Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Steve Schneider"
@article{DBLP:journals/cmpb/MartinJFGMEPAS24, author = {Liam Martin and Pranav Jain and Zachary Ferguson and Torkan Gholamalizadeh and Faezeh Moshfeghifar and Kenny Erleben and Daniele Panozzo and Steven D. Abramowitch and Teseo Schneider}, title = {A systematic comparison between FEBio and PolyFEM for biomechanical systems}, journal = {Comput. Methods Programs Biomed.}, volume = {244}, pages = {107938}, year = {2024}, url = {https://doi.org/10.1016/j.cmpb.2023.107938}, doi = {10.1016/J.CMPB.2023.107938}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cmpb/MartinJFGMEPAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/interactions/SchneidersBTAR24, author = {Eike Schneiders and Steve Benford and Nick Tandavanitj and Matt Adams and Ju Row{-}Farr}, title = {Cat Royale}, journal = {Interactions}, volume = {31}, number = {1}, pages = {64}, year = {2024}, url = {https://doi.org/10.1145/3636499}, doi = {10.1145/3636499}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/interactions/SchneidersBTAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/BaleFSWC24, author = {Cameron D. Bale and Jordan L. Fischer and Matthew J. Schneider and Steven Weber and Suzanne Chang}, title = {Legally Anonymizing Location Data Under the {GDPR}}, journal = {Trans. Data Priv.}, volume = {17}, number = {1}, pages = {1--30}, year = {2024}, url = {http://www.tdp.cat/issues21/abs.a472a22.php}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/BaleFSWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlsadiCDDRSSTWW24, author = {Mohammed Alsadi and Matthew Casey and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Luke Riley and Muntadher Sallal and Steve Schneider and Helen Treharne and Joe Wadsworth and Phil Wright}, title = {Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {3357--3374}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3327859}, doi = {10.1109/TDSC.2023.3327859}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlsadiCDDRSSTWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BenfordMCSCFKSN24, author = {Steven David Benford and Clara Mancini and Alan Chamberlain and Eike Schneiders and Simon D. Castle{-}Green and Joel E. Fischer and Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and Guido Salimbeni and Victor Zhi Heung Ngo and Pepita Barnard and Matt Adams and Nick Tandavanitj and Ju Row{-}Farr}, title = {Charting Ethical Tensions in Multispecies Technology Research through Beneficiary-Epistemology Space}, booktitle = {Proceedings of the {CHI} Conference on Human Factors in Computing Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024}, pages = {626:1--626:15}, year = {2024}, crossref = {DBLP:conf/chi/2024}, url = {https://doi.org/10.1145/3613904.3641994}, doi = {10.1145/3613904.3641994}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/BenfordMCSCFKSN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SchneidersBCMCN24, author = {Eike Schneiders and Steve Benford and Alan Chamberlain and Clara Mancini and Simon Castle{-}Green and Victor Zhi Heung Ngo and Ju Row{-}Farr and Matt Adams and Nick Tandavanitj and Joel E. Fischer}, title = {Designing Multispecies Worlds for Robots, Cats, and Humans}, booktitle = {Proceedings of the {CHI} Conference on Human Factors in Computing Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024}, pages = {593:1--593:16}, year = {2024}, crossref = {DBLP:conf/chi/2024}, url = {https://doi.org/10.1145/3613904.3642115}, doi = {10.1145/3613904.3642115}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/SchneidersBCMCN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hri/SchneidersBRTA24, author = {Eike Schneiders and Steve Benford and Ju Row{-}Farr and Nick Tandavanitj and Matt Adams}, title = {The Purr-suit of Happiness: {A} Tale of Three Kittens. Robots, Humans, Cats, and {AI}}, booktitle = {Companion of the 2024 {ACM/IEEE} International Conference on Human-Robot Interaction, {HRI} 2024, Boulder, CO, USA, March 11-15, 2024}, pages = {71--73}, year = {2024}, crossref = {DBLP:conf/hri/2024c}, url = {https://doi.org/10.1145/3610978.3640791}, doi = {10.1145/3610978.3640791}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hri/SchneidersBRTA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15431, author = {Eike Schneiders and Steve Benford and Alan Chamberlain and Clara Mancini and Simon Castle{-}Green and Victor Zhi Heung Ngo and Ju Row{-}Farr and Matt Adams and Nick Tandavanitj and Joel E. Fischer}, title = {Designing Multispecies Worlds for Robots, Cats, and Humans}, journal = {CoRR}, volume = {abs/2402.15431}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15431}, doi = {10.48550/ARXIV.2402.15431}, eprinttype = {arXiv}, eprint = {2402.15431}, timestamp = {Tue, 14 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15431.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15439, author = {Steve Benford and Clara Mancini and Alan Chamberlain and Eike Schneiders and Simon Castle{-}Green and Joel E. Fischer and Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and Guido Salimbeni and Victor Zhi Heung Ngo and Pepita Barnard and Matt Adams and Nick Tandavanitj and Ju Row{-}Farr}, title = {Charting Ethical Tensions in Multispecies Technology Research through Beneficiary-Epistemology Space}, journal = {CoRR}, volume = {abs/2402.15439}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15439}, doi = {10.48550/ARXIV.2402.15439}, eprinttype = {arXiv}, eprint = {2402.15439}, timestamp = {Tue, 14 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-13240, author = {Marie{-}Laure Zollinger and Peter B. R{\o}nne and Steve Schneider and Peter Y. A. Ryan and Wojtek Jamroga}, title = {Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)}, journal = {CoRR}, volume = {abs/2407.13240}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.13240}, doi = {10.48550/ARXIV.2407.13240}, eprinttype = {arXiv}, eprint = {2407.13240}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-13240.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/KrieglsteinSGBN23, author = {Felix Krieglstein and Sascha Schneider and Jessica Gr{\"{o}}ninger and Maik Beege and Steve Nebel and Lukas Wesenberg and Markus Suren and G{\"{u}}nter Daniel Rey}, title = {Exploring the effects of content-related segmentations and metacognitive prompts on learning with whiteboard animations}, journal = {Comput. Educ.}, volume = {194}, pages = {104702}, year = {2023}, url = {https://doi.org/10.1016/j.compedu.2022.104702}, doi = {10.1016/J.COMPEDU.2022.104702}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ce/KrieglsteinSGBN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/6gnet/FrieseGBZNMZSPB23, author = {Ingo Friese and Mandy Galkow{-}Schneider and Louay Bassbouss and Alexander Zoubarev and Andy Neparidze and Sergiy Melnyk and Qiuheng Zhou and Hans D. Schotten and Tobias Pfandzelter and David Bermbach and Arndt Kritzner and Enrico Zschau and Prasenjit Dhara and Steve G{\"{o}}ring and William Menz and Alexander Raake and Wolfgang R{\"{u}}ther{-}Kindel and Fabian Quaeck and Nick Stuckert and Robert Vilter}, title = {True 3D Holography: {A} Communication Service of Tomorrow and Its Requirements for a New Converged Cloud and Network Architecture on the Path to 6G}, booktitle = {2nd International Conference on 6G Networking, 6GNet 2023, Paris, France, October 18-20, 2023}, pages = {1--8}, year = {2023}, crossref = {DBLP:conf/6gnet/2023}, url = {https://doi.org/10.1109/6GNet58894.2023.10317647}, doi = {10.1109/6GNET58894.2023.10317647}, timestamp = {Tue, 28 Nov 2023 14:39:09 +0100}, biburl = {https://dblp.org/rec/conf/6gnet/FrieseGBZNMZSPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blocksys/DesaiMSSR23, author = {Nidhi Desai and Damiano Di Francesco Maesa and Nishanth Sastry and Steve Schneider and Laura Ricci}, title = {Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts}, booktitle = {Proceedings of the Fifth {ACM} International Workshop on Blockchain-enabled Networked Sensor Systems, BlockSys 2023, Istanbul, Turkiye, 12 November 2023}, pages = {2--8}, year = {2023}, crossref = {DBLP:conf/blocksys/2023}, url = {https://doi.org/10.1145/3628354.3629532}, doi = {10.1145/3628354.3629532}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blocksys/DesaiMSSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imw2/MarkovFSLJK23, author = {Viktor Markov and Gilles Festes and Louisa Schneider and Steven Lemke and Serguei Jourba and Alexander Kotov}, title = {Effect of High-Temperature Bake on {RTN} Statistics in Floating Gate Flash Memory Arrays}, booktitle = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA, May 21-24, 2023}, pages = {1--4}, year = {2023}, crossref = {DBLP:conf/imw2/2023}, url = {https://doi.org/10.1109/IMW56887.2023.10145950}, doi = {10.1109/IMW56887.2023.10145950}, timestamp = {Fri, 16 Jun 2023 08:54:55 +0200}, biburl = {https://dblp.org/rec/conf/imw2/MarkovFSLJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imw2/TkachevLSFG23, author = {Yuri Tkachev and Steven Lemke and Louisa Schneider and Gilles Festes and Parviz Ghazavi}, title = {Analog Tuning of Floating-Gate Cells with Sub-Elementary Charge Accuracy for In-Memory Computing Applications}, booktitle = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA, May 21-24, 2023}, pages = {1--4}, year = {2023}, crossref = {DBLP:conf/imw2/2023}, url = {https://doi.org/10.1109/IMW56887.2023.10145932}, doi = {10.1109/IMW56887.2023.10145932}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imw2/TkachevLSFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iui/SchneiderHRMGGL23, author = {Tobias Schneider and Joana Hois and Alischa Rosenstein and Sandra Metzl and Ansgar R. S. Gerlicher and Sabiha Ghellal and Steve Love}, title = {Don't fail me! The Level 5 Autonomous Driving Information Dilemma regarding Transparency and User Experience}, booktitle = {Proceedings of the 28th International Conference on Intelligent User Interfaces, {IUI} 2023, Sydney, NSW, Australia, March 27-31, 2023}, pages = {540--552}, year = {2023}, crossref = {DBLP:conf/iui/2023}, url = {https://doi.org/10.1145/3581641.3584085}, doi = {10.1145/3581641.3584085}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iui/SchneiderHRMGGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miccai/FilipiakSBZPSBB23, author = {Patryk Filipiak and Timothy M. Shepherd and Lee Basler and Anthony Zuccolotto and Dimitris G. Placantonakis and Walter Schneider and Fernando E. Boada and Steven H. Baete}, title = {Diffusion Phantom Study of Fiber Crossings at Varied Angles Reconstructed with ODF-Fingerprinting}, booktitle = {Computational Diffusion {MRI} - 14th International Workshop, {CDMRI} 2023, Held in Conjunction with {MICCAI} 2023, Vancouver, BC, Canada, October 8, 2023, Proceedings}, pages = {23--34}, year = {2023}, crossref = {DBLP:conf/miccai/2023cdmri}, url = {https://doi.org/10.1007/978-3-031-47292-3\_3}, doi = {10.1007/978-3-031-47292-3\_3}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/miccai/FilipiakSBZPSBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BudykhoBWRLRRS23, author = {Ksenia Budykho and Ioana Boureanu and Stephan Wesemeyer and Daniel Romero and Matt Lewis and Yogaratnam Rahulan and Fortunat Rajaona and Steve Schneider}, title = {Fine-Grained Trackability in Protocol Executions}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, year = {2023}, crossref = {DBLP:conf/ndss/2023}, url = {https://www.ndss-symposium.org/ndss-paper/fine-grained-trackability-in-protocol-executions/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BudykhoBWRLRRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sc/Atchley0LBVBBBC23, author = {Scott Atchley and Christopher Zimmer and John Lange and David E. Bernholdt and Ver{\'{o}}nica G. Melesse Vergara and Thomas Beck and Michael J. Brim and Reuben D. Budiardja and Sunita Chandrasekaran and Markus Eisenbach and Thomas M. Evans and Matthew Ezell and Nicholas Frontiere and Antigoni Georgiadou and Joe Glenski and Philipp Grete and Steven P. Hamilton and John K. Holmen and Axel Huebl and Daniel A. Jacobson and Wayne Joubert and Kim H. McMahon and Elia Merzari and Stan G. Moore and Andrew Myers and Stephen Nichols and Sarp Oral and Thomas Papatheodore and Danny Perez and David M. Rogers and Evan Schneider and Jean{-}Luc Vay and P. K. Yeung}, title = {Frontier: Exploring Exascale}, booktitle = {Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, {SC} 2023, Denver, CO, USA, November 12-17, 2023}, pages = {52:1--52:16}, year = {2023}, crossref = {DBLP:conf/sc/2023}, url = {https://doi.org/10.1145/3581784.3607089}, doi = {10.1145/3581784.3607089}, timestamp = {Mon, 24 Jun 2024 15:20:25 +0200}, biburl = {https://dblp.org/rec/conf/sc/Atchley0LBVBBBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tas/SchneidersCFBCN23, author = {Eike Schneiders and Alan Chamberlain and Joel E. Fischer and Steve Benford and Simon Castle{-}Green and Victor Zhi Heung Ngo and Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and Pepita Barnard and Ju Row{-}Farr and Matt Adams and Nick Tandavanitj and Kate Devlin and Clara Mancini and Daniel Mills}, title = {{TAS} for Cats: An Artist-led Exploration of Trustworthy Autonomous Systems for Companion Animals}, booktitle = {Proceedings of the First International Symposium on Trustworthy Autonomous Systems, {TAS} 2023, Edinburgh, United Kingdom, July 11-12, 2023}, pages = {36:1--36:5}, year = {2023}, crossref = {DBLP:conf/tas/2023}, url = {https://doi.org/10.1145/3597512.3597517}, doi = {10.1145/3597512.3597517}, timestamp = {Tue, 14 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tas/SchneidersCFBCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2023, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482}, doi = {10.1145/3558482}, isbn = {978-1-4503-9859-6}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03372, author = {Wojciech Jamroga and Peter Y. A. Ryan and Steve Schneider and Carsten Sch{\"{u}}rmann and Philip B. Stark}, title = {A Declaration of Software Independence}, journal = {CoRR}, volume = {abs/2311.03372}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03372}, doi = {10.48550/ARXIV.2311.03372}, eprinttype = {arXiv}, eprint = {2311.03372}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/KulikDLMSTW22, author = {Tomas Kulik and Brijesh Dongol and Peter Gorm Larsen and Hugo Daniel Macedo and Steve Schneider and Peter W. V. Tran{-}J{\o}rgensen and Jim Woodcock}, title = {A Survey of Practical Formal Methods for Security}, journal = {Formal Aspects Comput.}, volume = {34}, number = {1}, pages = {1--39}, year = {2022}, url = {https://doi.org/10.1145/3522582}, doi = {10.1145/3522582}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fac/KulikDLMSTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jair/AdriaensenBSAEL22, author = {Steven Adriaensen and Andr{\'{e}} Biedenkapp and Gresa Shala and Noor H. Awad and Theresa Eimer and Marius Lindauer and Frank Hutter}, title = {Automated Dynamic Algorithm Configuration}, journal = {J. Artif. Intell. Res.}, volume = {75}, pages = {1633--1699}, year = {2022}, url = {https://doi.org/10.1613/jair.1.13922}, doi = {10.1613/JAIR.1.13922}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jair/AdriaensenBSAEL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LorenzenRRSBFS22, author = {Steven Robert Lorenzen and Henrik Riedel and Maximilian Michael Rupp and Leon Schmeiser and Hagen Berthold and Andrei Firus and Jens Schneider}, title = {Virtual Axle Detector Based on Analysis of Bridge Acceleration Measurements by Fully Convolutional Network}, journal = {Sensors}, volume = {22}, number = {22}, pages = {8963}, year = {2022}, url = {https://doi.org/10.3390/s22228963}, doi = {10.3390/S22228963}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LorenzenRRSBFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/HossainHSJKV22, author = {Md. Arafat Hossain and Jun Han and Jean{-}Guy Schneider and Jiaojiao Jiang and Muhammad Ashad Kabir and Steve Versteeg}, title = {Extracting Formats of Service Messages with Varying Payloads}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {3}, pages = {71:1--71:31}, year = {2022}, url = {https://doi.org/10.1145/3503159}, doi = {10.1145/3503159}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/HossainHSJKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/Perez-Pellitero22, author = {Eduardo P{\'{e}}rez{-}Pellitero and Sibi Catley{-}Chandar and Richard Shaw and Ales Leonardis and Radu Timofte and Zexin Zhang and Cen Liu and Yunbo Peng and Yue Lin and Gaocheng Yu and Jin Zhang and Zhe Ma and Hongbin Wang and Xiangyu Chen and Xintao Wang and Haiwei Wu and Lin Liu and Chao Dong and Jiantao Zhou and Qingsen Yan and Song Zhang and Weiye Chen and Yuhang Liu and Zhen Zhang and Yanning Zhang and Javen Qinfeng Shi and Dong Gong and Dan Zhu and Mengdi Sun and Guannan Chen and Yang Hu and Haowei Li and Baozhu Zou and Zhen Liu and Wenjie Lin and Ting Jiang and Chengzhi Jiang and Xinpeng Li and Mingyan Han and Haoqiang Fan and Jian Sun and Shuaicheng Liu and Juan Mar{\'{\i}}n{-}Vega and Michael Sloth and Peter Schneider{-}Kamp and Richard R{\"{o}}ttger and Chunyang Li and Long Bao and Gang He and Ziyao Xu and Li Xu and Gen Zhan and Ming Sun and Xing Wen and Junlin Li and Jinjing Li and Chenghua Li and Ruipeng Gang and Fangya Li and Chenming Liu and Shuang Feng and Fei Lei and Rui Liu and Junxiang Ruan and Tianhong Dai and Wei Li and Zhan Lu and Hengyan Liu and Peian Huang and Guangyu Ren and Yonglin Luo and Chang Liu and Qiang Tu and Sai Ma and Yizhen Cao and Steven Tel and Barthelemy Heyrman and Dominique Ginhac and Chul Lee and Gahyeon Kim and Seonghyun Park and An Gia Vien and Truong Thanh Nhat Mai and Howoon Yoon and Tu Vo and Alexander Holston and Sheir Zaheer and Chan Y. Park}, title = {{NTIRE} 2022 Challenge on High Dynamic Range Imaging: Methods and Results}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition Workshops, {CVPR} Workshops 2022, New Orleans, LA, USA, June 19-20, 2022}, pages = {1008--1022}, year = {2022}, crossref = {DBLP:conf/cvpr/2022w}, url = {https://doi.org/10.1109/CVPRW56347.2022.00114}, doi = {10.1109/CVPRW56347.2022.00114}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/Perez-Pellitero22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miccai/FilipiakSBZPSBB22, author = {Patryk Filipiak and Timothy M. Shepherd and Lee Basler and Anthony Zuccolotto and Dimitris G. Placantonakis and Walter Schneider and Fernando E. Boada and Steven H. Baete}, title = {Stepwise Stochastic Dictionary Adaptation Improves Microstructure Reconstruction with Orientation Distribution Function Fingerprinting}, booktitle = {Computational Diffusion {MRI} - 13th International Workshop, {CDMRI} 2022, Held in Conjunction with {MICCAI} 2022, Singapore, Singapore, September 22, 2022, Proceedings}, pages = {89--100}, year = {2022}, crossref = {DBLP:conf/miccai/2022cdmri}, url = {https://doi.org/10.1007/978-3-031-21206-2\_8}, doi = {10.1007/978-3-031-21206-2\_8}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/miccai/FilipiakSBZPSBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-12633, author = {Eduardo P{\'{e}}rez{-}Pellitero and Sibi Catley{-}Chandar and Richard Shaw and Ales Leonardis and Radu Timofte and Zexin Zhang and Cen Liu and Yunbo Peng and Yue Lin and Gaocheng Yu and Jin Zhang and Zhe Ma and Hongbin Wang and Xiangyu Chen and Xintao Wang and Haiwei Wu and Lin Liu and Chao Dong and Jiantao Zhou and Qingsen Yan and Song Zhang and Weiye Chen and Yuhang Liu and Zhen Zhang and Yanning Zhang and Javen Qinfeng Shi and Dong Gong and Dan Zhu and Mengdi Sun and Guannan Chen and Yang Hu and Haowei Li and Baozhu Zou and Zhen Liu and Wenjie Lin and Ting Jiang and Chengzhi Jiang and Xinpeng Li and Mingyan Han and Haoqiang Fan and Jian Sun and Shuaicheng Liu and Juan Mar{\'{\i}}n{-}Vega and Michael Sloth and Peter Schneider{-}Kamp and Richard R{\"{o}}ttger and Chunyang Li and Long Bao and Gang He and Ziyao Xu and Li Xu and Gen Zhan and Ming Sun and Xing Wen and Junlin Li and Jinjing Li and Chenghua Li and Ruipeng Gang and Fangya Li and Chenming Liu and Shuang Feng and Fei Lei and Rui Liu and Junxiang Ruan and Tianhong Dai and Wei Li and Zhan Lu and Hengyan Liu and Peian Huang and Guangyu Ren and Yonglin Luo and Chang Liu and Qiang Tu and Sai Ma and Yizhen Cao and Steven Tel and Barthelemy Heyrman and Dominique Ginhac and Chul Lee and Gahyeon Kim and Seonghyun Park and An Gia Vien and Truong Thanh Nhat Mai and Howoon Yoon and Tu Vo and Alexander Holston and Sheir Zaheer and Chan Y. Park}, title = {{NTIRE} 2022 Challenge on High Dynamic Range Imaging: Methods and Results}, journal = {CoRR}, volume = {abs/2205.12633}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.12633}, doi = {10.48550/ARXIV.2205.12633}, eprinttype = {arXiv}, eprint = {2205.12633}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-12633.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-13881, author = {Steven Adriaensen and Andr{\'{e}} Biedenkapp and Gresa Shala and Noor H. Awad and Theresa Eimer and Marius Lindauer and Frank Hutter}, title = {Automated Dynamic Algorithm Configuration}, journal = {CoRR}, volume = {abs/2205.13881}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.13881}, doi = {10.48550/ARXIV.2205.13881}, eprinttype = {arXiv}, eprint = {2205.13881}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-13881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-03758, author = {Steven Robert Lorenzen and Henrik Riedel and Maximilian Michael Rupp and Leon Schmeiser and Hagen Berthold and Andrei Firus and Jens Schneider}, title = {Virtual Axle Detector based on Analysis of Bridge Acceleration Measurements by Fully Convolutional Network}, journal = {CoRR}, volume = {abs/2207.03758}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.03758}, doi = {10.48550/ARXIV.2207.03758}, eprinttype = {arXiv}, eprint = {2207.03758}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-03758.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cp/BeegeNSR21, author = {Maik Beege and Steve Nebel and Sascha Schneider and G{\"{u}}nter Daniel Rey}, title = {The effect of signaling in dependence on the extraneous cognitive load in learning environments}, journal = {Cogn. Process.}, volume = {22}, number = {2}, pages = {209--225}, year = {2021}, url = {https://doi.org/10.1007/s10339-020-01002-5}, doi = {10.1007/S10339-020-01002-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cp/BeegeNSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cp/BeegeNSR21a, author = {Maik Beege and Steve Nebel and Sascha Schneider and G{\"{u}}nter Daniel Rey}, title = {Correction to: The effect of signaling in dependence on the extraneous cognitive load in learning environments}, journal = {Cogn. Process.}, volume = {22}, number = {4}, pages = {735}, year = {2021}, url = {https://doi.org/10.1007/s10339-021-01051-4}, doi = {10.1007/S10339-021-01051-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cp/BeegeNSR21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cse/DoerflerGGSS21, author = {Douglas Doerfler and Steven Gottlieb and William Gropp and Barry I. Schneider and Alan Sussman}, title = {Performance Portability for Advanced Architectures}, journal = {Comput. Sci. Eng.}, volume = {23}, number = {5}, pages = {7--9}, year = {2021}, url = {https://doi.org/10.1109/MCSE.2021.3104083}, doi = {10.1109/MCSE.2021.3104083}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cse/DoerflerGGSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiangSVHHL21, author = {Jiaojiao Jiang and Jean{-}Guy Schneider and Steve Versteeg and Jun Han and Md. Arafat Hossain and Chengfei Liu}, title = {R-gram: Inferring message formats of service protocols with relative positional n-grams}, journal = {J. Netw. Comput. Appl.}, volume = {196}, pages = {103247}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103247}, doi = {10.1016/J.JNCA.2021.103247}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JiangSVHHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanCSTW21, author = {Jinguang Han and Liqun Chen and Steve Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1836--1849}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2940946}, doi = {10.1109/TDSC.2019.2940946}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanCSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/JamrogaRSSS21, author = {Wojciech Jamroga and Peter Y. A. Ryan and Steve Schneider and Carsten Sch{\"{u}}rmann and Philip B. Stark}, title = {A Declaration of Software Independence}, booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, pages = {198--217}, year = {2021}, crossref = {DBLP:conf/birthday/2021guttman}, url = {https://doi.org/10.1007/978-3-030-91631-2\_11}, doi = {10.1007/978-3-030-91631-2\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/JamrogaRSSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eacl/RehmPBHAVBGGCFH21, author = {Georg Rehm and Stelios Piperidis and Kalina Bontcheva and Jan Hajic and Victoria Arranz and Andrejs Vasiljevs and Gerhard Backfried and Jos{\'{e}} Manu{\'{e}}l G{\'{o}}mez{-}P{\'{e}}rez and Ulrich Germann and R{\'{e}}mi Calizzano and Nils Feldhus and Stefanie Hegele and Florian Kintzel and Katrin Marheinecke and Juli{\'{a}}n Moreno Schneider and Dimitris Galanis and Penny Labropoulou and Miltos Deligiannis and Katerina Gkirtzou and Athanasia Kolovou and Dimitris Gkoumas and Leon Voukoutis and Ian Roberts and Jana Hamrlov{\'{a}} and Dusan Varis and Luk{\'{a}}s Kacena and Khalid Choukri and Val{\'{e}}rie Mapelli and Micka{\"{e}}l Rigault and Julija Melnika and Miroslav J{\'{a}}nos{\'{\i}}k and Katja Prinz and Andr{\'{e}}s Garc{\'{\i}}a{-}Silva and Cristian Berrio and Ondrej Klejch and Steve Renals}, title = {European Language Grid: {A} Joint Platform for the European Language Technology Community}, booktitle = {Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: System Demonstrations, {EACL} 2021, Online, April 19-23, 2021}, pages = {221--230}, year = {2021}, crossref = {DBLP:conf/eacl/2021-d}, url = {https://doi.org/10.18653/v1/2021.eacl-demos.26}, doi = {10.18653/V1/2021.EACL-DEMOS.26}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eacl/RehmPBHAVBGGCFH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/EimerBRAHL21, author = {Theresa Eimer and Andr{\'{e}} Biedenkapp and Maximilian Reimer and Steven Adriaensen and Frank Hutter and Marius Lindauer}, title = {DACBench: {A} Benchmark Library for Dynamic Algorithm Configuration}, booktitle = {Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27 August 2021}, pages = {1668--1674}, year = {2021}, crossref = {DBLP:conf/ijcai/2021}, url = {https://doi.org/10.24963/ijcai.2021/230}, doi = {10.24963/IJCAI.2021/230}, timestamp = {Wed, 25 Aug 2021 17:11:16 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/EimerBRAHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iui/SchneiderGLG21, author = {Tobias Schneider and Sabiha Ghellal and Steve Love and Ansgar R. S. Gerlicher}, title = {Increasing the User Experience in Autonomous Driving through different Feedback Modalities}, booktitle = {{IUI} '21: 26th International Conference on Intelligent User Interfaces, College Station, TX, USA, April 13-17, 2021}, pages = {7--10}, year = {2021}, crossref = {DBLP:conf/iui/2021}, url = {https://doi.org/10.1145/3397481.3450687}, doi = {10.1145/3397481.3450687}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iui/SchneiderGLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sui/SchneiderHRLLG21, author = {Tobias Schneider and Joana Hois and Alischa Rosenstein and Raimondo Lazzara and Steve Love and Ansgar R. S. Gerlicher}, title = {Velocity Styles for Autonomous Vehicles affecting Control, Safety, and User Experience}, booktitle = {{SUI} '21: Symposium on Spatial User Interaction, Virtual Event, USA, November 9-10, 2021}, pages = {29:1--29:2}, year = {2021}, crossref = {DBLP:conf/sui/2021}, url = {https://doi.org/10.1145/3485279.3485308}, doi = {10.1145/3485279.3485308}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sui/SchneiderHRLLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-08541, author = {Theresa Eimer and Andr{\'{e}} Biedenkapp and Maximilian Reimer and Steven Adriaensen and Frank Hutter and Marius Lindauer}, title = {DACBench: {A} Benchmark Library for Dynamic Algorithm Configuration}, journal = {CoRR}, volume = {abs/2105.08541}, year = {2021}, url = {https://arxiv.org/abs/2105.08541}, eprinttype = {arXiv}, eprint = {2105.08541}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-08541.