = {A computational pipeline for quantification of mouse myocardial stiffness
                  parameters},
  journal      = {Comput. Biol. Medicine},
  volume       = {53},
  pages        = {65--75},
  year         = {2014}
}
@article{DBLP:journals/concurrency/BrowneDPBHJFSGGGPSIBWCYMLW14,
  author       = {James C. Browne and
                  Robert L. DeLeon and
                  Abani K. Patra and
                  William L. Barth and
                  John L. Hammond and
                  Matthew D. Jones and
                  Thomas R. Furlani and
                  Barry I. Schneider and
                  Steven M. Gallo and
                  Amin Ghadersohi and
                  Ryan J. Gentner and
                  Jeffrey T. Palmer and
                  Nikolay Simakov and
                  Martins Innus and
                  Andrew E. Bruno and
                  Joseph P. White and
                  Cynthia D. Cornelius and
                  Thomas Yearke and
                  Kyle Marcus and
                  Gregor von Laszewski and
                  Fugang Wang},
  title        = {Comprehensive, open-source resource usage measurement and analysis
                  for {HPC} systems},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {26},
  number       = {13},
  pages        = {2191--2209},
  year         = {2014}
}
@article{DBLP:journals/fac/BoitenS14,
  author       = {Eerke A. Boiten and
                  Steve A. Schneider},
  title        = {Editorial},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {1--2},
  year         = {2014}
}
@article{DBLP:journals/fac/HeatherST14,
  author       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Cryptographic protocols with everyday objects},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {37--62},
  year         = {2014}
}
@article{DBLP:journals/fac/MoranHS14,
  author       = {Murat Moran and
                  James Heather and
                  Steve A. Schneider},
  title        = {Verifying anonymity in voting systems using {CSP}},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {63--98},
  year         = {2014}
}
@article{DBLP:journals/fac/SchneiderTW14,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  title        = {The behavioural semantics of Event-B refinement},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {2},
  pages        = {251--280},
  year         = {2014}
}
@article{DBLP:journals/istr/SchneiderTCH14,
  author       = {Steve A. Schneider and
                  Vanessa Teague and
                  Chris Culnane and
                  James Heather},
  title        = {Special Section on Vote-ID 2013},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {103--104},
  year         = {2014}
}
@article{DBLP:journals/scp/JamesMNRST14,
  author       = {Phillip James and
                  Faron Moller and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {On modelling and verifying railway interlockings: Tracking train lengths},
  journal      = {Sci. Comput. Program.},
  volume       = {96},
  pages        = {315--336},
  year         = {2014}
}
@article{DBLP:journals/sttt/JamesMNRST14,
  author       = {Phillip James and
                  Faron Moller and
                  Nguyen Hoang Nga and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Techniques for modelling and verifying railway interlockings},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {16},
  number       = {6},
  pages        = {685--711},
  year         = {2014}
}
@article{DBLP:journals/tse/HeHYJSV14,
  author       = {Qiang He and
                  Jun Han and
                  Yun Yang and
                  Hai Jin and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Formulating Cost-Effective Monitoring Strategies for Service-Based
                  Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {40},
  number       = {5},
  pages        = {461--482},
  year         = {2014}
}
@inproceedings{DBLP:conf/cogsci/DavenportKHS14,
  author       = {Jodi L. Davenport and
                  Yvonne Kao and
                  Aleata Hubbard and
                  Steven Schneider},
  title        = {Testing Cognitive Science Principles in a Middle School Mathematics
                  Curriculum},
  booktitle    = {CogSci},
  publisher    = {cognitivesciencesociety.org},
  year         = {2014}
}
@inproceedings{DBLP:conf/csfw/CulnaneS14,
  author       = {Chris Culnane and
                  Steve A. Schneider},
  title        = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems},
  booktitle    = {{CSF}},
  pages        = {169--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2014}
}
@inproceedings{DBLP:conf/icls/LonnBPPSRS14,
  author       = {Steven Lonn and
                  Christopher Brooks and
                  Zachary A. Pardos and
                  Barry W. Peddycord III and
                  Emily Schneider and
                  Ido Roll and
                  Ashley Shaw},
  title        = {MOOCShop 2014},
  booktitle    = {{ICLS}},
  publisher    = {International Society of the Learning Sciences},
  year         = {2014}
}
@inproceedings{DBLP:conf/ifm/SchneiderTWW14,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim and
                  David M. Williams},
  title        = {Managing {LTL} Properties in Event-B Refinement},
  booktitle    = {{IFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8739},
  pages        = {221--237},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/milcom/WuSRR14,
  author       = {John Wu and
                  Steven Schneider and
                  Ranga S. Ramanujan and
                  Matthew Rambo},
  title        = {{ADNS} IPv6 Transition Architecture and Analysis},
  booktitle    = {{MILCOM}},
  pages        = {1167--1172},
  publisher    = {{IEEE}},
  year         = {2014}
}
@inproceedings{DBLP:conf/nss/SrinivasanCHSX14,
  author       = {Sriramkrishnan Srinivasan and
                  Chris Culnane and
                  James Heather and
                  Steve A. Schneider and
                  Zhe Xia},
  title        = {Countering Ballot Stuffing and Incorporating Eligibility Verifiability
                  in Helios},
  booktitle    = {{NSS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {335--348},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/secsr/StathakidisSH14,
  author       = {Efstathios Stathakidis and
                  Steve A. Schneider and
                  James Heather},
  title        = {Robustness Modelling and Verification of a Mix Net Protocol},
  booktitle    = {{SSR}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {131--150},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/uss/CulnaneHJRST14,
  author       = {Chris Culnane and
                  James Heather and
                  Rui Joaquim and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {{EVT/WOTE}},
  publisher    = {{USENIX} Association},
  year         = {2014}
}
@article{DBLP:journals/corr/CulnaneRST14,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: a Verifiable Voting System {(DRAFT)}},
  journal      = {CoRR},
  volume       = {abs/1404.6822},
  year         = {2014}
}
@article{DBLP:journals/corr/CulnaneS14,
  author       = {Chris Culnane and
                  Steve A. Schneider},
  title        = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems},
  journal      = {CoRR},
  volume       = {abs/1401.4151},
  year         = {2014}
}
@article{DBLP:journals/corr/SchneiderTWW14,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim and
                  David M. Williams},
  title        = {Managing {LTL} properties in Event-B refinement},
  journal      = {CoRR},
  volume       = {abs/1406.6622},
  year         = {2014}
}
@article{DBLP:journals/ao/NeuhausVBBDDGHLORSSVWY13,
  author       = {Fabian Neuhaus and
                  Amanda Vizedom and
                  Kenneth Baclawski and
                  Mike Bennett and
                  Mike Dean and
                  Michael Denny and
                  Michael Gr{\"{u}}ninger and
                  Ali Hashemi and
                  Terry Longstreth and
                  Leo Obrst and
                  Steve Ray and
                  Ram D. Sriram and
                  Todd Schneider and
                  Marcela Vegetti and
                  Matthew West and
                  Peter Yim},
  title        = {Towards ontology evaluation across the life cycleThe Ontology Summit
                  2013},
  journal      = {Appl. Ontology},
  volume       = {8},
  number       = {3},
  pages        = {179--194},
  year         = {2013}
}
@article{DBLP:journals/bib/Watson-HaighSHKLDDLMMMMQRTS13,
  author       = {Nathan S. Watson{-}Haigh and