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-01362, author = {Tomas Kulik and Brijesh Dongol and Peter Gorm Larsen and Hugo Daniel Macedo and Steve Schneider and Peter W{\"{u}}rtz Vinther Tran{-}J{\o}rgensen and Jim Woodcock}, title = {A Survey of Practical Formal Methods for Security}, journal = {CoRR}, volume = {abs/2109.01362}, year = {2021}, url = {https://arxiv.org/abs/2109.01362}, eprinttype = {arXiv}, eprint = {2109.01362}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-01362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/BeegeNSNSWMR20, author = {Maik Beege and Manuel Ninaus and Sascha Schneider and Steve Nebel and Julia Schlemmel and Jasmin Weidenm{\"{u}}ller and Korbinian Moeller and G{\"{u}}nter Daniel Rey}, title = {Investigating the effects of beat and deictic gestures of a lecturer in educational videos}, journal = {Comput. Educ.}, volume = {156}, pages = {103955}, year = {2020}, url = {https://doi.org/10.1016/j.compedu.2020.103955}, doi = {10.1016/J.COMPEDU.2020.103955}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ce/BeegeNSNSWMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/BeegeSNR20, author = {Maik Beege and Sascha Schneider and Steve Nebel and G{\"{u}}nter Daniel Rey}, title = {Does the effect of enthusiasm in a pedagogical Agent's voice depend on mental load in the Learner's working memory?}, journal = {Comput. Hum. Behav.}, volume = {112}, pages = {106483}, year = {2020}, url = {https://doi.org/10.1016/j.chb.2020.106483}, doi = {10.1016/J.CHB.2020.106483}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/BeegeSNR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/WilliamsDSM20, author = {David M. Williams and Salaheddin Darwish and Steve Schneider and David R. Michael}, title = {Legislation-driven development of a Gift Aid system using Event-B}, journal = {Formal Aspects Comput.}, volume = {32}, number = {2-3}, pages = {251--273}, year = {2020}, url = {https://doi.org/10.1007/s00165-020-00512-5}, doi = {10.1007/S00165-020-00512-5}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/WilliamsDSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/JiangVHHS20, author = {Jiaojiao Jiang and Steve Versteeg and Jun Han and Md. Arafat Hossain and Jean{-}Guy Schneider}, title = {A positional keyword-based approach to inferring fine-grained message formats}, journal = {Future Gener. Comput. Syst.}, volume = {102}, pages = {369--381}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.08.011}, doi = {10.1016/J.FUTURE.2019.08.011}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/JiangVHHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanCSTWW20, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer and Nick Wilson}, title = {Anonymous Single Sign-On With Proxy Re-Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {223--236}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919926}, doi = {10.1109/TIFS.2019.2919926}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanCSTWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/accv/GittingsSC20, author = {Thomas Gittings and Steve Schneider and John P. Collomosse}, title = {Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks}, booktitle = {Computer Vision - {ACCV} 2020 - 15th Asian Conference on Computer Vision, Kyoto, Japan, November 30 - December 4, 2020, Revised Selected Papers, Part {IV}}, pages = {235--251}, year = {2020}, crossref = {DBLP:conf/accv/2020-4}, url = {https://doi.org/10.1007/978-3-030-69538-5\_15}, doi = {10.1007/978-3-030-69538-5\_15}, timestamp = {Tue, 02 Mar 2021 08:39:09 +0100}, biburl = {https://dblp.org/rec/conf/accv/GittingsSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsci/PittSFGBP20, author = {Benjamin Pitt and Rose M. Schneider and Stephen Ferrigno and Edward Gibson and David Barner and Steven T. Piantadosi}, title = {Procedures and principles of number: Evidence from the Tsimane'}, booktitle = {Proceedings of the 42th Annual Meeting of the Cognitive Science Society - Developing a Mind: Learning in Humans, Animals, and Machines, CogSci 2020, virtual, July 29 - August 1, 2020}, year = {2020}, crossref = {DBLP:conf/cogsci/2020}, url = {https://cogsci.mindmodeling.org/2020/papers/0872/index.html}, timestamp = {Thu, 25 Apr 2024 16:58:16 +0200}, biburl = {https://dblp.org/rec/conf/cogsci/PittSFGBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/SallalSCDTDRW20, author = {Muntadher Sallal and Steve Schneider and Matthew Casey and Fran{\c{c}}ois Dupressoir and Helen Treharne and Constantin Catalin Dragan and Luke Riley and Phil Wright}, title = {Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {1167--1168}, year = {2020}, crossref = {DBLP:conf/icdcs/2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00124}, doi = {10.1109/ICDCS47774.2020.00124}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/SallalSCDTDRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/ShalaBAALH20, author = {Gresa Shala and Andr{\'{e}} Biedenkapp and Noor H. Awad and Steven Adriaensen and Marius Lindauer and Frank Hutter}, title = {Learning Step-Size Adaptation in {CMA-ES}}, booktitle = {Parallel Problem Solving from Nature - {PPSN} {XVI} - 16th International Conference, {PPSN} 2020, Leiden, The Netherlands, September 5-9, 2020, Proceedings, Part {I}}, pages = {691--706}, year = {2020}, crossref = {DBLP:conf/ppsn/2020-1}, url = {https://doi.org/10.1007/978-3-030-58112-1\_48}, doi = {10.1007/978-3-030-58112-1\_48}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ppsn/ShalaBAALH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020-1, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6}, doi = {10.1007/978-3-030-58951-6}, isbn = {978-3-030-58950-9}, timestamp = {Fri, 02 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020-2, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0}, doi = {10.1007/978-3-030-59013-0}, isbn = {978-3-030-59012-3}, timestamp = {Fri, 02 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-08194, author = {Thomas Gittings and Steve A. Schneider and John P. Collomosse}, title = {Vax-a-Net: Training-time Defence Against Adversarial Patch Attacks}, journal = {CoRR}, volume = {abs/2009.08194}, year = {2020}, url = {https://arxiv.org/abs/2009.08194}, eprinttype = {arXiv}, eprint = {2009.08194}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-08194.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JiangVHHSLF19, author = {Jiaojiao Jiang and Steve Versteeg and Jun Han and Md. Arafat Hossain and Jean{-}Guy Schneider and Christopher Leckie and Zeinab Farahmandpour}, title = {P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages}, journal = {{IEEE} Access}, volume = {7}, pages = {88504--88516}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2924928}, doi = {10.1109/ACCESS.2019.2924928}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JiangVHHSLF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/BeegeNSR19, author = {Maik Beege and Steve Nebel and Sascha Schneider and G{\"{u}}nter Daniel Rey}, title = {Social entities in educational videos: Combining the effects of addressing and professionalism}, journal = {Comput. Hum. Behav.}, volume = {93}, pages = {40--52}, year = {2019}, url = {https://doi.org/10.1016/j.chb.2018.11.051}, doi = {10.1016/J.CHB.2018.11.051}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/BeegeNSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbe/PriesterWKSZASR19, author = {Alan Priester and Holden H. Wu and Pooria Khoshnoodi and Douglas Schneider and Zhaohuan Zhang and Nazanin H. Asvadi and Anthony Sisk and Steven S. Raman and Robert E. Reiter and Warren S. Grundfest and Leonard S. Marks and Shyam Natarajan}, title = {Registration Accuracy of Patient-Specific, Three-Dimensional-Printed Prostate Molds for Correlating Pathology With Magnetic Resonance Imaging}, journal = {{IEEE} Trans. Biomed. Eng.}, volume = {66}, number = {1}, pages = {14--22}, year = {2019}, url = {https://doi.org/10.1109/TBME.2018.2828304}, doi = {10.1109/TBME.2018.2828304}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbe/PriesterWKSZASR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmvc/GittingsSC19, author = {Thomas Gittings and Steve A. Schneider and John P. Collomosse}, title = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior}, booktitle = {30th British Machine Vision Conference 2019, {BMVC} 2019, Cardiff, UK, September 9-12, 2019}, pages = {283}, year = {2019}, crossref = {DBLP:conf/bmvc/2019}, url = {https://bmvc2019.org/wp-content/uploads/papers/0165-paper.pdf}, timestamp = {Wed, 03 Feb 2021 08:35:59 +0100}, biburl = {https://dblp.org/rec/conf/bmvc/GittingsSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WhitefieldCSSTW19, author = {Jorden Whitefield and Liqun Chen and Ralf Sasse and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {A Symbolic Analysis of ECC-Based Direct Anonymous Attestation}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {127--141}, year = {2019}, crossref = {DBLP:conf/eurosp/2019}, url = {https://doi.org/10.1109/EuroSP.2019.00019}, doi = {10.1109/EUROSP.2019.00019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/WhitefieldCSSTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-1, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0}, doi = {10.1007/978-3-030-29959-0}, isbn = {978-3-030-29958-3}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-2, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0}, doi = {10.1007/978-3-030-29962-0}, isbn = {978-3-030-29961-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01996, author = {Thomas Gittings and Steve A. Schneider and John P. Collomosse}, title = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior}, journal = {CoRR}, volume = {abs/1907.01996}, year = {2019}, url = {http://arxiv.org/abs/1907.01996}, eprinttype = {arXiv}, eprint = {1907.01996}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-00288, author = {Muntadher Sallal and Steve A. Schneider and Matthew Casey and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Luke Riley and Helen Treharne and Joe Wadsworth and Phil Wright}, title = {{VMV:} Augmenting an Internet Voting System with Selene Verifiability}, journal = {CoRR}, volume = {abs/1912.00288}, year = {2019}, url = {http://arxiv.org/abs/1912.00288}, eprinttype = {arXiv}, eprint = {1912.00288}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-00288.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aci/LaneMAGKSL18, author = {Steven R. Lane and Holly Miller and Elizabeth Ames and Lawrence Garber and David C. Kibbe and Joseph Schneider and Christoph U. Lehmann}, title = {Consensus Statement: Feature and Function Recommendations to Optimize Clinician Usability of Direct Interoperability to Enhance Patient Care}, journal = {Appl. Clin. Inform.}, volume = {09}, number = {01}, pages = {205--220}, year = {2018}, url = {https://doi.org/10.1055/s-0038-1637007}, doi = {10.1055/S-0038-1637007}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aci/LaneMAGKSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/BeegeSNHR18, author = {Maik Beege and Sascha Schneider and Steve Nebel and Alexandra H{\"{a}}{\ss}ler and G{\"{u}}nter Daniel Rey}, title = {Mood-affect congruency. Exploring the relation between learners' mood and the affective charge of educational videos}, journal = {Comput. Educ.}, volume = {123}, pages = {85--96}, year = {2018}, url = {https://doi.org/10.1016/j.compedu.2018.05.001}, doi = {10.1016/J.COMPEDU.2018.05.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ce/BeegeSNHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HanCSTW18, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Anonymous Single-Sign-On for n Designated Services with Traceability}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, pages = {470--490}, year = {2018}, crossref = {DBLP:conf/esorics/2018-1}, url = {https://doi.org/10.1007/978-3-319-99073-6\_23}, doi = {10.1007/978-3-319-99073-6\_23}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HanCSTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/WendlandHSU18, author = {Marc{-}Florian Wendland and Niels Hoppe and Martin A. Schneider and Steven Ulrich}, title = {Extending the {UML} Testing Profile with a Fine-Grained Test Logging Model}, booktitle = {2018 {IEEE} International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops, V{\"{a}}ster{\aa}s, Sweden, April 9-13, 2018}, pages = {257--266}, year = {2018}, crossref = {DBLP:conf/icst/2018w}, url = {https://doi.org/10.1109/ICSTW.2018.00058}, doi = {10.1109/ICSTW.2018.00058}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/WendlandHSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HossainVHKJS18, author = {Md. Arafat Hossain and Steve Versteeg and Jun Han and Muhammad Ashad Kabir and Jiaojiao Jiang and Jean{-}Guy Schneider}, title = {Mining accurate message formats for service APIs}, booktitle = {25th International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018}, pages = {266--276}, year = {2018}, crossref = {DBLP:conf/wcre/2018}, url = {https://doi.org/10.1109/SANER.2018.8330215}, doi = {10.1109/SANER.2018.8330215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/HossainVHKJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2018, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8}, doi = {10.1007/978-3-319-99136-8}, isbn = {978-3-319-99135-1}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07201, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Anonymous Single-Sign-On for n designated services with traceability}, journal = {CoRR}, volume = {abs/1804.07201}, year = {2018}, url = {http://arxiv.org/abs/1804.07201}, eprinttype = {arXiv}, eprint = {1804.07201}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07201.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-07642, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer and Nick Wilson}, title = {Anonymous Single Sign-on with Proxy Re-Verification}, journal = {CoRR}, volume = {abs/1811.07642}, year = {2018}, url = {http://arxiv.org/abs/1811.07642}, eprinttype = {arXiv}, eprint = {1811.07642}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-07642.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/NebelSBR17, author = {Steve Nebel and Sascha Schneider and Maik Beege and G{\"{u}}nter Daniel Rey}, title = {Leaderboards within educational videogames: The impact of difficulty, effort and gameplay}, journal = {Comput. Educ.}, volume = {113}, pages = {28--41}, year = {2017}, url = {https://doi.org/10.1016/j.compedu.2017.05.011}, doi = {10.1016/J.COMPEDU.2017.05.011}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ce/NebelSBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/BeegeSNMR17, author = {Maik Beege and Sascha Schneider and Steve Nebel and Jessica Mittangk and G{\"{u}}nter Daniel Rey}, title = {Ageism - Age coherence within learning material fosters learning}, journal = {Comput. Hum. Behav.}, volume = {75}, pages = {510--519}, year = {2017}, url = {https://doi.org/10.1016/j.chb.2017.05.042}, doi = {10.1016/J.CHB.2017.05.042}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/BeegeSNMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuHSHV17, author = {Jian Yu and Jun Han and Jean{-}Guy Schneider and Cameron M. Hine and Steve Versteeg}, title = {A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems}, journal = {Comput. J.}, volume = {60}, number = {1}, pages = {27--44}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxw055}, doi = {10.1093/COMJNL/BXW055}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YuHSHV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenalohRST17, author = {Josh Benaloh and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {A Vote of Confidence?}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {3}, pages = {12--13}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.53}, doi = {10.1109/MSP.2017.53}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenalohRST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/DalanSWSV17, author = {Rinita Dalan and Jay Sturdevant and Rebecca Wallace and Blair Schneider and Steven De Vore}, title = {Cutbank Geophysics: {A} New Method for Expanding Magnetic Investigations to the Subsurface Using Magnetic Susceptibility Testing at an Awatixa Hidatsa Village, North Dakota}, journal = {Remote. Sens.}, volume = {9}, number = {2}, pages = {112}, year = {2017}, url = {https://doi.org/10.3390/rs9020112}, doi = {10.3390/RS9020112}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/DalanSWSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candc/AndolinaSCKJD17, author = {Salvatore Andolina and Hendrik Schneider and Joel Chan and Khalil Klouche and Giulio Jacucci and Steven Dow}, title = {Crowdboard: Augmenting In-Person Idea Generation with Real-Time Crowds}, booktitle = {Proceedings of the 2017 {ACM} {SIGCHI} Conference on Creativity and Cognition, C{\&}C 2017, Singapore, June 27 - 30, 2017}, pages = {106--118}, year = {2017}, crossref = {DBLP:conf/candc/2017}, url = {https://doi.org/10.1145/3059454.3059477}, doi = {10.1145/3059454.3059477}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/candc/AndolinaSCKJD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cri/MilosevicGCDLSN17, author = {Nikola Milosevic and Anay Gupta and Austin Chen and Steven DeMarco and Joshua P. Le and Jodi Schneider and Yifan Ning and Goran Nenadic and Richard D. Boyce}, title = {Extraction of Drug-Drug Interactions from Drug Product Labeling Tables}, booktitle = {Summit on Clinical Research Informatics, {CRI} 2017, San Francisco, CA, USA, March 27-30, 2017}, year = {2017}, crossref = {DBLP:conf/cri/2017}, url = {http://knowledge.amia.org/amia-64484-cri2017-1.3520710/t004-1.3521377/t004-1.3521378/a120-1.3521454/a121-1.3521451}, timestamp = {Wed, 20 Jun 2018 17:09:15 +0200}, biburl = {https://dblp.org/rec/conf/cri/MilosevicGCDLSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WhitefieldCKPST17, author = {Jorden Whitefield and Liqun Chen and Frank Kargl and Andrew Paverd and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Formal Analysis of {V2X} Revocation Protocols}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, pages = {147--163}, year = {2017}, crossref = {DBLP:conf/stm/2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_10}, doi = {10.1007/978-3-319-68063-7\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WhitefieldCKPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/WhitefieldCGST17, author = {Jorden Whitefield and Liqun Chen and Thanassis Giannetsos and Steve A. Schneider and Helen Treharne}, title = {Privacy-enhanced capabilities for VANETs using direct anonymous attestation}, booktitle = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy, November 27-29, 2017}, pages = {123--130}, year = {2017}, crossref = {DBLP:conf/vnc/2017}, url = {https://doi.org/10.1109/VNC.2017.8275615}, doi = {10.1109/VNC.2017.8275615}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vnc/WhitefieldCGST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2017, editor = {Nadia Polikarpova and Steve A. Schneider}, title = {Integrated Formal Methods - 13th International Conference, {IFM} 2017, Turin, Italy, September 20-22, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10510}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66845-1}, doi = {10.1007/978-3-319-66845-1}, isbn = {978-3-319-66844-4}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HanCST17, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne}, title = {{PPETS-FGP:} Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing}, journal = {CoRR}, volume = {abs/1706.03016}, year = {2017}, url = {http://arxiv.org/abs/1706.03016}, eprinttype = {arXiv}, eprint = {1706.03016}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HanCST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WhitefieldCKPST17, author = {Jorden Whitefield and Liqun Chen and Frank Kargl and Andrew Paverd and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Formal Analysis of {V2X} Revocation Protocols}, journal = {CoRR}, volume = {abs/1704.07216}, year = {2017}, url = {http://arxiv.org/abs/1704.07216}, eprinttype = {arXiv}, eprint = {1704.07216}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WhitefieldCKPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/f1000research/JimenezKABBBCHC17, author = {Rafael C. Jim{\'{e}}nez and Mateusz Kuzak and Monther Alhamdoosh and Michelle Barker and B{\'{e}}r{\'{e}}nice Batut and Mikael Borg and Salvador Capella{-}Guti{\'{e}}rrez and Neil P. Chue Hong and Martin Cook and Manuel Corpas and Madison Flannery and Leyla J. Garc{\'{\i}}a and Josep Lluis Gelp{\'{\i}} and Simon L. Gladman and Carole A. Goble and Montserrat Gonz{\'{a}}lez Ferreiro and Alejandra N. Gonz{\'{a}}lez{-}Beltr{\'{a}}n and Philippa C. Griffin and Bj{\"{o}}rn A. Gr{\"{u}}ning and Jonas Hagberg and Petr Holub and Rob W. W. Hooft and Jon C. Ison and Daniel S. Katz and Brane Leskosek and Federico L{\'{o}}pez{-}G{\'{o}}mez and Luis J. Oliveira and David Mellor and Rowland Mosbergen and Nicola J. Mulder and Yasset P{\'{e}}rez{-}Riverol and Robert Pergl and Horst Pichler and Bernard J. Pope and Ferran Sanz and Maria Victoria Schneider and Victoria Stodden and Radoslaw Suchecki and Radka Svobodov{\'{a}} Varekov{\'{a}} and Harry{-}Anton Talvik and Ilian T. Todorov and Andrew E. Treloar and Sonika Tyagi and Maarten van Gompel and Daniel Vaughan and Allegra Via and Xiaochuan Wang and Nathan S. Watson{-}Haigh and Steve Crouch}, title = {Four simple recommendations to encourage best practices in research software}, journal = {F1000Research}, volume = {6}, pages = {876}, year = {2017}, url = {https://doi.org/10.12688/f1000research.11407.1}, doi = {10.12688/F1000RESEARCH.11407.1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/f1000research/JimenezKABBBCHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/WirzbergerBSNR16, author = {Maria Wirzberger and Maik Beege and Sascha Schneider and Steve Nebel and G{\"{u}}nter Daniel Rey}, title = {One for all?! Simultaneous examination of load-inducing factors for advancing media-related instructional research}, journal = {Comput. Educ.}, volume = {100}, pages = {18--31}, year = {2016}, url = {https://doi.org/10.1016/j.compedu.2016.04.010}, doi = {10.1016/J.COMPEDU.2016.04.010}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ce/WirzbergerBSNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/NebelBSR16, author = {Steve Nebel and Maik Beege and Sascha Schneider and G{\"{u}}nter Daniel Rey}, title = {The higher the score, the higher the learning outcome? Heterogeneous impacts of leaderboards and choice within educational videogames}, journal = {Comput. Hum. Behav.}, volume = {65}, pages = {391--401}, year = {2016}, url = {https://doi.org/10.1016/j.chb.2016.08.042}, doi = {10.1016/J.CHB.2016.08.042}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/NebelBSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/NebelSR16, author = {Steve Nebel and Sascha Schneider and G{\"{u}}nter Daniel Rey}, title = {From duels to classroom competition: Social competition and learning in educational videogames within different group sizes}, journal = {Comput. Hum. Behav.}, volume = {55}, pages = {384--398}, year = {2016}, url = {https://doi.org/10.1016/j.chb.2015.09.035}, doi = {10.1016/J.CHB.2015.09.035}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/NebelSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/SkulmowskiAPNSR16, author = {Alexander Skulmowski and Yannik Augustin and Simon Pradel and Steve Nebel and Sascha Schneider and G{\"{u}}nter Daniel Rey}, title = {The negative impact of saturation on website trustworthiness and appeal: {A} temporal model of aesthetic website perception}, journal = {Comput. Hum. Behav.}, volume = {61}, pages = {386--393}, year = {2016}, url = {https://doi.org/10.1016/j.chb.2016.03.054}, doi = {10.1016/J.CHB.2016.03.054}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/SkulmowskiAPNSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ets/NebelSR16, author = {Steve Nebel and Sascha Schneider and G{\"{u}}nter Daniel Rey}, title = {Mining Learning and Crafting Scientific Experiments: {A} Literature Review on the Use of Minecraft in Education and Research}, journal = {J. Educ. Technol. Soc.}, volume = {19}, number = {2}, pages = {355--366}, year = {2016}, url = {https://www.j-ets.net/ETS/journals/19\_2/26.pdf}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ets/NebelSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/HoangSTW16, author = {Thai Son Hoang and Steve A. Schneider and Helen Treharne and David M. Williams}, title = {Foundations for using linear temporal logic in Event-B refinement}, journal = {Formal Aspects Comput.}, volume = {28}, number = {6}, pages = {909--935}, year = {2016}, url = {https://doi.org/10.1007/s00165-016-0376-0}, doi = {10.1007/S00165-016-0376-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/HoangSTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BurtonCS16, author = {Craig Burton and Chris Culnane and Steve A. Schneider}, title = {vVote: Verifiable Electronic Voting in Practice}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {4}, pages = {64--73}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.69}, doi = {10.1109/MSP.2016.69}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BurtonCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/MoranHS16, author = {Murat Moran and James Heather and Steve A. Schneider}, title = {Automated anonymity verification of the ThreeBallot and {VAV} voting systems}, journal = {Softw. Syst. Model.}, volume = {15}, number = {4}, pages = {1049--1062}, year = {2016}, url = {https://doi.org/10.1007/s10270-014-0445-x}, doi = {10.1007/S10270-014-0445-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/MoranHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpp/SchaferSS16, author = {Steven Sch{\"{a}}fer and Sigurd Schneider and Gert Smolka}, title = {Axiomatic semantics for compiler verification}, booktitle = {Proceedings of the 5th {ACM} {SIGPLAN} Conference on Certified Programs and Proofs, Saint Petersburg, FL, USA, January 20-22, 2016}, pages = {188--196}, year = {2016}, crossref = {DBLP:conf/cpp/2016}, url = {https://doi.org/10.1145/2854065.2854083}, doi = {10.1145/2854065.2854083}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpp/SchaferSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/HineSHV16, author = {Cameron M. Hine and Jean{-}Guy Schneider and Jun Han and Steve Versteeg}, title = {Enterprise software service emulation: constructing large-scale testbeds}, booktitle = {Proceedings of the International Workshop on Continuous Software Evolution and Delivery, CSED@ICSE 2016, Austin, Texas, USA, May 14-22, 2016}, pages = {56--62}, year = {2016}, crossref = {DBLP:conf/icse/2016csed}, url = {https://doi.org/10.1145/2896941.2896947}, doi = {10.1145/2896941.2896947}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/HineSHV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/VersteegDBSGH16, author = {Steve Versteeg and Miao Du and John Bird and Jean{-}Guy Schneider and John C. Grundy and Jun Han}, title = {Enhanced playback of automated service emulation models using entropy analysis}, booktitle = {Proceedings of the International Workshop on Continuous Software Evolution and Delivery, CSED@ICSE 2016, Austin, Texas, USA, May 14-22, 2016}, pages = {49--55}, year = {2016}, crossref = {DBLP:conf/icse/2016csed}, url = {https://doi.org/10.1145/2896941.2896950}, doi = {10.1145/2896941.2896950}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/VersteegDBSGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/VersteegDSGHG16, author = {Steven Versteeg and Miao Du and Jean{-}Guy Schneider and John Grundy and Jun Han and Menka Goyal}, title = {Opaque service virtualisation: a practical tool for emulating endpoint systems}, booktitle = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume}, pages = {202--211}, year = {2016}, crossref = {DBLP:conf/icse/2016c}, url = {https://doi.org/10.1145/2889160.2889242}, doi = {10.1145/2889160.2889242}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/VersteegDSGHG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/p/SchneiderTW16, author = {Steve A. Schneider and Helen Treharne and David M. Williams}, title = {Event-B and Linear Temporal Logic}, booktitle = {From Action Systems to Distributed Systems - The Refinement Approach}, pages = {113--123}, year = {2016}, crossref = {DBLP:books/crc/asds2016}, url = {https://doi.org/10.1201/b20053-12}, doi = {10.1201/B20053-12}, timestamp = {Tue, 16 May 2017 14:01:47 +0200}, biburl = {https://dblp.org/rec/books/crc/p/SchneiderTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2016, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5}, doi = {10.1007/978-3-319-39555-5}, isbn = {978-3-319-39554-8}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HineSHV16, author = {Cameron M. Hine and Jean{-}Guy Schneider and Jun Han and Steve Versteeg}, title = {Enterprise Software Service Emulation: Constructing Large-Scale Testbeds}, journal = {CoRR}, volume = {abs/1605.06729}, year = {2016}, url = {http://arxiv.org/abs/1605.06729}, eprinttype = {arXiv}, eprint = {1605.06729}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HineSHV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchneiderMV16, author = {Jean{-}Guy Schneider and Peter Mandile and Steve Versteeg}, title = {Generalized Suffix Tree based Multiple Sequence Alignment for Service Virtualization}, journal = {CoRR}, volume = {abs/1606.01593}, year = {2016}, url = {http://arxiv.org/abs/1606.01593}, eprinttype = {arXiv}, eprint = {1606.01593}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchneiderMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VersteegDBSGH16, author = {Steve Versteeg and Miao Du and John Bird and Jean{-}Guy Schneider and John C. Grundy and Jun Han}, title = {Enhanced Playback of Automated Service Emulation Models Using Entropy Analysis}, journal = {CoRR}, volume = {abs/1605.06668}, year = {2016}, url = {http://arxiv.org/abs/1605.06668}, eprinttype = {arXiv}, eprint = {1605.06668}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VersteegDBSGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VersteegDSGHG16, author = {Steve Versteeg and Miao Du and Jean{-}Guy Schneider and John C. Grundy and Jun Han and Menka Goyal}, title = {Opaque Service Virtualisation: {A} Practical Tool for Emulating Endpoint Systems}, journal = {CoRR}, volume = {abs/1605.06670}, year = {2016}, url = {http://arxiv.org/abs/1605.06670}, eprinttype = {arXiv}, eprint = {1605.06670}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VersteegDSGHG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cars/SongTTJBSGDOHC15, author = {Yi Song and Johannes Totz and Steve Thompson and Stian Flage Johnsen and Dean C. Barratt and Crispin Schneider and Kurinchi Gurusamy and Brian R. Davidson and S{\'{e}}bastien Ourselin and David J. Hawkes and Matthew J. Clarkson}, title = {Locally rigid, vessel-based registration for laparoscopic liver surgery}, journal = {Int. J. Comput. Assist. Radiol. Surg.}, volume = {10}, number = {12}, pages = {1951--1961}, year = {2015}, url = {https://doi.org/10.1007/s11548-015-1236-8}, doi = {10.1007/S11548-015-1236-8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cars/SongTTJBSGDOHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/SchneiderNPR15, author = {Sascha Schneider and Steve Nebel and Simon Pradel and G{\"{u}}nter Daniel Rey}, title = {Introducing the familiarity mechanism: {A} unified explanatory approach for the personalization effect and the examination of youth slang in multimedia learning}, journal = {Comput. Hum. Behav.}, volume = {43}, pages = {129--138}, year = {2015}, url = {https://doi.org/10.1016/j.chb.2014.10.052}, doi = {10.1016/J.CHB.2014.10.052}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/SchneiderNPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/SchneiderNPR15a, author = {Sascha Schneider and Steve Nebel and Simon Pradel and G{\"{u}}nter Daniel Rey}, title = {Mind your Ps and Qs! How polite instructions affect learning with multimedia}, journal = {Comput. Hum. Behav.}, volume = {51}, pages = {546--555}, year = {2015}, url = {https://doi.org/10.1016/j.chb.2015.05.025}, doi = {10.1016/J.CHB.2015.05.025}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/SchneiderNPR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RyanST15, author = {Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {End-to-End Verifiability in Voting Systems, from Theory to Practice}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {59--62}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.54}, doi = {10.1109/MSP.2015.54}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RyanST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AlshehriS15, author = {Abdullah Ali Alshehri and Steve A. Schneider}, title = {A formal framework for security analysis of {NFC} mobile coupon protocols}, journal = {J. Comput. Secur.}, volume = {23}, number = {6}, pages = {685--707}, year = {2015}, url = {https://doi.org/10.3233/JCS-150531}, doi = {10.3233/JCS-150531}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AlshehriS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/SchneiderT15, author = {Steve A. Schneider and Helen Treharne}, title = {Special issue on Automated Verification of Critical Systems (AVoCS 2013)}, journal = {Sci. Comput. Program.}, volume = {111}, pages = {213}, year = {2015}, url = {https://doi.org/10.1016/j.scico.2015.08.006}, doi = {10.1016/J.SCICO.2015.08.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/SchneiderT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/DuVSHG15, author = {Miao Du and Steven Versteeg and Jean{-}Guy Schneider and Jun Han and John C. Grundy}, title = {Interaction Traces Mining for Efficient System Responses Generation}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {40}, number = {1}, pages = {1--8}, year = {2015}, url = {https://doi.org/10.1145/2693208.2693221}, doi = {10.1145/2693208.2693221}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/DuVSHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CulnaneRST15, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: {A} Verifiable Voting System}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {3:1--3:30}, year = {2015}, url = {https://doi.org/10.1145/2746338}, doi = {10.1145/2746338}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/SchneiderMV15, author = {Jean{-}Guy Schneider and Peter Mandile and Steven Versteeg}, title = {Generalized Suffix Tree Based Multiple Sequence Alignment for Service Virtualization}, booktitle = {24th Australasian Software Engineering Conference, {ASWEC} 2015, Adelaide, SA, Australia, September 28 - October 1, 2015}, pages = {48--57}, year = {2015}, crossref = {DBLP:conf/aswec/2015}, url = {https://doi.org/10.1109/ASWEC.2015.13}, doi = {10.1109/ASWEC.2015.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/SchneiderMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BurtonCS15, author = {Craig Burton and Chris Culnane and Steve A. Schneider}, title = {Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election}, journal = {CoRR}, volume = {abs/1504.07098}, year = {2015}, url = {http://arxiv.org/abs/1504.07098}, eprinttype = {arXiv}, eprint = {1504.07098}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BurtonCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DuVSGH15, author = {Miao Du and Steven Versteeg and Jean{-}Guy Schneider and John C. Grundy and Jun Han}, title = {From Network Traces to System Responses: Opaquely Emulating Software Services}, journal = {CoRR}, volume = {abs/1510.01421}, year = {2015}, url = {http://arxiv.org/abs/1510.01421}, eprinttype = {arXiv}, eprint = {1510.01421}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DuVSGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchiobergSSUF15, author = {Doris Schi{\"{o}}berg and Fabian Schneider and Stefan Schmid and Steve Uhlig and Anja Feldmann}, title = {Evolution of Directed Triangle Motifs in the Google+ {OSN}}, journal = {CoRR}, volume = {abs/1502.04321}, year = {2015}, url = {http://arxiv.org/abs/1502.04321}, eprinttype = {arXiv}, eprint = {1502.04321}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchiobergSSUF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/NordboLLNALSMGTTLSRSOV14, author = {{\O}yvind Nordb{\o} and Pablo Lamata and Sander Land and Steven A. Niederer and Jan M. Aronsen and William E. Louch and Ivar Sjaastad and Harald Martens and Arne B. Gjuvsland and Kristin T{\o}ndel and Hans Torp and Ma{\'{e}}l{\`{e}}ne Lohezic and J{\"{u}}rgen E. Schneider and Espen W. Remme and Nicolas Smith and Stig W. Omholt and Jon Olav Vik}, title = {A computational pipeline for quantification of mouse myocardial stiffness parameters}, journal = {Comput. Biol. Medicine}, volume = {53}, pages = {65--75}, year = {2014}, url = {https://doi.org/10.1016/j.compbiomed.2014.07.013}, doi = {10.1016/J.COMPBIOMED.2014.07.013}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cbm/NordboLLNALSMGTTLSRSOV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/BrowneDPBHJFSGGGPSIBWCYMLW14, author = {James C. Browne and Robert L. DeLeon and Abani K. Patra and William L. Barth and John L. Hammond and Matthew D. Jones and Thomas R. Furlani and Barry I. Schneider and Steven M. Gallo and Amin Ghadersohi and Ryan J. Gentner and Jeffrey T. Palmer and Nikolay Simakov and Martins Innus and Andrew E. Bruno and Joseph P. White and Cynthia D. Cornelius and Thomas Yearke and Kyle Marcus and Gregor von Laszewski and Fugang Wang}, title = {Comprehensive, open-source resource usage measurement and analysis for {HPC} systems}, journal = {Concurr. Comput. Pract. Exp.}, volume = {26}, number = {13}, pages = {2191--2209}, year = {2014}, url = {https://doi.org/10.1002/cpe.3245}, doi = {10.1002/CPE.3245}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/BrowneDPBHJFSGGGPSIBWCYMLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/BoitenS14, author = {Eerke A. Boiten and Steve A. Schneider}, title = {Editorial}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.1007/s00165-013-0290-7}, doi = {10.1007/S00165-013-0290-7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/BoitenS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/HeatherST14, author = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {Cryptographic protocols with everyday objects}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {37--62}, year = {2014}, url = {https://doi.org/10.1007/s00165-013-0274-7}, doi = {10.1007/S00165-013-0274-7}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/HeatherST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/MoranHS14, author = {Murat Moran and James Heather and Steve A. Schneider}, title = {Verifying anonymity in voting systems using {CSP}}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {63--98}, year = {2014}, url = {https://doi.org/10.1007/s00165-012-0268-x}, doi = {10.1007/S00165-012-0268-X}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/MoranHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SchneiderTW14, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, title = {The behavioural semantics of Event-B refinement}, journal = {Formal Aspects Comput.}, volume = {26}, number = {2}, pages = {251--280}, year = {2014}, url = {https://doi.org/10.1007/s00165-012-0265-0}, doi = {10.1007/S00165-012-0265-0}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SchneiderTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchneiderTCH14, author = {Steve A. Schneider and Vanessa Teague and Chris Culnane and James Heather}, title = {Special Section on Vote-ID 2013}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {103--104}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.06.002}, doi = {10.1016/J.JISA.2014.06.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SchneiderTCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/JamesMNRST14, author = {Phillip James and Faron Moller and Hoang Nga Nguyen and Markus Roggenbach and Steve A. Schneider and Helen Treharne}, title = {On modelling and verifying railway interlockings: Tracking train lengths}, journal = {Sci. Comput. Program.}, volume = {96}, pages = {315--336}, year = {2014}, url = {https://doi.org/10.1016/j.scico.2014.04.005}, doi = {10.1016/J.SCICO.2014.04.005}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/JamesMNRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/JamesMNRST14, author = {Phillip James and Faron Moller and Nguyen Hoang Nga and Markus Roggenbach and Steve A. Schneider and Helen Treharne}, title = {Techniques for modelling and verifying railway interlockings}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {16}, number = {6}, pages = {685--711}, year = {2014}, url = {https://doi.org/10.1007/s10009-014-0304-7}, doi = {10.1007/S10009-014-0304-7}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/JamesMNRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/HeHYJSV14, author = {Qiang He and Jun Han and Yun Yang and Hai Jin and Jean{-}Guy Schneider and Steven Versteeg}, title = {Formulating Cost-Effective Monitoring Strategies for Service-Based Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {40}, number = {5}, pages = {461--482}, year = {2014}, url = {https://doi.org/10.1109/TSE.2013.48}, doi = {10.1109/TSE.2013.48}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/HeHYJSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsci/DavenportKHS14, author = {Jodi L. Davenport and Yvonne Kao and Aleata Hubbard and Steven Schneider}, title = {Testing Cognitive Science Principles in a Middle School Mathematics Curriculum}, booktitle = {Proceedings of the 36th Annual Meeting of the Cognitive Science Society, CogSci 2014, Quebec City, Canada, July 23-26, 2014}, year = {2014}, crossref = {DBLP:conf/cogsci/2014}, url = {https://escholarship.org/uc/item/8f31r6jv}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cogsci/DavenportKHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CulnaneS14, author = {Chris Culnane and Steve A. Schneider}, title = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {169--183}, year = {2014}, crossref = {DBLP:conf/csfw/2014}, url = {https://doi.org/10.1109/CSF.2014.20}, doi = {10.1109/CSF.2014.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CulnaneS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icls/LonnBPPSRS14, author = {Steven Lonn and Christopher Brooks and Zachary A. Pardos and Barry W. Peddycord III and Emily Schneider and Ido Roll and Ashley Shaw}, title = {MOOCShop 2014}, booktitle = {Learning and Becoming in Practice: Proceedings of the 11th International Conference of the Learning Sciences, {ICLS} 2014, Boulder, Colorado, USA, June 23-27, 2014}, year = {2014}, crossref = {DBLP:conf/icls/2014}, url = {https://repository.isls.org/handle/1/1099}, timestamp = {Wed, 05 May 2021 10:29:19 +0200}, biburl = {https://dblp.org/rec/conf/icls/LonnBPPSRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderTWW14, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim and David M. Williams}, title = {Managing {LTL} Properties in Event-B Refinement}, booktitle = {Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings}, pages = {221--237}, year = {2014}, crossref = {DBLP:conf/ifm/2014}, url = {https://doi.org/10.1007/978-3-319-10181-1\_14}, doi = {10.1007/978-3-319-10181-1\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderTWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/WuSRR14, author = {John Wu and Steven Schneider and Ranga S. Ramanujan and Matthew Rambo}, title = {{ADNS} IPv6 Transition Architecture and Analysis}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {1167--1172}, year = {2014}, crossref = {DBLP:conf/milcom/2014}, url = {https://doi.org/10.1109/MILCOM.2014.196}, doi = {10.1109/MILCOM.2014.196}, timestamp = {Fri, 16 Sep 2022 20:28:33 +0200}, biburl = {https://dblp.org/rec/conf/milcom/WuSRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SrinivasanCHSX14, author = {Sriramkrishnan Srinivasan and Chris Culnane and James Heather and Steve A. Schneider and Zhe Xia}, title = {Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, pages = {335--348}, year = {2014}, crossref = {DBLP:conf/nss/2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_26}, doi = {10.1007/978-3-319-11698-3\_26}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SrinivasanCHSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/StathakidisSH14, author = {Efstathios Stathakidis and Steve A. Schneider and James Heather}, title = {Robustness Modelling and Verification of a Mix Net Protocol}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, pages = {131--150}, year = {2014}, crossref = {DBLP:conf/secsr/2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_9}, doi = {10.1007/978-3-319-14054-4\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secsr/StathakidisSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CulnaneHJRST14, author = {Chris Culnane and James Heather and Rui Joaquim and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter}, booktitle = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014}, year = {2014}, crossref = {DBLP:conf/uss/2014evt}, url = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane}, timestamp = {Mon, 01 Feb 2021 08:42:52 +0100}, biburl = {https://dblp.org/rec/conf/uss/CulnaneHJRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CulnaneRST14, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: a Verifiable Voting System {(DRAFT)}}, journal = {CoRR}, volume = {abs/1404.6822}, year = {2014}, url = {http://arxiv.org/abs/1404.6822}, eprinttype = {arXiv}, eprint = {1404.6822}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CulnaneRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CulnaneS14, author = {Chris Culnane and Steve A. Schneider}, title = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems}, journal = {CoRR}, volume = {abs/1401.4151}, year = {2014}, url = {http://arxiv.org/abs/1401.4151}, eprinttype = {arXiv}, eprint = {1401.4151}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CulnaneS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchneiderTWW14, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim and David M. Williams}, title = {Managing {LTL} properties in Event-B refinement}, journal = {CoRR}, volume = {abs/1406.6622}, year = {2014}, url = {http://arxiv.org/abs/1406.6622}, eprinttype = {arXiv}, eprint = {1406.6622}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchneiderTWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ao/NeuhausVBBDDGHLORSSVWY13, author = {Fabian Neuhaus and Amanda Vizedom and Kenneth Baclawski and Mike Bennett and Mike Dean and Michael Denny and Michael Gr{\"{u}}ninger and Ali Hashemi and Terry Longstreth and Leo Obrst and Steve Ray and Ram D. Sriram and Todd Schneider and Marcela Vegetti and Matthew West and Peter Yim}, title = {Towards ontology evaluation across the life cycleThe Ontology Summit 2013}, journal = {Appl. Ontology}, volume = {8}, number = {3}, pages = {179--194}, year = {2013}, url = {https://doi.org/10.3233/AO-130125}, doi = {10.3233/AO-130125}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ao/NeuhausVBBDDGHLORSSVWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bib/Watson-HaighSHKLDDLMMMMQRTS13, author = {Nathan S. Watson{-}Haigh and Catherine A. Shang and Matthias Haimel and Myrto Kostadima and Remco Loos and Nandan Deshpande and Konsta Duesing and Xi Li and Annette McGrath and Sean McWilliam and Simon Michnowicz and Paula Moolhuijzen and Steve Quenette and Jerico Nico De Leon Revote and Sonika Tyagi and Maria Victoria Schneider}, title = {Next-generation sequencing: a challenge to meet the increasing demand for training workshops in Australia}, journal = {Briefings Bioinform.}, volume = {14}, number = {5}, pages = {563--574}, year = {2013}, url = {https://doi.org/10.1093/bib/bbt022}, doi = {10.1093/BIB/BBT022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bib/Watson-HaighSHKLDDLMMMMQRTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/AbdelhalimST13, author = {Islam Abdelhalim and Steve A. Schneider and Helen Treharne}, title = {An integrated framework for checking the behaviour of fUML models using {CSP}}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {15}, number = {4}, pages = {375--396}, year = {2013}, url = {https://doi.org/10.1007/s10009-012-0243-0}, doi = {10.1007/S10009-012-0243-0}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/AbdelhalimST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HeatherCSSX13, author = {James Heather and Chris Culnane and Steve A. Schneider and Sriramkrishnan Srinivasan and Zhe Xia}, title = {Solving the Discrete Logarithm Problem for Packing Candidate Preferences}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, pages = {209--221}, year = {2013}, crossref = {DBLP:conf/IEEEares/2013cd-w}, url = {https://doi.org/10.1007/978-3-642-40588-4\_15}, doi = {10.1007/978-3-642-40588-4\_15}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HeatherCSSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AlshehriS13, author = {Abdullah Ali Alshehri and Steve A. Schneider}, title = {Formal Security Analysis and Improvement of a Hash-Based {NFC} M-Coupon Protocol}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, pages = {152--167}, year = {2013}, crossref = {DBLP:conf/cardis/2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_11}, doi = {10.1007/978-3-319-08302-5\_11}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AlshehriS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsci/DavenportKS13, author = {Jodi L. Davenport and Yvonne Kao and Steven Schneider}, title = {Integrating Cognitive Principles to Redesign a Middle School Math Curriculum}, booktitle = {Proceedings of the 35th Annual Meeting of the Cognitive Science Society, CogSci 2013, Berlin, Germany, July 31 - August 3, 2013}, year = {2013}, crossref = {DBLP:conf/cogsci/2013}, url = {https://escholarship.org/uc/item/83d2s254}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cogsci/DavenportKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gil/Schneider13, author = {Steve A. Schneider}, title = {Fuzzy-Systeme zur Unterst{\"{u}}tzung von Entscheidungen in land- und forstwirtschaftlichen Logistik-Prozessen}, booktitle = {Massendatenmanagement in der Agrar- und Ern{\"{a}}hrungswirtschaft, Erhebung - Verarbeitung - Nutzung, Referate der 33. GIL-Jahrestagung, 20. - 21. Februar 2013, Potsdam, Germany}, pages = {307--310}, year = {2013}, crossref = {DBLP:conf/gil/2013}, url = {https://dl.gi.de/handle/20.500.12116/17639}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gil/Schneider13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlshehriS13, author = {Abdullah Ali Alshehri and Steve A. Schneider}, title = {Formally defining {NFC} M-coupon requirements, with a case study}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {52--58}, year = {2013}, crossref = {DBLP:conf/icitst/2013}, url = {https://doi.org/10.1109/ICITST.2013.6750161}, doi = {10.1109/ICITST.2013.6750161}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlshehriS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CaseSWKMW13, author = {Steven Case and Sherry K. Schneider and Laura J. White and Steven J. Kass and Kelly Manning and Norman Wilde}, title = {Integrating globally distributed team projects into software engineering courses}, booktitle = {3rd International Workshop on Collaborative Teaching of Globally Distributed Software Development, {CTGDSD} 2013, San Francisco, CA, USA, May 25, 2013}, pages = {25--29}, year = {2013}, crossref = {DBLP:conf/icse/2013ctgdsd}, url = {https://doi.org/10.1109/CTGDSD.2013.6635242}, doi = {10.1109/CTGDSD.2013.6635242}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/CaseSWKMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/MoranHS13, author = {Murat Moran and James Heather and Steve A. Schneider}, title = {Automated Anonymity Verification of the ThreeBallot Voting System}, booktitle = {Integrated Formal Methods, 10th International Conference, {IFM} 2013, Turku, Finland, June 10-14, 2013. Proceedings}, pages = {94--108}, year = {2013}, crossref = {DBLP:conf/ifm/2013}, url = {https://doi.org/10.1007/978-3-642-38613-8\_7}, doi = {10.1007/978-3-642-38613-8\_7}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/MoranHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/JamesTTRS13, author = {Phillip James and Matthew Trumble and Helen Treharne and Markus Roggenbach and Steve A. Schneider}, title = {OnTrack: An Open Tooling Environment for Railway Verification}, booktitle = {{NASA} Formal Methods, 5th International Symposium, {NFM} 2013, Moffett Field, CA, USA, May 14-16, 2013. Proceedings}, pages = {435--440}, year = {2013}, crossref = {DBLP:conf/nfm/2013}, url = {https://doi.org/10.1007/978-3-642-38088-4\_30}, doi = {10.1007/978-3-642-38088-4\_30}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nfm/JamesTTRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AktoudianakisCSTW13, author = {Evangelos Aktoudianakis