                  Catherine A. Shang and
                  Matthias Haimel and
                  Myrto Kostadima and
                  Remco Loos and
                  Nandan Deshpande and
                  Konsta Duesing and
                  Xi Li and
                  Annette McGrath and
                  Sean McWilliam and
                  Simon Michnowicz and
                  Paula Moolhuijzen and
                  Steve Quenette and
                  Jerico Nico De Leon Revote and
                  Sonika Tyagi and
                  Maria Victoria Schneider},
  title        = {Next-generation sequencing: a challenge to meet the increasing demand
                  for training workshops in Australia},
  journal      = {Briefings Bioinform.},
  volume       = {14},
  number       = {5},
  pages        = {563--574},
  year         = {2013}
}
@article{DBLP:journals/sttt/AbdelhalimST13,
  author       = {Islam Abdelhalim and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {An integrated framework for checking the behaviour of fUML models
                  using {CSP}},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {15},
  number       = {4},
  pages        = {375--396},
  year         = {2013}
}
@inproceedings{DBLP:conf/IEEEares/HeatherCSSX13,
  author       = {James Heather and
                  Chris Culnane and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Zhe Xia},
  title        = {Solving the Discrete Logarithm Problem for Packing Candidate Preferences},
  booktitle    = {{CD-ARES} Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {209--221},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/cardis/AlshehriS13,
  author       = {Abdullah Ali Alshehri and
                  Steve A. Schneider},
  title        = {Formal Security Analysis and Improvement of a Hash-Based {NFC} M-Coupon
                  Protocol},
  booktitle    = {{CARDIS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {152--167},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/cogsci/DavenportKS13,
  author       = {Jodi L. Davenport and
                  Yvonne Kao and
                  Steven Schneider},
  title        = {Integrating Cognitive Principles to Redesign a Middle School Math
                  Curriculum},
  booktitle    = {CogSci},
  publisher    = {cognitivesciencesociety.org},
  year         = {2013}
}
@inproceedings{DBLP:conf/gil/Schneider13,
  author       = {Steve A. Schneider},
  title        = {Fuzzy-Systeme zur Unterst{\"{u}}tzung von Entscheidungen in land-
                  und forstwirtschaftlichen Logistik-Prozessen},
  booktitle    = {{GIL} Jahrestagung},
  series       = {{LNI}},
  volume       = {{P-211}},
  pages        = {307--310},
  publisher    = {{GI}},
  year         = {2013}
}
@inproceedings{DBLP:conf/icitst/AlshehriS13,
  author       = {Abdullah Ali Alshehri and
                  Steve A. Schneider},
  title        = {Formally defining {NFC} M-coupon requirements, with a case study},
  booktitle    = {{ICITST}},
  pages        = {52--58},
  publisher    = {{IEEE}},
  year         = {2013}
}
@inproceedings{DBLP:conf/icse/CaseSWKMW13,
  author       = {Steven Case and
                  Sherry K. Schneider and
                  Laura J. White and
                  Steven J. Kass and
                  Kelly Manning and
                  Norman Wilde},
  title        = {Integrating globally distributed team projects into software engineering
                  courses},
  booktitle    = {CTGDSD@ICSE},
  pages        = {25--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2013}
}
@inproceedings{DBLP:conf/ifm/MoranHS13,
  author       = {Murat Moran and
                  James Heather and
                  Steve A. Schneider},
  title        = {Automated Anonymity Verification of the ThreeBallot Voting System},
  booktitle    = {{IFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7940},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/nfm/JamesTTRS13,
  author       = {Phillip James and
                  Matthew Trumble and
                  Helen Treharne and
                  Markus Roggenbach and
                  Steve A. Schneider},
  title        = {OnTrack: An Open Tooling Environment for Railway Verification},
  booktitle    = {{NASA} Formal Methods},
  series       = {Lecture Notes in Computer Science},
  volume       = {7871},
  pages        = {435--440},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/pst/AktoudianakisCSTW13,
  author       = {Evangelos Aktoudianakis and
                  Jason Crampton and
                  Steve A. Schneider and
                  Helen Treharne and
                  Adrian Waller},
  title        = {Policy templates for relationship-based access control},
  booktitle    = {{PST}},
  pages        = {221--228},
  publisher    = {{IEEE} Computer Society},
  year         = {2013}
}
@inproceedings{DBLP:conf/qosa/DuSHGV13,
  author       = {Miao Du and
                  Jean{-}Guy Schneider and
                  Cameron M. Hine and
                  John Grundy and
                  Steven Versteeg},
  title        = {Generating service models by trace subsequence substitution},
  booktitle    = {QoSA},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2013}
}
@inproceedings{DBLP:conf/sefm/JamesMNRSTTW13,
  author       = {Phillip James and
                  Faron Moller and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne and
                  Matthew Trumble and
                  David M. Williams},
  title        = {Verification of Scheme Plans Using {CSP} {\textdollar}{\textdollar}{\(\vert\)}{\(\vert\)}{\textdollar}{\textdollar}
                  {\(\vert\)} {\(\vert\)} {B}},
  booktitle    = {{SEFM} Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {8368},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/uss/LlewellynSXCHRS13,
  author       = {Morgan Llewellyn and
                  Steve A. Schneider and
                  Zhe Xia and
                  Chris Culnane and
                  James Heather and
                  Peter Y. A. Ryan and
                  Sriramkrishnan Srinivasan},
  title        = {Testing Voters' Understanding of a Security Mechanism Used in Verifiable
                  Voting},
  booktitle    = {{EVT/WOTE}},
  publisher    = {{USENIX} Association},
  year         = {2013}
}
@inproceedings{DBLP:conf/xsede/FurlaniSJTHGDLGGPLWPS13,
  author       = {Thomas R. Furlani and
                  Barry I. Schneider and
                  Matthew D. Jones and
                  John Towns and
                  David L. Hart and
                  Steven M. Gallo and
                  Robert L. DeLeon and
                  Charng{-}Da Lu and
                  Amin Ghadersohi and
                  Ryan J. Gentner and
                  Abani K. Patra and
                  Gregor von Laszewski and
                  Fugang Wang and
                  Jeffrey T. Palmer and
                  Nikolay Simakov},
  title        = {Using XDMoD to facilitate {XSEDE} operations, planning and analysis},
  booktitle    = {{XSEDE}},
  pages        = {46:1--46:8},
  publisher    = {{ACM}},
  year         = {2013}
}
@proceedings{DBLP:conf/voteid/2013,
  editor       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {E-Voting and Identify - 4th International Conference, VoteID 2013,
                  Guildford, UK, July 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7985},
  publisher    = {Springer},
  year         = {2013}
}
@article{DBLP:journals/ao/SchneiderHBBCGGGLLORSVWWY12,
  author       = {Todd Schneider and
                  Ali Hashemi and
                  Mike Bennett and
                  Mary Brady and
                  Cory Casanave and
                  Henson Graves and
                  Michael Gruninger and
                  Nicola Guarino and
                  Anatoly Levenchuk and
                  Ernie Lucier and
                  Leo Obrst and
                  Steve Ray and
                  Ram D. Sriram and
                  Amanda Vizedom and
                  Matthew West and
                  Trish Whetzel and
                  Peter Yim},
  title        = {Ontology for Big Systems: The Ontology Summit 2012 Communiqu{\'{e}}},
  journal      = {Appl. Ontology},
  volume       = {7},
  number       = {3},
  pages        = {357--371},
  year         = {2012}
}
@article{DBLP:journals/eceasst/RoggenbachMSTN12,
  author       = {Markus Roggenbach and
                  Faron Moller and
                  Steve A. Schneider and
                  Helen Treharne and
                  Hoang Nga Nguyen},
  title        = {Railway modelling in CSP{\(\vert\)}{\(\vert\)}B: the double junction