and Jason Crampton and Steve A. Schneider and Helen Treharne and Adrian Waller}, title = {Policy templates for relationship-based access control}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {221--228}, year = {2013}, crossref = {DBLP:conf/pst/2013}, url = {https://doi.org/10.1109/PST.2013.6596057}, doi = {10.1109/PST.2013.6596057}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AktoudianakisCSTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qosa/DuSHGV13, author = {Miao Du and Jean{-}Guy Schneider and Cameron M. Hine and John Grundy and Steven Versteeg}, title = {Generating service models by trace subsequence substitution}, booktitle = {Proceedings of the 9th international {ACM} {SIGSOFT} conference on Quality of Software Architectures, QoSA 2013, part of Comparch '13 Federated Events on Component-Based Software Engineering and Software Architecture, Vancouver, BC, Canada, June 17-21, 2013}, pages = {123--132}, year = {2013}, crossref = {DBLP:conf/qosa/2013}, url = {https://doi.org/10.1145/2465478.2465485}, doi = {10.1145/2465478.2465485}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qosa/DuSHGV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/JamesMNRSTTW13, author = {Phillip James and Faron Moller and Hoang Nga Nguyen and Markus Roggenbach and Steve A. Schneider and Helen Treharne and Matthew Trumble and David M. Williams}, title = {Verification of Scheme Plans Using {CSP} {\textdollar}{\textdollar}{\(\vert\)}{\(\vert\)}{\textdollar}{\textdollar} {\(\vert\)} {\(\vert\)} {B}}, booktitle = {Software Engineering and Formal Methods - {SEFM} 2013 Collocated Workshops: BEAT2, WS-FMDS, FM-RAIL-Bok, MoKMaSD, and OpenCert, Madrid, Spain, September 23-24, 2013, Revised Selected Papers}, pages = {189--204}, year = {2013}, crossref = {DBLP:conf/sefm/2013w}, url = {https://doi.org/10.1007/978-3-319-05032-4\_15}, doi = {10.1007/978-3-319-05032-4\_15}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sefm/JamesMNRSTTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LlewellynSXCHRS13, author = {Morgan Llewellyn and Steve A. Schneider and Zhe Xia and Chris Culnane and James Heather and Peter Y. A. Ryan and Sriramkrishnan Srinivasan}, title = {Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting}, booktitle = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013}, year = {2013}, crossref = {DBLP:conf/uss/2013evt}, url = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/llewellyn}, timestamp = {Mon, 01 Feb 2021 08:42:58 +0100}, biburl = {https://dblp.org/rec/conf/uss/LlewellynSXCHRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xsede/FurlaniSJTHGDLGGPLWPS13, author = {Thomas R. Furlani and Barry I. Schneider and Matthew D. Jones and John Towns and David L. Hart and Steven M. Gallo and Robert L. DeLeon and Charng{-}Da Lu and Amin Ghadersohi and Ryan J. Gentner and Abani K. Patra and Gregor von Laszewski and Fugang Wang and Jeffrey T. Palmer and Nikolay Simakov}, title = {Using XDMoD to facilitate {XSEDE} operations, planning and analysis}, booktitle = {Extreme Science and Engineering Discovery Environment: Gateway to Discovery, XSEDE13, San Diego, CA, {USA} - July 22 - 25, 2013}, pages = {46:1--46:8}, year = {2013}, crossref = {DBLP:conf/xsede/2013}, url = {https://doi.org/10.1145/2484762.2484763}, doi = {10.1145/2484762.2484763}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/xsede/FurlaniSJTHGDLGGPLWPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2013, editor = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7985}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39185-9}, doi = {10.1007/978-3-642-39185-9}, isbn = {978-3-642-39184-2}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ao/SchneiderHBBCGGGLLORSVWWY12, author = {Todd Schneider and Ali Hashemi and Mike Bennett and Mary Brady and Cory Casanave and Henson Graves and Michael Gruninger and Nicola Guarino and Anatoly Levenchuk and Ernie Lucier and Leo Obrst and Steve Ray and Ram D. Sriram and Amanda Vizedom and Matthew West and Trish Whetzel and Peter Yim}, title = {Ontology for Big Systems: The Ontology Summit 2012 Communiqu{\'{e}}}, journal = {Appl. Ontology}, volume = {7}, number = {3}, pages = {357--371}, year = {2012}, url = {https://doi.org/10.3233/AO-2012-0111}, doi = {10.3233/AO-2012-0111}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ao/SchneiderHBBCGGGLLORSVWWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/RoggenbachMSTN12, author = {Markus Roggenbach and Faron Moller and Steve A. Schneider and Helen Treharne and Hoang Nga Nguyen}, title = {Railway modelling in CSP{\(\vert\)}{\(\vert\)}B: the double junction case study}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {53}, year = {2012}, url = {https://doi.org/10.14279/tuj.eceasst.53.791}, doi = {10.14279/TUJ.ECEASST.53.791}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/RoggenbachMSTN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/SimKHHSN12, author = {Ngak{-}Leng Sim and Prateek Kumar and Jing Hu and Steven Henikoff and Georg Schneider and Pauline C. Ng}, title = {{SIFT} web server: predicting effects of amino acid substitutions on proteins}, journal = {Nucleic Acids Res.}, volume = {40}, number = {Web-Server-Issue}, pages = {452--457}, year = {2012}, url = {https://doi.org/10.1093/nar/gks539}, doi = {10.1093/NAR/GKS539}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nar/SimKHHSN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/HeHYSJV12, author = {Qiang He and Jun Han and Yun Yang and Jean{-}Guy Schneider and Hai Jin and Steven Versteeg}, title = {Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based Systems}, booktitle = {2012 {IEEE} Ninth International Conference on Services Computing, Honolulu, HI, USA, June 24-29, 2012}, pages = {178--185}, year = {2012}, crossref = {DBLP:conf/IEEEscc/2012}, url = {https://doi.org/10.1109/SCC.2012.39}, doi = {10.1109/SCC.2012.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/HeHYSJV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan and Vanessa Teague and Roland Wen and Zhe Xia}, title = {A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission}, booktitle = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, pages = {81--94}, year = {2012}, crossref = {DBLP:conf/ev/2012}, url = {https://dl.gi.de/handle/20.500.12116/18227}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/BurtonCHPRSSTWX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/HeatherS12, author = {James Heather and Steve A. Schneider}, title = {A Formal Framework for Modelling Coercion Resistance and Receipt Freeness}, booktitle = {{FM} 2012: Formal Methods - 18th International Symposium, Paris, France, August 27-31, 2012. Proceedings}, pages = {217--231}, year = {2012}, crossref = {DBLP:conf/fm/2012}, url = {https://doi.org/10.1007/978-3-642-32759-9\_19}, doi = {10.1007/978-3-642-32759-9\_19}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fm/HeatherS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hvc/MollerNRST12, author = {Faron Moller and Hoang Nga Nguyen and Markus Roggenbach and Steve A. Schneider and Helen Treharne}, title = {Defining and Model Checking Abstractions of Complex Railway Models Using CSP{\(\vert\)}{\(\vert\)}B}, booktitle = {Hardware and Software: Verification and Testing - 8th International Haifa Verification Conference, {HVC} 2012, Haifa, Israel, November 6-8, 2012. Revised Selected Papers}, pages = {193--208}, year = {2012}, crossref = {DBLP:conf/hvc/2012}, url = {https://doi.org/10.1007/978-3-642-39611-3\_20}, doi = {10.1007/978-3-642-39611-3\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hvc/MollerNRST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/HineSHV12, author = {Cameron M. Hine and Jean{-}Guy Schneider and Jun Han and Steven Versteeg}, title = {Quokka: visualising interactions of enterprise software environment emulators}, booktitle = {{IEEE/ACM} International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012}, pages = {370--373}, year = {2012}, crossref = {DBLP:conf/kbse/2012}, url = {https://doi.org/10.1145/2351676.2351750}, doi = {10.1145/2351676.2351750}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/HineSHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/SchneiderAMFU12, author = {Fabian Schneider and Bernhard Ager and Gregor Maier and Anja Feldmann and Steve Uhlig}, title = {Pitfalls in {HTTP} Traffic Measurements and Analysis}, booktitle = {Passive and Active Measurement - 13th International Conference, {PAM} 2012, Vienna, Austria, March 12-14th, 2012. Proceedings}, pages = {242--251}, year = {2012}, crossref = {DBLP:conf/pam/2012}, url = {https://doi.org/10.1007/978-3-642-28537-0\_24}, doi = {10.1007/978-3-642-28537-0\_24}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/SchneiderAMFU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qosa/YuHSHV12, author = {Jian Yu and Jun Han and Jean{-}Guy Schneider and Cameron M. Hine and Steven Versteeg}, title = {A virtual deployment testing environment for enterprise software systems}, booktitle = {Proceedings of the 8th international {ACM} {SIGSOFT} conference on Quality of Software Architectures, QoSA 2012, part of Comparch '12 Federated Events on Component-Based Software Engineering and Software Architecture, Bertinoro, Italy, June 25-28, 2012}, pages = {101--110}, year = {2012}, crossref = {DBLP:conf/qosa/2012}, url = {https://doi.org/10.1145/2304696.2304714}, doi = {10.1145/2304696.2304714}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qosa/YuHSHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qsic/VersteegHSH12, author = {Steven Versteeg and Cameron M. Hine and Jean{-}Guy Schneider and Jun Han}, title = {Emulation of Cloud-Scale Environments for Scalability Testing}, booktitle = {2012 12th International Conference on Quality Software, Xi'an, Shaanxi, China, August 27-29, 2012}, pages = {201--209}, year = {2012}, crossref = {DBLP:conf/qsic/2012}, url = {https://doi.org/10.1109/QSIC.2012.57}, doi = {10.1109/QSIC.2012.57}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/qsic/VersteegHSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/AbdelhalimST12, author = {Islam Abdelhalim and Steve A. Schneider and Helen Treharne}, title = {An Optimization Approach for Effective Formalized fUML Model Checking}, booktitle = {Software Engineering and Formal Methods - 10th International Conference, {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings}, pages = {248--262}, year = {2012}, crossref = {DBLP:conf/sefm/2012}, url = {https://doi.org/10.1007/978-3-642-33826-7\_17}, doi = {10.1007/978-3-642-33826-7\_17}, timestamp = {Sat, 05 Sep 2020 18:01:22 +0200}, biburl = {https://dblp.org/rec/conf/sefm/AbdelhalimST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague and Roland Wen and Zhe Xia and Sriramkrishnan Srinivasan}, title = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections}, booktitle = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012}, year = {2012}, crossref = {DBLP:conf/uss/2012evt}, url = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton}, timestamp = {Mon, 01 Feb 2021 08:43:08 +0100}, biburl = {https://dblp.org/rec/conf/uss/BurtonCHPRSTWXS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/SchiobergSSUSF12, author = {Doris Schi{\"{o}}berg and Stefan Schmid and Fabian Schneider and Steve Uhlig and Harald Schi{\"{o}}berg and Anja Feldmann}, title = {Tracing the birth of an {OSN:} social graph and profile analysis in Google+}, booktitle = {Web Science 2012, WebSci '12, Evanston, IL, {USA} - June 22 - 24, 2012}, pages = {265--274}, year = {2012}, crossref = {DBLP:conf/websci/2012}, url = {https://doi.org/10.1145/2380718.2380753}, doi = {10.1145/2380718.2380753}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/websci/SchiobergSSUSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/HeHYSJV12, author = {Qiang He and Jun Han and Yun Yang and Jean{-}Guy Schneider and Hai Jin and Steven Versteeg}, title = {Probabilistic critical path identification for cost-effective monitoring of service-based web applications}, booktitle = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon, France, April 16-20, 2012 (Companion Volume)}, pages = {523--524}, year = {2012}, crossref = {DBLP:conf/www/2012c}, url = {https://doi.org/10.1145/2187980.2188108}, doi = {10.1145/2187980.2188108}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/HeHYSJV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-1394, author = {Doris Schi{\"{o}}berg and Fabian Schneider and Gilles Tr{\'{e}}dan and Steve Uhlig and Anja Feldmann}, title = {Revisiting Content Availability in Distributed Online Social Networks}, journal = {CoRR}, volume = {abs/1210.1394}, year = {2012}, url = {http://arxiv.org/abs/1210.1394}, eprinttype = {arXiv}, eprint = {1210.1394}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-1394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/SchneiderT11, author = {Steve A. Schneider and Helen Treharne}, title = {Changing system interfaces consistently: {A} new refinement strategy for CSP{\(\vert\)}{\(\vert\)}B}, journal = {Sci. Comput. Program.}, volume = {76}, number = {10}, pages = {837--860}, year = {2011}, url = {https://doi.org/10.1016/j.scico.2010.08.001}, doi = {10.1016/J.SCICO.2010.08.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/SchneiderT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/MullerHSV11, author = {Ingo M{\"{u}}ller and Jun Han and Jean{-}Guy Schneider and Steven Versteeg}, title = {Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {573--581}, year = {2011}, crossref = {DBLP:conf/IEEEcloud/2011}, url = {https://doi.org/10.1109/CLOUD.2011.90}, doi = {10.1109/CLOUD.2011.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/MullerHSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/MullerHSV11, author = {Ingo M{\"{u}}ller and Jun Han and Jean{-}Guy Schneider and Steven Versteeg}, title = {Idea: {A} Reference Platform for Systematic Information Security Management Tool Support}, booktitle = {Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings}, pages = {256--263}, year = {2011}, crossref = {DBLP:conf/essos/2011}, url = {https://doi.org/10.1007/978-3-642-19125-1\_20}, doi = {10.1007/978-3-642-19125-1\_20}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/MullerHSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/AbdelhalimST11, author = {Islam Abdelhalim and Steve A. Schneider and Helen Treharne}, title = {Towards a Practical Approach to Check UML/fUML Models Consistency Using {CSP}}, booktitle = {Formal Methods and Software Engineering - 13th International Conference on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28, 2011. Proceedings}, pages = {33--48}, year = {2011}, crossref = {DBLP:conf/icfem/2011}, url = {https://doi.org/10.1007/978-3-642-24559-6\_5}, doi = {10.1007/978-3-642-24559-6\_5}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/AbdelhalimST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/SchneiderLCHSX11, author = {Steve A. Schneider and Morgan Llewellyn and Chris Culnane and James Heather and Sriramkrishnan Srinivasan and Zhe Xia}, title = {Focus group views on Pr{\^{e}}t {\`{a}} Voter 1.0}, booktitle = {2011 International Workshop on Requirements Engineering for Electronic Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011}, pages = {56--65}, year = {2011}, crossref = {DBLP:conf/re/2011revote}, url = {https://doi.org/10.1109/REVOTE.2011.6045916}, doi = {10.1109/REVOTE.2011.6045916}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/SchneiderLCHSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soca/HewardHSV11, author = {Garth Heward and Jun Han and Jean{-}Guy Schneider and Steven Versteeg}, title = {Run-time management and optimization of web service monitoring systems}, booktitle = {2011 {IEEE} International Conference on Service-Oriented Computing and Applications, {SOCA} 2011, Irvine, CA, USA, December 12-14, 2011}, pages = {1--6}, year = {2011}, crossref = {DBLP:conf/soca/2011}, url = {https://doi.org/10.1109/SOCA.2011.6166266}, doi = {10.1109/SOCA.2011.6166266}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soca/HewardHSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CulnaneBHSSX11, author = {Chris Culnane and David Bismark and James Heather and Steve A. Schneider and Sriramkrishnan Srinivasan and Zhe Xia}, title = {Authentication Codes}, booktitle = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011}, year = {2011}, crossref = {DBLP:conf/uss/2011evt}, url = {https://www.usenix.org/conference/evtwote-11/authentication-codes}, timestamp = {Mon, 01 Feb 2021 08:42:50 +0100}, biburl = {https://dblp.org/rec/conf/uss/CulnaneBHSSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/DemirelHRSV11, author = {Denise Demirel and Maria Henning and Peter Y. A. Ryan and Steve A. Schneider and Melanie Volkamer}, title = {Feasibility Analysis of Pr{\^{e}}t {\`{a}} Voter for German Federal Elections}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, pages = {158--173}, year = {2011}, crossref = {DBLP:conf/voteid/2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_10}, doi = {10.1007/978-3-642-32747-6\_10}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/DemirelHRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/SchneiderSCHX11, author = {Steve A. Schneider and Sriramkrishnan Srinivasan and Chris Culnane and James Heather and Zhe Xia}, title = {Pr{\^{e}}t {\'{a}} Voter with Write-Ins}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, pages = {174--189}, year = {2011}, crossref = {DBLP:conf/voteid/2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_11}, doi = {10.1007/978-3-642-32747-6\_11}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/SchneiderSCHX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1106-4098, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, title = {A {CSP} Account of Event-B Refinement}, booktitle = {Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011}, pages = {139--154}, year = {2011}, crossref = {DBLP:journals/corr/abs-1106-3488}, url = {https://doi.org/10.4204/EPTCS.55.9}, doi = {10.4204/EPTCS.55.9}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-4098.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchneiderTW11, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, title = {Bounded Retransmission in Event-B{\(\parallel\)}CSP: a Case Study}, booktitle = {Proceedings of the {B} 2011 Workshop, a satellite event of the 17th International Symposium on Formal Methods, {FM} 2011, Limerick, Ireland, June 21, 2011}, pages = {69--80}, year = {2011}, crossref = {DBLP:conf/fm/2011b}, url = {https://doi.org/10.1016/j.entcs.2011.11.019}, doi = {10.1016/J.ENTCS.2011.11.019}, timestamp = {Fri, 10 Mar 2023 15:49:46 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchneiderTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Schneider11, author = {Steve A. Schneider}, title = {Security Analysis using Rank Functions in {CSP}}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, pages = {258--276}, year = {2011}, crossref = {DBLP:books/ios/11/CK2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-258}, doi = {10.3233/978-1-60750-714-7-258}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Schneider11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/IfillS10, author = {Wilson Ifill and Steve A. Schneider}, title = {A step towards refining and translating {B} control annotations to Handel-C}, journal = {Concurr. Comput. Pract. Exp.}, volume = {22}, number = {8}, pages = {1023--1048}, year = {2010}, url = {https://doi.org/10.1002/cpe.1427}, doi = {10.1002/CPE.1427}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/IfillS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/McEwanS10, author = {Alistair A. McEwan and Steve A. Schneider}, title = {Modelling and analysis of the {AMBA} bus using {CSP} and {B}}, journal = {Concurr. Comput. Pract. Exp.}, volume = {22}, number = {8}, pages = {949--964}, year = {2010}, url = {https://doi.org/10.1002/cpe.1432}, doi = {10.1002/CPE.1432}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/McEwanS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/HewardMHSV10, author = {Garth Heward and Ingo M{\"{u}}ller and Jun Han and Jean{-}Guy Schneider and Steven Versteeg}, title = {Assessing the Performance Impact of Service Monitoring}, booktitle = {21st Australian Software Engineering Conference {(ASWEC} 2010), 6-9 April 2010, Auckland, New Zealand}, pages = {192--201}, year = {2010}, crossref = {DBLP:conf/aswec/2010}, url = {https://doi.org/10.1109/ASWEC.2010.28}, doi = {10.1109/ASWEC.2010.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/HewardMHSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/HineSHV10, author = {Cameron M. Hine and Jean{-}Guy Schneider and Jun Han and Steven Versteeg}, title = {Modelling Enterprise System Protocols and Trace Conformance}, booktitle = {21st Australian Software Engineering Conference {(ASWEC} 2010), 6-9 April 2010, Auckland, New Zealand}, pages = {35--44}, year = {2010}, crossref = {DBLP:conf/aswec/2010}, url = {https://doi.org/10.1109/ASWEC.2010.40}, doi = {10.1109/ASWEC.2010.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/HineSHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biocomp/SoysalCBS10, author = {{\"{O}}mer M. Soysal and Jianhua Chen and Steven Bujenovic and Helmut Schneider}, title = {A Hierarchical Decision Engine for Computer Aided Lung Nodule Detection from {CT} Images}, booktitle = {International Conference on Bioinformatics {\&} Computational Biology, {BIOCOMP} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {387--393}, year = {2010}, crossref = {DBLP:conf/biocomp/2010}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biocomp/SoysalCBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/AbdelhalimSST10, author = {Islam Abdelhalim and James Sharp and Steve A. Schneider and Helen Treharne}, title = {Formal Verification of Tokeneer Behaviours Modelled in fUML Using {CSP}}, booktitle = {Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings}, pages = {371--387}, year = {2010}, crossref = {DBLP:conf/icfem/2010}, url = {https://doi.org/10.1007/978-3-642-16901-4\_25}, doi = {10.1007/978-3-642-16901-4\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/AbdelhalimSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/HewardHMSV10, author = {Garth Heward and Jun Han and Ingo M{\"{u}}ller and Jean{-}Guy Schneider and Steven Versteeg}, title = {Optimizing the Configuration of Web Service Monitors}, booktitle = {Service-Oriented Computing - 8th International Conference, {ICSOC} 2010, San Francisco, CA, USA, December 7-10, 2010. Proceedings}, pages = {587--595}, year = {2010}, crossref = {DBLP:conf/icsoc/2010}, url = {https://doi.org/10.1007/978-3-642-17358-5\_43}, doi = {10.1007/978-3-642-17358-5\_43}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/HewardHMSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/HewardHMSV10a, author = {Garth Heward and Jun Han and Ingo M{\"{u}}ller and Jean{-}Guy Schneider and Steven Versteeg}, title = {A Case Study on Optimizing Web Service Monitoring Configurations}, booktitle = {Service-Oriented Computing - {ICSOC} 2010 International Workshops, PAASC, WESOA, SEE, and SOC-LOG, San Francisco, CA, USA, December 7-10, 2010, Revised Selected Papers}, pages = {4--14}, year = {2010}, crossref = {DBLP:conf/icsoc/2010w}, url = {https://doi.org/10.1007/978-3-642-19394-1\_2}, doi = {10.1007/978-3-642-19394-1\_2}, timestamp = {Sun, 02 Jun 2019 21:20:24 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/HewardHMSV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderTW10, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, title = {A {CSP} Approach to Control in Event-B}, booktitle = {Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings}, pages = {260--274}, year = {2010}, crossref = {DBLP:conf/ifm/2010}, url = {https://doi.org/10.1007/978-3-642-16265-7\_19}, doi = {10.1007/978-3-642-16265-7\_19}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10, author = {Zhe Xia and Chris Culnane and James Heather and Hugo Jonker and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan}, title = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods with a Unified Interface}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, pages = {98--114}, year = {2010}, crossref = {DBLP:conf/indocrypt/2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_8}, doi = {10.1007/978-3-642-17401-8\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/XiaCHJRSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/HineSV10, author = {Cameron M. Hine and Jean{-}Guy Schneider and Steven Versteeg}, title = {Reac2o: a runtime for enterprise system models}, booktitle = {{ASE} 2010, 25th {IEEE/ACM} International Conference on Automated Software Engineering, Antwerp, Belgium, September 20-24, 2010}, pages = {177--178}, year = {2010}, crossref = {DBLP:conf/kbse/2010}, url = {https://doi.org/10.1145/1858996.1859034}, doi = {10.1145/1858996.1859034}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/kbse/HineSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/inc/2010, editor = {Udo Bleimann and Paul Dowland and Steven Furnell and Oliver Schneider}, title = {Eighth International Network Conference {(INC} 2010), Heidelberg, Germany, July 6-8, 2010. Proceedings}, publisher = {University of Plymouth}, year = {2010}, url = {http://www.cscan.org/?page=openaccess\&eid=2}, isbn = {978-1-84102-259-8}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/inc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaikhBS09, author = {Siraj A. Shaikh and Vicky J. Bush and Steve A. Schneider}, title = {Specifying authentication using signal events in {CSP}}, journal = {Comput. Secur.}, volume = {28}, number = {5}, pages = {310--324}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2008.10.001}, doi = {10.1016/J.COSE.2008.10.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShaikhBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/VajarST09, author = {Beeta Vajar and Steve A. Schneider and Helen Treharne}, title = {Mobile CSP{\(\vert\)}{\(\vert\)}B}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {23}, year = {2009}, url = {https://doi.org/10.14279/tuj.eceasst.23.338}, doi = {10.14279/TUJ.ECEASST.23.338}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/VajarST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RyanBHSX09, author = {Peter Y. A. Ryan and David Bismark and James Heather and Steve A. Schneider and Zhe Xia}, title = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {662--673}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033233}, doi = {10.1109/TIFS.2009.2033233}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RyanBHSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/HineSHV09, author = {Cameron M. Hine and Jean{-}Guy Schneider and Jun Han and Steven Versteeg}, title = {Scalable Emulation of Enterprise Systems}, booktitle = {20th Australian Software Engineering Conference {(ASWEC} 2009), 14-17 April 2009, Gold Cost, Australia}, pages = {142--151}, year = {2009}, crossref = {DBLP:conf/aswec/2009}, url = {https://doi.org/10.1109/ASWEC.2009.34}, doi = {10.1109/ASWEC.2009.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/HineSHV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/TreharneSGEI09, author = {Helen Treharne and Steve A. Schneider and Neil Grant and Neil Evans and Wilson Ifill}, title = {A Step towards Merging xUML and {CSP} {\(\vert\)}{\(\vert\)} \{{\textbackslash}{\(\vert\)} {\textbackslash} \}B}, booktitle = {Rigorous Methods for Software Construction and Analysis, Essays Dedicated to Egon B{\"{o}}rger on the Occasion of His 60th Birthday}, pages = {130--146}, year = {2009}, crossref = {DBLP:conf/birthday/2009borger}, url = {https://doi.org/10.1007/978-3-642-11447-2\_9}, doi = {10.1007/978-3-642-11447-2\_9}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/TreharneSGEI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ZhouKHSLW09, author = {Steven Zhiying Zhou and Jayashree Karlekar and Daniel Hii and Miriam Schneider and Weiquan Lu and Stephen Wittkopf}, title = {Robust Pose Estimation for Outdoor Mixed Reality with Sensor Fusion}, booktitle = {Universal Access in Human-Computer Interaction. Applications and Services, 5th International Conference, {UAHCI} 2009, Held as Part of {HCI} International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, Part {III}}, pages = {281--289}, year = {2009}, crossref = {DBLP:conf/hci/2009-7}, url = {https://doi.org/10.1007/978-3-642-02713-0\_30}, doi = {10.1007/978-3-642-02713-0\_30}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/ZhouKHSLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderT09, author = {Steve A. Schneider and Helen Treharne}, title = {Changing System Interfaces Consistently: {A} New Refinement Strategy for CSP{\(\vert\)}{\(\vert\)}B}, booktitle = {Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings}, pages = {103--117}, year = {2009}, crossref = {DBLP:conf/ifm/2009}, url = {https://doi.org/10.1007/978-3-642-00255-7\_8}, doi = {10.1007/978-3-642-00255-7\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BismarkHPSXR09, author = {David Bismark and James Heather and Roger M. A. Peel and Steve A. Schneider and Zhe Xia and Peter Y. A. Ryan}, title = {Experiences Gained from the first Pr{\^{e}}t {\`{a}} Voter Implementation}, booktitle = {First International Workshop on Requirements Engineering for e-Voting Systems, {RE-VOTE} 2009, Atlanta, Georgia, USA, August 31, 2009}, pages = {19--28}, year = {2009}, crossref = {DBLP:conf/re/2009revote}, url = {https://doi.org/10.1109/RE-VOTE.2009.5}, doi = {10.1109/RE-VOTE.2009.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BismarkHPSXR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nms/Haas08, author = {Gretchen Haas}, title = {Book Review: Kirsten A. Foot and Steven M. Schneider, Web Campaigning. Cambridge, {MA:} {MIT} Press, 2006. xix + 263 pp. {ISBN} 0262062585, {\textdollar}60.00 (hbk), {\textdollar}27.50 (pbk)}, journal = {New Media Soc.}, volume = {10}, number = {2}, pages = {355--357}, year = {2008}, url = {https://doi.org/10.1177/14614448080100020902}, doi = {10.1177/14614448080100020902}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nms/Haas08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/polity/X08b, title = {Book Review: Response to Wainer Lusoli's review of Web Campaigning, by Kirsten Foot and Steven Schneider}, journal = {Inf. Polity}, volume = {13}, number = {1-2}, pages = {119--121}, year = {2008}, url = {https://doi.org/10.3233/ip-2008-0149}, doi = {10.3233/IP-2008-0149}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/polity/X08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asm/TreharneTSE08, author = {Helen Treharne and Edward Turner and Steve A. Schneider and Neil Evans}, title = {Object Modelling in the SystemB Industrial Project}, booktitle = {Abstract State Machines, {B} and Z, First International Conference, {ABZ} 2008, London, UK, September 16-18, 2008. Proceedings}, pages = {359}, year = {2008}, crossref = {DBLP:conf/asm/2008}, url = {https://doi.org/10.1007/978-3-540-87603-8\_46}, doi = {10.1007/978-3-540-87603-8\_46}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asm/TreharneTSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/MullerHSV08, author = {Ingo M{\"{u}}ller and Jun Han and Jean{-}Guy Schneider and Steven Versteeg}, title = {A Conceptual Framework for Unified and Comprehensive {SOA} Management}, booktitle = {Service-Oriented Computing - {ICSOC} 2008 Workshops, {ICSOC} 2008 International Workshops, Sydney, Australia, December 1st, 2008, Revised Selected Papers}, pages = {28--40}, year = {2008}, crossref = {DBLP:conf/icsoc/2008w}, url = {https://doi.org/10.1007/978-3-642-01247-1\_4}, doi = {10.1007/978-3-642-01247-1\_4}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/MullerHSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/TurnerTSE08, author = {Edward Turner and Helen Treharne and Steve A. Schneider and Neil Evans}, title = {Automatic Generation of {CSP} {\(\vert\)}{\(\vert\)} {B} Skeletons from xUML Models}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}, pages = {364--379}, year = {2008}, crossref = {DBLP:conf/ictac/2008}, url = {https://doi.org/10.1007/978-3-540-85762-4\_25}, doi = {10.1007/978-3-540-85762-4\_25}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictac/TurnerTSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XiaSHT08, author = {Zhe Xia and Steve A. Schneider and James Heather and Jacques Traor{\'{e}}}, title = {Analysis, Improvement, and Simplification of Pr{\^{e}}t {\`{a}} Voter with Paillier Encryption}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, year = {2008}, crossref = {DBLP:conf/uss/2008evt}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/xia/xia.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XiaSHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/SchneiderTMI08, author = {Steve A. Schneider and Helen Treharne and Alistair A. McEwan and Wilson Ifill}, title = {Experiments in Translating {CSP} {\(\vert\)}{\(\vert\)} {B} to Handel-C}, booktitle = {The thirty-first Communicating Process Architectures Conference, {CPA} 2008, organised under the auspices of WoTUG and the Department of Computer Science of the University of York, York, Yorkshire, UK, 7-10 September 2008}, pages = {115--133}, year = {2008}, crossref = {DBLP:conf/wotug/2008}, url = {https://doi.org/10.3233/978-1-58603-907-3-115}, doi = {10.3233/978-1-58603-907-3-115}, timestamp = {Sun, 18 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wotug/SchneiderTMI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DelicataS07, author = {Rob Delicata and Steve A. Schneider}, title = {An algebraic approach to the verification of a class of Diffie-Hellman protocols}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {183--196}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0013-2}, doi = {10.1007/S10207-007-0013-2}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DelicataS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DimitrakosMRS07, author = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest Editors' Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {65--66}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0012-3}, doi = {10.1007/S10207-007-0012-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DimitrakosMRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/b/IfillST07, author = {Wilson Ifill and Steve A. Schneider and Helen Treharne}, title = {Augmenting {B} with Control Annotations}, booktitle = {B 2007: Formal Specification and Development in B, 7th International Conference of {B} Users, Besan{\c{c}}on, France, January 17-19, 2007, Proceedings}, pages = {34--48}, year = {2007}, crossref = {DBLP:conf/b/2007}, url = {https://doi.org/10.1007/11955757\_6}, doi = {10.1007/11955757\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/b/IfillST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/KarkinskyST07, author = {Damien Karkinsky and Steve A. Schneider and Helen Treharne}, title = {Combining Mobility with State}, booktitle = {Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings}, pages = {373--392}, year = {2007}, crossref = {DBLP:conf/ifm/2007}, url = {https://doi.org/10.1007/978-3-540-73210-5\_20}, doi = {10.1007/978-3-540-73210-5\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifm/KarkinskyST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miigp/SchneiderS07, author = {Mark Schneider and Charles Stevens}, title = {Development and testing of a new magnetic-tracking device for image guidance}, booktitle = {Medical Imaging 2007: Visualization and Image-Guided Procedures, San Diego, CA, United States, 17-22 February 2007}, pages = {65090I}, year = {2007}, crossref = {DBLP:conf/miigp/2007}, url = {https://doi.org/10.1117/12.713249}, doi = {10.1117/12.713249}, timestamp = {Wed, 23 May 2018 15:10:40 +0200}, biburl = {https://dblp.org/rec/conf/miigp/SchneiderS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mtsummit/YeSA07, author = {Yang Ye and Karl{-}Michael Schneider and Steven P. Abney}, title = {Aspect marker generation in English-to-Chinese machine translation}, booktitle = {Proceedings of Machine Translation Summit {XI:} Papers, Copenhagen, Denmark, September 10-14, 2007}, year = {2007}, crossref = {DBLP:conf/mtsummit/2007}, url = {https://aclanthology.org/2007.mtsummit-papers.69}, timestamp = {Mon, 25 Oct 2021 15:03:55 +0200}, biburl = {https://dblp.org/rec/conf/mtsummit/YeSA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/FoulleSTX07, author = {S{\'{e}}bastien Foulle and Steve A. Schneider and Jacques Traor{\'{e}} and Zhe Xia}, title = {Threat Analysis of a Practical Voting Scheme with Receipts}, booktitle = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}, pages = {156--165}, year = {2007}, crossref = {DBLP:conf/voteid/2007}, url = {https://doi.org/10.1007/978-3-540-77493-8\_14}, doi = {10.1007/978-3-540-77493-8\_14}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/FoulleSTX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/IfillS07, author = {Wilson Ifill and Steve A. Schneider}, title = {A Step Towards Refining and Translating {B} Control Annotations to Handel-C}, booktitle = {The 30th Communicating Process Architectures Conference, {CPA} 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007}, pages = {399--424}, year = {2007}, crossref = {DBLP:conf/wotug/2007}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5985}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wotug/IfillS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/McEwanS07, author = {Alistair A. McEwan and Steve A. Schneider}, title = {Modeling and Analysis of the {AMBA} Bus Using {CSP} and {B}}, booktitle = {The 30th Communicating Process Architectures Conference, {CPA} 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007}, pages = {379--398}, year = {2007}, crossref = {DBLP:conf/wotug/2007}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5984}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wotug/McEwanS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2006, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75227-1}, doi = {10.1007/978-3-540-75227-1}, isbn = {978-3-540-75226-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wotug/2007, editor = {Alistair A. McEwan and Steve A. Schneider and Wilson Ifill and Peter H. Welch}, title = {The 30th Communicating Process Architectures Conference, {CPA} 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007}, series = {Concurrent Systems Engineering Series}, volume = {65}, publisher = {{IOS} Press}, year = {2007}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5962}, isbn = {978-1-58603-767-3}, timestamp = {Tue, 03 Mar 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wotug/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SchneiderHRT06, author = {Steve A. Schneider and Thai Son Hoang and Ken Robinson and Helen Treharne}, title = {Tank monitoring: a pAMN case study}, journal = {Formal Aspects Comput.}, volume = {18}, number = {3}, pages = {308--328}, year = {2006}, url = {https://doi.org/10.1007/s00165-006-0004-5}, doi = {10.1007/S00165-006-0004-5}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SchneiderHRT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RyanS06, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Pr{\^{e}}t {\`{a}} Voter with Re-encryption Mixes}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, pages = {313--326}, year = {2006}, crossref = {DBLP:conf/esorics/2006}, url = {https://doi.org/10.1007/11863908\_20}, doi = {10.1007/11863908\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RyanS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/SchneiderTCW06, author = {Steve A. Schneider and Helen Treharne and Ana Cavalcanti and Jim Woodcock}, title = {A Layered Behavioural Model of Platelets}, booktitle = {11th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2006), 15-17 August 2006, Stanford, California, {USA}}, pages = {98--106}, year = {2006}, crossref = {DBLP:conf/iceccs/2006}, url = {https://doi.ieeecomputersociety.org/10.1109/ICECCS.2006.80}, doi = {10.1109/ICECCS.2006.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/SchneiderTCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/McEwanS06, author = {Alistair A. McEwan and Steve A. Schneider}, title = {A verified development of hardware using CSP{\(\parallel\)}B}, booktitle = {4th {ACM} {\&} {IEEE} International Conference on Formal Methods and Models for Co-Design {(MEMOCODE} 2006), 27-29 July 2006, Embassy Suites, Napa, California, {USA}}, pages = {81}, year = {2006}, crossref = {DBLP:conf/memocode/2006}, url = {https://doi.org/10.1109/MEMCOD.2006.1695904}, doi = {10.1109/MEMCOD.2006.1695904}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/memocode/McEwanS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/HeatherS06, author = {James Heather and Steve A. Schneider}, title = {To infinity and beyond or, avoiding the infinite in security protocol analysis}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {346--353}, year = {2006}, crossref = {DBLP:conf/sac/2006}, url = {https://doi.org/10.1145/1141277.1141359}, doi = {10.1145/1141277.1141359}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/HeatherS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2005, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11679219}, doi = {10.1007/11679219}, isbn = {3-540-32628-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SchneiderT05, author = {Steve A. Schneider and Helen Treharne}, title = {{CSP} theorems for communicating {B} machines}, journal = {Formal Aspects Comput.}, volume = {17}, number = {4}, pages = {390--422}, year = {2005}, url = {https://doi.org/10.1007/s00165-005-0076-7}, doi = {10.1007/S00165-005-0076-7}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SchneiderT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmc/FootWS05, author = {Kirsten A. Foot and Barbara Warnick and Steven M. Schneider}, title = {Web-Based Memorializing After September 11: Toward a Conceptual Framework}, journal = {J. Comput. Mediat. Commun.}, volume = {11}, number = {1}, pages = {72--96}, year = {2005}, url = {https://doi.org/10.1111/j.1083-6101.2006.tb00304.x}, doi = {10.1111/J.1083-6101.2006.TB00304.X}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmc/FootWS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeatherS05, author = {James Heather and Steve A. Schneider}, title = {A decision procedure for the existence of a rank function}, journal = {J. Comput. Secur.}, volume = {13}, number = {2}, pages = {317--344}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13204}, doi = {10.3233/JCS-2005-13204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeatherS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/EvansS05, author = {Neil Evans and Steve A. Schneider}, title = {Verifying security protocols with {PVS:} widening the rank function approach}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {253--284}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.005}, doi = {10.1016/J.JLAP.2004.09.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/EvansS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/polity/JankowskiFKS05, author = {Nicholas W. Jankowski and Kirsten Foot and Randy Kluver and Steve Schneider}, title = {The Web and the 2004 {EP} election: Comparing political actor Web sites in 11 {EU} Member States}, journal = {Inf. Polity}, volume = {10}, number = {3-4}, pages = {165--176}, year = {2005}, url = {https://doi.org/10.3233/ip-2005-0076}, doi = {10.3233/IP-2005-0076}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/polity/JankowskiFKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/DingSDR05, author = {Steven X. Ding and Stefan Schneider and Eve L. Ding and Ansgar Rehm}, title = {Fault tolerant monitoring of vehicle lateral dynamics stabilization systems}, booktitle = {44th {IEEE} {IEEE} Conference on Decision and Control and 8th European Control Conference Control, {CDC/ECC} 2005, Seville, Spain, 12-15 December, 2005}, pages = {2000--2005}, year = {2005}, crossref = {DBLP:conf/cdc/2005}, url = {https://doi.org/10.1109/CDC.2005.1582454}, doi = {10.1109/CDC.2005.1582454}, timestamp = {Mon, 10 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/DingSDR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ShaikhBS05, author = {Siraj A. Shaikh and Vicky J. Bush and Steve A. Schneider}, title = {Specifying Authentication Using Signal Events in {CSP}}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, pages = {63--74}, year = {2005}, crossref = {DBLP:conf/cisc/2005}, url = {https://doi.org/10.1007/11599548\_6}, doi = {10.1007/11599548\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ShaikhBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelicataS05, author = {Rob Delicata and Steve A. Schneider}, title = {Temporal Rank Functions for Forward Secrecy}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {126--139}, year = {2005}, crossref = {DBLP:conf/csfw/2005}, url = {https://doi.org/10.1109/CSFW.2005.26}, doi = {10.1109/CSFW.2005.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelicataS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaumRS05, author = {David Chaum and Peter Y. A. Ryan and Steve A. Schneider}, title = {A Practical Voter-Verifiable Election Scheme}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, pages = {118--139}, year = {2005}, crossref = {DBLP:conf/esorics/2005}, url = {https://doi.org/10.1007/11555827\_8}, doi = {10.1007/11555827\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DelicataS05, author = {Rob Delicata and Steve A. Schneider}, title = {A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, pages = {34--46}, year = {2005}, crossref = {DBLP:conf/ifip1-7/2005}, url = {https://doi.org/10.1007/11679219\_4}, doi = {10.1007/11679219\_4}, timestamp = {Sun, 02 Oct 2022 16:07:30 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DelicataS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderTE05, author = {Steve A. Schneider and Helen Treharne and Neil Evans}, title = {Chunks: Component Verification in CSP{\(\vert\)}{\(\vert\)}B}, booktitle = {Integrated Formal Methods, 5th International Conference, {IFM} 2005, Eindhoven, The Netherlands, November 29 - December 2, 2005, Proceedings}, pages = {89--108}, year = {2005}, crossref = {DBLP:conf/ifm/2005}, url = {https://doi.org/10.1007/11589976\_7}, doi = {10.1007/11589976\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderTE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/KaddouraRS05, author = {Maher Kaddoura and Ranga S. Ramanujan and Steven Schneider}, title = {Routing Optimization Techniques for Wireless Ad Hoc Networks}, booktitle = {Proceedings of the 6th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing {(SNPD} 2005), May 23-25, 2005, Towson, Maryland, {USA}}, pages = {454--459}, year = {2005}, crossref = {DBLP:conf/snpd/2005}, url = {https://doi.org/10.1109/SNPD-SAWN.2005.65}, doi = {10.1109/SNPD-SAWN.2005.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/KaddouraRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/OuaknineS06, author = {Jo{\"{e}}l Ouaknine and Steve A. Schneider}, title = {Timed {CSP:} {A} Retrospective}, booktitle = {Proceedings of the Workshop "Essays on Algebraic Process Calculi", {APC} 25, Bertinoro, Italy, August 1-5, 2005}, pages = {273--276}, year = {2005}, crossref = {DBLP:conf/apc25/2005}, url = {https://doi.org/10.1016/j.entcs.2005.12.093}, doi = {10.1016/J.ENTCS.2005.12.093}, timestamp = {Fri, 20 Jan 2023 12:38:53 +0100}, biburl = {https://dblp.org/rec/journals/entcs/OuaknineS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchneiderHRT05, author = {Steve A. Schneider and Thai Son Hoang and Ken Robinson and Helen Treharne}, title = {Tank Monitoring: {A} pAMN Case Study}, booktitle = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford, UK, April 2005}, pages = {183--204}, year = {2005}, crossref = {DBLP:conf/refine/2005}, url = {https://doi.org/10.1016/j.entcs.2005.04.031}, doi = {10.1016/J.ENTCS.2005.04.031}, timestamp = {Mon, 12 Dec 2022 16:45:39 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchneiderHRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/zum/2005, editor = {Helen Treharne and Steve King and Martin C. Henson and Steve A. Schneider}, title = {{ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3455}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b135596}, doi = {10.1007/B135596}, isbn = {3-540-25559-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/zum/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nms/SchneiderF04, author = {Steven M. Schneider and Kirsten A. Foot}, title = {The Web as an Object of Study}, journal = {New Media Soc.}, volume = {6}, number = {1}, pages = {114--122}, year = {2004}, url = {https://doi.org/10.1177/1461444804039912}, doi = {10.1177/1461444804039912}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nms/SchneiderF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Petride04, author = {Sabina Petride}, title = {Review of "Concurrent and real-time systems: the {CSP} approach" by Steve Schneider. Wiley 1999}, journal = {{SIGACT} News}, volume = {35}, number = {2}, pages = {4--12}, year = {2004}, url = {https://doi.org/10.1145/992287.992291}, doi = {10.1145/992287.992291}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigact/Petride04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/SchneiderD04, author = {Steve A. Schneider and Rob Delicata}, title = {Verifying Security Protocols: An Application of {CSP}}, booktitle = {Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers}, pages = {243--263}, year = {2004}, crossref = {DBLP:conf/birthday/2004csp}, url = {https://doi.org/10.1007/11423348\_14}, doi = {10.1007/11423348\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/SchneiderD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderT04, author = {Steve A. Schneider and Helen Treharne}, title = {Verifying Controlled Components}, booktitle = {Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings}, pages = {87--107}, year = {2004}, crossref = {DBLP:conf/ifm/2004}, url = {https://doi.org/10.1007/978-3-540-24756-2\_6}, doi = {10.1007/978-3-540-24756-2\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/YeungS03, author = {Wing Lok Yeung and Steve A. Schneider}, title = {Design and Verification of Distributed Recovery Blocks with {CSP}}, journal = {Formal Methods Syst. Des.}, volume = {22}, number = {3}, pages = {225--248}, year = {2003}, url = {https://doi.org/10.1023/A:1022997110855}, doi = {10.1023/A:1022997110855}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/YeungS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmc/FootSDXL03, author = {Kirsten A. Foot and Steven M. Schneider and Meghan Dougherty and Michael Xenos and Elena Larsen}, title = {Analyzing Linking Practices: Candidate Sites in the 2002 {US} Electoral Web Sphere}, journal = {J. Comput. Mediat. Commun.}, volume = {8}, number = {4}, pages = {0}, year = {2003}, url = {https://doi.org/10.1111/j.1083-6101.2003.tb00220.x}, doi = {10.1111/J.1083-6101.2003.TB00220.X}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmc/FootSDXL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeatherLS03, author = {James Heather and Gavin Lowe and Steve A. Schneider}, title = {How to Prevent Type Flaw Attacks on Security Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {2}, pages = {217--244}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11204}, doi = {10.3233/JCS-2003-11204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeatherLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GongGRS03, author = {Li Gong and Joshua D. Guttman and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest editorial overview}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {1}, pages = {1--4}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2002.806120}, doi = {10.1109/JSAC.2002.806120}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GongGRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vr/BaumannNFSBVS03, author = {Steve Baumann and Chris Neff and Scott Fetzick and Gregg Stangl and Lee Basler and Ray Vereneck and Walter Schneider}, title = {A Virtual Reality System for Neurobehavioral and fMRI Studie}, booktitle = {{IEEE} Virtual Reality Conference 2003 {(VR} 2003), 22-26 March 2003, Los Angeles, CA, USA, Proceedings}, pages = {312}, year = {2003}, crossref = {DBLP:conf/vr/2003}, url = {https://doi.org/10.1109/VR.2003.1191192}, doi = {10.1109/VR.2003.1191192}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vr/BaumannNFSBVS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/TreharneSB03, author = {Helen Treharne and Steve A. Schneider and Marchia Bramble}, title = {Composing Specifications Using Communication}, booktitle = {{ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings}, pages = {58--78}, year = {2003}, crossref = {DBLP:conf/zum/2003}, url = {https://doi.org/10.1007/3-540-44880-2\_5}, doi = {10.1007/3-540-44880-2\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/zum/TreharneSB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fasec/2002, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b94774}, doi = {10.1007/B94774}, isbn = {3-540-20693-0}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fasec/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeatherS02, author = {James Heather and Steve A. Schneider}, title = {Equal To The Task?}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, pages = {162--177}, year = {2002}, crossref = {DBLP:conf/esorics/2002}, url = {https://doi.org/10.1007/3-540-45853-0\_10}, doi = {10.1007/3-540-45853-0\_10}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeatherS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmoods/Schneider02, author = {Steve A. Schneider}, title = {Verifying Authentication Protocol Implementations}, booktitle = {Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands}, pages = {5--24}, year = {2002}, crossref = {DBLP:conf/fmoods/2002}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fmoods/Schneider02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/SchneiderT02, author = {Steve A. Schneider and Helen Treharne}, title = {Communicating {B} Machines}, booktitle = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd International Conference of {B} and {Z} Users, Grenoble, France, January 23-25, 2002, Proceedings}, pages = {416--435}, year = {2002}, crossref = {DBLP:conf/zum/2002}, url = {https://doi.org/10.1007/3-540-45648-1\_22}, doi = {10.1007/3-540-45648-1\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/zum/SchneiderT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0009544, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Modelling and analysis of security protocols}, publisher = {Addison-Wesley-Longman}, year = {2001}, isbn = {978-0-201-67471-2}, timestamp = {Fri, 25 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0009544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0015710, author = {Steve A. Schneider}, title = {The B-method - an introduction}, series = {The cornerstones of computing series}, publisher = {Macmillan Publ.