                  case study},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {53},
  year         = {2012}
}
@article{DBLP:journals/nar/SimKHHSN12,
  author       = {Ngak{-}Leng Sim and
                  Prateek Kumar and
                  Jing Hu and
                  Steven Henikoff and
                  Georg Schneider and
                  Pauline C. Ng},
  title        = {{SIFT} web server: predicting effects of amino acid substitutions
                  on proteins},
  journal      = {Nucleic Acids Res.},
  volume       = {40},
  number       = {Web-Server-Issue},
  pages        = {452--457},
  year         = {2012}
}
@inproceedings{DBLP:conf/IEEEscc/HeHYSJV12,
  author       = {Qiang He and
                  Jun Han and
                  Yun Yang and
                  Jean{-}Guy Schneider and
                  Hai Jin and
                  Steven Versteeg},
  title        = {Probabilistic Critical Path Identification for Cost-Effective Monitoring
                  of Service-Based Systems},
  booktitle    = {{IEEE} {SCC}},
  pages        = {178--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2012}
}
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia},
  title        = {A Supervised Verifiable Voting Protocol for the Victorian Electoral
                  Commission},
  booktitle    = {Electronic Voting},
  series       = {{LNI}},
  volume       = {{P-205}},
  pages        = {81--94},
  publisher    = {{GI}},
  year         = {2012}
}
@inproceedings{DBLP:conf/fm/HeatherS12,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {A Formal Framework for Modelling Coercion Resistance and Receipt Freeness},
  booktitle    = {{FM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7436},
  pages        = {217--231},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/hvc/MollerNRST12,
  author       = {Faron Moller and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Defining and Model Checking Abstractions of Complex Railway Models
                  Using CSP{\(\vert\)}{\(\vert\)}B},
  booktitle    = {Haifa Verification Conference},
  series       = {Lecture Notes in Computer Science},
  volume       = {7857},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/kbse/HineSHV12,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steven Versteeg},
  title        = {Quokka: visualising interactions of enterprise software environment
                  emulators},
  booktitle    = {{ASE}},
  pages        = {370--373},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/pam/SchneiderAMFU12,
  author       = {Fabian Schneider and
                  Bernhard Ager and
                  Gregor Maier and
                  Anja Feldmann and
                  Steve Uhlig},
  title        = {Pitfalls in {HTTP} Traffic Measurements and Analysis},
  booktitle    = {{PAM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7192},
  pages        = {242--251},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/qosa/YuHSHV12,
  author       = {Jian Yu and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Cameron M. Hine and
                  Steven Versteeg},
  title        = {A virtual deployment testing environment for enterprise software systems},
  booktitle    = {QoSA},
  pages        = {101--110},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/qsic/VersteegHSH12,
  author       = {Steven Versteeg and
                  Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han},
  title        = {Emulation of Cloud-Scale Environments for Scalability Testing},
  booktitle    = {{QSIC}},
  pages        = {201--209},
  publisher    = {{IEEE}},
  year         = {2012}
}
@inproceedings{DBLP:conf/sefm/AbdelhalimST12,
  author       = {Islam Abdelhalim and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {An Optimization Approach for Effective Formalized fUML Model Checking},
  booktitle    = {{SEFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7504},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia and
                  Sriramkrishnan Srinivasan},
  title        = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections},
  booktitle    = {{EVT/WOTE}},
  publisher    = {{USENIX} Association},
  year         = {2012}
}
@inproceedings{DBLP:conf/websci/SchiobergSSUSF12,
  author       = {Doris Schi{\"{o}}berg and
                  Stefan Schmid and
                  Fabian Schneider and
                  Steve Uhlig and
                  Harald Schi{\"{o}}berg and
                  Anja Feldmann},
  title        = {Tracing the birth of an {OSN:} social graph and profile analysis in
                  Google+},
  booktitle    = {WebSci},
  pages        = {265--274},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/www/HeHYSJV12,
  author       = {Qiang He and
                  Jun Han and
                  Yun Yang and
                  Jean{-}Guy Schneider and
                  Hai Jin and
                  Steven Versteeg},
  title        = {Probabilistic critical path identification for cost-effective monitoring
                  of service-based web applications},
  booktitle    = {{WWW} (Companion Volume)},
  pages        = {523--524},
  publisher    = {{ACM}},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1210-1394,
  author       = {Doris Schi{\"{o}}berg and
                  Fabian Schneider and
                  Gilles Tr{\'{e}}dan and
                  Steve Uhlig and
                  Anja Feldmann},
  title        = {Revisiting Content Availability in Distributed Online Social Networks},
  journal      = {CoRR},
  volume       = {abs/1210.1394},
  year         = {2012}
}
@article{DBLP:journals/scp/SchneiderT11,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {Changing system interfaces consistently: {A} new refinement strategy
                  for CSP{\(\vert\)}{\(\vert\)}B},
  journal      = {Sci. Comput. Program.},
  volume       = {76},
  number       = {10},
  pages        = {837--860},
  year         = {2011}
}
@inproceedings{DBLP:conf/IEEEcloud/MullerHSV11,
  author       = {Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Tackling the Loss of Control: Standards-Based Conjoint Management
                  of Security Requirements for Cloud Services},
  booktitle    = {{IEEE} {CLOUD}},
  pages        = {573--581},
  publisher    = {{IEEE} Computer Society},
  year         = {2011}
}
@inproceedings{DBLP:conf/essos/MullerHSV11,
  author       = {Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Idea: {A} Reference Platform for Systematic Information Security Management
                  Tool Support},
  booktitle    = {ESSoS},
  series       = {Lecture Notes in Computer Science},
  volume       = {6542},
  pages        = {256--263},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/icfem/AbdelhalimST11,
  author       = {Islam Abdelhalim and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Towards a Practical Approach to Check UML/fUML Models Consistency
                  Using {CSP}},
  booktitle    = {{ICFEM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6991},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/re/SchneiderLCHSX11,
  author       = {Steve A. Schneider and
                  Morgan Llewellyn and
                  Chris Culnane and
                  James Heather and
                  Sriramkrishnan Srinivasan and
                  Zhe Xia},
  title        = {Focus group views on Pr{\^{e}}t {\`{a}} Voter 1.0},
  booktitle    = {{REVOTE}},
  pages        = {56--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2011}
}
@inproceedings{DBLP:conf/soca/HewardHSV11,
  author       = {Garth Heward and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Run-time management and optimization of web service monitoring systems},
  booktitle    = {{SOCA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011}
}
@inproceedings{DBLP:conf/uss/CulnaneBHSSX11,
  author       = {Chris Culnane and
                  David Bismark and
                  James Heather and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Zhe Xia},
  title        = {Authentication Codes},
  booktitle    = {{EVT/WOTE}},
  publisher    = {{USENIX} Association},
  year         = {2011}
}
@inproceedings{DBLP:conf/voteid/DemirelHRSV11,
  author       = {Denise Demirel and
                  Maria Henning and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Melanie Volkamer},
  title        = {Feasibility Analysis of Pr{\^{e}}t {\`{a}} Voter for German Federal
                  Elections},
  booktitle    = {VoteID},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/voteid/SchneiderSCHX11,
  author       = {Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Chris Culnane and
                  James Heather and
                  Zhe Xia},
  title        = {Pr{\^{e}}t {\'{a}} Voter with Write-Ins},
  booktitle    = {VoteID},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:journals/corr/abs-1106-4098,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  title        = {A {CSP} Account of Event-B Refinement},
  booktitle    = {Refine@FM},
  series       = {{EPTCS}},
  volume       = {55},
  pages        = {139--154},
  year         = {2011}
}
@inproceedings{DBLP:journals/entcs/SchneiderTW11,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  title        = {Bounded Retransmission in Event-B{\(\parallel\)}CSP: a Case Study},
  booktitle    = {B@FM},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {280},
  pages        = {69--80},
  publisher    = {Elsevier},
  year         = {2011}
}
@incollection{DBLP:books/ios/11/Schneider11,
  author       = {Steve A. Schneider},
  title        = {Security Analysis using Rank Functions in {CSP}},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {258--276},
  publisher    = {{IOS} Press},
  year         = {2011}
}
@article{DBLP:journals/concurrency/IfillS10,
  author       = {Wilson Ifill and
                  Steve A. Schneider},
  title        = {A step towards refining and translating {B} control annotations to
                  Handel-C},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {22},
  number       = {8},
  pages        = {1023--1048},
  year         = {2010}
}
@article{DBLP:journals/concurrency/McEwanS10,
  author       = {Alistair A. McEwan and
                  Steve A. Schneider},
  title        = {Modelling and analysis of the {AMBA} bus using {CSP} and {B}},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {22},
  number       = {8},
  pages        = {949--964},
  year         = {2010}
}
@inproceedings{DBLP:conf/aswec/HewardMHSV10,
  author       = {Garth Heward and
                  Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Assessing the Performance Impact of Service Monitoring},
  booktitle    = {Australian Software Engineering Conference},
  pages        = {192--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2010}
}
@inproceedings{DBLP:conf/aswec/HineSHV10,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steven Versteeg},
  title        = {Modelling Enterprise System Protocols and Trace Conformance},
  booktitle    = {Australian Software Engineering Conference},
  pages        = {35--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2010}
}
@inproceedings{DBLP:conf/biocomp/SoysalCBS10,
  author       = {{\"{O}}mer M. Soysal and
                  Jianhua Chen and
                  Steven Bujenovic and
                  Helmut Schneider},
  title        = {A Hierarchical Decision Engine for Computer Aided Lung Nodule Detection
                  from {CT} Images},
  booktitle    = {{BIOCOMP}},
  pages        = {387--393},
  publisher    = {{CSREA} Press},
  year         = {2010}
}
@inproceedings{DBLP:conf/icfem/AbdelhalimSST10,
  author       = {Islam Abdelhalim and
                  James Sharp and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Formal Verification of Tokeneer Behaviours Modelled in fUML Using
                  {CSP}},
  booktitle    = {{ICFEM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6447},
  pages        = {371--387},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/icsoc/HewardHMSV10,
  author       = {Garth Heward and
                  Jun Han and
                  Ingo M{\"{u}}ller and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Optimizing the Configuration of Web Service Monitors},
  booktitle    = {{ICSOC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6470},
  pages        = {587--595},
  year         = {2010}
}
@inproceedings{DBLP:conf/icsoc/HewardHMSV10a,
  author       = {Garth Heward and
                  Jun Han and
                  Ingo M{\"{u}}ller and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {A Case Study on Optimizing Web Service Monitoring Configurations},
  booktitle    = {{ICSOC} Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {6568},
  pages        = {4--14},
  year         = {2010}
}
@inproceedings{DBLP:conf/ifm/SchneiderTW10,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  title        = {A {CSP} Approach to Control in Event-B},
  booktitle    = {{IFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6396},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10,
  author       = {Zhe Xia and
                  Chris Culnane and
                  James Heather and
                  Hugo Jonker and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan},
  title        = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods
                  with a Unified Interface},
  booktitle    = {{INDOCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {98--114},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/kbse/HineSV10,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Reac2o: a runtime for enterprise system models},
  booktitle    = {{ASE}},
  pages        = {177--178},
  publisher    = {{ACM}},
  year         = {2010}
}
@proceedings{DBLP:conf/inc/2010,
  editor       = {Udo Bleimann and
                  Paul Dowland and
                  Steven Furnell and
                  Oliver Schneider},
  title        = {Eighth International Network Conference {(INC} 2010), Heidelberg,
                  Germany, July 6-8, 2010. Proceedings},
  publisher    = {University of Plymouth},
  year         = {2010}
}
@article{DBLP:journals/compsec/ShaikhBS09,
  author       = {Siraj A. Shaikh and
                  Vicky J. Bush and
                  Steve A. Schneider},
  title        = {Specifying authentication using signal events in {CSP}},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {310--324},
  year         = {2009}
}
@article{DBLP:journals/eceasst/VajarST09,
  author       = {Beeta Vajar and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Mobile CSP{\(\vert\)}{\(\vert\)}B},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {23},
  year         = {2009}
}
@article{DBLP:journals/tifs/RyanBHSX09,
  author       = {Peter Y. A. Ryan and
                  David Bismark and
                  James Heather and
                  Steve A. Schneider and
                  Zhe Xia},
  title        = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {662--673},
  year         = {2009}
}
@inproceedings{DBLP:conf/aswec/HineSHV09,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steven Versteeg},
  title        = {Scalable Emulation of Enterprise Systems},
  booktitle    = {Australian Software Engineering Conference},
  pages        = {142--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@inproceedings{DBLP:conf/birthday/TreharneSGEI09,
  author       = {Helen Treharne and
                  Steve A. Schneider and
                  Neil Grant and
                  Neil Evans and
                  Wilson Ifill},
  title        = {A Step towards Merging xUML and {CSP} {\(\vert\)}{\(\vert\)} \{{\textbackslash}{\(\vert\)}
                  {\textbackslash} \}B},
  booktitle    = {Rigorous Methods for Software Construction and Analysis},
  series       = {Lecture Notes in Computer Science},
  volume       = {5115},
  pages        = {130--146},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/hci/ZhouKHSLW09,
  author       = {Steven Zhiying Zhou and
                  Jayashree Karlekar and
                  Daniel Hii and
                  Miriam Schneider and
                  Weiquan Lu and
                  Stephen Wittkopf},
  title        = {Robust Pose Estimation for Outdoor Mixed Reality with Sensor Fusion},
  booktitle    = {{HCI} {(7)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5616},
  pages        = {281--289},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/ifm/SchneiderT09,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {Changing System Interfaces Consistently: {A} New Refinement Strategy
                  for CSP{\(\vert\)}{\(\vert\)}B},
  booktitle    = {{IFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5423},
  pages        = {103--117},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/re/BismarkHPSXR09,
  author       = {David Bismark and
                  James Heather and
                  Roger M. A. Peel and
                  Steve A. Schneider and
                  Zhe Xia and
                  Peter Y. A. Ryan},
  title        = {Experiences Gained from the first Pr{\^{e}}t {\`{a}} Voter Implementation},
  booktitle    = {{REVOTE}},
  pages        = {19--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@article{DBLP:journals/nms/Haas08,
  author       = {Gretchen Haas},
  title        = {Book Review: Kirsten A. Foot and Steven M. Schneider, Web Campaigning.