}, year = {2001}, isbn = {978-0-333-79284-1}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0015710.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RyanS01, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Process Algebra and Non-Interference}, journal = {J. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {75--103}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-91-204}, doi = {10.3233/JCS-2001-91-204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RyanS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/MaximSSHCS01, author = {Adrian Maxim and Baker Scott and Edmund M. Schneider and Melvin Hagge and Steve Chacko and Dan Stiurca}, title = {A low-jitter 125-1250-MHz process-independent and ripple-poleless 0.18-{\(\mu\)}m {CMOS} {PLL} based on a sample-reset loop filter}, journal = {{IEEE} J. Solid State Circuits}, volume = {36}, number = {11}, pages = {1673--1683}, year = {2001}, url = {https://doi.org/10.1109/4.962287}, doi = {10.1109/4.962287}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jssc/MaximSSHCS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Schneider01, author = {Steve A. Schneider}, title = {Process Algebra and Security}, booktitle = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings}, pages = {37--38}, year = {2001}, crossref = {DBLP:conf/concur/2001}, url = {https://doi.org/10.1007/3-540-44685-0\_4}, doi = {10.1007/3-540-44685-0\_4}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/Schneider01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/MaximSSHCS01, author = {Adrian Maxim and Baker Scott and Ed Schneider and Melvin Hagge and Steve Chacko and Dan Stiurca}, title = {Sample-reset loop filter architecture for process independent and ripple-pole-less low jitter {CMOS} charge-pump PLLs}, booktitle = {Proceedings of the 2001 International Symposium on Circuits and Systems, {ISCAS} 2001, Sydney, Australia, May 6-9, 2001}, pages = {766--769}, year = {2001}, crossref = {DBLP:conf/iscas/2001}, url = {https://doi.org/10.1109/ISCAS.2001.922350}, doi = {10.1109/ISCAS.2001.922350}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/MaximSSHCS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/Schneider00, author = {Steve A. Schneider}, title = {Abstraction and Testing in {CSP}}, journal = {Formal Aspects Comput.}, volume = {12}, number = {3}, pages = {165--181}, year = {2000}, url = {https://doi.org/10.1007/s001650070027}, doi = {10.1007/S001650070027}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/Schneider00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/Derrick00, author = {John Derrick}, title = {Concurrent and Real-Time Systems: The {CSP} Approach, Steve Schneider, Wiley, 2000 (Book Review)}, journal = {Softw. Test. Verification Reliab.}, volume = {10}, number = {3}, pages = {195}, year = {2000}, url = {https://doi.org/10.1002/1099-1689(200009)10:3\<195::AID-STVR207\>3.0.CO;2-F}, doi = {10.1002/1099-1689(200009)10:3\<195::AID-STVR207\>3.0.CO;2-F}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/Derrick00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HeatherLS00, author = {James Heather and Gavin Lowe and Steve A. Schneider}, title = {How to Prevent Type Flaw Attacks on Security Protocols}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {255--268}, year = {2000}, crossref = {DBLP:conf/csfw/2000}, url = {https://doi.org/10.1109/CSFW.2000.856942}, doi = {10.1109/CSFW.2000.856942}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HeatherLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HeatherS00, author = {James Heather and Steve A. Schneider}, title = {Towards Automatic Verification of Authentication Protocols on an Unbounded Network}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {132--143}, year = {2000}, crossref = {DBLP:conf/csfw/2000}, url = {https://doi.org/10.1109/CSFW.2000.856932}, doi = {10.1109/CSFW.2000.856932}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HeatherS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EvansS00, author = {Neil Evans and Steve A. Schneider}, title = {Analysing Time Dependent Security Properties in {CSP} Using {PVS}}, booktitle = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}, pages = {222--237}, year = {2000}, crossref = {DBLP:conf/esorics/2000}, url = {https://doi.org/10.1007/10722599\_14}, doi = {10.1007/10722599\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/EvansS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/TreharneS00, author = {Helen Treharne and Steve A. Schneider}, title = {How to Drive a {B} Machine}, booktitle = {{ZB} 2000: Formal Specification and Development in {Z} and B, First International Conference of {B} and {Z} Users, York, UK, August 29 - September 2, 2000, Proceedings}, pages = {188--208}, year = {2000}, crossref = {DBLP:conf/zum/2000}, url = {https://doi.org/10.1007/3-540-44525-0\_12}, doi = {10.1007/3-540-44525-0\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/zum/TreharneS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Schneider00, author = {Steve A. Schneider}, title = {May Testing, Non-interference, and Compositionality}, booktitle = {First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, {MFCSIT} 2000, Cork, Ireland, July 20-21, 2000}, pages = {361--391}, year = {2000}, crossref = {DBLP:conf/mfcsit/2000}, url = {https://doi.org/10.1016/S1571-0661(05)80064-7}, doi = {10.1016/S1571-0661(05)80064-7}, timestamp = {Wed, 30 Nov 2022 10:58:03 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Schneider00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wsaif/1999, editor = {Steve A. Schneider and Peter Ryan}, title = {Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {32}, publisher = {Elsevier}, year = {2000}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/32/suppl/C}, timestamp = {Wed, 30 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsaif/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/SchneiderB99, author = {Fred B. Schneider and Steven M. Bellovin}, title = {Evolving Telephone Networks}, journal = {Commun. {ACM}}, volume = {42}, number = {1}, pages = {160}, year = {1999}, url = {https://doi.org/10.1145/291469.291485}, doi = {10.1145/291469.291485}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/SchneiderB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/Solano-FloresRST99, author = {Guillermo Solano{-}Flores and Bruce Raymond and Steven A. Schneider and Michael J. Timms}, title = {Management of scoring sessions in alternative assessment: the computer-assisted scoring approach}, journal = {Comput. Educ.}, volume = {33}, number = {1}, pages = {47--63}, year = {1999}, url = {https://doi.org/10.1016/S0360-1315(99)00018-4}, doi = {10.1016/S0360-1315(99)00018-4}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ce/Solano-FloresRST99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/SchneiderBI99, author = {Fred B. Schneider and Steven M. Bellovin and Alan S. Inouye}, title = {Building Trustworthy Systems: Lessons from the {PTN} and Internet}, journal = {{IEEE} Internet Comput.}, volume = {3}, number = {6}, pages = {64--72}, year = {1999}, url = {https://doi.org/10.1109/4236.807013}, doi = {10.1109/4236.807013}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/SchneiderBI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanS99, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Process Algebra and Non-Interference}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {214--227}, year = {1999}, crossref = {DBLP:conf/csfw/1999}, url = {https://doi.org/10.1109/CSFW.1999.779775}, doi = {10.1109/CSFW.1999.779775}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Schneider99, author = {Steve A. Schneider}, title = {Abstraction and Testing}, booktitle = {FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume {I}}, pages = {738--757}, year = {1999}, crossref = {DBLP:conf/fm/1999-1}, url = {https://doi.org/10.1007/3-540-48119-2\_41}, doi = {10.1007/3-540-48119-2\_41}, timestamp = {Fri, 17 Feb 2023 09:02:00 +0100}, biburl = {https://dblp.org/rec/conf/fm/Schneider99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/TreharneS99, author = {Helen Treharne and Steve A. Schneider}, title = {Using a Process Algebra to Control {B} Operations}, booktitle = {Integrated Formal Methods, Proceedings of the 1st International Conference on Integrated Formal Methods, {IFM} 99, York, UK, 28-29 June 1999}, pages = {437--456}, year = {1999}, crossref = {DBLP:conf/ifm/1999}, url = {https://doi.org/10.1007/978-1-4471-0851-1\_23}, doi = {10.1007/978-1-4471-0851-1\_23}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/TreharneS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/AdekunleS99, author = {Carl B. Adekunle and Steve A. Schneider}, title = {Detecting Feature Interactions in the Terrestrial Trunked Radio {(TETRA)} Network Using Promela and Xspin}, booktitle = {Theoretical and Practical Aspects of {SPIN} Model Checking, 5th and 6th International {SPIN} Workshops, Trento, Italy, July 5, 1999, Toulouse, France, September 21 and 24 1999, Proceedings}, pages = {136--151}, year = {1999}, crossref = {DBLP:conf/spin/1999}, url = {https://doi.org/10.1007/3-540-48234-2\_10}, doi = {10.1007/3-540-48234-2\_10}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spin/AdekunleS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchneiderR00, author = {Steve A. Schneider and Peter Ryan}, title = {Preface}, booktitle = {Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999}, pages = {113--114}, year = {1999}, crossref = {DBLP:conf/wsaif/1999}, url = {https://doi.org/10.1016/S1571-0661(05)80565-1}, doi = {10.1016/S1571-0661(05)80565-1}, timestamp = {Wed, 30 Nov 2022 10:28:30 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchneiderR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/egh/1999, editor = {Arie E. Kaufman and Wolfgang Stra{\ss}er and Steven Molnar and Bengt{-}Olaf Schneider}, title = {Proceedings of the 1999 {ACM} {SIGGRAPH/EUROGRAPHICS} Workshop on Graphics Hardware, Los Angeles, CA, USA, August 8-9, 1999}, publisher = {The Eurographics Association}, year = {1999}, url = {http://diglib.eg.org/handle/10.2312/336}, doi = {10.1145/311534}, isbn = {1-58113-170-4}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/egh/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RyanS98, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {An Attack on a Recursive Authentication Protocol. {A} Cautionary Tale}, journal = {Inf. Process. Lett.}, volume = {65}, number = {1}, pages = {7--10}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(97)00180-4}, doi = {10.1016/S0020-0190(97)00180-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/RyanS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/Schneider98, author = {Steve A. Schneider}, title = {Verifying Authentication Protocols in {CSP}}, journal = {{IEEE} Trans. Software Eng.}, volume = {24}, number = {9}, pages = {741--758}, year = {1998}, url = {https://doi.org/10.1109/32.713329}, doi = {10.1109/32.713329}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/Schneider98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/b/TreharneDS98, author = {Helen Treharne and J. Draper and Steve A. Schneider}, title = {Test Case Preparation Using a Prototype}, booktitle = {B'98: Recent Advances in the Development and Use of the {B} Method, Second International {B} Conference, Montpellier, France, April 22-24, 1998, Proceedings}, pages = {293--311}, year = {1998}, crossref = {DBLP:conf/b/1998}, url = {https://doi.org/10.1007/BFb0053368}, doi = {10.1007/BFB0053368}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/b/TreharneDS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Schneider98, author = {Steve A. Schneider}, title = {Formal Analysis of a Non-Repudiation Protocol}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {54--65}, year = {1998}, crossref = {DBLP:conf/csfw/1998}, url = {https://doi.org/10.1109/CSFW.1998.683155}, doi = {10.1109/CSFW.1998.683155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Schneider98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icre/SchneiderECH98, author = {Francis Schneider and Steve M. Easterbrook and John R. Callahan and Gerard J. Holzmann}, title = {Validating Requirements for Fault Tolerant Systems using Model Checking}, booktitle = {3rd International Conference on Requirements Engineering {(ICRE} '98), Putting Requirements Engineering to Practice, April 6-10, 1998, Colorado Springs, CO, USA, Proceedings}, pages = {4--13}, year = {1998}, crossref = {DBLP:conf/icre/1998}, url = {https://doi.org/10.1109/ICRE.1998.667803}, doi = {10.1109/ICRE.1998.667803}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icre/SchneiderECH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Schneider97, author = {Steve A. Schneider}, title = {Timewise Refinement for Communicating Processes}, journal = {Sci. Comput. Program.}, volume = {28}, number = {1}, pages = {43--90}, year = {1997}, url = {https://doi.org/10.1016/S0167-6423(96)00016-0}, doi = {10.1016/S0167-6423(96)00016-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/Schneider97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Schneider97, author = {Steve A. Schneider}, title = {Verifying authentication protocols with {CSP}}, booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12, 1997, Rockport, Massachusetts, {USA}}, pages = {3--17}, year = {1997}, crossref = {DBLP:conf/csfw/1997}, url = {https://doi.org/10.1109/CSFW.1997.596775}, doi = {10.1109/CSFW.1997.596775}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Schneider97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/DutertreS97, author = {Bruno Dutertre and Steve A. Schneider}, title = {Using a {PVS} Embedding of {CSP} to Verify Authentication Protocols}, booktitle = {Theorem Proving in Higher Order Logics, 10th International Conference, TPHOLs'97, Murray Hill, NJ, USA, August 19-22, 1997, Proceedings}, pages = {121--136}, year = {1997}, crossref = {DBLP:conf/tphol/1997}, url = {https://doi.org/10.1007/BFb0028390}, doi = {10.1007/BFB0028390}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tphol/DutertreS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/egh/1997, editor = {Arie E. Kaufman and Wolfgang Stra{\ss}er and Steven Molnar and Bengt{-}Olaf Schneider}, title = {Proceedings of the 1997 {ACM} {SIGGRAPH/EUROGRAPHICS} Workshop on Graphics Hardware, Los Angeles, CA, USA, August 3-4, 1997}, publisher = {The Eurographics Association}, year = {1997}, url = {https://doi.org/10.1145/258694}, doi = {10.1145/258694}, isbn = {0-89791-961-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/egh/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SchneiderS96, author = {Steve A. Schneider and Abraham Sidiropoulos}, title = {{CSP} and Anonymity}, booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, pages = {198--218}, year = {1996}, crossref = {DBLP:conf/esorics/1996}, url = {https://doi.org/10.1007/3-540-61770-1\_38}, doi = {10.1007/3-540-61770-1\_38}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SchneiderS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/ReynaertCGDLLPS96, author = {Philippe Reynaert and Ludwig Callewaert and Georges G. E. Gielen and Geert Debyser and Koen Lampaert and Francky Leyn and Geert Van der Plas and Willy Sansen and Birger Schneider and Ren{\'{e}} Bloch and Dave Orton and Steve Boardman and Jeremy Stent and Jean{-}Fran{\c{c}}ois Aga{\"{e}}sse and J{\"{o}}rg{-}Olliver Fischer{-}Binder and Jukka Riihiaho and Kari Tukkiniemi}, title = {{ADMIRE:} advanced mixed signal design environment}, booktitle = {Proceedings of Third International Conference on Electronics, Circuits, and Systems, {ICECS} 1996, Rodos, Greece, October 13-16, 1996}, pages = {428--431}, year = {1996}, crossref = {DBLP:conf/icecsys/1996}, url = {https://doi.org/10.1109/ICECS.1996.582867}, doi = {10.1109/ICECS.1996.582867}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/ReynaertCGDLLPS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/HotovySO96, author = {Steven Hotovy and David Schneider and Timothy J. O'Donnell}, title = {Analysis of the Early Workload on the Cornell Theory Center {IBM} {SP2}}, booktitle = {Proceedings of the 1996 {ACM} {SIGMETRICS} international conference on Measurement and modeling of computer systems, Philadelphia, Pennsylvania, USA, May 23-26, 1996}, pages = {272--273}, year = {1996}, crossref = {DBLP:conf/sigmetrics/1996}, url = {https://doi.org/10.1145/233013.233060}, doi = {10.1145/233013.233060}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/HotovySO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Schneider96, author = {Steve A. Schneider}, title = {Security Properties and {CSP}}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {174--187}, year = {1996}, crossref = {DBLP:conf/sp/1996}, url = {https://doi.org/10.1109/SECPRI.1996.502680}, doi = {10.1109/SECPRI.1996.502680}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/Schneider96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Schneider95, author = {Steve A. Schneider}, title = {An Operational Semantics for Timed {CSP}}, journal = {Inf. Comput.}, volume = {116}, number = {2}, pages = {193--213}, year = {1995}, url = {https://doi.org/10.1006/inco.1995.1014}, doi = {10.1006/INCO.1995.1014}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Schneider95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DaviesS95, author = {Jim Davies and Steve A. Schneider}, title = {A Brief History of Timed {CSP}}, journal = {Theor. Comput. Sci.}, volume = {138}, number = {2}, pages = {243--271}, year = {1995}, url = {https://doi.org/10.1016/0304-3975(94)00169-J}, doi = {10.1016/0304-3975(94)00169-J}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/DaviesS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MisloveRS95, author = {Michael W. Mislove and A. W. Roscoe and Steve A. Schneider}, title = {Fixed Points Without Completeness}, journal = {Theor. Comput. Sci.}, volume = {138}, number = {2}, pages = {273--314}, year = {1995}, url = {https://doi.org/10.1016/0304-3975(94)00170-N}, doi = {10.1016/0304-3975(94)00170-N}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/MisloveRS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/BryansDS95, author = {Jeremy W. Bryans and Jim Davies and Steve A. Schneider}, title = {Towards a denotational semantics for {ET-LOTOS}}, booktitle = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia, PA, USA, August 21-24, 1995, Proceedings}, pages = {269--283}, year = {1995}, crossref = {DBLP:conf/concur/1995}, url = {https://doi.org/10.1007/3-540-60218-6\_20}, doi = {10.1007/3-540-60218-6\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/BryansDS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/DaviesBS95, author = {Jim Davies and Jeremy W. Bryans and Steve A. Schneider}, title = {Real-time {LOTOS} and Timed Observations}, booktitle = {Formal Description Techniques VIII, Proceedings of the {IFIP} {TC6} Eighth International Conference on Formal Description Techniques, Montreal, Canada, October 1995}, pages = {383--397}, year = {1995}, crossref = {DBLP:conf/forte/1995}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/forte/DaviesBS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/DaviesS94, author = {Jim Davies and Steve A. Schneider}, title = {Recursion Induction for Real-Time Processes}, journal = {Formal Aspects Comput.}, volume = {5}, number = {6}, pages = {530--553}, year = {1993}, url = {https://doi.org/10.1007/BF01211248}, doi = {10.1007/BF01211248}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/DaviesS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/Schneider93, author = {Steve A. Schneider}, title = {Rigorous Specification of Real-Time Systems}, booktitle = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings of the Third International Conference on Methodology and Software Technology, University of Twente, Enschede, The Netherlands, 21-25 June, 1993}, pages = {59--74}, year = {1993}, crossref = {DBLP:conf/amast/1993}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amast/Schneider93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/Schneider93, author = {Steve A. Schneider}, title = {Timewise Refinement for Communicating Processes}, booktitle = {Mathematical Foundations of Programming Semantics, 9th International Conference, New Orleans, LA, USA, April 7-10, 1993, Proceedings}, pages = {177--214}, year = {1993}, crossref = {DBLP:conf/mfps/1993}, url = {https://doi.org/10.1007/3-540-58027-1\_9}, doi = {10.1007/3-540-58027-1\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mfps/Schneider93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/DaviesS92, author = {Jim Davies and Steve A. Schneider}, title = {Using {CSP} to Verify a Timed Protocol over a Fair Medium}, booktitle = {{CONCUR} '92, Third International Conference on Concurrency Theory, Stony Brook, NY, USA, August 24-27, 1992, Proceedings}, pages = {355--369}, year = {1992}, crossref = {DBLP:conf/concur/1992}, url = {https://doi.org/10.1007/BFb0084803}, doi = {10.1007/BFB0084803}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/DaviesS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftrtft/DaviesJS92, author = {Jim Davies and Dave Jackson and Steve A. Schneider}, title = {Broadcast Communication for Real-time Processes}, booktitle = {Formal Techniques in Real-Time and Fault-Tolerant Systems, Second International Symposium, Nijmegen, The Netherlands, January 8-10, 1992, Proceedings}, pages = {149--169}, year = {1992}, crossref = {DBLP:conf/ftrtft/1992}, url = {https://doi.org/10.1007/3-540-55092-5\_9}, doi = {10.1007/3-540-55092-5\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ftrtft/DaviesJS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rex/SchneiderDJRRR91, author = {Steve A. Schneider and Jim Davies and D. M. Jackson and George M. Reed and Joy N. Reed and A. W. Roscoe}, title = {Timed {CSP:} Theory and Practice}, booktitle = {Real-Time: Theory in Practice, {REX} Workshop, Mook, The Netherlands, June 3-7, 1991, Proceedings}, pages = {640--675}, year = {1991}, crossref = {DBLP:conf/rex/1991}, url = {https://doi.org/10.1007/BFb0032011}, doi = {10.1007/BFB0032011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rex/SchneiderDJRRR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpca/BerryCKKLPPRSCCSFMWHSLOSJGM89, author = {Michael W. Berry and Da{-}Ren Chen and Peter F. Koss and David J. Kuck and Sy{-}Shin Lo and Yingxin Pang and Lynn Pointer and Richard Roloff and Ahmed H. Sameh and Enrico Clementi and Shaoan Chin and David J. Schneider and Geoffrey C. Fox and Paul Messina and David W. Walker and Chris Hsiung and Jim Schwarzmeier and Kok{-}Meng Lue and Steve Orszag and Fred Seidl and Olin G. Johnson and Richard Goodrum and Joanne Martin}, title = {The Perfect Club Benchmarks: Effective Performance Evaluation of Supercomputers}, journal = {Int. J. High Perform. Comput. Appl.}, volume = {3}, number = {3}, pages = {5--40}, year = {1989}, url = {https://doi.org/10.1177/109434208900300302}, doi = {10.1177/109434208900300302}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpca/BerryCKKLPPRSCCSFMWHSLOSJGM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/DaviesS89, author = {Jim Davies and Steve A. Schneider}, title = {Factorizing Proofs in Timed {CSP}}, booktitle = {Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29 - April 1, 1989, Proceedings}, pages = {129--159}, year = {1989}, crossref = {DBLP:conf/mfps/1989}, url = {https://doi.org/10.1007/BFb0040256}, doi = {10.1007/BFB0040256}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfps/DaviesS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigart/Schneider88, author = {Victor Schneider}, title = {Book review: {A} quick Review of the Elements of Artificial Intelligence: An Introduction Using Lisp by Steven L. Tanimoto (Computer Science Press, 1987)}, journal = {{SIGART} Newsl.}, volume = {103}, pages = {20}, year = {1988}, url = {https://doi.org/10.1145/44418.1057642}, doi = {10.1145/44418.1057642}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigart/Schneider88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/MahaneyS85, author = {Stephen R. Mahaney and Fred B. Schneider}, title = {Inexact Agreement: Accuracy, Precision, and Graceful Degradation}, booktitle = {Proceedings of the Fourth Annual {ACM} Symposium on Principles of Distributed Computing, Minaki, Ontario, Canada, August 5-7, 1985}, pages = {237--249}, year = {1985}, crossref = {DBLP:conf/podc/1985}, url = {https://doi.org/10.1145/323596.323618}, doi = {10.1145/323596.323618}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/MahaneyS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/chi/2024, editor = {Florian 'Floyd' Mueller and Penny Kyburz and Julie R. Williamson and Corina Sas and Max L. Wilson and Phoebe O. Toups Dugas and Irina Shklovski}, title = {Proceedings of the {CHI} Conference on Human Factors in Computing Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3613904}, doi = {10.1145/3613904}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/chi/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hri/2024c, editor = {Dan Grollman and Elizabeth Broadbent and Wendy Ju and Harold Soh and Tom Williams}, title = {Companion of the 2024 {ACM/IEEE} International Conference on Human-Robot Interaction, {HRI} 2024, Boulder, CO, USA, March 11-15, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3610978}, doi = {10.1145/3610978}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/hri/2024c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/6gnet/2023, title = {2nd International Conference on 6G Networking, 6GNet 2023, Paris, France, October 18-20, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/6GNet58894.2023}, doi = {10.1109/6GNET58894.2023}, isbn = {979-8-3503-0673-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/6gnet/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/blocksys/2023, title = {Proceedings of the Fifth {ACM} International Workshop on Blockchain-enabled Networked Sensor Systems, BlockSys 2023, Istanbul, Turkiye, 12 November 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3628354}, doi = {10.1145/3628354}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/blocksys/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/imw2/2023, title = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA, May 21-24, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IMW56887.2023}, doi = {10.1109/IMW56887.2023}, isbn = {978-1-6654-7459-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/imw2/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iui/2023, title = {Proceedings of the 28th International Conference on Intelligent User Interfaces, {IUI} 2023, Sydney, NSW, Australia, March 27-31, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581641}, doi = {10.1145/3581641}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/iui/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/miccai/2023cdmri, editor = {Muge Karaman and Remika Mito and Elizabeth Powell and Francois Rheault and Stefan Winzeck}, title = {Computational Diffusion {MRI} - 14th International Workshop, {CDMRI} 2023, Held in Conjunction with {MICCAI} 2023, Vancouver, BC, Canada, October 8, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14328}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47292-3}, doi = {10.1007/978-3-031-47292-3}, isbn = {978-3-031-47291-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/miccai/2023cdmri.