                  Cambridge, {MA:} {MIT} Press, 2006. xix + 263 pp. {ISBN} 0262062585,
                  {\textdollar}60.00 (hbk), {\textdollar}27.50 (pbk)},
  journal      = {New Media Soc.},
  volume       = {10},
  number       = {2},
  pages        = {355--357},
  year         = {2008}
}
@article{DBLP:journals/polity/X08b,
  title        = {Book Review: Response to Wainer Lusoli's review of Web Campaigning,
                  by Kirsten Foot and Steven Schneider},
  journal      = {Inf. Polity},
  volume       = {13},
  number       = {1-2},
  pages        = {119--121},
  year         = {2008}
}
@inproceedings{DBLP:conf/asm/TreharneTSE08,
  author       = {Helen Treharne and
                  Edward Turner and
                  Steve A. Schneider and
                  Neil Evans},
  title        = {Object Modelling in the SystemB Industrial Project},
  booktitle    = {{ABZ}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5238},
  pages        = {359},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/icsoc/MullerHSV08,
  author       = {Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {A Conceptual Framework for Unified and Comprehensive {SOA} Management},
  booktitle    = {{ICSOC} Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {5472},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/ictac/TurnerTSE08,
  author       = {Edward Turner and
                  Helen Treharne and
                  Steve A. Schneider and
                  Neil Evans},
  title        = {Automatic Generation of {CSP} {\(\vert\)}{\(\vert\)} {B} Skeletons
                  from xUML Models},
  booktitle    = {{ICTAC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5160},
  pages        = {364--379},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/uss/XiaSHT08,
  author       = {Zhe Xia and
                  Steve A. Schneider and
                  James Heather and
                  Jacques Traor{\'{e}}},
  title        = {Analysis, Improvement, and Simplification of Pr{\^{e}}t {\`{a}} Voter
                  with Paillier Encryption},
  booktitle    = {{EVT}},
  publisher    = {{USENIX} Association},
  year         = {2008}
}
@inproceedings{DBLP:conf/wotug/SchneiderTMI08,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Alistair A. McEwan and
                  Wilson Ifill},
  title        = {Experiments in Translating {CSP} {\(\vert\)}{\(\vert\)} {B} to Handel-C},
  booktitle    = {{CPA}},
  series       = {Concurrent Systems Engineering Series},
  volume       = {66},
  pages        = {115--133},
  publisher    = {{IOS} Press},
  year         = {2008}
}
@article{DBLP:journals/ijisec/DelicataS07,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  title        = {An algebraic approach to the verification of a class of Diffie-Hellman
                  protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {183--196},
  year         = {2007}
}
@article{DBLP:journals/ijisec/DimitrakosMRS07,
  author       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest Editors' Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {65--66},
  year         = {2007}
}
@inproceedings{DBLP:conf/b/IfillST07,
  author       = {Wilson Ifill and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Augmenting {B} with Control Annotations},
  booktitle    = {B},
  series       = {Lecture Notes in Computer Science},
  volume       = {4355},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/ifm/KarkinskyST07,
  author       = {Damien Karkinsky and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Combining Mobility with State},
  booktitle    = {{IFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4591},
  pages        = {373--392},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/miigp/SchneiderS07,
  author       = {Mark Schneider and
                  Charles Stevens},
  title        = {Development and testing of a new magnetic-tracking device for image
                  guidance},
  booktitle    = {Medical Imaging: Image-Guided Procedures},
  series       = {{SPIE} Proceedings},
  volume       = {6509},
  pages        = {65090I},
  publisher    = {{SPIE}},
  year         = {2007}
}
@inproceedings{DBLP:conf/mtsummit/YeSA07,
  author       = {Yang Ye and
                  Karl{-}Michael Schneider and
                  Steven P. Abney},
  title        = {Aspect marker generation in English-to-Chinese machine translation},
  booktitle    = {MTSummit},
  year         = {2007}
}
@inproceedings{DBLP:conf/voteid/FoulleSTX07,
  author       = {S{\'{e}}bastien Foulle and
                  Steve A. Schneider and
                  Jacques Traor{\'{e}} and
                  Zhe Xia},
  title        = {Threat Analysis of a Practical Voting Scheme with Receipts},
  booktitle    = {{VOTE-ID}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4896},
  pages        = {156--165},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/wotug/IfillS07,
  author       = {Wilson Ifill and
                  Steve A. Schneider},
  title        = {A Step Towards Refining and Translating {B} Control Annotations to
                  Handel-C},
  booktitle    = {{CPA}},
  series       = {Concurrent Systems Engineering Series},
  volume       = {65},
  pages        = {399--424},
  publisher    = {{IOS} Press},
  year         = {2007}
}
@inproceedings{DBLP:conf/wotug/McEwanS07,
  author       = {Alistair A. McEwan and
                  Steve A. Schneider},
  title        = {Modeling and Analysis of the {AMBA} Bus Using {CSP} and {B}},
  booktitle    = {{CPA}},
  series       = {Concurrent Systems Engineering Series},
  volume       = {65},
  pages        = {379--398},
  publisher    = {{IOS} Press},
  year         = {2007}
}
@proceedings{DBLP:conf/ifip1-7/2006,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  publisher    = {Springer},
  year         = {2007}
}
@proceedings{DBLP:conf/wotug/2007,
  editor       = {Alistair A. McEwan and
                  Steve A. Schneider and
                  Wilson Ifill and
                  Peter H. Welch},
  title        = {The 30th Communicating Process Architectures Conference, {CPA} 2007,
                  organised under the auspices of WoTUG and the University of Surrey,
                  Guildford, Surrey, UK, 8-11 July 2007},
  series       = {Concurrent Systems Engineering Series},
  volume       = {65},
  publisher    = {{IOS} Press},
  year         = {2007}
}
@article{DBLP:journals/fac/SchneiderHRT06,
  author       = {Steve A. Schneider and
                  Thai Son Hoang and
                  Ken Robinson and
                  Helen Treharne},
  title        = {Tank monitoring: a pAMN case study},
  journal      = {Formal Aspects Comput.},
  volume       = {18},
  number       = {3},
  pages        = {308--328},
  year         = {2006}
}
@inproceedings{DBLP:conf/esorics/RyanS06,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Pr{\^{e}}t {\`{a}} Voter with Re-encryption Mixes},
  booktitle    = {{ESORICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iceccs/SchneiderTCW06,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Ana Cavalcanti and
                  Jim Woodcock},
  title        = {A Layered Behavioural Model of Platelets},
  booktitle    = {{ICECCS}},
  pages        = {98--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2006}
}
@inproceedings{DBLP:conf/memocode/McEwanS06,
  author       = {Alistair A. McEwan and
                  Steve A. Schneider},
  title        = {A verified development of hardware using CSP{\(\parallel\)}B},
  booktitle    = {{MEMOCODE}},
  pages        = {81},
  publisher    = {{IEEE} Computer Society},
  year         = {2006}
}
@inproceedings{DBLP:conf/sac/HeatherS06,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {To infinity and beyond or, avoiding the infinite in security protocol
                  analysis},
  booktitle    = {{SAC}},
  pages        = {346--353},
  publisher    = {{ACM}},
  year         = {2006}
}
@proceedings{DBLP:conf/ifip1-7/2005,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  publisher    = {Springer},
  year         = {2006}
}
@article{DBLP:journals/fac/SchneiderT05,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {{CSP} theorems for communicating {B} machines},
  journal      = {Formal Aspects Comput.},
  volume       = {17},
  number       = {4},
  pages        = {390--422},
  year         = {2005}
}
@article{DBLP:journals/jcmc/FootWS05,
  author       = {Kirsten A. Foot and
                  Barbara Warnick and
                  Steven M. Schneider},
  title        = {Web-Based Memorializing After September 11: Toward a Conceptual Framework},
  journal      = {J. Comput. Mediat. Commun.},
  volume       = {11},
  number       = {1},
  pages        = {72--96},
  year         = {2005}
}
@article{DBLP:journals/jcs/HeatherS05,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {A decision procedure for the existence of a rank function},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {317--344},
  year         = {2005}
}
@article{DBLP:journals/jlp/EvansS05,
  author       = {Neil Evans and
                  Steve A. Schneider},
  title        = {Verifying security protocols with {PVS:} widening the rank function
                  approach},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {253--284},
  year         = {2005}
}
@article{DBLP:journals/polity/JankowskiFKS05,
  author       = {Nicholas W. Jankowski and
                  Kirsten Foot and
                  Randy Kluver and
                  Steve Schneider},
  title        = {The Web and the 2004 {EP} election: Comparing political actor Web
                  sites in 11 {EU} Member States},
  journal      = {Inf. Polity},
  volume       = {10},
  number       = {3-4},
  pages        = {165--176},
  year         = {2005}
}
@inproceedings{DBLP:conf/cdc/DingSDR05,
  author       = {Steven X. Ding and
                  Stefan Schneider and
                  Eve L. Ding and
                  Ansgar Rehm},
  title        = {Fault tolerant monitoring of vehicle lateral dynamics stabilization
                  systems},
  booktitle    = {{CDC/ECC}},
  pages        = {2000--2005},
  publisher    = {{IEEE}},
  year         = {2005}
}
@inproceedings{DBLP:conf/cisc/ShaikhBS05,
  author       = {Siraj A. Shaikh and
                  Vicky J. Bush and
                  Steve A. Schneider},
  title        = {Specifying Authentication Using Signal Events in {CSP}},
  booktitle    = {{CISC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {63--74},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/csfw/DelicataS05,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  title        = {Temporal Rank Functions for Forward Secrecy},
  booktitle    = {{CSFW}},
  pages        = {126--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2005}
}
@inproceedings{DBLP:conf/esorics/ChaumRS05,
  author       = {David Chaum and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {A Practical Voter-Verifiable Election Scheme},
  booktitle    = {{ESORICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {118--139},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/ifip1-7/DelicataS05,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  title        = {A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols},
  booktitle    = {Formal Aspects in Security and Trust},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/ifm/SchneiderTE05,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Neil Evans},
  title        = {Chunks: Component Verification in CSP{\(\vert\)}{\(\vert\)}B},
  booktitle    = {{IFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3771},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/snpd/KaddouraRS05,
  author       = {Maher Kaddoura and
                  Ranga S. Ramanujan and
                  Steven Schneider},
  title        = {Routing Optimization Techniques for Wireless Ad Hoc Networks},
  booktitle    = {{SNPD}},
  pages        = {454--459},
  publisher    = {{IEEE} Computer Society},
  year         = {2005}
}
@inproceedings{DBLP:journals/entcs/OuaknineS06,
  author       = {Jo{\"{e}}l Ouaknine and
                  Steve A. Schneider},
  title        = {Timed {CSP:} {A} Retrospective},
  booktitle    = {{APC} 25},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {162},
  pages        = {273--276},
  publisher    = {Elsevier},
  year         = {2005}
}
@inproceedings{DBLP:journals/entcs/SchneiderHRT05,
  author       = {Steve A. Schneider and
                  Thai Son Hoang and
                  Ken Robinson and
                  Helen Treharne},
  title        = {Tank Monitoring: {A} pAMN Case Study},
  booktitle    = {{REFINE}},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {137},
  number       = {2},
  pages        = {183--204},
  publisher    = {Elsevier},
  year         = {2005}
}
@proceedings{DBLP:conf/zum/2005,
  editor       = {Helen Treharne and
                  Steve King and
                  Martin C. Henson and
                  Steve A. Schneider},
  title        = {{ZB} 2005: Formal Specification and Development in {Z} and B, 4th
                  International Conference of {B} and {Z} Users, Guildford, UK, April
                  13-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3455},
  publisher    = {Springer},
  year         = {2005}
}
@article{DBLP:journals/nms/SchneiderF04,
  author       = {Steven M. Schneider and
                  Kirsten A. Foot},
  title        = {The Web as an Object of Study},
  journal      = {New Media Soc.},
  volume       = {6},
  number       = {1},
  pages        = {114--122},
  year         = {2004}
}
@article{DBLP:journals/sigact/Petride04,
  author       = {Sabina Petride},
  title        = {Review of "Concurrent and real-time systems: the {CSP} approach" by
                  Steve Schneider. Wiley 1999},
  journal      = {{SIGACT} News},
  volume       = {35},
  number       = {2},
  pages        = {4--12},
  year         = {2004}
}
@inproceedings{DBLP:conf/birthday/SchneiderD04,
  author       = {Steve A. Schneider and
                  Rob Delicata},
  title        = {Verifying Security Protocols: An Application of {CSP}},
  booktitle    = {25 Years Communicating Sequential Processes},
  series       = {Lecture Notes in Computer Science},
  volume       = {3525},
  pages        = {243--263},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/ifm/SchneiderT04,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {Verifying Controlled Components},
  booktitle    = {{IFM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2999},
  pages        = {87--107},
  publisher    = {Springer},
  year         = {2004}
}
@article{DBLP:journals/fmsd/YeungS03,
  author       = {Wing Lok Yeung and
                  Steve A. Schneider},
  title        = {Design and Verification of Distributed Recovery Blocks with {CSP}},
  journal      = {Formal Methods Syst. Des.},
  volume       = {22},
  number       = {3},
  pages        = {225--248},
  year         = {2003}
}
@article{DBLP:journals/jcmc/FootSDXL03,
  author       = {Kirsten A. Foot and
                  Steven M. Schneider and
                  Meghan Dougherty and
                  Michael Xenos and
                  Elena Larsen},
  title        = {Analyzing Linking Practices: Candidate Sites in the 2002 {US} Electoral
                  Web Sphere},
  journal      = {J. Comput. Mediat. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {0},
  year         = {2003}
}
@article{DBLP:journals/jcs/HeatherLS03,
  author       = {James Heather and
                  Gavin Lowe and
                  Steve A. Schneider},
  title        = {How to Prevent Type Flaw Attacks on Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {217--244},
  year         = {2003}
}
@article{DBLP:journals/jsac/GongGRS03,
  author       = {Li Gong and
                  Joshua D. Guttman and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest editorial overview},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {1},
  pages        = {1--4},
  year         = {2003}
}
@inproceedings{DBLP:conf/vr/BaumannNFSBVS03,
  author       = {Steve Baumann and
                  Chris Neff and
                  Scott Fetzick and
                  Gregg Stangl and
                  Lee Basler and
                  Ray Vereneck and
                  Walter Schneider},
  title        = {A Virtual Reality System for Neurobehavioral and fMRI Studie},
  booktitle    = {{VR}},
  pages        = {312},
  publisher    = {{IEEE} Computer Society},
  year         = {2003}
}
@inproceedings{DBLP:conf/zum/TreharneSB03,
  author       = {Helen Treharne and
                  Steve A. Schneider and
                  Marchia Bramble},
  title        = {Composing Specifications Using Communication},
  booktitle    = {{ZB}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2651},
  pages        = {58--78},
  publisher    = {Springer},
  year         = {2003}
}
@proceedings{DBLP:conf/fasec/2002,
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  publisher    = {Springer},
  year         = {2003}
}
@inproceedings{DBLP:conf/esorics/HeatherS02,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {Equal To The Task?},
  booktitle    = {{ESORICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2002}
}
@inproceedings{DBLP:conf/fmoods/Schneider02,
  author       = {Steve A. Schneider},
  title        = {Verifying Authentication Protocol Implementations},
  booktitle    = {{FMOODS}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {209},
  pages        = {5--24},
  publisher    = {Kluwer},
  year         = {2002}
}
@inproceedings{DBLP:conf/zum/SchneiderT02,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {Communicating {B} Machines},
  booktitle    = {{ZB}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2272},
  pages        = {416--435},
  publisher    = {Springer},
  year         = {2002}
}
@book{DBLP:books/daglib/0009544,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Modelling and analysis of security protocols},
  publisher    = {Addison-Wesley-Longman},
  year         = {2001}
}
@book{DBLP:books/daglib/0015710,
  author       = {Steve A. Schneider},
  title        = {The B-method - an introduction},
  series       = {The cornerstones of computing series},
  publisher    = {Macmillan Publ.},
  year         = {2001}
}