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ndss/2023, title = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss2023/}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ndss/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sc/2023, editor = {Dorian Arnold and Rosa M. Badia and Kathryn M. Mohror}, title = {Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, {SC} 2023, Denver, CO, USA, November 12-17, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581784}, doi = {10.1145/3581784}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/sc/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tas/2023, title = {Proceedings of the First International Symposium on Trustworthy Autonomous Systems, {TAS} 2023, Edinburgh, United Kingdom, July 11-12, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597512}, doi = {10.1145/3597512}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/tas/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cvpr/2022w, title = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition Workshops, {CVPR} Workshops 2022, New Orleans, LA, USA, June 19-20, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPRW56347.2022}, doi = {10.1109/CVPRW56347.2022}, isbn = {978-1-6654-8739-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/2022w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/miccai/2022cdmri, editor = {Suheyla Cetin Karayumak and Daan Christiaens and Matteo Figini and Pamela Guevara and Tomasz Pieciak and Elizabeth Powell and Francois Rheault}, title = {Computational Diffusion {MRI} - 13th International Workshop, {CDMRI} 2022, Held in Conjunction with {MICCAI} 2022, Singapore, Singapore, September 22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13722}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21206-2}, doi = {10.1007/978-3-031-21206-2}, isbn = {978-3-031-21205-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/miccai/2022cdmri.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2021guttman, editor = {Daniel Dougherty and Jos{\'{e}} Meseguer and Sebastian Alexander M{\"{o}}dersheim and Paul D. Rowe}, title = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13066}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91631-2}, doi = {10.1007/978-3-030-91631-2}, isbn = {978-3-030-91630-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2021guttman.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eacl/2021-d, editor = {Dimitra Gkatzia and Djam{\'{e}} Seddah}, title = {Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: System Demonstrations, {EACL} 2021, Online, April 19-23, 2021}, publisher = {Association for Computational Linguistics}, year = {2021}, url = {https://aclanthology.org/volumes/2021.eacl-demos/}, isbn = {978-1-954085-05-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/eacl/2021-d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ijcai/2021, editor = {Zhi{-}Hua Zhou}, title = {Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27 August 2021}, publisher = {ijcai.org}, year = {2021}, url = {https://www.ijcai.org/proceedings/2021/}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iui/2021, editor = {Tracy Hammond and Katrien Verbert and Dennis Parra and Bart P. Knijnenburg and John O'Donovan and Paul Teale}, title = {{IUI} '21: 26th International Conference on Intelligent User Interfaces, College Station, TX, USA, April 13-17, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3397481}, doi = {10.1145/3397481}, isbn = {978-1-4503-8017-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/iui/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sui/2021, editor = {Francisco R. Ortega and Robert J. Teather and Gerd Bruder and Thammathip Piumsomboon and Benjamin Weyers and Anil Ufuk Batmaz and Kyle Johnsen and Christoph W. Borst}, title = {{SUI} '21: Symposium on Spatial User Interaction, Virtual Event, USA, November 9-10, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485279}, doi = {10.1145/3485279}, isbn = {978-1-4503-9091-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/sui/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/accv/2020-4, editor = {Hiroshi Ishikawa and Cheng{-}Lin Liu and Tom{\'{a}}s Pajdla and Jianbo Shi}, title = {Computer Vision - {ACCV} 2020 - 15th Asian Conference on Computer Vision, Kyoto, Japan, November 30 - December 4, 2020, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12625}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-69538-5}, doi = {10.1007/978-3-030-69538-5}, isbn = {978-3-030-69537-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/accv/2020-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cogsci/2020, editor = {Stephanie Denison and Michael L. Mack and Yang Xu and Blair C. Armstrong}, title = {Proceedings of the 42th Annual Meeting of the Cognitive Science Society - Developing a Mind: Learning in Humans, Animals, and Machines, CogSci 2020, virtual, July 29 - August 1, 2020}, publisher = {cognitivesciencesociety.org}, year = {2020}, url = {https://cogsci.mindmodeling.org/2020/}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cogsci/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdcs/2020, title = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020}, doi = {10.1109/ICDCS47774.2020}, isbn = {978-1-7281-7002-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ppsn/2020-1, editor = {Thomas B{\"{a}}ck and Mike Preuss and Andr{\'{e}} H. Deutz and Hao Wang and Carola Doerr and Michael T. M. Emmerich and Heike Trautmann}, title = {Parallel Problem Solving from Nature - {PPSN} {XVI} - 16th International Conference, {PPSN} 2020, Leiden, The Netherlands, September 5-9, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12269}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58112-1}, doi = {10.1007/978-3-030-58112-1}, isbn = {978-3-030-58111-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bmvc/2019, title = {30th British Machine Vision Conference 2019, {BMVC} 2019, Cardiff, UK, September 9-12, 2019}, publisher = {{BMVA} Press}, year = {2019}, url = {https://bmvc2019.org/programme/detailed-programme/}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/bmvc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosp/2019, title = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8790377/proceeding}, isbn = {978-1-7281-1148-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018-1, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6}, doi = {10.1007/978-3-319-99073-6}, isbn = {978-3-319-99072-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icst/2018w, title = {2018 {IEEE} International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops, V{\"{a}}ster{\aa}s, Sweden, April 9-13, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8401305/proceeding}, isbn = {978-1-5386-6352-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icst/2018w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wcre/2018, editor = {Rocco Oliveto and Massimiliano Di Penta and David C. Shepherd}, title = {25th International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8326467/proceeding}, isbn = {978-1-5386-4969-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/wcre/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/candc/2017, editor = {David A. Shamma and Jude Yew and Brian P. Bailey}, title = {Proceedings of the 2017 {ACM} {SIGCHI} Conference on Creativity and Cognition, C{\&}C 2017, Singapore, June 27 - 30, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3059454}, doi = {10.1145/3059454}, isbn = {978-1-4503-4403-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/candc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cri/2017, title = {Summit on Clinical Research Informatics, {CRI} 2017, San Francisco, CA, USA, March 27-30, 2017}, publisher = {{AMIA}}, year = {2017}, url = {http://knowledge.amia.org/amia-64484-cri2017-1.3520710}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cri/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2017, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7}, doi = {10.1007/978-3-319-68063-7}, isbn = {978-3-319-68062-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/stm/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vnc/2017, title = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy, November 27-29, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8267164/proceeding}, isbn = {978-1-5386-0986-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/vnc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cpp/2016, editor = {Jeremy Avigad and Adam Chlipala}, title = {Proceedings of the 5th {ACM} {SIGPLAN} Conference on Certified Programs and Proofs, Saint Petersburg, FL, USA, January 20-22, 2016}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2854065}, isbn = {978-1-4503-4127-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cpp/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse/2016csed, title = {Proceedings of the International Workshop on Continuous Software Evolution and Delivery, CSED@ICSE 2016, Austin, Texas, USA, May 14-22, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2896941}, doi = {10.1145/2896941}, isbn = {978-1-4503-4157-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icse/2016csed.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse/2016c, editor = {Laura K. Dillon and Willem Visser and Laurie A. Williams}, title = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2889160}, isbn = {978-1-4503-4205-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icse/2016c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/crc/asds2016, editor = {Luigia Petre and Emil Sekerinski}, title = {From Action Systems to Distributed Systems - The Refinement Approach}, publisher = {Chapman and Hall/CRC}, year = {2016}, url = {https://doi.org/10.1201/b20053}, doi = {10.1201/B20053}, isbn = {978-1-4987-0158-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/books/crc/asds2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aswec/2015, title = {24th Australasian Software Engineering Conference, {ASWEC} 2015, Adelaide, SA, Australia, September 28 - October 1, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7364551/proceeding}, isbn = {978-1-4673-9390-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/aswec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cogsci/2014, editor = {Paul Bello and Marcello Guarini and Marjorie McShane and Brian Scassellati}, title = {Proceedings of the 36th Annual Meeting of the Cognitive Science Society, CogSci 2014, Quebec City, Canada, July 23-26, 2014}, publisher = {cognitivesciencesociety.org}, year = {2014}, url = {https://mindmodeling.org/cogsci2014/}, isbn = {978-0-9911967-0-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cogsci/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2014, title = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6954678/proceeding}, isbn = {978-1-4799-4290-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icls/2014, editor = {William R. Penuel and A. Susan Jurow and Kevin O'Connor}, title = {Learning and Becoming in Practice: Proceedings of the 11th International Conference of the Learning Sciences, {ICLS} 2014, Boulder, Colorado, USA, June 23-27, 2014}, publisher = {International Society of the Learning Sciences}, year = {2014}, url = {https://repository.isls.org/handle/1/920/}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icls/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2014, editor = {Elvira Albert and Emil Sekerinski}, title = {Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8739}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10181-1}, doi = {10.1007/978-3-319-10181-1}, isbn = {978-3-319-10180-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/milcom/2014, title = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM201434636.2014}, doi = {10.1109/MILCOM201434636.2014}, isbn = {978-1-4799-6770-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/milcom/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2014, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3}, doi = {10.1007/978-3-319-11698-3}, isbn = {978-3-319-11697-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/nss/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secsr/2014, editor = {Liqun Chen and Chris J. Mitchell}, title = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4}, doi = {10.1007/978-3-319-14054-4}, isbn = {978-3-319-14053-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/secsr/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2014evt, title = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/evtwote14}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/uss/2014evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEares/2013cd-w, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4}, doi = {10.1007/978-3-642-40588-4}, isbn = {978-3-642-40587-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/2013cd-w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2013, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08302-5}, doi = {10.1007/978-3-319-08302-5}, isbn = {978-3-319-08301-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cogsci/2013, editor = {Markus Knauff and Michael Pauen and Natalie Sebanz and Ipke Wachsmuth}, title = {Proceedings of the 35th Annual Meeting of the Cognitive Science Society, CogSci 2013, Berlin, Germany, July 31 - August 3, 2013}, publisher = {cognitivesciencesociety.org}, year = {2013}, url = {https://mindmodeling.org/cogsci2013/}, isbn = {978-0-9768318-9-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cogsci/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gil/2013, editor = {Michael Clasen and Kurt Christian Kersebaum and Andreas Meyer{-}Aurich and Brigitte Theuvsen}, title = {Massendatenmanagement in der Agrar- und Ern{\"{a}}hrungswirtschaft, Erhebung - Verarbeitung - Nutzung, Referate der 33. GIL-Jahrestagung, 20. - 21. Februar 2013, Potsdam, Germany}, series = {{LNI}}, volume = {{P-211}}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/17569}, isbn = {978-3-88579-605-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/gil/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2013, title = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6745432/proceeding}, isbn = {978-1-908320-20-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse/2013ctgdsd, title = {3rd International Workshop on Collaborative Teaching of Globally Distributed Software Development, {CTGDSD} 2013, San Francisco, CA, USA, May 25, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6619587/proceeding}, isbn = {978-1-4673-6294-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icse/2013ctgdsd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2013, editor = {Einar Broch Johnsen and Luigia Petre}, title = {Integrated Formal Methods, 10th International Conference, {IFM} 2013, Turku, Finland, June 10-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7940}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38613-8}, doi = {10.1007/978-3-642-38613-8}, isbn = {978-3-642-38612-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nfm/2013, editor = {Guillaume Brat and Neha Rungta and Arnaud Venet}, title = {{NASA} Formal Methods, 5th International Symposium, {NFM} 2013, Moffett Field, CA, USA, May 14-16, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7871}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38088-4}, doi = {10.1007/978-3-642-38088-4}, isbn = {978-3-642-38087-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/nfm/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pst/2013, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6589044/proceeding}, isbn = {978-1-4673-5839-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/pst/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/qosa/2013, editor = {Philippe Kruchten and Anne Koziolek and Robert L. Nord}, title = {Proceedings of the 9th international {ACM} {SIGSOFT} conference on Quality of Software Architectures, QoSA 2013, part of Comparch '13 Federated Events on Component-Based Software Engineering and Software Architecture, Vancouver, BC, Canada, June 17-21, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2465478}, isbn = {978-1-4503-2126-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/qosa/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sefm/2013w, editor = {Steve Counsell and Manuel N{\'{u}}{\~{n}}ez}, title = {Software Engineering and Formal Methods - {SEFM} 2013 Collocated Workshops: BEAT2, WS-FMDS, FM-RAIL-Bok, MoKMaSD, and OpenCert, Madrid, Spain, September 23-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8368}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05032-4}, doi = {10.1007/978-3-319-05032-4}, isbn = {978-3-319-05031-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/sefm/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2013evt, title = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/evtwote13}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/uss/2013evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/xsede/2013, editor = {Nancy Wilkins{-}Diehr}, title = {Extreme Science and Engineering Discovery Environment: Gateway to Discovery, XSEDE13, San Diego, CA, {USA} - July 22 - 25, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2484762}, isbn = {978-1-4503-2170-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/xsede/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEscc/2012, editor = {Louise E. Moser and Manish Parashar and Patrick C. K. Hung}, title = {2012 {IEEE} Ninth International Conference on Services Computing, Honolulu, HI, USA, June 24-29, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6273231/proceeding}, isbn = {978-1-4673-3049-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/IEEEscc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ev/2012, editor = {Manuel J. Kripp and Melanie Volkamer and R{\"{u}}diger Grimm}, title = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-205}}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18207}, isbn = {978-3-88579-299-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ev/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fm/2012, editor = {Dimitra Giannakopoulou and Dominique M{\'{e}}ry}, title = {{FM} 2012: Formal Methods - 18th International Symposium, Paris, France, August 27-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7436}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32759-9}, doi = {10.1007/978-3-642-32759-9}, isbn = {978-3-642-32758-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/fm/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hvc/2012, editor = {Armin Biere and Amir Nahir and Tanja E. J. Vos}, title = {Hardware and Software: Verification and Testing - 8th International Haifa Verification Conference, {HVC} 2012, Haifa, Israel, November 6-8, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7857}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39611-3}, doi = {10.1007/978-3-642-39611-3}, isbn = {978-3-642-39610-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/hvc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/kbse/2012, editor = {Michael Goedicke and Tim Menzies and Motoshi Saeki}, title = {{IEEE/ACM} International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2351676}, isbn = {978-1-4503-1204-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/kbse/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pam/2012, editor = {Nina Taft and Fabio Ricciato}, title = {Passive and Active Measurement - 13th International Conference, {PAM} 2012, Vienna, Austria, March 12-14th, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7192}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28537-0}, doi = {10.1007/978-3-642-28537-0}, isbn = {978-3-642-28536-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/pam/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/qosa/2012, editor = {Vincenzo Grassi and Raffaela Mirandola and Barbora Buhnova and Antonio Vallecillo}, title = {Proceedings of the 8th international {ACM} {SIGSOFT} conference on Quality of Software Architectures, QoSA 2012, part of Comparch '12 Federated Events on Component-Based Software Engineering and Software Architecture, Bertinoro, Italy, June 25-28, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2304696}, isbn = {978-1-4503-1346-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/qosa/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/qsic/2012, editor = {Antony Tang and Henry Muccini}, title = {2012 12th International Conference on Quality Software, Xi'an, Shaanxi, China, August 27-29, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6317270/proceeding}, isbn = {978-1-4673-2857-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/qsic/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sefm/2012, editor = {George Eleftherakis and Mike Hinchey and Mike Holcombe}, title = {Software Engineering and Formal Methods - 10th International Conference, {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7504}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33826-7}, doi = {10.1007/978-3-642-33826-7}, isbn = {978-3-642-33825-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/sefm/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2012evt, editor = {J. Alex Halderman and Olivier Pereira}, title = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/evtwote12}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/uss/2012evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/websci/2012, editor = {Noshir S. Contractor and Brian Uzzi and Michael W. Macy and Wolfgang Nejdl}, title = {Web Science 2012, WebSci '12, Evanston, IL, {USA} - June 22 - 24, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2380718}, isbn = {978-1-4503-1228-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/websci/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/www/2012c, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon, France, April 16-20, 2012 (Companion Volume)}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2187980}, isbn = {978-1-4503-1230-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/www/2012c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEcloud/2011, editor = {Ling Liu and Manish Parashar}, title = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6008653/proceeding}, isbn = {978-1-4577-0836-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcloud/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2011, editor = {{\'{U}}lfar Erlingsson and Roel J. Wieringa and Nicola Zannone}, title = {Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6542}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19125-1}, doi = {10.1007/978-3-642-19125-1}, isbn = {978-3-642-19124-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/essos/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icfem/2011, editor = {Shengchao Qin and Zongyan Qiu}, title = {Formal Methods and Software Engineering - 13th International Conference on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6991}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24559-6}, doi = {10.1007/978-3-642-24559-6}, isbn = {978-3-642-24558-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icfem/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2011revote, title = {2011 International Workshop on Requirements Engineering for Electronic Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6036120/proceeding}, isbn = {978-1-4577-0951-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/re/2011revote.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soca/2011, editor = {Kwei{-}Jay Lin and Christian Huemer and M. Brian Blake and Boualem Benatallah}, title = {2011 {IEEE} International Conference on Service-Oriented Computing and Applications, {SOCA} 2011, Irvine, CA, USA, December 12-14, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6156051/proceeding}, isbn = {978-1-4673-0318-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/soca/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2011evt, editor = {Hovav Shacham and Vanessa Teague}, title = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/evtwote11}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/uss/2011evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2011, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32747-6}, doi = {10.1007/978-3-642-32747-6}, isbn = {978-3-642-32746-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/voteid/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/corr/abs-1106-3488, editor = {John Derrick and Eerke A. Boiten and Steve Reeves}, title = {Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011}, series = {{EPTCS}}, volume = {55}, year = {2011}, url = {https://doi.org/10.4204/EPTCS.55}, doi = {10.4204/EPTCS.55}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-3488.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fm/2011b, editor = {Marie{-}Laure Potet and Helen Treharne}, title = {Proceedings of the {B} 2011 Workshop, a satellite event of the 17th International Symposium on Formal Methods, {FM} 2011, Limerick, Ireland, June 21, 2011}, series = {Electronic Notes in Theoretical Computer Science}, volume = {280}, publisher = {Elsevier}, year = {2011}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/280/suppl/C}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/fm/2011b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ios/11/CK2011, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, publisher = {{IOS} Press}, year = {2011}, url = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols}, isbn = {978-1-60750-713-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CK2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aswec/2010, title = {21st Australian Software Engineering Conference {(ASWEC} 2010), 6-9 April 2010, Auckland, New Zealand}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5474654/proceeding}, isbn = {978-0-7695-4006-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/aswec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/biocomp/2010, editor = {Hamid R. Arabnia and Quoc{-}Nam Tran and Rui Chang and Matthew He and Andy Marsh and Ashu M. G. Solo and Jack Y. Yang}, title = {International Conference on Bioinformatics {\&} Computational Biology, {BIOCOMP} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, publisher = {{CSREA} Press}, year = {2010}, isbn = {1-60132-134-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/biocomp/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icfem/2010, editor = {Jin Song Dong and Huibiao Zhu}, title = {Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6447}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16901-4}, doi = {10.1007/978-3-642-16901-4}, isbn = {978-3-642-16900-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icfem/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icsoc/2010, editor = {Paul P. Maglio and Mathias Weske and Jian Yang and Marcelo Fantinato}, title = {Service-Oriented Computing - 8th International Conference, {ICSOC} 2010, San Francisco, CA, USA, December 7-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6470}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17358-5}, doi = {10.1007/978-3-642-17358-5}, isbn = {978-3-642-17357-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icsoc/2010w, editor = {E. Michael Maximilien and Gustavo Rossi and Soe{-}Tsyr Yuan and Heiko Ludwig and Marcelo Fantinato}, title = {Service-Oriented Computing - {ICSOC} 2010 International Workshops, PAASC, WESOA, SEE, and SOC-LOG, San Francisco, CA, USA, December 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6568}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19394-1}, doi = {10.1007/978-3-642-19394-1}, isbn = {978-3-642-19393-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/2010w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2010, editor = {Dominique M{\'{e}}ry and Stephan Merz}, title = {Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6396}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16265-7}, doi = {10.1007/978-3-642-16265-7}, isbn = {978-3-642-16264-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2010, editor = {Guang Gong and Kishan Chand Gupta}, title = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8}, doi = {10.1007/978-3-642-17401-8}, isbn = {978-3-642-17400-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/kbse/2010, editor = {Charles Pecheur and Jamie Andrews and Elisabetta Di Nitto}, title = {{ASE} 2010, 25th {IEEE/ACM} International Conference on Automated Software Engineering, Antwerp, Belgium, September 20-24, 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1858996}, doi = {10.1145/1858996}, isbn = {978-1-4503-0116-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/kbse/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aswec/2009, title = {20th Australian Software Engineering Conference {(ASWEC} 2009), 14-17 April 2009, Gold Cost, Australia}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5076602/proceeding}, isbn = {978-0-7695-3599-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/aswec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2009borger, editor = {Jean{-}Raymond Abrial and Uwe Gl{\"{a}}sser}, title = {Rigorous Methods for Software Construction and Analysis, Essays Dedicated to Egon B{\"{o}}rger on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {5115}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11447-2}, doi = {10.1007/978-3-642-11447-2}, isbn = {978-3-642-11446-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2009borger.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hci/2009-7, editor = {Constantine Stephanidis}, title = {Universal Access in Human-Computer Interaction. Applications and Services, 5th International Conference, {UAHCI} 2009, Held as Part of {HCI} International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {5616}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02713-0}, doi = {10.1007/978-3-642-02713-0}, isbn = {978-3-642-02712-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/hci/2009-7.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2009, editor = {Michael Leuschel and Heike Wehrheim}, title = {Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5423}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00255-7}, doi = {10.1007/978-3-642-00255-7}, isbn = {978-3-642-00254-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2009revote, title = {First International Workshop on Requirements Engineering for e-Voting Systems, {RE-VOTE} 2009, Atlanta, Georgia, USA, August 31, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5458386/proceeding}, isbn = {978-0-7695-4100-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/re/2009revote.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asm/2008, editor = {Egon B{\"{o}}rger and Michael J. Butler and Jonathan P. Bowen and Paul Boca}, title = {Abstract State Machines, {B} and Z, First International Conference, {ABZ} 2008, London, UK, September 16-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5238}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87603-8}, doi = {10.1007/978-3-540-87603-8}, isbn = {978-3-540-87602-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/asm/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icsoc/2008w, editor = {George Feuerlicht and Winfried Lamersdorf}, title = {Service-Oriented Computing - {ICSOC} 2008 Workshops, {ICSOC} 2008 International Workshops, Sydney, Australia, December 1st, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5472}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01247-1}, doi = {10.1007/978-3-642-01247-1}, isbn = {978-3-642-01246-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/2008w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ictac/2008, editor = {John S. Fitzgerald and Anne E. Haxthausen and H{\"{u}}sn{\"{u}} Yenig{\"{u}}n}, title = {Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5160}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85762-4}, doi = {10.1007/978-3-540-85762-4}, isbn = {978-3-540-85761-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ictac/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2008evt, editor = {David L. Dill and Tadayoshi Kohno}, title = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/uss/2008evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wotug/2008, editor = {Peter H. Welch and Susan Stepney and Fiona Polack and Fred R. M. Barnes and Alistair A. McEwan and Gardiner S. Stiles and Jan F. Broenink and Adam T. Sampson}, title = {The thirty-first Communicating Process Architectures Conference, {CPA} 2008, organised under the auspices of WoTUG and the Department of Computer Science of the University of York, York, Yorkshire, UK, 7-10 September 2008}, series = {Concurrent Systems Engineering Series}, volume = {66}, publisher = {{IOS} Press}, year = {2008}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=10444}, isbn = {978-1-58603-907-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/wotug/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/b/2007, editor = {Jacques Julliand and Olga Kouchnarenko}, title = {B 2007: Formal Specification and Development in B, 7th International Conference of {B} Users, Besan{\c{c}}on, France, January 17-19, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4355}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11955757}, doi = {10.1007/11955757}, isbn = {3-540-68760-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/b/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2007, editor = {Jim Davies and Jeremy Gibbons}, title = {Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4591}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73210-5}, doi = {10.1007/978-3-540-73210-5}, isbn = {978-3-540-73209-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/miigp/2007, editor = {Kevin R. Cleary and Michael I. Miga}, title = {Medical Imaging 2007: Visualization and Image-Guided Procedures, San Diego, CA, United States, 17-22 February 2007}, series = {{SPIE} Proceedings}, volume = {6509}, publisher = {{SPIE}}, year = {2007}, url = {https://www.spiedigitallibrary.org/conference-proceedings-of-SPIE/6509.toc}, isbn = {9780819466273}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/miigp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mtsummit/2007, editor = {Bente Maegaard}, title = {Proceedings of Machine Translation Summit {XI:} Papers, Copenhagen, Denmark, September 10-14, 2007}, year = {2007}, url = {https://aclanthology.org/volumes/2007.mtsummit-papers/}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/mtsummit/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2007, editor = {Ammar Alkassar and Melanie Volkamer}, title = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4896}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77493-8}, doi = {10.1007/978-3-540-77493-8}, isbn = {978-3-540-77492-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/voteid/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wotug/2007, editor = {Alistair A. McEwan and Steve A. Schneider and Wilson Ifill and Peter H. Welch}, title = {The 30th Communicating Process Architectures Conference, {CPA} 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007}, series = {Concurrent Systems Engineering Series}, volume = {65}, publisher = {{IOS} Press}, year = {2007}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5962}, isbn = {978-1-58603-767-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/wotug/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2006, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908}, doi = {10.1007/11863908}, isbn = {3-540-44601-X}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iceccs/2006, title = {11th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2006), 15-17 August 2006, Stanford, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/11122/proceeding}, isbn = {0-7695-2530-X}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/iceccs/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/memocode/2006, title = {4th {ACM} {\&} {IEEE} International Conference on Formal Methods and Models for Co-Design {(MEMOCODE} 2006), 27-29 July 2006, Embassy Suites, Napa, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/11148/proceeding}, isbn = {1-4244-0421-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/memocode/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sac/2006, editor = {Hisham Haddad}, title = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277}, doi = {10.1145/1141277}, isbn = {1-59593-108-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/sac/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cdc/2005, title = {44th {IEEE} {IEEE} Conference on Decision and Control and 8th European Control Conference Control, {CDC/ECC} 2005, Seville, Spain, 12-15 December, 2005}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/CDC-ECC7191.2005}, doi = {10.1109/CDC-ECC7191.2005}, isbn = {0-7803-9567-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cdc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2005, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548}, doi = {10.1007/11599548}, isbn = {3-540-30855-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2005, title = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9853/proceeding}, isbn = {0-7695-2340-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2005, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827}, doi = {10.1007/11555827}, isbn = {3-540-28963-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2005, editor = {Judi Romijn and Graeme Smith and Jaco van de Pol}, title = {Integrated Formal Methods, 5th International Conference, {IFM} 2005, Eindhoven, The Netherlands, November 29 - December 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3771}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11589976}, doi = {10.1007/11589976}, isbn = {3-540-30492-4}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/snpd/2005, editor = {Lawrence Chung and Yeong{-}Tae Song}, title = {Proceedings of the 6th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing {(SNPD} 2005), May 23-25, 2005, Towson, Maryland, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9806/proceeding}, isbn = {0-7695-2294-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/snpd/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/apc25/2005, editor = {Luca Aceto and Andrew D. Gordon}, title = {Proceedings of the Workshop "Essays on Algebraic Process Calculi", {APC} 25, Bertinoro, Italy, August 1-5, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {162}, publisher = {Elsevier}, year = {2006}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/162/suppl/C}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/apc25/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/refine/2005, editor = {John Derrick and Eerke A. Boiten}, title = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford, UK, April 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {137}, number = {2}, publisher = {Elsevier}, year = {2005}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/137/issue/2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/refine/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2004csp, editor = {Ali E. Abdallah and Cliff B. Jones and Jeff W. Sanders}, title = {Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3525}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b136154}, doi = {10.1007/B136154}, isbn = {3-540-25813-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2004csp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2004, editor = {Eerke A. Boiten and John Derrick and Graeme Smith}, title = {Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2999}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b96106}, doi = {10.1007/B96106}, isbn = {3-540-21377-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vr/2003, title = {{IEEE} Virtual Reality Conference 2003 {(VR} 2003), 22-26 March 2003, Los Angeles, CA, USA, Proceedings}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://ieeexplore.ieee.org/xpl/conhome/8471/proceeding}, isbn = {0-7695-1882-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/vr/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/zum/2003, editor = {Didier Bert and Jonathan P. Bowen and Steve King and Marina Wald{\'{e}}n}, title = {{ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2651}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44880-2}, doi = {10.1007/3-540-44880-2}, isbn = {3-540-40253-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/zum/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2002, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0}, doi = {10.1007/3-540-45853-0}, isbn = {3-540-44345-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fmoods/2002, editor = {Bart Jacobs and Arend Rensink}, title = {Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands}, series = {{IFIP} Conference Proceedings}, volume = {209}, publisher = {Kluwer}, year = {2002}, isbn = {0-7923-7683-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/fmoods/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/zum/2002, editor = {Didier Bert and Jonathan P. Bowen and Martin C. Henson and Ken Robinson}, title = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd International Conference of {B} and {Z} Users, Grenoble, France, January 23-25, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2272}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45648-1}, doi = {10.1007/3-540-45648-1}, isbn = {3-540-43166-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/zum/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/concur/2001, editor = {Kim Guldstrand Larsen and Mogens Nielsen}, title = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2154}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44685-0}, doi = {10.1007/3-540-44685-0}, isbn = {3-540-42497-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/concur/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2001, title = {Proceedings of the 2001 International Symposium on Circuits and Systems, {ISCAS} 2001, Sydney, Australia, May 6-9, 2001}, publisher = {{IEEE}}, year = {2001}, url = {https://ieeexplore.ieee.org/xpl/conhome/7344/proceeding}, isbn = {0-7803-6685-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2000, title = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://ieeexplore.ieee.org/xpl/conhome/6924/proceeding}, isbn = {0-7695-0671-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2000, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Yves Deswarte and Dieter Gollmann and Michael Waidner}, title = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1895}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722599}, doi = {10.1007/10722599}, isbn = {3-540-41031-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/zum/2000, editor = {Jonathan P. Bowen and Steve Dunne and Andy Galloway and Steve King}, title = {{ZB} 2000: Formal Specification and Development in {Z} and B, First International Conference of {B} and {Z} Users, York, UK, August 29 - September 2, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1878}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44525-0}, doi = {10.1007/3-540-44525-0}, isbn = {3-540-67944-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/zum/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mfcsit/2000, editor = {Ted Hurley and M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and Michel P. Schellekens and Anthony Karel Seda}, title = {First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, {MFCSIT} 2000, Cork, Ireland, July 20-21, 2000}, series = {Electronic Notes in Theoretical Computer Science}, volume = {40}, publisher = {Elsevier}, year = {2000}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/40/suppl/C}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/mfcsit/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/1999, title = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://ieeexplore.ieee.org/xpl/conhome/6332/proceeding}, isbn = {0-7695-0201-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/csfw/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fm/1999-1, editor = {Jeannette M. Wing and Jim Woodcock and Jim Davies}, title = {FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume {I}}, series = {Lecture Notes in Computer Science}, volume = {1708}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48119-2}, doi = {10.1007/3-540-48119-2}, isbn = {3-540-66587-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/fm/1999-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/1999, editor = {Keijiro Araki and Andy Galloway and Kenji Taguchi}, title = {Integrated Formal Methods, Proceedings of the 1st International Conference on Integrated Formal Methods, {IFM} 99, York, UK, 28-29 June 1999}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-1-4471-0851-1}, doi = {10.1007/978-1-4471-0851-1}, isbn = {1-85233-107-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ifm/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spin/1999, editor = {Dennis Dams and Rob Gerth and Stefan Leue and Mieke Massink}, title = {Theoretical and Practical Aspects of {SPIN} Model Checking, 5th and 6th International {SPIN} Workshops, Trento, Italy, July 5, 1999, Toulouse, France, September 21 and 24 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1680}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48234-2}, doi = {10.1007/3-540-48234-2}, isbn = {3-540-66499-8}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/spin/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/b/1998, editor = {Didier Bert}, title = {B'98: Recent Advances in the Development and Use of the {B} Method, Second International {B} Conference, Montpellier, France, April 22-24, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1393}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053349}, doi = {10.1007/BFB0053349}, isbn = {3-540-64405-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/b/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/1998, title = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://ieeexplore.ieee.org/xpl/conhome/5606/proceeding}, isbn = {0-8186-8488-7}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/csfw/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icre/1998, title = {3rd International Conference on Requirements Engineering {(ICRE} '98), Putting Requirements Engineering to Practice, April 6-10, 1998, Colorado Springs, CO, USA, Proceedings}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://ieeexplore.ieee.org/xpl/conhome/5429/proceeding}, isbn = {0-8186-8356-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icre/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/1997, title = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12, 1997, Rockport, Massachusetts, {USA}}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://ieeexplore.ieee.org/xpl/conhome/4668/proceeding}, isbn = {0-8186-7990-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/csfw/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tphol/1997, editor = {Elsa L. Gunter and Amy P. Felty}, title = {Theorem Proving in Higher Order Logics, 10th International Conference, TPHOLs'97, Murray Hill, NJ, USA, August 19-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1275}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028381}, doi = {10.1007/BFB0028381}, isbn = {3-540-63379-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/tphol/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/1996, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, title = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1146}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61770-1}, doi = {10.1007/3-540-61770-1}, isbn = {3-540-61770-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/esorics/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icecsys/1996, title = {Proceedings of Third International Conference on Electronics, Circuits, and Systems, {ICECS} 1996, Rodos, Greece, October 13-16, 1996}, publisher = {{IEEE}}, year = {1996}, url = {https://ieeexplore.ieee.org/xpl/conhome/4443/proceeding}, isbn = {0-7803-3650-X}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigmetrics/1996, editor = {Daniel A. Reed and Blaine D. Gaither}, title = {Proceedings of the 1996 {ACM} {SIGMETRICS} international conference on Measurement and modeling of computer systems, Philadelphia, Pennsylvania, USA, May 23-26, 1996}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/233013}, doi = {10.1145/233013}, isbn = {0-89791-793-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/1996, title = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://ieeexplore.ieee.org/xpl/conhome/3742/proceeding}, doi = {10.5555/525080}, isbn = {0-8186-7417-2}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/sp/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/concur/1995, editor = {Insup Lee and Scott A. Smolka}, title = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia, PA, USA, August 21-24, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {962}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60218-6}, doi = {10.1007/3-540-60218-6}, isbn = {3-540-60218-6}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/concur/1995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/forte/1995, editor = {Gregor von Bochmann and Rachida Dssouli and Omar Rafiq}, title = {Formal Description Techniques VIII, Proceedings of the {IFIP} {TC6} Eighth International Conference on Formal Description Techniques, Montreal, Canada, October 1995}, series = {{IFIP} Conference Proceedings}, volume = {43}, publisher = {Chapman {\&} Hall}, year = {1996}, isbn = {0-412-73270-X}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/forte/1995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/amast/1993, editor = {Maurice Nivat and Charles Rattray and Teodor Rus and Giuseppe Scollo}, title = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings of the Third International Conference on Methodology and Software Technology, University of Twente, Enschede, The Netherlands, 21-25 June, 1993}, series = {Workshops in Computing}, publisher = {Springer}, year = {1994}, isbn = {3-540-19852-0}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/amast/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mfps/1993, editor = {Stephen D. Brookes and Michael G. Main and Austin Melton and Michael W. Mislove and David A. Schmidt}, title = {Mathematical Foundations of Programming Semantics, 9th International Conference, New Orleans, LA, USA, April 7-10, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {802}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58027-1}, doi = {10.1007/3-540-58027-1}, isbn = {3-540-58027-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/mfps/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/concur/1992, editor = {Rance Cleaveland}, title = {{CONCUR} '92, Third International Conference on Concurrency Theory, Stony Brook, NY, USA, August 24-27, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {630}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0084777}, doi = {10.1007/BFB0084777}, isbn = {3-540-55822-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/concur/1992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ftrtft/1992, editor = {Jan Vytopil}, title = {Formal Techniques in Real-Time and Fault-Tolerant Systems, Second International Symposium, Nijmegen, The Netherlands, January 8-10, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {571}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-55092-5}, doi = {10.1007/3-540-55092-5}, isbn = {3-540-55092-5}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/ftrtft/1992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rex/1991, editor = {J. W. de Bakker and Cornelis Huizing and Willem P. de Roever and Grzegorz Rozenberg}, title = {Real-Time: Theory in Practice, {REX} Workshop, Mook, The Netherlands, June 3-7, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {600}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0031984}, doi = {10.1007/BFB0031984}, isbn = {3-540-55564-1}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/rex/1991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mfps/1989, editor = {Michael G. Main and Austin Melton and Michael W. Mislove and David A. Schmidt}, title = {Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29 - April 1, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {442}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0040251}, doi = {10.1007/BFB0040251}, isbn = {3-540-97375-3}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/mfps/1989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/podc/1985, editor = {Michael A. Malcolm and H. Raymond Strong}, title = {Proceedings of the Fourth Annual {ACM} Symposium on Principles of Distributed Computing, Minaki, Ontario, Canada, August 5-7, 1985}, publisher = {{ACM}}, year = {1985}, url = {http://dl.acm.org/citation.cfm?id=323596}, isbn = {0-89791-167-9}, timestamp = {Fri, 30 Aug 2024 07:37:09 +0200}, biburl = {https://dblp.org/rec/conf/podc/1985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.