@article{DBLP:journals/jcs/RyanS01,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Process Algebra and Non-Interference},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {75--103},
  year         = {2001}
}
@article{DBLP:journals/jssc/MaximSSHCS01,
  author       = {Adrian Maxim and
                  Baker Scott and
                  Edmund M. Schneider and
                  Melvin Hagge and
                  Steve Chacko and
                  Dan Stiurca},
  title        = {A low-jitter 125-1250-MHz process-independent and ripple-poleless
                  0.18-{\(\mu\)}m {CMOS} {PLL} based on a sample-reset loop filter},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {36},
  number       = {11},
  pages        = {1673--1683},
  year         = {2001}
}
@inproceedings{DBLP:conf/concur/Schneider01,
  author       = {Steve A. Schneider},
  title        = {Process Algebra and Security},
  booktitle    = {{CONCUR}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2154},
  pages        = {37--38},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/iscas/MaximSSHCS01,
  author       = {Adrian Maxim and
                  Baker Scott and
                  Ed Schneider and
                  Melvin Hagge and
                  Steve Chacko and
                  Dan Stiurca},
  title        = {Sample-reset loop filter architecture for process independent and
                  ripple-pole-less low jitter {CMOS} charge-pump PLLs},
  booktitle    = {{ISCAS} {(4)}},
  pages        = {766--769},
  publisher    = {{IEEE}},
  year         = {2001}
}
@article{DBLP:journals/fac/Schneider00,
  author       = {Steve A. Schneider},
  title        = {Abstraction and Testing in {CSP}},
  journal      = {Formal Aspects Comput.},
  volume       = {12},
  number       = {3},
  pages        = {165--181},
  year         = {2000}
}
@article{DBLP:journals/stvr/Derrick00,
  author       = {John Derrick},
  title        = {Concurrent and Real-Time Systems: The {CSP} Approach, Steve Schneider,
                  Wiley, 2000 (Book Review)},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {10},
  number       = {3},
  pages        = {195},
  year         = {2000}
}
@inproceedings{DBLP:conf/csfw/HeatherLS00,
  author       = {James Heather and
                  Gavin Lowe and
                  Steve A. Schneider},
  title        = {How to Prevent Type Flaw Attacks on Security Protocols},
  booktitle    = {{CSFW}},
  pages        = {255--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2000}
}
@inproceedings{DBLP:conf/csfw/HeatherS00,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {Towards Automatic Verification of Authentication Protocols on an Unbounded
                  Network},
  booktitle    = {{CSFW}},
  pages        = {132--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2000}
}
@inproceedings{DBLP:conf/esorics/EvansS00,
  author       = {Neil Evans and
                  Steve A. Schneider},
  title        = {Analysing Time Dependent Security Properties in {CSP} Using {PVS}},
  booktitle    = {{ESORICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {222--237},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:conf/zum/TreharneS00,
  author       = {Helen Treharne and
                  Steve A. Schneider},
  title        = {How to Drive a {B} Machine},
  booktitle    = {{ZB}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1878},
  pages        = {188--208},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:journals/entcs/Schneider00,
  author       = {Steve A. Schneider},
  title        = {May Testing, Non-interference, and Compositionality},
  booktitle    = {{MFCSIT}},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {40},
  pages        = {361--391},
  publisher    = {Elsevier},
  year         = {2000}
}
@proceedings{DBLP:conf/wsaif/1999,
  editor       = {Steve A. Schneider and
                  Peter Ryan},
  title        = {Workshop on Secure Architectures and Information Flow 1999, Royal
                  Holloway, London, UK, December 1-3, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {32},
  publisher    = {Elsevier},
  year         = {2000}
}
@article{DBLP:journals/cacm/SchneiderB99,
  author       = {Fred B. Schneider and
                  Steven M. Bellovin},
  title        = {Evolving Telephone Networks},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {1},
  pages        = {160},
  year         = {1999}
}
@article{DBLP:journals/ce/Solano-FloresRST99,
  author       = {Guillermo Solano{-}Flores and
                  Bruce Raymond and
                  Steven A. Schneider and
                  Michael J. Timms},
  title        = {Management of scoring sessions in alternative assessment: the computer-assisted
                  scoring approach},
  journal      = {Comput. Educ.},
  volume       = {33},
  number       = {1},
  pages        = {47--63},
  year         = {1999}
}
@article{DBLP:journals/internet/SchneiderBI99,
  author       = {Fred B. Schneider and
                  Steven M. Bellovin and
                  Alan S. Inouye},
  title        = {Building Trustworthy Systems: Lessons from the {PTN} and Internet},
  journal      = {{IEEE} Internet Comput.},
  volume       = {3},
  number       = {6},
  pages        = {64--72},
  year         = {1999}
}
@inproceedings{DBLP:conf/csfw/RyanS99,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Process Algebra and Non-Interference},
  booktitle    = {{CSFW}},
  pages        = {214--227},
  publisher    = {{IEEE} Computer Society},
  year         = {1999}
}
@inproceedings{DBLP:conf/fm/Schneider99,
  author       = {Steve A. Schneider},
  title        = {Abstraction and Testing},
  booktitle    = {World Congress on Formal Methods},
  series       = {Lecture Notes in Computer Science},
  volume       = {1708},
  pages        = {738--757},
  publisher    = {Springer},
  year         = {1999}
}
@inproceedings{DBLP:conf/ifm/TreharneS99,
  author       = {Helen Treharne and
                  Steve A. Schneider},
  title        = {Using a Process Algebra to Control {B} Operations},
  booktitle    = {{IFM}},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {1999}
}
@inproceedings{DBLP:conf/spin/AdekunleS99,
  author       = {Carl B. Adekunle and
                  Steve A. Schneider},
  title        = {Detecting Feature Interactions in the Terrestrial Trunked Radio {(TETRA)}
                  Network Using Promela and Xspin},
  booktitle    = {{SPIN}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1680},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {1999}
}
@inproceedings{DBLP:journals/entcs/SchneiderR00,
  author       = {Steve A. Schneider and
                  Peter Ryan},
  title        = {Preface},
  booktitle    = {Workshop on Secure Architectures and Information Flow},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {32},
  pages        = {113--114},
  publisher    = {Elsevier},
  year         = {1999}
}
@proceedings{DBLP:conf/egh/1999,
  editor       = {Arie E. Kaufman and
                  Wolfgang Stra{\ss}er and
                  Steven Molnar and
                  Bengt{-}Olaf Schneider},
  title        = {Proceedings of the 1999 {ACM} {SIGGRAPH/EUROGRAPHICS} Workshop on
                  Graphics Hardware, Los Angeles, CA, USA, August 8-9, 1999},
  publisher    = {The Eurographics Association},
  year         = {1999}
}
@article{DBLP:journals/ipl/RyanS98,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {An Attack on a Recursive Authentication Protocol. {A} Cautionary Tale},
  journal      = {Inf. Process. Lett.},
  volume       = {65},
  number       = {1},
  pages        = {7--10},
  year         = {1998}
}
@article{DBLP:journals/tse/Schneider98,
  author       = {Steve A. Schneider},
  title        = {Verifying Authentication Protocols in {CSP}},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {24},
  number       = {9},
  pages        = {741--758},
  year         = {1998}
}
@inproceedings{DBLP:conf/b/TreharneDS98,
  author       = {Helen Treharne and
                  J. Draper and
                  Steve A. Schneider},
  title        = {Test Case Preparation Using a Prototype},
  booktitle    = {B},
  series       = {Lecture Notes in Computer Science},
  volume       = {1393},
  pages        = {293--311},
  publisher    = {Springer},
  year         = {1998}
}
@inproceedings{DBLP:conf/csfw/Schneider98,
  author       = {Steve A. Schneider},
  title        = {Formal Analysis of a Non-Repudiation Protocol},
  booktitle    = {{CSFW}},
  pages        = {54--65},
  publisher    = {{IEEE} Computer Society},
  year         = {1998}
}
@inproceedings{DBLP:conf/icre/SchneiderECH98,
  author       = {Francis Schneider and
                  Steve M. Easterbrook and
                  John R. Callahan and
                  Gerard J. Holzmann},
  title        = {Validating Requirements for Fault Tolerant Systems using Model Checking},
  booktitle    = {{ICRE}},
  pages        = {4--13},
  publisher    = {{IEEE} Computer Society},
  year         = {1998}
}
@article{DBLP:journals/scp/Schneider97,
  author       = {Steve A. Schneider},
  title        = {Timewise Refinement for Communicating Processes},
  journal      = {Sci. Comput. Program.},
  volume       = {28},
  number       = {1},
  pages        = {43--90},
  year         = {1997}
}
@inproceedings{DBLP:conf/csfw/Schneider97,
  author       = {Steve A. Schneider},
  title        = {Verifying authentication protocols with {CSP}},
  booktitle    = {{CSFW}},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {1997}
}
@inproceedings{DBLP:conf/tphol/DutertreS97,
  author       = {Bruno Dutertre and
                  Steve A. Schneider},
  title        = {Using a {PVS} Embedding of {CSP} to Verify Authentication Protocols},
  booktitle    = {TPHOLs},
  series       = {Lecture Notes in Computer Science},
  volume       = {1275},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {1997}
}
@proceedings{DBLP:conf/egh/1997,
  editor       = {Arie E. Kaufman and
                  Wolfgang Stra{\ss}er and
                  Steven Molnar and
                  Bengt{-}Olaf Schneider},
  title        = {Proceedings of the 1997 {ACM} {SIGGRAPH/EUROGRAPHICS} Workshop on
                  Graphics Hardware, Los Angeles, CA, USA, August 3-4, 1997},
  publisher    = {The Eurographics Association},
  year         = {1997}
}
@inproceedings{DBLP:conf/esorics/SchneiderS96,
  author       = {Steve A. Schneider and
                  Abraham Sidiropoulos},
  title        = {{CSP} and Anonymity},
  booktitle    = {{ESORICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {198--218},
  publisher    = {Springer},
  year         = {1996}
}
@inproceedings{DBLP:conf/icecsys/ReynaertCGDLLPS96,
  author       = {Philippe Reynaert and
                  Ludwig Callewaert and
                  Georges G. E. Gielen and
                  Geert Debyser and
                  Koen Lampaert and
                  Francky Leyn and
                  Geert Van der Plas and
                  Willy Sansen and
                  Birger Schneider and
                  Ren{\'{e}} Bloch and
                  Dave Orton and
                  Steve Boardman and
                  Jeremy Stent and
                  Jean{-}Fran{\c{c}}ois Aga{\"{e}}sse and
                  J{\"{o}}rg{-}Olliver Fischer{-}Binder and
                  Jukka Riihiaho and
                  Kari Tukkiniemi},
  title        = {{ADMIRE:} advanced mixed signal design environment},
  booktitle    = {{ICECS}},
  pages        = {428--431},
  publisher    = {{IEEE}},
  year         = {1996}
}
@inproceedings{DBLP:conf/sigmetrics/HotovySO96,
  author       = {Steven Hotovy and
                  David Schneider and
                  Timothy J. O'Donnell},
  title        = {Analysis of the Early Workload on the Cornell Theory Center {IBM}
                  {SP2}},
  booktitle    = {{SIGMETRICS}},
  pages        = {272--273},
  publisher    = {{ACM}},
  year         = {1996}
}
@inproceedings{DBLP:conf/sp/Schneider96,
  author       = {Steve A. Schneider},
  title        = {Security Properties and {CSP}},
  booktitle    = {S{\&}P},
  pages        = {174--187},
  publisher    = {{IEEE} Computer Society},
  year         = {1996}
}
@article{DBLP:journals/iandc/Schneider95,
  author       = {Steve A. Schneider},
  title        = {An Operational Semantics for Timed {CSP}},
  journal      = {Inf. Comput.},
  volume       = {116},
  number       = {2},
  pages        = {193--213},
  year         = {1995}
}
@article{DBLP:journals/tcs/DaviesS95,
  author       = {Jim Davies and
                  Steve A. Schneider},
  title        = {A Brief History of Timed {CSP}},
  journal      = {Theor. Comput. Sci.},
  volume       = {138},
  number       = {2},
  pages        = {243--271},
  year         = {1995}
}
@article{DBLP:journals/tcs/MisloveRS95,
  author       = {Michael W. Mislove and
                  A. W. Roscoe and
                  Steve A. Schneider},
  title        = {Fixed Points Without Completeness},
  journal      = {Theor. Comput. Sci.},
  volume       = {138},
  number       = {2},
  pages        = {273--314},
  year         = {1995}
}
@inproceedings{DBLP:conf/concur/BryansDS95,
  author       = {Jeremy W. Bryans and
                  Jim Davies and
                  Steve A. Schneider},
  title        = {Towards a denotational semantics for {ET-LOTOS}},
  booktitle    = {{CONCUR}},
  series       = {Lecture Notes in Computer Science},
  volume       = {962},
  pages        = {269--283},
  publisher    = {Springer},
  year         = {1995}
}
@inproceedings{DBLP:conf/forte/DaviesBS95,
  author       = {Jim Davies and
                  Jeremy W. Bryans and
                  Steve A. Schneider},
  title        = {Real-time {LOTOS} and Timed Observations},
  booktitle    = {{FORTE}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {43},
  pages        = {383--397},
  publisher    = {Chapman {\&} Hall},
  year         = {1995}
}
@article{DBLP:journals/fac/DaviesS94,
  author       = {Jim Davies and
                  Steve A. Schneider},
  title        = {Recursion Induction for Real-Time Processes},
  journal      = {Formal Aspects Comput.},
  volume       = {5},
  number       = {6},
  pages        = {530--553},
  year         = {1993}
}
@inproceedings{DBLP:conf/amast/Schneider93,
  author       = {Steve A. Schneider},
  title        = {Rigorous Specification of Real-Time Systems},
  booktitle    = {{AMAST}},
  series       = {Workshops in Computing},
  pages        = {59--74},
  publisher    = {Springer},
  year         = {1993}
}
@inproceedings{DBLP:conf/mfps/Schneider93,
  author       = {Steve A. Schneider},
  title        = {Timewise Refinement for Communicating Processes},
  booktitle    = {{MFPS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {802},
  pages        = {177--214},
  publisher    = {Springer},
  year         = {1993}
}
@inproceedings{DBLP:conf/concur/DaviesS92,
  author       = {Jim Davies and
                  Steve A. Schneider},
  title        = {Using {CSP} to Verify a Timed Protocol over a Fair Medium},
  booktitle    = {{CONCUR}},
  series       = {Lecture Notes in Computer Science},
  volume       = {630},
  pages        = {355--369},
  publisher    = {Springer},
  year         = {1992}
}
@inproceedings{DBLP:conf/ftrtft/DaviesJS92,
  author       = {Jim Davies and
                  Dave Jackson and
                  Steve A. Schneider},
  title        = {Broadcast Communication for Real-time Processes},
  booktitle    = {{FTRTFT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {571},
  pages        = {149--169},
  publisher    = {Springer},
  year         = {1992}
}
@inproceedings{DBLP:conf/rex/SchneiderDJRRR91,
  author       = {Steve A. Schneider and
                  Jim Davies and
                  D. M. Jackson and
                  George M. Reed and
                  Joy N. Reed and
                  A. W. Roscoe},
  title        = {Timed {CSP:} Theory and Practice},
  booktitle    = {{REX} Workshop},
  series       = {Lecture Notes in Computer Science},
  volume       = {600},
  pages        = {640--675},
  publisher    = {Springer},
  year         = {1991}
}
@article{DBLP:journals/ijhpca/BerryCKKLPPRSCCSFMWHSLOSJGM89,
  author       = {Michael W. Berry and
                  Da{-}Ren Chen and
                  Peter F. Koss and
                  David J. Kuck and
                  Sy{-}Shin Lo and
                  Yingxin Pang and
                  Lynn Pointer and
                  Richard Roloff and
                  Ahmed H. Sameh and
                  Enrico Clementi and
                  Shaoan Chin and
                  David J. Schneider and
                  Geoffrey C. Fox and
                  Paul Messina and
                  David W. Walker and
                  Chris Hsiung and
                  Jim Schwarzmeier and
                  Kok{-}Meng Lue and
                  Steve Orszag and
                  Fred Seidl and
                  Olin G. Johnson and
                  Richard Goodrum and
                  Joanne Martin},
  title        = {The Perfect Club Benchmarks: Effective Performance Evaluation of Supercomputers},
  journal      = {Int. J. High Perform. Comput. Appl.},
  volume       = {3},
  number       = {3},
  pages        = {5--40},
  year         = {1989}
}
@inproceedings{DBLP:conf/mfps/DaviesS89,
  author       = {Jim Davies and
                  Steve A. Schneider},
  title        = {Factorizing Proofs in Timed {CSP}},
  booktitle    = {Mathematical Foundations of Programming Semantics},
  series       = {Lecture Notes in Computer Science},
  volume       = {442},
  pages        = {129--159},
  publisher    = {Springer},
  year         = {1989}
}
@article{DBLP:journals/sigart/Schneider88,
  author       = {Victor Schneider},
  title        = {Book review: {A} quick Review of the Elements of Artificial Intelligence:
                  An Introduction Using Lisp by Steven L. Tanimoto (Computer Science
                  Press, 1987)},
  journal      = {{SIGART} Newsl.},
  volume       = {103},
  pages        = {20},
  year         = {1988}
}
@inproceedings{DBLP:conf/podc/MahaneyS85,
  author       = {Stephen R. Mahaney and
                  Fred B. Schneider},
  title        = {Inexact Agreement: Accuracy, Precision, and Graceful Degradation},
  booktitle    = {{PODC}},
  pages        = {237--249},
  publisher    = {{ACM}},
  year         = {1985}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics