Search dblp for Publications

export results for "Steve Schneider"

 download as .bib file

@article{DBLP:journals/cmpb/MartinJFGMEPAS24,
  author       = {Liam Martin and
                  Pranav Jain and
                  Zachary Ferguson and
                  Torkan Gholamalizadeh and
                  Faezeh Moshfeghifar and
                  Kenny Erleben and
                  Daniele Panozzo and
                  Steven D. Abramowitch and
                  Teseo Schneider},
  title        = {A systematic comparison between FEBio and PolyFEM for biomechanical
                  systems},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {244},
  pages        = {107938},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cmpb.2023.107938},
  doi          = {10.1016/J.CMPB.2023.107938},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmpb/MartinJFGMEPAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/interactions/SchneidersBTAR24,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Nick Tandavanitj and
                  Matt Adams and
                  Ju Row{-}Farr},
  title        = {Cat Royale},
  journal      = {Interactions},
  volume       = {31},
  number       = {1},
  pages        = {64},
  year         = {2024},
  url          = {https://doi.org/10.1145/3636499},
  doi          = {10.1145/3636499},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/interactions/SchneidersBTAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BaleFSWC24,
  author       = {Cameron D. Bale and
                  Jordan L. Fischer and
                  Matthew J. Schneider and
                  Steven Weber and
                  Suzanne Chang},
  title        = {Legally Anonymizing Location Data Under the {GDPR}},
  journal      = {Trans. Data Priv.},
  volume       = {17},
  number       = {1},
  pages        = {1--30},
  year         = {2024},
  url          = {http://www.tdp.cat/issues21/abs.a472a22.php},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdp/BaleFSWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlsadiCDDRSSTWW24,
  author       = {Mohammed Alsadi and
                  Matthew Casey and
                  Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Luke Riley and
                  Muntadher Sallal and
                  Steve Schneider and
                  Helen Treharne and
                  Joe Wadsworth and
                  Phil Wright},
  title        = {Towards End-to-End Verifiable Online Voting: Adding Verifiability
                  to Established Voting Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3357--3374},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3327859},
  doi          = {10.1109/TDSC.2023.3327859},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlsadiCDDRSSTWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BenfordMCSCFKSN24,
  author       = {Steven David Benford and
                  Clara Mancini and
                  Alan Chamberlain and
                  Eike Schneiders and
                  Simon D. Castle{-}Green and
                  Joel E. Fischer and
                  Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and
                  Guido Salimbeni and
                  Victor Zhi Heung Ngo and
                  Pepita Barnard and
                  Matt Adams and
                  Nick Tandavanitj and
                  Ju Row{-}Farr},
  editor       = {Florian 'Floyd' Mueller and
                  Penny Kyburz and
                  Julie R. Williamson and
                  Corina Sas and
                  Max L. Wilson and
                  Phoebe O. Toups Dugas and
                  Irina Shklovski},
  title        = {Charting Ethical Tensions in Multispecies Technology Research through
                  Beneficiary-Epistemology Space},
  booktitle    = {Proceedings of the {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024},
  pages        = {626:1--626:15},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3613904.3641994},
  doi          = {10.1145/3613904.3641994},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BenfordMCSCFKSN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SchneidersBCMCN24,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Alan Chamberlain and
                  Clara Mancini and
                  Simon Castle{-}Green and
                  Victor Zhi Heung Ngo and
                  Ju Row{-}Farr and
                  Matt Adams and
                  Nick Tandavanitj and
                  Joel E. Fischer},
  editor       = {Florian 'Floyd' Mueller and
                  Penny Kyburz and
                  Julie R. Williamson and
                  Corina Sas and
                  Max L. Wilson and
                  Phoebe O. Toups Dugas and
                  Irina Shklovski},
  title        = {Designing Multispecies Worlds for Robots, Cats, and Humans},
  booktitle    = {Proceedings of the {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024},
  pages        = {593:1--593:16},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3613904.3642115},
  doi          = {10.1145/3613904.3642115},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/SchneidersBCMCN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hri/SchneidersBRTA24,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Ju Row{-}Farr and
                  Nick Tandavanitj and
                  Matt Adams},
  editor       = {Dan Grollman and
                  Elizabeth Broadbent and
                  Wendy Ju and
                  Harold Soh and
                  Tom Williams},
  title        = {The Purr-suit of Happiness: {A} Tale of Three Kittens. Robots, Humans,
                  Cats, and {AI}},
  booktitle    = {Companion of the 2024 {ACM/IEEE} International Conference on Human-Robot
                  Interaction, {HRI} 2024, Boulder, CO, USA, March 11-15, 2024},
  pages        = {71--73},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3610978.3640791},
  doi          = {10.1145/3610978.3640791},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hri/SchneidersBRTA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15431,
  author       = {Eike Schneiders and
                  Steve Benford and
                  Alan Chamberlain and
                  Clara Mancini and
                  Simon Castle{-}Green and
                  Victor Zhi Heung Ngo and
                  Ju Row{-}Farr and
                  Matt Adams and
                  Nick Tandavanitj and
                  Joel E. Fischer},
  title        = {Designing Multispecies Worlds for Robots, Cats, and Humans},
  journal      = {CoRR},
  volume       = {abs/2402.15431},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15431},
  doi          = {10.48550/ARXIV.2402.15431},
  eprinttype    = {arXiv},
  eprint       = {2402.15431},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15431.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15439,
  author       = {Steve Benford and
                  Clara Mancini and
                  Alan Chamberlain and
                  Eike Schneiders and
                  Simon Castle{-}Green and
                  Joel E. Fischer and
                  Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and
                  Guido Salimbeni and
                  Victor Zhi Heung Ngo and
                  Pepita Barnard and
                  Matt Adams and
                  Nick Tandavanitj and
                  Ju Row{-}Farr},
  title        = {Charting Ethical Tensions in Multispecies Technology Research through
                  Beneficiary-Epistemology Space},
  journal      = {CoRR},
  volume       = {abs/2402.15439},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15439},
  doi          = {10.48550/ARXIV.2402.15439},
  eprinttype    = {arXiv},
  eprint       = {2402.15439},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/KrieglsteinSGBN23,
  author       = {Felix Krieglstein and
                  Sascha Schneider and
                  Jessica Gr{\"{o}}ninger and
                  Maik Beege and
                  Steve Nebel and
                  Lukas Wesenberg and
                  Markus Suren and
                  G{\"{u}}nter Daniel Rey},
  title        = {Exploring the effects of content-related segmentations and metacognitive
                  prompts on learning with whiteboard animations},
  journal      = {Comput. Educ.},
  volume       = {194},
  pages        = {104702},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compedu.2022.104702},
  doi          = {10.1016/J.COMPEDU.2022.104702},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ce/KrieglsteinSGBN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/6gnet/FrieseGBZNMZSPB23,
  author       = {Ingo Friese and
                  Mandy Galkow{-}Schneider and
                  Louay Bassbouss and
                  Alexander Zoubarev and
                  Andy Neparidze and
                  Sergiy Melnyk and
                  Qiuheng Zhou and
                  Hans D. Schotten and
                  Tobias Pfandzelter and
                  David Bermbach and
                  Arndt Kritzner and
                  Enrico Zschau and
                  Prasenjit Dhara and
                  Steve G{\"{o}}ring and
                  William Menz and
                  Alexander Raake and
                  Wolfgang R{\"{u}}ther{-}Kindel and
                  Fabian Quaeck and
                  Nick Stuckert and
                  Robert Vilter},
  title        = {True 3D Holography: {A} Communication Service of Tomorrow and Its
                  Requirements for a New Converged Cloud and Network Architecture on
                  the Path to 6G},
  booktitle    = {2nd International Conference on 6G Networking, 6GNet 2023, Paris,
                  France, October 18-20, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/6GNet58894.2023.10317647},
  doi          = {10.1109/6GNET58894.2023.10317647},
  timestamp    = {Tue, 28 Nov 2023 14:39:09 +0100},
  biburl       = {https://dblp.org/rec/conf/6gnet/FrieseGBZNMZSPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blocksys/DesaiMSSR23,
  author       = {Nidhi Desai and
                  Damiano Di Francesco Maesa and
                  Nishanth Sastry and
                  Steve Schneider and
                  Laura Ricci},
  title        = {Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive
                  Sensor Data Streams using Smart Contracts},
  booktitle    = {Proceedings of the Fifth {ACM} International Workshop on Blockchain-enabled
                  Networked Sensor Systems, BlockSys 2023, Istanbul, Turkiye, 12 November
                  2023},
  pages        = {2--8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3628354.3629532},
  doi          = {10.1145/3628354.3629532},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blocksys/DesaiMSSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imw2/MarkovFSLJK23,
  author       = {Viktor Markov and
                  Gilles Festes and
                  Louisa Schneider and
                  Steven Lemke and
                  Serguei Jourba and
                  Alexander Kotov},
  title        = {Effect of High-Temperature Bake on {RTN} Statistics in Floating Gate
                  Flash Memory Arrays},
  booktitle    = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA,
                  May 21-24, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IMW56887.2023.10145950},
  doi          = {10.1109/IMW56887.2023.10145950},
  timestamp    = {Fri, 16 Jun 2023 08:54:55 +0200},
  biburl       = {https://dblp.org/rec/conf/imw2/MarkovFSLJK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imw2/TkachevLSFG23,
  author       = {Yuri Tkachev and
                  Steven Lemke and
                  Louisa Schneider and
                  Gilles Festes and
                  Parviz Ghazavi},
  title        = {Analog Tuning of Floating-Gate Cells with Sub-Elementary Charge Accuracy
                  for In-Memory Computing Applications},
  booktitle    = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA,
                  May 21-24, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IMW56887.2023.10145932},
  doi          = {10.1109/IMW56887.2023.10145932},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imw2/TkachevLSFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iui/SchneiderHRMGGL23,
  author       = {Tobias Schneider and
                  Joana Hois and
                  Alischa Rosenstein and
                  Sandra Metzl and
                  Ansgar R. S. Gerlicher and
                  Sabiha Ghellal and
                  Steve Love},
  title        = {Don't fail me! The Level 5 Autonomous Driving Information Dilemma
                  regarding Transparency and User Experience},
  booktitle    = {Proceedings of the 28th International Conference on Intelligent User
                  Interfaces, {IUI} 2023, Sydney, NSW, Australia, March 27-31, 2023},
  pages        = {540--552},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581641.3584085},
  doi          = {10.1145/3581641.3584085},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iui/SchneiderHRMGGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miccai/FilipiakSBZPSBB23,
  author       = {Patryk Filipiak and
                  Timothy M. Shepherd and
                  Lee Basler and
                  Anthony Zuccolotto and
                  Dimitris G. Placantonakis and
                  Walter Schneider and
                  Fernando E. Boada and
                  Steven H. Baete},
  editor       = {Muge Karaman and
                  Remika Mito and
                  Elizabeth Powell and
                  Francois Rheault and
                  Stefan Winzeck},
  title        = {Diffusion Phantom Study of Fiber Crossings at Varied Angles Reconstructed
                  with ODF-Fingerprinting},
  booktitle    = {Computational Diffusion {MRI} - 14th International Workshop, {CDMRI}
                  2023, Held in Conjunction with {MICCAI} 2023, Vancouver, BC, Canada,
                  October 8, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14328},
  pages        = {23--34},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47292-3\_3},
  doi          = {10.1007/978-3-031-47292-3\_3},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/miccai/FilipiakSBZPSBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BudykhoBWRLRRS23,
  author       = {Ksenia Budykho and
                  Ioana Boureanu and
                  Stephan Wesemeyer and
                  Daniel Romero and
                  Matt Lewis and
                  Yogaratnam Rahulan and
                  Fortunat Rajaona and
                  Steve Schneider},
  title        = {Fine-Grained Trackability in Protocol Executions},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/fine-grained-trackability-in-protocol-executions/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BudykhoBWRLRRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc/Atchley0LBVBBBC23,
  author       = {Scott Atchley and
                  Christopher Zimmer and
                  John Lange and
                  David E. Bernholdt and
                  Ver{\'{o}}nica G. Melesse Vergara and
                  Thomas Beck and
                  Michael J. Brim and
                  Reuben D. Budiardja and
                  Sunita Chandrasekaran and
                  Markus Eisenbach and
                  Thomas M. Evans and
                  Matthew Ezell and
                  Nicholas Frontiere and
                  Antigoni Georgiadou and
                  Joe Glenski and
                  Philipp Grete and
                  Steven P. Hamilton and
                  John K. Holmen and
                  Axel Huebl and
                  Daniel A. Jacobson and
                  Wayne Joubert and
                  Kim H. McMahon and
                  Elia Merzari and
                  Stan G. Moore and
                  Andrew Myers and
                  Stephen Nichols and
                  Sarp Oral and
                  Thomas Papatheodore and
                  Danny Perez and
                  David M. Rogers and
                  Evan Schneider and
                  Jean{-}Luc Vay and
                  P. K. Yeung},
  editor       = {Dorian Arnold and
                  Rosa M. Badia and
                  Kathryn M. Mohror},
  title        = {Frontier: Exploring Exascale},
  booktitle    = {Proceedings of the International Conference for High Performance Computing,
                  Networking, Storage and Analysis, {SC} 2023, Denver, CO, USA, November
                  12-17, 2023},
  pages        = {52:1--52:16},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581784.3607089},
  doi          = {10.1145/3581784.3607089},
  timestamp    = {Mon, 24 Jun 2024 15:20:25 +0200},
  biburl       = {https://dblp.org/rec/conf/sc/Atchley0LBVBBBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tas/SchneidersCFBCN23,
  author       = {Eike Schneiders and
                  Alan Chamberlain and
                  Joel E. Fischer and
                  Steve Benford and
                  Simon Castle{-}Green and
                  Victor Zhi Heung Ngo and
                  Ayse K{\"{u}}{\c{c}}{\"{u}}kyilmaz and
                  Pepita Barnard and
                  Ju Row{-}Farr and
                  Matt Adams and
                  Nick Tandavanitj and
                  Kate Devlin and
                  Clara Mancini and
                  Daniel Mills},
  title        = {{TAS} for Cats: An Artist-led Exploration of Trustworthy Autonomous
                  Systems for Companion Animals},
  booktitle    = {Proceedings of the First International Symposium on Trustworthy Autonomous
                  Systems, {TAS} 2023, Edinburgh, United Kingdom, July 11-12, 2023},
  pages        = {36:1--36:5},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597512.3597517},
  doi          = {10.1145/3597512.3597517},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tas/SchneidersCFBCN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2023,
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482},
  doi          = {10.1145/3558482},
  isbn         = {978-1-4503-9859-6},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-03372,
  author       = {Wojciech Jamroga and
                  Peter Y. A. Ryan and
                  Steve Schneider and
                  Carsten Sch{\"{u}}rmann and
                  Philip B. Stark},
  title        = {A Declaration of Software Independence},
  journal      = {CoRR},
  volume       = {abs/2311.03372},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.03372},
  doi          = {10.48550/ARXIV.2311.03372},
  eprinttype    = {arXiv},
  eprint       = {2311.03372},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-03372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/KulikDLMSTW22,
  author       = {Tomas Kulik and
                  Brijesh Dongol and
                  Peter Gorm Larsen and
                  Hugo Daniel Macedo and
                  Steve Schneider and
                  Peter W. V. Tran{-}J{\o}rgensen and
                  Jim Woodcock},
  title        = {A Survey of Practical Formal Methods for Security},
  journal      = {Formal Aspects Comput.},
  volume       = {34},
  number       = {1},
  pages        = {1--39},
  year         = {2022},
  url          = {https://doi.org/10.1145/3522582},
  doi          = {10.1145/3522582},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fac/KulikDLMSTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/AdriaensenBSAEL22,
  author       = {Steven Adriaensen and
                  Andr{\'{e}} Biedenkapp and
                  Gresa Shala and
                  Noor H. Awad and
                  Theresa Eimer and
                  Marius Lindauer and
                  Frank Hutter},
  title        = {Automated Dynamic Algorithm Configuration},
  journal      = {J. Artif. Intell. Res.},
  volume       = {75},
  pages        = {1633--1699},
  year         = {2022},
  url          = {https://doi.org/10.1613/jair.1.13922},
  doi          = {10.1613/JAIR.1.13922},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jair/AdriaensenBSAEL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LorenzenRRSBFS22,
  author       = {Steven Robert Lorenzen and
                  Henrik Riedel and
                  Maximilian Michael Rupp and
                  Leon Schmeiser and
                  Hagen Berthold and
                  Andrei Firus and
                  Jens Schneider},
  title        = {Virtual Axle Detector Based on Analysis of Bridge Acceleration Measurements
                  by Fully Convolutional Network},
  journal      = {Sensors},
  volume       = {22},
  number       = {22},
  pages        = {8963},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22228963},
  doi          = {10.3390/S22228963},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LorenzenRRSBFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/HossainHSJKV22,
  author       = {Md. Arafat Hossain and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Jiaojiao Jiang and
                  Muhammad Ashad Kabir and
                  Steve Versteeg},
  title        = {Extracting Formats of Service Messages with Varying Payloads},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {3},
  pages        = {71:1--71:31},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503159},
  doi          = {10.1145/3503159},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/HossainHSJKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/Perez-Pellitero22,
  author       = {Eduardo P{\'{e}}rez{-}Pellitero and
                  Sibi Catley{-}Chandar and
                  Richard Shaw and
                  Ales Leonardis and
                  Radu Timofte and
                  Zexin Zhang and
                  Cen Liu and
                  Yunbo Peng and
                  Yue Lin and
                  Gaocheng Yu and
                  Jin Zhang and
                  Zhe Ma and
                  Hongbin Wang and
                  Xiangyu Chen and
                  Xintao Wang and
                  Haiwei Wu and
                  Lin Liu and
                  Chao Dong and
                  Jiantao Zhou and
                  Qingsen Yan and
                  Song Zhang and
                  Weiye Chen and
                  Yuhang Liu and
                  Zhen Zhang and
                  Yanning Zhang and
                  Javen Qinfeng Shi and
                  Dong Gong and
                  Dan Zhu and
                  Mengdi Sun and
                  Guannan Chen and
                  Yang Hu and
                  Haowei Li and
                  Baozhu Zou and
                  Zhen Liu and
                  Wenjie Lin and
                  Ting Jiang and
                  Chengzhi Jiang and
                  Xinpeng Li and
                  Mingyan Han and
                  Haoqiang Fan and
                  Jian Sun and
                  Shuaicheng Liu and
                  Juan Mar{\'{\i}}n{-}Vega and
                  Michael Sloth and
                  Peter Schneider{-}Kamp and
                  Richard R{\"{o}}ttger and
                  Chunyang Li and
                  Long Bao and
                  Gang He and
                  Ziyao Xu and
                  Li Xu and
                  Gen Zhan and
                  Ming Sun and
                  Xing Wen and
                  Junlin Li and
                  Jinjing Li and
                  Chenghua Li and
                  Ruipeng Gang and
                  Fangya Li and
                  Chenming Liu and
                  Shuang Feng and
                  Fei Lei and
                  Rui Liu and
                  Junxiang Ruan and
                  Tianhong Dai and
                  Wei Li and
                  Zhan Lu and
                  Hengyan Liu and
                  Peian Huang and
                  Guangyu Ren and
                  Yonglin Luo and
                  Chang Liu and
                  Qiang Tu and
                  Sai Ma and
                  Yizhen Cao and
                  Steven Tel and
                  Barthelemy Heyrman and
                  Dominique Ginhac and
                  Chul Lee and
                  Gahyeon Kim and
                  Seonghyun Park and
                  An Gia Vien and
                  Truong Thanh Nhat Mai and
                  Howoon Yoon and
                  Tu Vo and
                  Alexander Holston and
                  Sheir Zaheer and
                  Chan Y. Park},
  title        = {{NTIRE} 2022 Challenge on High Dynamic Range Imaging: Methods and
                  Results},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition Workshops,
                  {CVPR} Workshops 2022, New Orleans, LA, USA, June 19-20, 2022},
  pages        = {1008--1022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPRW56347.2022.00114},
  doi          = {10.1109/CVPRW56347.2022.00114},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/Perez-Pellitero22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miccai/FilipiakSBZPSBB22,
  author       = {Patryk Filipiak and
                  Timothy M. Shepherd and
                  Lee Basler and
                  Anthony Zuccolotto and
                  Dimitris G. Placantonakis and
                  Walter Schneider and
                  Fernando E. Boada and
                  Steven H. Baete},
  editor       = {Suheyla Cetin Karayumak and
                  Daan Christiaens and
                  Matteo Figini and
                  Pamela Guevara and
                  Tomasz Pieciak and
                  Elizabeth Powell and
                  Francois Rheault},
  title        = {Stepwise Stochastic Dictionary Adaptation Improves Microstructure
                  Reconstruction with Orientation Distribution Function Fingerprinting},
  booktitle    = {Computational Diffusion {MRI} - 13th International Workshop, {CDMRI}
                  2022, Held in Conjunction with {MICCAI} 2022, Singapore, Singapore,
                  September 22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13722},
  pages        = {89--100},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21206-2\_8},
  doi          = {10.1007/978-3-031-21206-2\_8},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/miccai/FilipiakSBZPSBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-12633,
  author       = {Eduardo P{\'{e}}rez{-}Pellitero and
                  Sibi Catley{-}Chandar and
                  Richard Shaw and
                  Ales Leonardis and
                  Radu Timofte and
                  Zexin Zhang and
                  Cen Liu and
                  Yunbo Peng and
                  Yue Lin and
                  Gaocheng Yu and
                  Jin Zhang and
                  Zhe Ma and
                  Hongbin Wang and
                  Xiangyu Chen and
                  Xintao Wang and
                  Haiwei Wu and
                  Lin Liu and
                  Chao Dong and
                  Jiantao Zhou and
                  Qingsen Yan and
                  Song Zhang and
                  Weiye Chen and
                  Yuhang Liu and
                  Zhen Zhang and
                  Yanning Zhang and
                  Javen Qinfeng Shi and
                  Dong Gong and
                  Dan Zhu and
                  Mengdi Sun and
                  Guannan Chen and
                  Yang Hu and
                  Haowei Li and
                  Baozhu Zou and
                  Zhen Liu and
                  Wenjie Lin and
                  Ting Jiang and
                  Chengzhi Jiang and
                  Xinpeng Li and
                  Mingyan Han and
                  Haoqiang Fan and
                  Jian Sun and
                  Shuaicheng Liu and
                  Juan Mar{\'{\i}}n{-}Vega and
                  Michael Sloth and
                  Peter Schneider{-}Kamp and
                  Richard R{\"{o}}ttger and
                  Chunyang Li and
                  Long Bao and
                  Gang He and
                  Ziyao Xu and
                  Li Xu and
                  Gen Zhan and
                  Ming Sun and
                  Xing Wen and
                  Junlin Li and
                  Jinjing Li and
                  Chenghua Li and
                  Ruipeng Gang and
                  Fangya Li and
                  Chenming Liu and
                  Shuang Feng and
                  Fei Lei and
                  Rui Liu and
                  Junxiang Ruan and
                  Tianhong Dai and
                  Wei Li and
                  Zhan Lu and
                  Hengyan Liu and
                  Peian Huang and
                  Guangyu Ren and
                  Yonglin Luo and
                  Chang Liu and
                  Qiang Tu and
                  Sai Ma and
                  Yizhen Cao and
                  Steven Tel and
                  Barthelemy Heyrman and
                  Dominique Ginhac and
                  Chul Lee and
                  Gahyeon Kim and
                  Seonghyun Park and
                  An Gia Vien and
                  Truong Thanh Nhat Mai and
                  Howoon Yoon and
                  Tu Vo and
                  Alexander Holston and
                  Sheir Zaheer and
                  Chan Y. Park},
  title        = {{NTIRE} 2022 Challenge on High Dynamic Range Imaging: Methods and
                  Results},
  journal      = {CoRR},
  volume       = {abs/2205.12633},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.12633},
  doi          = {10.48550/ARXIV.2205.12633},
  eprinttype    = {arXiv},
  eprint       = {2205.12633},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-12633.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-13881,
  author       = {Steven Adriaensen and
                  Andr{\'{e}} Biedenkapp and
                  Gresa Shala and
                  Noor H. Awad and
                  Theresa Eimer and
                  Marius Lindauer and
                  Frank Hutter},
  title        = {Automated Dynamic Algorithm Configuration},
  journal      = {CoRR},
  volume       = {abs/2205.13881},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.13881},
  doi          = {10.48550/ARXIV.2205.13881},
  eprinttype    = {arXiv},
  eprint       = {2205.13881},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-13881.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-03758,
  author       = {Steven Robert Lorenzen and
                  Henrik Riedel and
                  Maximilian Michael Rupp and
                  Leon Schmeiser and
                  Hagen Berthold and
                  Andrei Firus and
                  Jens Schneider},
  title        = {Virtual Axle Detector based on Analysis of Bridge Acceleration Measurements
                  by Fully Convolutional Network},
  journal      = {CoRR},
  volume       = {abs/2207.03758},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.03758},
  doi          = {10.48550/ARXIV.2207.03758},
  eprinttype    = {arXiv},
  eprint       = {2207.03758},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-03758.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cp/BeegeNSR21,
  author       = {Maik Beege and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {The effect of signaling in dependence on the extraneous cognitive
                  load in learning environments},
  journal      = {Cogn. Process.},
  volume       = {22},
  number       = {2},
  pages        = {209--225},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10339-020-01002-5},
  doi          = {10.1007/S10339-020-01002-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cp/BeegeNSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cp/BeegeNSR21a,
  author       = {Maik Beege and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {Correction to: The effect of signaling in dependence on the extraneous
                  cognitive load in learning environments},
  journal      = {Cogn. Process.},
  volume       = {22},
  number       = {4},
  pages        = {735},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10339-021-01051-4},
  doi          = {10.1007/S10339-021-01051-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cp/BeegeNSR21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cse/DoerflerGGSS21,
  author       = {Douglas Doerfler and
                  Steven Gottlieb and
                  William Gropp and
                  Barry I. Schneider and
                  Alan Sussman},
  title        = {Performance Portability for Advanced Architectures},
  journal      = {Comput. Sci. Eng.},
  volume       = {23},
  number       = {5},
  pages        = {7--9},
  year         = {2021},
  url          = {https://doi.org/10.1109/MCSE.2021.3104083},
  doi          = {10.1109/MCSE.2021.3104083},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cse/DoerflerGGSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiangSVHHL21,
  author       = {Jiaojiao Jiang and
                  Jean{-}Guy Schneider and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Chengfei Liu},
  title        = {R-gram: Inferring message formats of service protocols with relative
                  positional n-grams},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {196},
  pages        = {103247},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103247},
  doi          = {10.1016/J.JNCA.2021.103247},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/JiangSVHHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanCSTW21,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1836--1849},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2940946},
  doi          = {10.1109/TDSC.2019.2940946},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanCSTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/JamrogaRSSS21,
  author       = {Wojciech Jamroga and
                  Peter Y. A. Ryan and
                  Steve Schneider and
                  Carsten Sch{\"{u}}rmann and
                  Philip B. Stark},
  editor       = {Daniel Dougherty and
                  Jos{\'{e}} Meseguer and
                  Sebastian Alexander M{\"{o}}dersheim and
                  Paul D. Rowe},
  title        = {A Declaration of Software Independence},
  booktitle    = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman
                  on the Occasion of his 66.66th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {13066},
  pages        = {198--217},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91631-2\_11},
  doi          = {10.1007/978-3-030-91631-2\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/JamrogaRSSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eacl/RehmPBHAVBGGCFH21,
  author       = {Georg Rehm and
                  Stelios Piperidis and
                  Kalina Bontcheva and
                  Jan Hajic and
                  Victoria Arranz and
                  Andrejs Vasiljevs and
                  Gerhard Backfried and
                  Jos{\'{e}} Manu{\'{e}}l G{\'{o}}mez{-}P{\'{e}}rez and
                  Ulrich Germann and
                  R{\'{e}}mi Calizzano and
                  Nils Feldhus and
                  Stefanie Hegele and
                  Florian Kintzel and
                  Katrin Marheinecke and
                  Juli{\'{a}}n Moreno Schneider and
                  Dimitris Galanis and
                  Penny Labropoulou and
                  Miltos Deligiannis and
                  Katerina Gkirtzou and
                  Athanasia Kolovou and
                  Dimitris Gkoumas and
                  Leon Voukoutis and
                  Ian Roberts and
                  Jana Hamrlov{\'{a}} and
                  Dusan Varis and
                  Luk{\'{a}}s Kacena and
                  Khalid Choukri and
                  Val{\'{e}}rie Mapelli and
                  Micka{\"{e}}l Rigault and
                  Julija Melnika and
                  Miroslav Janosik and
                  Katja Prinz and
                  Andr{\'{e}}s Garc{\'{\i}}a{-}Silva and
                  Cristian Berrio and
                  Ondrej Klejch and
                  Steve Renals},
  editor       = {Dimitra Gkatzia and
                  Djam{\'{e}} Seddah},
  title        = {European Language Grid: {A} Joint Platform for the European Language
                  Technology Community},
  booktitle    = {Proceedings of the 16th Conference of the European Chapter of the
                  Association for Computational Linguistics: System Demonstrations,
                  {EACL} 2021, Online, April 19-23, 2021},
  pages        = {221--230},
  publisher    = {Association for Computational Linguistics},
  year         = {2021},
  url          = {https://doi.org/10.18653/v1/2021.eacl-demos.26},
  doi          = {10.18653/V1/2021.EACL-DEMOS.26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eacl/RehmPBHAVBGGCFH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/EimerBRAHL21,
  author       = {Theresa Eimer and
                  Andr{\'{e}} Biedenkapp and
                  Maximilian Reimer and
                  Steven Adriaensen and
                  Frank Hutter and
                  Marius Lindauer},
  editor       = {Zhi{-}Hua Zhou},
  title        = {DACBench: {A} Benchmark Library for Dynamic Algorithm Configuration},
  booktitle    = {Proceedings of the Thirtieth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27
                  August 2021},
  pages        = {1668--1674},
  publisher    = {ijcai.org},
  year         = {2021},
  url          = {https://doi.org/10.24963/ijcai.2021/230},
  doi          = {10.24963/IJCAI.2021/230},
  timestamp    = {Wed, 25 Aug 2021 17:11:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/EimerBRAHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iui/SchneiderGLG21,
  author       = {Tobias Schneider and
                  Sabiha Ghellal and
                  Steve Love and
                  Ansgar R. S. Gerlicher},
  editor       = {Tracy Hammond and
                  Katrien Verbert and
                  Dennis Parra and
                  Bart P. Knijnenburg and
                  John O'Donovan and
                  Paul Teale},
  title        = {Increasing the User Experience in Autonomous Driving through different
                  Feedback Modalities},
  booktitle    = {{IUI} '21: 26th International Conference on Intelligent User Interfaces,
                  College Station, TX, USA, April 13-17, 2021},
  pages        = {7--10},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3397481.3450687},
  doi          = {10.1145/3397481.3450687},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iui/SchneiderGLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sui/SchneiderHRLLG21,
  author       = {Tobias Schneider and
                  Joana Hois and
                  Alischa Rosenstein and
                  Raimondo Lazzara and
                  Steve Love and
                  Ansgar R. S. Gerlicher},
  editor       = {Francisco R. Ortega and
                  Robert J. Teather and
                  Gerd Bruder and
                  Thammathip Piumsomboon and
                  Benjamin Weyers and
                  Anil Ufuk Batmaz and
                  Kyle Johnsen and
                  Christoph W. Borst},
  title        = {Velocity Styles for Autonomous Vehicles affecting Control, Safety,
                  and User Experience},
  booktitle    = {{SUI} '21: Symposium on Spatial User Interaction, Virtual Event, USA,
                  November 9-10, 2021},
  pages        = {29:1--29:2},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485279.3485308},
  doi          = {10.1145/3485279.3485308},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sui/SchneiderHRLLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-08541,
  author       = {Theresa Eimer and
                  Andr{\'{e}} Biedenkapp and
                  Maximilian Reimer and
                  Steven Adriaensen and
                  Frank Hutter and
                  Marius Lindauer},
  title        = {DACBench: {A} Benchmark Library for Dynamic Algorithm Configuration},
  journal      = {CoRR},
  volume       = {abs/2105.08541},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.08541},
  eprinttype    = {arXiv},
  eprint       = {2105.08541},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-08541.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-01362,
  author       = {Tomas Kulik and
                  Brijesh Dongol and
                  Peter Gorm Larsen and
                  Hugo Daniel Macedo and
                  Steve Schneider and
                  Peter W{\"{u}}rtz Vinther Tran{-}J{\o}rgensen and
                  Jim Woodcock},
  title        = {A Survey of Practical Formal Methods for Security},
  journal      = {CoRR},
  volume       = {abs/2109.01362},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.01362},
  eprinttype    = {arXiv},
  eprint       = {2109.01362},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-01362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/BeegeNSNSWMR20,
  author       = {Maik Beege and
                  Manuel Ninaus and
                  Sascha Schneider and
                  Steve Nebel and
                  Julia Schlemmel and
                  Jasmin Weidenm{\"{u}}ller and
                  Korbinian Moeller and
                  G{\"{u}}nter Daniel Rey},
  title        = {Investigating the effects of beat and deictic gestures of a lecturer
                  in educational videos},
  journal      = {Comput. Educ.},
  volume       = {156},
  pages        = {103955},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.compedu.2020.103955},
  doi          = {10.1016/J.COMPEDU.2020.103955},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ce/BeegeNSNSWMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/BeegeSNR20,
  author       = {Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  G{\"{u}}nter Daniel Rey},
  title        = {Does the effect of enthusiasm in a pedagogical Agent's voice depend
                  on mental load in the Learner's working memory?},
  journal      = {Comput. Hum. Behav.},
  volume       = {112},
  pages        = {106483},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.chb.2020.106483},
  doi          = {10.1016/J.CHB.2020.106483},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/BeegeSNR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/WilliamsDSM20,
  author       = {David M. Williams and
                  Salaheddin Darwish and
                  Steve Schneider and
                  David R. Michael},
  title        = {Legislation-driven development of a Gift Aid system using Event-B},
  journal      = {Formal Aspects Comput.},
  volume       = {32},
  number       = {2-3},
  pages        = {251--273},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00165-020-00512-5},
  doi          = {10.1007/S00165-020-00512-5},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/WilliamsDSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JiangVHHS20,
  author       = {Jiaojiao Jiang and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Jean{-}Guy Schneider},
  title        = {A positional keyword-based approach to inferring fine-grained message
                  formats},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {102},
  pages        = {369--381},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.08.011},
  doi          = {10.1016/J.FUTURE.2019.08.011},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/JiangVHHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanCSTWW20,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer and
                  Nick Wilson},
  title        = {Anonymous Single Sign-On With Proxy Re-Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {223--236},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2919926},
  doi          = {10.1109/TIFS.2019.2919926},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanCSTWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/accv/GittingsSC20,
  author       = {Thomas Gittings and
                  Steve Schneider and
                  John P. Collomosse},
  editor       = {Hiroshi Ishikawa and
                  Cheng{-}Lin Liu and
                  Tom{\'{a}}s Pajdla and
                  Jianbo Shi},
  title        = {Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks},
  booktitle    = {Computer Vision - {ACCV} 2020 - 15th Asian Conference on Computer
                  Vision, Kyoto, Japan, November 30 - December 4, 2020, Revised Selected
                  Papers, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12625},
  pages        = {235--251},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69538-5\_15},
  doi          = {10.1007/978-3-030-69538-5\_15},
  timestamp    = {Tue, 02 Mar 2021 08:39:09 +0100},
  biburl       = {https://dblp.org/rec/conf/accv/GittingsSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogsci/PittSFGBP20,
  author       = {Benjamin Pitt and
                  Rose M. Schneider and
                  Stephen Ferrigno and
                  Edward Gibson and
                  David Barner and
                  Steven T. Piantadosi},
  editor       = {Stephanie Denison and
                  Michael L. Mack and
                  Yang Xu and
                  Blair C. Armstrong},
  title        = {Procedures and principles of number: Evidence from the Tsimane'},
  booktitle    = {Proceedings of the 42th Annual Meeting of the Cognitive Science Society
                  - Developing a Mind: Learning in Humans, Animals, and Machines, CogSci
                  2020, virtual, July 29 - August 1, 2020},
  publisher    = {cognitivesciencesociety.org},
  year         = {2020},
  url          = {https://cogsci.mindmodeling.org/2020/papers/0872/index.html},
  timestamp    = {Thu, 25 Apr 2024 16:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/cogsci/PittSFGBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/SallalSCDTDRW20,
  author       = {Muntadher Sallal and
                  Steve Schneider and
                  Matthew Casey and
                  Fran{\c{c}}ois Dupressoir and
                  Helen Treharne and
                  Constantin Catalin Dragan and
                  Luke Riley and
                  Phil Wright},
  title        = {Augmenting an Internet Voting System with Selene Verifiability using
                  Permissioned Distributed Ledger},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {1167--1168},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00124},
  doi          = {10.1109/ICDCS47774.2020.00124},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/SallalSCDTDRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/ShalaBAALH20,
  author       = {Gresa Shala and
                  Andr{\'{e}} Biedenkapp and
                  Noor H. Awad and
                  Steven Adriaensen and
                  Marius Lindauer and
                  Frank Hutter},
  editor       = {Thomas B{\"{a}}ck and
                  Mike Preuss and
                  Andr{\'{e}} H. Deutz and
                  Hao Wang and
                  Carola Doerr and
                  Michael T. M. Emmerich and
                  Heike Trautmann},
  title        = {Learning Step-Size Adaptation in {CMA-ES}},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} {XVI} - 16th International
                  Conference, {PPSN} 2020, Leiden, The Netherlands, September 5-9, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12269},
  pages        = {691--706},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58112-1\_48},
  doi          = {10.1007/978-3-030-58112-1\_48},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ppsn/ShalaBAALH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2020-1,
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6},
  doi          = {10.1007/978-3-030-58951-6},
  isbn         = {978-3-030-58950-9},
  timestamp    = {Fri, 02 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2020-2,
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0},
  doi          = {10.1007/978-3-030-59013-0},
  isbn         = {978-3-030-59012-3},
  timestamp    = {Fri, 02 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-08194,
  author       = {Thomas Gittings and
                  Steve A. Schneider and
                  John P. Collomosse},
  title        = {Vax-a-Net: Training-time Defence Against Adversarial Patch Attacks},
  journal      = {CoRR},
  volume       = {abs/2009.08194},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.08194},
  eprinttype    = {arXiv},
  eprint       = {2009.08194},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-08194.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JiangVHHSLF19,
  author       = {Jiaojiao Jiang and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Jean{-}Guy Schneider and
                  Christopher Leckie and
                  Zeinab Farahmandpour},
  title        = {P-Gram: Positional N-Gram for the Clustering of Machine-Generated
                  Messages},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {88504--88516},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2924928},
  doi          = {10.1109/ACCESS.2019.2924928},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JiangVHHSLF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/BeegeNSR19,
  author       = {Maik Beege and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {Social entities in educational videos: Combining the effects of addressing
                  and professionalism},
  journal      = {Comput. Hum. Behav.},
  volume       = {93},
  pages        = {40--52},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.chb.2018.11.051},
  doi          = {10.1016/J.CHB.2018.11.051},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/BeegeNSR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbe/PriesterWKSZASR19,
  author       = {Alan Priester and
                  Holden H. Wu and
                  Pooria Khoshnoodi and
                  Douglas Schneider and
                  Zhaohuan Zhang and
                  Nazanin H. Asvadi and
                  Anthony Sisk and
                  Steven S. Raman and
                  Robert E. Reiter and
                  Warren S. Grundfest and
                  Leonard S. Marks and
                  Shyam Natarajan},
  title        = {Registration Accuracy of Patient-Specific, Three-Dimensional-Printed
                  Prostate Molds for Correlating Pathology With Magnetic Resonance Imaging},
  journal      = {{IEEE} Trans. Biomed. Eng.},
  volume       = {66},
  number       = {1},
  pages        = {14--22},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBME.2018.2828304},
  doi          = {10.1109/TBME.2018.2828304},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbe/PriesterWKSZASR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmvc/GittingsSC19,
  author       = {Thomas Gittings and
                  Steve A. Schneider and
                  John P. Collomosse},
  title        = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image
                  Prior},
  booktitle    = {30th British Machine Vision Conference 2019, {BMVC} 2019, Cardiff,
                  UK, September 9-12, 2019},
  pages        = {283},
  publisher    = {{BMVA} Press},
  year         = {2019},
  url          = {https://bmvc2019.org/wp-content/uploads/papers/0165-paper.pdf},
  timestamp    = {Wed, 03 Feb 2021 08:35:59 +0100},
  biburl       = {https://dblp.org/rec/conf/bmvc/GittingsSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/WhitefieldCSSTW19,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Ralf Sasse and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {A Symbolic Analysis of ECC-Based Direct Anonymous Attestation},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {127--141},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00019},
  doi          = {10.1109/EUROSP.2019.00019},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/WhitefieldCSSTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019-1,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0},
  doi          = {10.1007/978-3-030-29959-0},
  isbn         = {978-3-030-29958-3},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019-2,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0},
  doi          = {10.1007/978-3-030-29962-0},
  isbn         = {978-3-030-29961-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01996,
  author       = {Thomas Gittings and
                  Steve A. Schneider and
                  John P. Collomosse},
  title        = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image
                  Prior},
  journal      = {CoRR},
  volume       = {abs/1907.01996},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01996},
  eprinttype    = {arXiv},
  eprint       = {1907.01996},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-00288,
  author       = {Muntadher Sallal and
                  Steve A. Schneider and
                  Matthew Casey and
                  Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Luke Riley and
                  Helen Treharne and
                  Joe Wadsworth and
                  Phil Wright},
  title        = {{VMV:} Augmenting an Internet Voting System with Selene Verifiability},
  journal      = {CoRR},
  volume       = {abs/1912.00288},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.00288},
  eprinttype    = {arXiv},
  eprint       = {1912.00288},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-00288.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aci/LaneMAGKSL18,
  author       = {Steven R. Lane and
                  Holly Miller and
                  Elizabeth Ames and
                  Lawrence Garber and
                  David C. Kibbe and
                  Joseph Schneider and
                  Christoph U. Lehmann},
  title        = {Consensus Statement: Feature and Function Recommendations to Optimize
                  Clinician Usability of Direct Interoperability to Enhance Patient
                  Care},
  journal      = {Appl. Clin. Inform.},
  volume       = {09},
  number       = {01},
  pages        = {205--220},
  year         = {2018},
  url          = {https://doi.org/10.1055/s-0038-1637007},
  doi          = {10.1055/S-0038-1637007},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aci/LaneMAGKSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/BeegeSNHR18,
  author       = {Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  Alexandra H{\"{a}}{\ss}ler and
                  G{\"{u}}nter Daniel Rey},
  title        = {Mood-affect congruency. Exploring the relation between learners' mood
                  and the affective charge of educational videos},
  journal      = {Comput. Educ.},
  volume       = {123},
  pages        = {85--96},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compedu.2018.05.001},
  doi          = {10.1016/J.COMPEDU.2018.05.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ce/BeegeSNHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HanCSTW18,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Anonymous Single-Sign-On for n Designated Services with Traceability},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {470--490},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_23},
  doi          = {10.1007/978-3-319-99073-6\_23},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HanCSTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/WendlandHSU18,
  author       = {Marc{-}Florian Wendland and
                  Niels Hoppe and
                  Martin A. Schneider and
                  Steven Ulrich},
  title        = {Extending the {UML} Testing Profile with a Fine-Grained Test Logging
                  Model},
  booktitle    = {2018 {IEEE} International Conference on Software Testing, Verification
                  and Validation Workshops, {ICST} Workshops, V{\"{a}}ster{\aa}s,
                  Sweden, April 9-13, 2018},
  pages        = {257--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSTW.2018.00058},
  doi          = {10.1109/ICSTW.2018.00058},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/WendlandHSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HossainVHKJS18,
  author       = {Md. Arafat Hossain and
                  Steve Versteeg and
                  Jun Han and
                  Muhammad Ashad Kabir and
                  Jiaojiao Jiang and
                  Jean{-}Guy Schneider},
  editor       = {Rocco Oliveto and
                  Massimiliano Di Penta and
                  David C. Shepherd},
  title        = {Mining accurate message formats for service APIs},
  booktitle    = {25th International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018},
  pages        = {266--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SANER.2018.8330215},
  doi          = {10.1109/SANER.2018.8330215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/HossainVHKJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2018,
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8},
  doi          = {10.1007/978-3-319-99136-8},
  isbn         = {978-3-319-99135-1},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-07201,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Anonymous Single-Sign-On for n designated services with traceability},
  journal      = {CoRR},
  volume       = {abs/1804.07201},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.07201},
  eprinttype    = {arXiv},
  eprint       = {1804.07201},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-07201.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-07642,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer and
                  Nick Wilson},
  title        = {Anonymous Single Sign-on with Proxy Re-Verification},
  journal      = {CoRR},
  volume       = {abs/1811.07642},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.07642},
  eprinttype    = {arXiv},
  eprint       = {1811.07642},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-07642.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/NebelSBR17,
  author       = {Steve Nebel and
                  Sascha Schneider and
                  Maik Beege and
                  G{\"{u}}nter Daniel Rey},
  title        = {Leaderboards within educational videogames: The impact of difficulty,
                  effort and gameplay},
  journal      = {Comput. Educ.},
  volume       = {113},
  pages        = {28--41},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.compedu.2017.05.011},
  doi          = {10.1016/J.COMPEDU.2017.05.011},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ce/NebelSBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/BeegeSNMR17,
  author       = {Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  Jessica Mittangk and
                  G{\"{u}}nter Daniel Rey},
  title        = {Ageism - Age coherence within learning material fosters learning},
  journal      = {Comput. Hum. Behav.},
  volume       = {75},
  pages        = {510--519},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.chb.2017.05.042},
  doi          = {10.1016/J.CHB.2017.05.042},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/BeegeSNMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuHSHV17,
  author       = {Jian Yu and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Cameron M. Hine and
                  Steve Versteeg},
  title        = {A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise
                  Software Systems},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {1},
  pages        = {27--44},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxw055},
  doi          = {10.1093/COMJNL/BXW055},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YuHSHV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenalohRST17,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {A Vote of Confidence?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {3},
  pages        = {12--13},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.53},
  doi          = {10.1109/MSP.2017.53},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenalohRST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/DalanSWSV17,
  author       = {Rinita Dalan and
                  Jay Sturdevant and
                  Rebecca Wallace and
                  Blair Schneider and
                  Steven De Vore},
  title        = {Cutbank Geophysics: {A} New Method for Expanding Magnetic Investigations
                  to the Subsurface Using Magnetic Susceptibility Testing at an Awatixa
                  Hidatsa Village, North Dakota},
  journal      = {Remote. Sens.},
  volume       = {9},
  number       = {2},
  pages        = {112},
  year         = {2017},
  url          = {https://doi.org/10.3390/rs9020112},
  doi          = {10.3390/RS9020112},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/DalanSWSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candc/AndolinaSCKJD17,
  author       = {Salvatore Andolina and
                  Hendrik Schneider and
                  Joel Chan and
                  Khalil Klouche and
                  Giulio Jacucci and
                  Steven Dow},
  editor       = {David A. Shamma and
                  Jude Yew and
                  Brian P. Bailey},
  title        = {Crowdboard: Augmenting In-Person Idea Generation with Real-Time Crowds},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGCHI} Conference on Creativity and
                  Cognition, C{\&}C 2017, Singapore, June 27 - 30, 2017},
  pages        = {106--118},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3059454.3059477},
  doi          = {10.1145/3059454.3059477},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/candc/AndolinaSCKJD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cri/MilosevicGCDLSN17,
  author       = {Nikola Milosevic and
                  Anay Gupta and
                  Austin Chen and
                  Steven DeMarco and
                  Joshua P. Le and
                  Jodi Schneider and
                  Yifan Ning and
                  Goran Nenadic and
                  Richard D. Boyce},
  title        = {Extraction of Drug-Drug Interactions from Drug Product Labeling Tables},
  booktitle    = {Summit on Clinical Research Informatics, {CRI} 2017, San Francisco,
                  CA, USA, March 27-30, 2017},
  publisher    = {{AMIA}},
  year         = {2017},
  url          = {http://knowledge.amia.org/amia-64484-cri2017-1.3520710/t004-1.3521377/t004-1.3521378/a120-1.3521454/a121-1.3521451},
  timestamp    = {Wed, 20 Jun 2018 17:09:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cri/MilosevicGCDLSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/WhitefieldCKPST17,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Frank Kargl and
                  Andrew Paverd and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Formal Analysis of {V2X} Revocation Protocols},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_10},
  doi          = {10.1007/978-3-319-68063-7\_10},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/WhitefieldCKPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/WhitefieldCGST17,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Thanassis Giannetsos and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Privacy-enhanced capabilities for VANETs using direct anonymous attestation},
  booktitle    = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy,
                  November 27-29, 2017},
  pages        = {123--130},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/VNC.2017.8275615},
  doi          = {10.1109/VNC.2017.8275615},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vnc/WhitefieldCGST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifm/2017,
  editor       = {Nadia Polikarpova and
                  Steve A. Schneider},
  title        = {Integrated Formal Methods - 13th International Conference, {IFM} 2017,
                  Turin, Italy, September 20-22, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10510},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66845-1},
  doi          = {10.1007/978-3-319-66845-1},
  isbn         = {978-3-319-66844-4},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HanCST17,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {{PPETS-FGP:} Privacy-Preserving Electronic Ticket Scheme with Fine-Grained
                  Pricing},
  journal      = {CoRR},
  volume       = {abs/1706.03016},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.03016},
  eprinttype    = {arXiv},
  eprint       = {1706.03016},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HanCST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WhitefieldCKPST17,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Frank Kargl and
                  Andrew Paverd and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  title        = {Formal Analysis of {V2X} Revocation Protocols},
  journal      = {CoRR},
  volume       = {abs/1704.07216},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.07216},
  eprinttype    = {arXiv},
  eprint       = {1704.07216},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WhitefieldCKPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/f1000research/JimenezKABBBCHC17,
  author       = {Rafael C. Jim{\'{e}}nez and
                  Mateusz Kuzak and
                  Monther Alhamdoosh and
                  Michelle Barker and
                  B{\'{e}}r{\'{e}}nice Batut and
                  Mikael Borg and
                  Salvador Capella{-}Guti{\'{e}}rrez and
                  Neil P. Chue Hong and
                  Martin Cook and
                  Manuel Corpas and
                  Madison Flannery and
                  Leyla J. Garc{\'{\i}}a and
                  Josep Lluis Gelp{\'{\i}} and
                  Simon L. Gladman and
                  Carole A. Goble and
                  Montserrat Gonz{\'{a}}lez Ferreiro and
                  Alejandra N. Gonz{\'{a}}lez{-}Beltr{\'{a}}n and
                  Philippa C. Griffin and
                  Bj{\"{o}}rn A. Gr{\"{u}}ning and
                  Jonas Hagberg and
                  Petr Holub and
                  Rob W. W. Hooft and
                  Jon C. Ison and
                  Daniel S. Katz and
                  Brane Leskosek and
                  Federico L{\'{o}}pez{-}G{\'{o}}mez and
                  Luis J. Oliveira and
                  David Mellor and
                  Rowland Mosbergen and
                  Nicola J. Mulder and
                  Yasset P{\'{e}}rez{-}Riverol and
                  Robert Pergl and
                  Horst Pichler and
                  Bernard J. Pope and
                  Ferran Sanz and
                  Maria Victoria Schneider and
                  Victoria Stodden and
                  Radoslaw Suchecki and
                  Radka Svobodov{\'{a}} Varekov{\'{a}} and
                  Harry{-}Anton Talvik and
                  Ilian T. Todorov and
                  Andrew E. Treloar and
                  Sonika Tyagi and
                  Maarten van Gompel and
                  Daniel Vaughan and
                  Allegra Via and
                  Xiaochuan Wang and
                  Nathan S. Watson{-}Haigh and
                  Steve Crouch},
  title        = {Four simple recommendations to encourage best practices in research
                  software},
  journal      = {F1000Research},
  volume       = {6},
  pages        = {876},
  year         = {2017},
  url          = {https://doi.org/10.12688/f1000research.11407.1},
  doi          = {10.12688/F1000RESEARCH.11407.1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/f1000research/JimenezKABBBCHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/WirzbergerBSNR16,
  author       = {Maria Wirzberger and
                  Maik Beege and
                  Sascha Schneider and
                  Steve Nebel and
                  G{\"{u}}nter Daniel Rey},
  title        = {One for all?! Simultaneous examination of load-inducing factors for
                  advancing media-related instructional research},
  journal      = {Comput. Educ.},
  volume       = {100},
  pages        = {18--31},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.compedu.2016.04.010},
  doi          = {10.1016/J.COMPEDU.2016.04.010},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ce/WirzbergerBSNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/NebelBSR16,
  author       = {Steve Nebel and
                  Maik Beege and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {The higher the score, the higher the learning outcome? Heterogeneous
                  impacts of leaderboards and choice within educational videogames},
  journal      = {Comput. Hum. Behav.},
  volume       = {65},
  pages        = {391--401},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.chb.2016.08.042},
  doi          = {10.1016/J.CHB.2016.08.042},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/NebelBSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/NebelSR16,
  author       = {Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {From duels to classroom competition: Social competition and learning
                  in educational videogames within different group sizes},
  journal      = {Comput. Hum. Behav.},
  volume       = {55},
  pages        = {384--398},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.chb.2015.09.035},
  doi          = {10.1016/J.CHB.2015.09.035},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/NebelSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/SkulmowskiAPNSR16,
  author       = {Alexander Skulmowski and
                  Yannik Augustin and
                  Simon Pradel and
                  Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {The negative impact of saturation on website trustworthiness and appeal:
                  {A} temporal model of aesthetic website perception},
  journal      = {Comput. Hum. Behav.},
  volume       = {61},
  pages        = {386--393},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.chb.2016.03.054},
  doi          = {10.1016/J.CHB.2016.03.054},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/SkulmowskiAPNSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ets/NebelSR16,
  author       = {Steve Nebel and
                  Sascha Schneider and
                  G{\"{u}}nter Daniel Rey},
  title        = {Mining Learning and Crafting Scientific Experiments: {A} Literature
                  Review on the Use of Minecraft in Education and Research},
  journal      = {J. Educ. Technol. Soc.},
  volume       = {19},
  number       = {2},
  pages        = {355--366},
  year         = {2016},
  url          = {https://www.j-ets.net/ETS/journals/19\_2/26.pdf},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ets/NebelSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/HoangSTW16,
  author       = {Thai Son Hoang and
                  Steve A. Schneider and
                  Helen Treharne and
                  David M. Williams},
  title        = {Foundations for using linear temporal logic in Event-B refinement},
  journal      = {Formal Aspects Comput.},
  volume       = {28},
  number       = {6},
  pages        = {909--935},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00165-016-0376-0},
  doi          = {10.1007/S00165-016-0376-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/HoangSTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BurtonCS16,
  author       = {Craig Burton and
                  Chris Culnane and
                  Steve A. Schneider},
  title        = {vVote: Verifiable Electronic Voting in Practice},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {64--73},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.69},
  doi          = {10.1109/MSP.2016.69},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BurtonCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/MoranHS16,
  author       = {Murat Moran and
                  James Heather and
                  Steve A. Schneider},
  title        = {Automated anonymity verification of the ThreeBallot and {VAV} voting
                  systems},
  journal      = {Softw. Syst. Model.},
  volume       = {15},
  number       = {4},
  pages        = {1049--1062},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10270-014-0445-x},
  doi          = {10.1007/S10270-014-0445-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/MoranHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpp/SchaferSS16,
  author       = {Steven Sch{\"{a}}fer and
                  Sigurd Schneider and
                  Gert Smolka},
  editor       = {Jeremy Avigad and
                  Adam Chlipala},
  title        = {Axiomatic semantics for compiler verification},
  booktitle    = {Proceedings of the 5th {ACM} {SIGPLAN} Conference on Certified Programs
                  and Proofs, Saint Petersburg, FL, USA, January 20-22, 2016},
  pages        = {188--196},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2854065.2854083},
  doi          = {10.1145/2854065.2854083},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpp/SchaferSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/HineSHV16,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steve Versteeg},
  title        = {Enterprise software service emulation: constructing large-scale testbeds},
  booktitle    = {Proceedings of the International Workshop on Continuous Software Evolution
                  and Delivery, CSED@ICSE 2016, Austin, Texas, USA, May 14-22, 2016},
  pages        = {56--62},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2896941.2896947},
  doi          = {10.1145/2896941.2896947},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/HineSHV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/VersteegDBSGH16,
  author       = {Steve Versteeg and
                  Miao Du and
                  John Bird and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han},
  title        = {Enhanced playback of automated service emulation models using entropy
                  analysis},
  booktitle    = {Proceedings of the International Workshop on Continuous Software Evolution
                  and Delivery, CSED@ICSE 2016, Austin, Texas, USA, May 14-22, 2016},
  pages        = {49--55},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2896941.2896950},
  doi          = {10.1145/2896941.2896950},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/VersteegDBSGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/VersteegDSGHG16,
  author       = {Steven Versteeg and
                  Miao Du and
                  Jean{-}Guy Schneider and
                  John Grundy and
                  Jun Han and
                  Menka Goyal},
  editor       = {Laura K. Dillon and
                  Willem Visser and
                  Laurie A. Williams},
  title        = {Opaque service virtualisation: a practical tool for emulating endpoint
                  systems},
  booktitle    = {Proceedings of the 38th International Conference on Software Engineering,
                  {ICSE} 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume},
  pages        = {202--211},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2889160.2889242},
  doi          = {10.1145/2889160.2889242},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/VersteegDSGHG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/p/SchneiderTW16,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  David M. Williams},
  editor       = {Luigia Petre and
                  Emil Sekerinski},
  title        = {Event-B and Linear Temporal Logic},
  booktitle    = {From Action Systems to Distributed Systems - The Refinement Approach},
  pages        = {113--123},
  publisher    = {Chapman and Hall/CRC},
  year         = {2016},
  url          = {https://doi.org/10.1201/b20053-12},
  doi          = {10.1201/B20053-12},
  timestamp    = {Tue, 16 May 2017 14:01:47 +0200},
  biburl       = {https://dblp.org/rec/books/crc/p/SchneiderTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5},
  doi          = {10.1007/978-3-319-39555-5},
  isbn         = {978-3-319-39554-8},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HineSHV16,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steve Versteeg},
  title        = {Enterprise Software Service Emulation: Constructing Large-Scale Testbeds},
  journal      = {CoRR},
  volume       = {abs/1605.06729},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.06729},
  eprinttype    = {arXiv},
  eprint       = {1605.06729},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HineSHV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchneiderMV16,
  author       = {Jean{-}Guy Schneider and
                  Peter Mandile and
                  Steve Versteeg},
  title        = {Generalized Suffix Tree based Multiple Sequence Alignment for Service
                  Virtualization},
  journal      = {CoRR},
  volume       = {abs/1606.01593},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01593},
  eprinttype    = {arXiv},
  eprint       = {1606.01593},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SchneiderMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VersteegDBSGH16,
  author       = {Steve Versteeg and
                  Miao Du and
                  John Bird and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han},
  title        = {Enhanced Playback of Automated Service Emulation Models Using Entropy
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/1605.06668},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.06668},
  eprinttype    = {arXiv},
  eprint       = {1605.06668},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VersteegDBSGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VersteegDSGHG16,
  author       = {Steve Versteeg and
                  Miao Du and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han and
                  Menka Goyal},
  title        = {Opaque Service Virtualisation: {A} Practical Tool for Emulating Endpoint
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1605.06670},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.06670},
  eprinttype    = {arXiv},
  eprint       = {1605.06670},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VersteegDSGHG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cars/SongTTJBSGDOHC15,
  author       = {Yi Song and
                  Johannes Totz and
                  Steve Thompson and
                  Stian Flage Johnsen and
                  Dean C. Barratt and
                  Crispin Schneider and
                  Kurinchi Gurusamy and
                  Brian R. Davidson and
                  S{\'{e}}bastien Ourselin and
                  David J. Hawkes and
                  Matthew J. Clarkson},
  title        = {Locally rigid, vessel-based registration for laparoscopic liver surgery},
  journal      = {Int. J. Comput. Assist. Radiol. Surg.},
  volume       = {10},
  number       = {12},
  pages        = {1951--1961},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11548-015-1236-8},
  doi          = {10.1007/S11548-015-1236-8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cars/SongTTJBSGDOHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/SchneiderNPR15,
  author       = {Sascha Schneider and
                  Steve Nebel and
                  Simon Pradel and
                  G{\"{u}}nter Daniel Rey},
  title        = {Introducing the familiarity mechanism: {A} unified explanatory approach
                  for the personalization effect and the examination of youth slang
                  in multimedia learning},
  journal      = {Comput. Hum. Behav.},
  volume       = {43},
  pages        = {129--138},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.chb.2014.10.052},
  doi          = {10.1016/J.CHB.2014.10.052},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/SchneiderNPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/SchneiderNPR15a,
  author       = {Sascha Schneider and
                  Steve Nebel and
                  Simon Pradel and
                  G{\"{u}}nter Daniel Rey},
  title        = {Mind your Ps and Qs! How polite instructions affect learning with
                  multimedia},
  journal      = {Comput. Hum. Behav.},
  volume       = {51},
  pages        = {546--555},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.chb.2015.05.025},
  doi          = {10.1016/J.CHB.2015.05.025},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/SchneiderNPR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RyanST15,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {End-to-End Verifiability in Voting Systems, from Theory to Practice},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {59--62},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.54},
  doi          = {10.1109/MSP.2015.54},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RyanST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AlshehriS15,
  author       = {Abdullah Ali Alshehri and
                  Steve A. Schneider},
  title        = {A formal framework for security analysis of {NFC} mobile coupon protocols},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {685--707},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-150531},
  doi          = {10.3233/JCS-150531},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AlshehriS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/SchneiderT15,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {Special issue on Automated Verification of Critical Systems (AVoCS
                  2013)},
  journal      = {Sci. Comput. Program.},
  volume       = {111},
  pages        = {213},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.scico.2015.08.006},
  doi          = {10.1016/J.SCICO.2015.08.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/SchneiderT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/DuVSHG15,
  author       = {Miao Du and
                  Steven Versteeg and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  John C. Grundy},
  title        = {Interaction Traces Mining for Efficient System Responses Generation},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {40},
  number       = {1},
  pages        = {1--8},
  year         = {2015},
  url          = {https://doi.org/10.1145/2693208.2693221},
  doi          = {10.1145/2693208.2693221},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/DuVSHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CulnaneRST15,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: {A} Verifiable Voting System},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {3:1--3:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746338},
  doi          = {10.1145/2746338},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aswec/SchneiderMV15,
  author       = {Jean{-}Guy Schneider and
                  Peter Mandile and
                  Steven Versteeg},
  title        = {Generalized Suffix Tree Based Multiple Sequence Alignment for Service
                  Virtualization},
  booktitle    = {24th Australasian Software Engineering Conference, {ASWEC} 2015, Adelaide,
                  SA, Australia, September 28 - October 1, 2015},
  pages        = {48--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ASWEC.2015.13},
  doi          = {10.1109/ASWEC.2015.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aswec/SchneiderMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BurtonCS15,
  author       = {Craig Burton and
                  Chris Culnane and
                  Steve A. Schneider},
  title        = {Secure and Verifiable Electronic Voting in Practice: the use of vVote
                  in the Victorian State Election},
  journal      = {CoRR},
  volume       = {abs/1504.07098},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.07098},
  eprinttype    = {arXiv},
  eprint       = {1504.07098},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BurtonCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DuVSGH15,
  author       = {Miao Du and
                  Steven Versteeg and
                  Jean{-}Guy Schneider and
                  John C. Grundy and
                  Jun Han},
  title        = {From Network Traces to System Responses: Opaquely Emulating Software
                  Services},
  journal      = {CoRR},
  volume       = {abs/1510.01421},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.01421},
  eprinttype    = {arXiv},
  eprint       = {1510.01421},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DuVSGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchiobergSSUF15,
  author       = {Doris Schi{\"{o}}berg and
                  Fabian Schneider and
                  Stefan Schmid and
                  Steve Uhlig and
                  Anja Feldmann},
  title        = {Evolution of Directed Triangle Motifs in the Google+ {OSN}},
  journal      = {CoRR},
  volume       = {abs/1502.04321},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.04321},
  eprinttype    = {arXiv},
  eprint       = {1502.04321},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SchiobergSSUF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/NordboLLNALSMGTTLSRSOV14,
  author       = {{\O}yvind Nordb{\o} and
                  Pablo Lamata and
                  Sander Land and
                  Steven A. Niederer and
                  Jan M. Aronsen and
                  William E. Louch and
                  Ivar Sjaastad and
                  Harald Martens and
                  Arne B. Gjuvsland and
                  Kristin T{\o}ndel and
                  Hans Torp and
                  Ma{\'{e}}l{\`{e}}ne Lohezic and
                  J{\"{u}}rgen E. Schneider and
                  Espen W. Remme and
                  Nicolas Smith and
                  Stig W. Omholt and
                  Jon Olav Vik},
  title        = {A computational pipeline for quantification of mouse myocardial stiffness
                  parameters},
  journal      = {Comput. Biol. Medicine},
  volume       = {53},
  pages        = {65--75},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.compbiomed.2014.07.013},
  doi          = {10.1016/J.COMPBIOMED.2014.07.013},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cbm/NordboLLNALSMGTTLSRSOV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/BrowneDPBHJFSGGGPSIBWCYMLW14,
  author       = {James C. Browne and
                  Robert L. DeLeon and
                  Abani K. Patra and
                  William L. Barth and
                  John L. Hammond and
                  Matthew D. Jones and
                  Thomas R. Furlani and
                  Barry I. Schneider and
                  Steven M. Gallo and
                  Amin Ghadersohi and
                  Ryan J. Gentner and
                  Jeffrey T. Palmer and
                  Nikolay Simakov and
                  Martins Innus and
                  Andrew E. Bruno and
                  Joseph P. White and
                  Cynthia D. Cornelius and
                  Thomas Yearke and
                  Kyle Marcus and
                  Gregor von Laszewski and
                  Fugang Wang},
  title        = {Comprehensive, open-source resource usage measurement and analysis
                  for {HPC} systems},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {26},
  number       = {13},
  pages        = {2191--2209},
  year         = {2014},
  url          = {https://doi.org/10.1002/cpe.3245},
  doi          = {10.1002/CPE.3245},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/BrowneDPBHJFSGGGPSIBWCYMLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/BoitenS14,
  author       = {Eerke A. Boiten and
                  Steve A. Schneider},
  title        = {Editorial},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00165-013-0290-7},
  doi          = {10.1007/S00165-013-0290-7},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/BoitenS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/HeatherST14,
  author       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Cryptographic protocols with everyday objects},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {37--62},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00165-013-0274-7},
  doi          = {10.1007/S00165-013-0274-7},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/HeatherST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/MoranHS14,
  author       = {Murat Moran and
                  James Heather and
                  Steve A. Schneider},
  title        = {Verifying anonymity in voting systems using {CSP}},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {63--98},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00165-012-0268-x},
  doi          = {10.1007/S00165-012-0268-X},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/MoranHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/SchneiderTW14,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  title        = {The behavioural semantics of Event-B refinement},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {2},
  pages        = {251--280},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00165-012-0265-0},
  doi          = {10.1007/S00165-012-0265-0},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/SchneiderTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchneiderTCH14,
  author       = {Steve A. Schneider and
                  Vanessa Teague and
                  Chris Culnane and
                  James Heather},
  title        = {Special Section on Vote-ID 2013},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {103--104},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.06.002},
  doi          = {10.1016/J.JISA.2014.06.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SchneiderTCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/JamesMNRST14,
  author       = {Phillip James and
                  Faron Moller and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {On modelling and verifying railway interlockings: Tracking train lengths},
  journal      = {Sci. Comput. Program.},
  volume       = {96},
  pages        = {315--336},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.scico.2014.04.005},
  doi          = {10.1016/J.SCICO.2014.04.005},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/JamesMNRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/JamesMNRST14,
  author       = {Phillip James and
                  Faron Moller and
                  Nguyen Hoang Nga and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Techniques for modelling and verifying railway interlockings},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {16},
  number       = {6},
  pages        = {685--711},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10009-014-0304-7},
  doi          = {10.1007/S10009-014-0304-7},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/JamesMNRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/HeHYJSV14,
  author       = {Qiang He and
                  Jun Han and
                  Yun Yang and
                  Hai Jin and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Formulating Cost-Effective Monitoring Strategies for Service-Based
                  Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {40},
  number       = {5},
  pages        = {461--482},
  year         = {2014},
  url          = {https://doi.org/10.1109/TSE.2013.48},
  doi          = {10.1109/TSE.2013.48},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/HeHYJSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogsci/DavenportKHS14,
  author       = {Jodi L. Davenport and
                  Yvonne Kao and
                  Aleata Hubbard and
                  Steven Schneider},
  editor       = {Paul Bello and
                  Marcello Guarini and
                  Marjorie McShane and
                  Brian Scassellati},
  title        = {Testing Cognitive Science Principles in a Middle School Mathematics
                  Curriculum},
  booktitle    = {Proceedings of the 36th Annual Meeting of the Cognitive Science Society,
                  CogSci 2014, Quebec City, Canada, July 23-26, 2014},
  publisher    = {cognitivesciencesociety.org},
  year         = {2014},
  url          = {https://escholarship.org/uc/item/8f31r6jv},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cogsci/DavenportKHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CulnaneS14,
  author       = {Chris Culnane and
                  Steve A. Schneider},
  title        = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {169--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.20},
  doi          = {10.1109/CSF.2014.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CulnaneS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icls/LonnBPPSRS14,
  author       = {Steven Lonn and
                  Christopher Brooks and
                  Zachary A. Pardos and
                  Barry W. Peddycord III and
                  Emily Schneider and
                  Ido Roll and
                  Ashley Shaw},
  editor       = {William R. Penuel and
                  A. Susan Jurow and
                  Kevin O'Connor},
  title        = {MOOCShop 2014},
  booktitle    = {Learning and Becoming in Practice: Proceedings of the 11th International
                  Conference of the Learning Sciences, {ICLS} 2014, Boulder, Colorado,
                  USA, June 23-27, 2014},
  publisher    = {International Society of the Learning Sciences},
  year         = {2014},
  url          = {https://repository.isls.org/handle/1/1099},
  timestamp    = {Wed, 05 May 2021 10:29:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icls/LonnBPPSRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/SchneiderTWW14,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim and
                  David M. Williams},
  editor       = {Elvira Albert and
                  Emil Sekerinski},
  title        = {Managing {LTL} Properties in Event-B Refinement},
  booktitle    = {Integrated Formal Methods - 11th International Conference, {IFM} 2014,
                  Bertinoro, Italy, September 9-11, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8739},
  pages        = {221--237},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10181-1\_14},
  doi          = {10.1007/978-3-319-10181-1\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/SchneiderTWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/WuSRR14,
  author       = {John Wu and
                  Steven Schneider and
                  Ranga S. Ramanujan and
                  Matthew Rambo},
  title        = {{ADNS} IPv6 Transition Architecture and Analysis},
  booktitle    = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore,
                  MD, USA, October 6-8, 2014},
  pages        = {1167--1172},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MILCOM.2014.196},
  doi          = {10.1109/MILCOM.2014.196},
  timestamp    = {Fri, 16 Sep 2022 20:28:33 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/WuSRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SrinivasanCHSX14,
  author       = {Sriramkrishnan Srinivasan and
                  Chris Culnane and
                  James Heather and
                  Steve A. Schneider and
                  Zhe Xia},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Countering Ballot Stuffing and Incorporating Eligibility Verifiability
                  in Helios},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {335--348},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_26},
  doi          = {10.1007/978-3-319-11698-3\_26},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/SrinivasanCHSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/StathakidisSH14,
  author       = {Efstathios Stathakidis and
                  Steve A. Schneider and
                  James Heather},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Robustness Modelling and Verification of a Mix Net Protocol},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {131--150},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_9},
  doi          = {10.1007/978-3-319-14054-4\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/StathakidisSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CulnaneHJRST14,
  author       = {Chris Culnane and
                  James Heather and
                  Rui Joaquim and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy
                  Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane},
  timestamp    = {Mon, 01 Feb 2021 08:42:52 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CulnaneHJRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CulnaneRST14,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: a Verifiable Voting System {(DRAFT)}},
  journal      = {CoRR},
  volume       = {abs/1404.6822},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.6822},
  eprinttype    = {arXiv},
  eprint       = {1404.6822},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CulnaneRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CulnaneS14,
  author       = {Chris Culnane and
                  Steve A. Schneider},
  title        = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems},
  journal      = {CoRR},
  volume       = {abs/1401.4151},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.4151},
  eprinttype    = {arXiv},
  eprint       = {1401.4151},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CulnaneS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchneiderTWW14,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim and
                  David M. Williams},
  title        = {Managing {LTL} properties in Event-B refinement},
  journal      = {CoRR},
  volume       = {abs/1406.6622},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.6622},
  eprinttype    = {arXiv},
  eprint       = {1406.6622},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SchneiderTWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ao/NeuhausVBBDDGHLORSSVWY13,
  author       = {Fabian Neuhaus and
                  Amanda Vizedom and
                  Kenneth Baclawski and
                  Mike Bennett and
                  Mike Dean and
                  Michael Denny and
                  Michael Gr{\"{u}}ninger and
                  Ali Hashemi and
                  Terry Longstreth and
                  Leo Obrst and
                  Steve Ray and
                  Ram D. Sriram and
                  Todd Schneider and
                  Marcela Vegetti and
                  Matthew West and
                  Peter Yim},
  title        = {Towards ontology evaluation across the life cycleThe Ontology Summit
                  2013},
  journal      = {Appl. Ontology},
  volume       = {8},
  number       = {3},
  pages        = {179--194},
  year         = {2013},
  url          = {https://doi.org/10.3233/AO-130125},
  doi          = {10.3233/AO-130125},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ao/NeuhausVBBDDGHLORSSVWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bib/Watson-HaighSHKLDDLMMMMQRTS13,
  author       = {Nathan S. Watson{-}Haigh and
                  Catherine A. Shang and
                  Matthias Haimel and
                  Myrto Kostadima and
                  Remco Loos and
                  Nandan Deshpande and
                  Konsta Duesing and
                  Xi Li and
                  Annette McGrath and
                  Sean McWilliam and
                  Simon Michnowicz and
                  Paula Moolhuijzen and
                  Steve Quenette and
                  Jerico Nico De Leon Revote and
                  Sonika Tyagi and
                  Maria Victoria Schneider},
  title        = {Next-generation sequencing: a challenge to meet the increasing demand
                  for training workshops in Australia},
  journal      = {Briefings Bioinform.},
  volume       = {14},
  number       = {5},
  pages        = {563--574},
  year         = {2013},
  url          = {https://doi.org/10.1093/bib/bbt022},
  doi          = {10.1093/BIB/BBT022},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bib/Watson-HaighSHKLDDLMMMMQRTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/AbdelhalimST13,
  author       = {Islam Abdelhalim and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {An integrated framework for checking the behaviour of fUML models
                  using {CSP}},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {15},
  number       = {4},
  pages        = {375--396},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10009-012-0243-0},
  doi          = {10.1007/S10009-012-0243-0},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/AbdelhalimST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HeatherCSSX13,
  author       = {James Heather and
                  Chris Culnane and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Zhe Xia},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Solving the Discrete Logarithm Problem for Packing Candidate Preferences},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {209--221},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_15},
  doi          = {10.1007/978-3-642-40588-4\_15},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HeatherCSSX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AlshehriS13,
  author       = {Abdullah Ali Alshehri and
                  Steve A. Schneider},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Formal Security Analysis and Improvement of a Hash-Based {NFC} M-Coupon
                  Protocol},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {152--167},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_11},
  doi          = {10.1007/978-3-319-08302-5\_11},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AlshehriS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogsci/DavenportKS13,
  author       = {Jodi L. Davenport and
                  Yvonne Kao and
                  Steven Schneider},
  editor       = {Markus Knauff and
                  Michael Pauen and
                  Natalie Sebanz and
                  Ipke Wachsmuth},
  title        = {Integrating Cognitive Principles to Redesign a Middle School Math
                  Curriculum},
  booktitle    = {Proceedings of the 35th Annual Meeting of the Cognitive Science Society,
                  CogSci 2013, Berlin, Germany, July 31 - August 3, 2013},
  publisher    = {cognitivesciencesociety.org},
  year         = {2013},
  url          = {https://escholarship.org/uc/item/83d2s254},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cogsci/DavenportKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gil/Schneider13,
  author       = {Steve A. Schneider},
  editor       = {Michael Clasen and
                  Kurt Christian Kersebaum and
                  Andreas Meyer{-}Aurich and
                  Brigitte Theuvsen},
  title        = {Fuzzy-Systeme zur Unterst{\"{u}}tzung von Entscheidungen in land-
                  und forstwirtschaftlichen Logistik-Prozessen},
  booktitle    = {Massendatenmanagement in der Agrar- und Ern{\"{a}}hrungswirtschaft,
                  Erhebung - Verarbeitung - Nutzung, Referate der 33. GIL-Jahrestagung,
                  20. - 21. Februar 2013, Potsdam, Germany},
  series       = {{LNI}},
  volume       = {{P-211}},
  pages        = {307--310},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/17639},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gil/Schneider13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlshehriS13,
  author       = {Abdullah Ali Alshehri and
                  Steve A. Schneider},
  title        = {Formally defining {NFC} M-coupon requirements, with a case study},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {52--58},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750161},
  doi          = {10.1109/ICITST.2013.6750161},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlshehriS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CaseSWKMW13,
  author       = {Steven Case and
                  Sherry K. Schneider and
                  Laura J. White and
                  Steven J. Kass and
                  Kelly Manning and
                  Norman Wilde},
  title        = {Integrating globally distributed team projects into software engineering
                  courses},
  booktitle    = {3rd International Workshop on Collaborative Teaching of Globally Distributed
                  Software Development, {CTGDSD} 2013, San Francisco, CA, USA, May 25,
                  2013},
  pages        = {25--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CTGDSD.2013.6635242},
  doi          = {10.1109/CTGDSD.2013.6635242},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/CaseSWKMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/MoranHS13,
  author       = {Murat Moran and
                  James Heather and
                  Steve A. Schneider},
  editor       = {Einar Broch Johnsen and
                  Luigia Petre},
  title        = {Automated Anonymity Verification of the ThreeBallot Voting System},
  booktitle    = {Integrated Formal Methods, 10th International Conference, {IFM} 2013,
                  Turku, Finland, June 10-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7940},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38613-8\_7},
  doi          = {10.1007/978-3-642-38613-8\_7},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/MoranHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/JamesTTRS13,
  author       = {Phillip James and
                  Matthew Trumble and
                  Helen Treharne and
                  Markus Roggenbach and
                  Steve A. Schneider},
  editor       = {Guillaume Brat and
                  Neha Rungta and
                  Arnaud Venet},
  title        = {OnTrack: An Open Tooling Environment for Railway Verification},
  booktitle    = {{NASA} Formal Methods, 5th International Symposium, {NFM} 2013, Moffett
                  Field, CA, USA, May 14-16, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7871},
  pages        = {435--440},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38088-4\_30},
  doi          = {10.1007/978-3-642-38088-4\_30},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nfm/JamesTTRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AktoudianakisCSTW13,
  author       = {Evangelos Aktoudianakis and
                  Jason Crampton and
                  Steve A. Schneider and
                  Helen Treharne and
                  Adrian Waller},
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {Policy templates for relationship-based access control},
  booktitle    = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  pages        = {221--228},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PST.2013.6596057},
  doi          = {10.1109/PST.2013.6596057},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AktoudianakisCSTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qosa/DuSHGV13,
  author       = {Miao Du and
                  Jean{-}Guy Schneider and
                  Cameron M. Hine and
                  John Grundy and
                  Steven Versteeg},
  editor       = {Philippe Kruchten and
                  Anne Koziolek and
                  Robert L. Nord},
  title        = {Generating service models by trace subsequence substitution},
  booktitle    = {Proceedings of the 9th international {ACM} {SIGSOFT} conference on
                  Quality of Software Architectures, QoSA 2013, part of Comparch '13
                  Federated Events on Component-Based Software Engineering and Software
                  Architecture, Vancouver, BC, Canada, June 17-21, 2013},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2465478.2465485},
  doi          = {10.1145/2465478.2465485},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qosa/DuSHGV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/JamesMNRSTTW13,
  author       = {Phillip James and
                  Faron Moller and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne and
                  Matthew Trumble and
                  David M. Williams},
  editor       = {Steve Counsell and
                  Manuel N{\'{u}}{\~{n}}ez},
  title        = {Verification of Scheme Plans Using {CSP} {\textdollar}{\textdollar}{\(\vert\)}{\(\vert\)}{\textdollar}{\textdollar}
                  {\(\vert\)} {\(\vert\)} {B}},
  booktitle    = {Software Engineering and Formal Methods - {SEFM} 2013 Collocated Workshops:
                  BEAT2, WS-FMDS, FM-RAIL-Bok, MoKMaSD, and OpenCert, Madrid, Spain,
                  September 23-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8368},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05032-4\_15},
  doi          = {10.1007/978-3-319-05032-4\_15},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sefm/JamesMNRSTTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LlewellynSXCHRS13,
  author       = {Morgan Llewellyn and
                  Steve A. Schneider and
                  Zhe Xia and
                  Chris Culnane and
                  James Heather and
                  Peter Y. A. Ryan and
                  Sriramkrishnan Srinivasan},
  title        = {Testing Voters' Understanding of a Security Mechanism Used in Verifiable
                  Voting},
  booktitle    = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/llewellyn},
  timestamp    = {Mon, 01 Feb 2021 08:42:58 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LlewellynSXCHRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xsede/FurlaniSJTHGDLGGPLWPS13,
  author       = {Thomas R. Furlani and
                  Barry I. Schneider and
                  Matthew D. Jones and
                  John Towns and
                  David L. Hart and
                  Steven M. Gallo and
                  Robert L. DeLeon and
                  Charng{-}Da Lu and
                  Amin Ghadersohi and
                  Ryan J. Gentner and
                  Abani K. Patra and
                  Gregor von Laszewski and
                  Fugang Wang and
                  Jeffrey T. Palmer and
                  Nikolay Simakov},
  editor       = {Nancy Wilkins{-}Diehr},
  title        = {Using XDMoD to facilitate {XSEDE} operations, planning and analysis},
  booktitle    = {Extreme Science and Engineering Discovery Environment: Gateway to
                  Discovery, XSEDE13, San Diego, CA, {USA} - July 22 - 25, 2013},
  pages        = {46:1--46:8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484762.2484763},
  doi          = {10.1145/2484762.2484763},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/xsede/FurlaniSJTHGDLGGPLWPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2013,
  editor       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {E-Voting and Identify - 4th International Conference, VoteID 2013,
                  Guildford, UK, July 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7985},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39185-9},
  doi          = {10.1007/978-3-642-39185-9},
  isbn         = {978-3-642-39184-2},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ao/SchneiderHBBCGGGLLORSVWWY12,
  author       = {Todd Schneider and
                  Ali Hashemi and
                  Mike Bennett and
                  Mary Brady and
                  Cory Casanave and
                  Henson Graves and
                  Michael Gruninger and
                  Nicola Guarino and
                  Anatoly Levenchuk and
                  Ernie Lucier and
                  Leo Obrst and
                  Steve Ray and
                  Ram D. Sriram and
                  Amanda Vizedom and
                  Matthew West and
                  Trish Whetzel and
                  Peter Yim},
  title        = {Ontology for Big Systems: The Ontology Summit 2012 Communiqu{\'{e}}},
  journal      = {Appl. Ontology},
  volume       = {7},
  number       = {3},
  pages        = {357--371},
  year         = {2012},
  url          = {https://doi.org/10.3233/AO-2012-0111},
  doi          = {10.3233/AO-2012-0111},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ao/SchneiderHBBCGGGLLORSVWWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/RoggenbachMSTN12,
  author       = {Markus Roggenbach and
                  Faron Moller and
                  Steve A. Schneider and
                  Helen Treharne and
                  Hoang Nga Nguyen},
  title        = {Railway modelling in CSP{\(\vert\)}{\(\vert\)}B: the double junction
                  case study},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {53},
  year         = {2012},
  url          = {https://doi.org/10.14279/tuj.eceasst.53.791},
  doi          = {10.14279/TUJ.ECEASST.53.791},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/RoggenbachMSTN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nar/SimKHHSN12,
  author       = {Ngak{-}Leng Sim and
                  Prateek Kumar and
                  Jing Hu and
                  Steven Henikoff and
                  Georg Schneider and
                  Pauline C. Ng},
  title        = {{SIFT} web server: predicting effects of amino acid substitutions
                  on proteins},
  journal      = {Nucleic Acids Res.},
  volume       = {40},
  number       = {Web-Server-Issue},
  pages        = {452--457},
  year         = {2012},
  url          = {https://doi.org/10.1093/nar/gks539},
  doi          = {10.1093/NAR/GKS539},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nar/SimKHHSN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/HeHYSJV12,
  author       = {Qiang He and
                  Jun Han and
                  Yun Yang and
                  Jean{-}Guy Schneider and
                  Hai Jin and
                  Steven Versteeg},
  editor       = {Louise E. Moser and
                  Manish Parashar and
                  Patrick C. K. Hung},
  title        = {Probabilistic Critical Path Identification for Cost-Effective Monitoring
                  of Service-Based Systems},
  booktitle    = {2012 {IEEE} Ninth International Conference on Services Computing,
                  Honolulu, HI, USA, June 24-29, 2012},
  pages        = {178--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SCC.2012.39},
  doi          = {10.1109/SCC.2012.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/HeHYSJV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia},
  editor       = {Manuel J. Kripp and
                  Melanie Volkamer and
                  R{\"{u}}diger Grimm},
  title        = {A Supervised Verifiable Voting Protocol for the Victorian Electoral
                  Commission},
  booktitle    = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012),
                  Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r
                  Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz,
                  Austria},
  series       = {{LNI}},
  volume       = {{P-205}},
  pages        = {81--94},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18227},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/BurtonCHPRSSTWX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/HeatherS12,
  author       = {James Heather and
                  Steve A. Schneider},
  editor       = {Dimitra Giannakopoulou and
                  Dominique M{\'{e}}ry},
  title        = {A Formal Framework for Modelling Coercion Resistance and Receipt Freeness},
  booktitle    = {{FM} 2012: Formal Methods - 18th International Symposium, Paris, France,
                  August 27-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7436},
  pages        = {217--231},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32759-9\_19},
  doi          = {10.1007/978-3-642-32759-9\_19},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/HeatherS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hvc/MollerNRST12,
  author       = {Faron Moller and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Steve A. Schneider and
                  Helen Treharne},
  editor       = {Armin Biere and
                  Amir Nahir and
                  Tanja E. J. Vos},
  title        = {Defining and Model Checking Abstractions of Complex Railway Models
                  Using CSP{\(\vert\)}{\(\vert\)}B},
  booktitle    = {Hardware and Software: Verification and Testing - 8th International
                  Haifa Verification Conference, {HVC} 2012, Haifa, Israel, November
                  6-8, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7857},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39611-3\_20},
  doi          = {10.1007/978-3-642-39611-3\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hvc/MollerNRST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HineSHV12,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steven Versteeg},
  editor       = {Michael Goedicke and
                  Tim Menzies and
                  Motoshi Saeki},
  title        = {Quokka: visualising interactions of enterprise software environment
                  emulators},
  booktitle    = {{IEEE/ACM} International Conference on Automated Software Engineering,
                  ASE'12, Essen, Germany, September 3-7, 2012},
  pages        = {370--373},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2351676.2351750},
  doi          = {10.1145/2351676.2351750},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/HineSHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/SchneiderAMFU12,
  author       = {Fabian Schneider and
                  Bernhard Ager and
                  Gregor Maier and
                  Anja Feldmann and
                  Steve Uhlig},
  editor       = {Nina Taft and
                  Fabio Ricciato},
  title        = {Pitfalls in {HTTP} Traffic Measurements and Analysis},
  booktitle    = {Passive and Active Measurement - 13th International Conference, {PAM}
                  2012, Vienna, Austria, March 12-14th, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7192},
  pages        = {242--251},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28537-0\_24},
  doi          = {10.1007/978-3-642-28537-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/SchneiderAMFU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qosa/YuHSHV12,
  author       = {Jian Yu and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Cameron M. Hine and
                  Steven Versteeg},
  editor       = {Vincenzo Grassi and
                  Raffaela Mirandola and
                  Barbora Buhnova and
                  Antonio Vallecillo},
  title        = {A virtual deployment testing environment for enterprise software systems},
  booktitle    = {Proceedings of the 8th international {ACM} {SIGSOFT} conference on
                  Quality of Software Architectures, QoSA 2012, part of Comparch '12
                  Federated Events on Component-Based Software Engineering and Software
                  Architecture, Bertinoro, Italy, June 25-28, 2012},
  pages        = {101--110},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2304696.2304714},
  doi          = {10.1145/2304696.2304714},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qosa/YuHSHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qsic/VersteegHSH12,
  author       = {Steven Versteeg and
                  Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han},
  editor       = {Antony Tang and
                  Henry Muccini},
  title        = {Emulation of Cloud-Scale Environments for Scalability Testing},
  booktitle    = {2012 12th International Conference on Quality Software, Xi'an, Shaanxi,
                  China, August 27-29, 2012},
  pages        = {201--209},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/QSIC.2012.57},
  doi          = {10.1109/QSIC.2012.57},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/qsic/VersteegHSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/AbdelhalimST12,
  author       = {Islam Abdelhalim and
                  Steve A. Schneider and
                  Helen Treharne},
  editor       = {George Eleftherakis and
                  Mike Hinchey and
                  Mike Holcombe},
  title        = {An Optimization Approach for Effective Formalized fUML Model Checking},
  booktitle    = {Software Engineering and Formal Methods - 10th International Conference,
                  {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7504},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33826-7\_17},
  doi          = {10.1007/978-3-642-33826-7\_17},
  timestamp    = {Sat, 05 Sep 2020 18:01:22 +0200},
  biburl       = {https://dblp.org/rec/conf/sefm/AbdelhalimST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia and
                  Sriramkrishnan Srinivasan},
  editor       = {J. Alex Halderman and
                  Olivier Pereira},
  title        = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections},
  booktitle    = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton},
  timestamp    = {Mon, 01 Feb 2021 08:43:08 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BurtonCHPRSTWXS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/SchiobergSSUSF12,
  author       = {Doris Schi{\"{o}}berg and
                  Stefan Schmid and
                  Fabian Schneider and
                  Steve Uhlig and
                  Harald Schi{\"{o}}berg and
                  Anja Feldmann},
  editor       = {Noshir S. Contractor and
                  Brian Uzzi and
                  Michael W. Macy and
                  Wolfgang Nejdl},
  title        = {Tracing the birth of an {OSN:} social graph and profile analysis in
                  Google+},
  booktitle    = {Web Science 2012, WebSci '12, Evanston, IL, {USA} - June 22 - 24,
                  2012},
  pages        = {265--274},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2380718.2380753},
  doi          = {10.1145/2380718.2380753},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/SchiobergSSUSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/HeHYSJV12,
  author       = {Qiang He and
                  Jun Han and
                  Yun Yang and
                  Jean{-}Guy Schneider and
                  Hai Jin and
                  Steven Versteeg},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {Probabilistic critical path identification for cost-effective monitoring
                  of service-based web applications},
  booktitle    = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon,
                  France, April 16-20, 2012 (Companion Volume)},
  pages        = {523--524},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187980.2188108},
  doi          = {10.1145/2187980.2188108},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/HeHYSJV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-1394,
  author       = {Doris Schi{\"{o}}berg and
                  Fabian Schneider and
                  Gilles Tr{\'{e}}dan and
                  Steve Uhlig and
                  Anja Feldmann},
  title        = {Revisiting Content Availability in Distributed Online Social Networks},
  journal      = {CoRR},
  volume       = {abs/1210.1394},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.1394},
  eprinttype    = {arXiv},
  eprint       = {1210.1394},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-1394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/SchneiderT11,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {Changing system interfaces consistently: {A} new refinement strategy
                  for CSP{\(\vert\)}{\(\vert\)}B},
  journal      = {Sci. Comput. Program.},
  volume       = {76},
  number       = {10},
  pages        = {837--860},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.scico.2010.08.001},
  doi          = {10.1016/J.SCICO.2010.08.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/SchneiderT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/MullerHSV11,
  author       = {Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  editor       = {Ling Liu and
                  Manish Parashar},
  title        = {Tackling the Loss of Control: Standards-Based Conjoint Management
                  of Security Requirements for Cloud Services},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
                  Washington, DC, USA, 4-9 July, 2011},
  pages        = {573--581},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CLOUD.2011.90},
  doi          = {10.1109/CLOUD.2011.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/MullerHSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/MullerHSV11,
  author       = {Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  editor       = {{\'{U}}lfar Erlingsson and
                  Roel J. Wieringa and
                  Nicola Zannone},
  title        = {Idea: {A} Reference Platform for Systematic Information Security Management
                  Tool Support},
  booktitle    = {Engineering Secure Software and Systems - Third International Symposium,
                  ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6542},
  pages        = {256--263},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19125-1\_20},
  doi          = {10.1007/978-3-642-19125-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/MullerHSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/AbdelhalimST11,
  author       = {Islam Abdelhalim and
                  Steve A. Schneider and
                  Helen Treharne},
  editor       = {Shengchao Qin and
                  Zongyan Qiu},
  title        = {Towards a Practical Approach to Check UML/fUML Models Consistency
                  Using {CSP}},
  booktitle    = {Formal Methods and Software Engineering - 13th International Conference
                  on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6991},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24559-6\_5},
  doi          = {10.1007/978-3-642-24559-6\_5},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/AbdelhalimST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/SchneiderLCHSX11,
  author       = {Steve A. Schneider and
                  Morgan Llewellyn and
                  Chris Culnane and
                  James Heather and
                  Sriramkrishnan Srinivasan and
                  Zhe Xia},
  title        = {Focus group views on Pr{\^{e}}t {\`{a}} Voter 1.0},
  booktitle    = {2011 International Workshop on Requirements Engineering for Electronic
                  Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011},
  pages        = {56--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/REVOTE.2011.6045916},
  doi          = {10.1109/REVOTE.2011.6045916},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/SchneiderLCHSX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soca/HewardHSV11,
  author       = {Garth Heward and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  editor       = {Kwei{-}Jay Lin and
                  Christian Huemer and
                  M. Brian Blake and
                  Boualem Benatallah},
  title        = {Run-time management and optimization of web service monitoring systems},
  booktitle    = {2011 {IEEE} International Conference on Service-Oriented Computing
                  and Applications, {SOCA} 2011, Irvine, CA, USA, December 12-14, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SOCA.2011.6166266},
  doi          = {10.1109/SOCA.2011.6166266},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soca/HewardHSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CulnaneBHSSX11,
  author       = {Chris Culnane and
                  David Bismark and
                  James Heather and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Zhe Xia},
  editor       = {Hovav Shacham and
                  Vanessa Teague},
  title        = {Authentication Codes},
  booktitle    = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/evtwote-11/authentication-codes},
  timestamp    = {Mon, 01 Feb 2021 08:42:50 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CulnaneBHSSX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/DemirelHRSV11,
  author       = {Denise Demirel and
                  Maria Henning and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Melanie Volkamer},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {Feasibility Analysis of Pr{\^{e}}t {\`{a}} Voter for German Federal
                  Elections},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_10},
  doi          = {10.1007/978-3-642-32747-6\_10},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/DemirelHRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/SchneiderSCHX11,
  author       = {Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Chris Culnane and
                  James Heather and
                  Zhe Xia},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {Pr{\^{e}}t {\'{a}} Voter with Write-Ins},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_11},
  doi          = {10.1007/978-3-642-32747-6\_11},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/SchneiderSCHX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1106-4098,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  editor       = {John Derrick and
                  Eerke A. Boiten and
                  Steve Reeves},
  title        = {A {CSP} Account of Event-B Refinement},
  booktitle    = {Proceedings 15th International Refinement Workshop, Refine@FM 2011,
                  Limerick, Ireland, 20th June 2011},
  series       = {{EPTCS}},
  volume       = {55},
  pages        = {139--154},
  year         = {2011},
  url          = {https://doi.org/10.4204/EPTCS.55.9},
  doi          = {10.4204/EPTCS.55.9},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-4098.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/SchneiderTW11,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  editor       = {Marie{-}Laure Potet and
                  Helen Treharne},
  title        = {Bounded Retransmission in Event-B{\(\parallel\)}CSP: a Case Study},
  booktitle    = {Proceedings of the {B} 2011 Workshop, a satellite event of the 17th
                  International Symposium on Formal Methods, {FM} 2011, Limerick, Ireland,
                  June 21, 2011},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {280},
  pages        = {69--80},
  publisher    = {Elsevier},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.entcs.2011.11.019},
  doi          = {10.1016/J.ENTCS.2011.11.019},
  timestamp    = {Fri, 10 Mar 2023 15:49:46 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/SchneiderTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/Schneider11,
  author       = {Steve A. Schneider},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Security Analysis using Rank Functions in {CSP}},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {258--276},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-258},
  doi          = {10.3233/978-1-60750-714-7-258},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Schneider11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/IfillS10,
  author       = {Wilson Ifill and
                  Steve A. Schneider},
  title        = {A step towards refining and translating {B} control annotations to
                  Handel-C},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {22},
  number       = {8},
  pages        = {1023--1048},
  year         = {2010},
  url          = {https://doi.org/10.1002/cpe.1427},
  doi          = {10.1002/CPE.1427},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/IfillS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/McEwanS10,
  author       = {Alistair A. McEwan and
                  Steve A. Schneider},
  title        = {Modelling and analysis of the {AMBA} bus using {CSP} and {B}},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {22},
  number       = {8},
  pages        = {949--964},
  year         = {2010},
  url          = {https://doi.org/10.1002/cpe.1432},
  doi          = {10.1002/CPE.1432},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/McEwanS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aswec/HewardMHSV10,
  author       = {Garth Heward and
                  Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  title        = {Assessing the Performance Impact of Service Monitoring},
  booktitle    = {21st Australian Software Engineering Conference {(ASWEC} 2010), 6-9
                  April 2010, Auckland, New Zealand},
  pages        = {192--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ASWEC.2010.28},
  doi          = {10.1109/ASWEC.2010.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aswec/HewardMHSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aswec/HineSHV10,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steven Versteeg},
  title        = {Modelling Enterprise System Protocols and Trace Conformance},
  booktitle    = {21st Australian Software Engineering Conference {(ASWEC} 2010), 6-9
                  April 2010, Auckland, New Zealand},
  pages        = {35--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ASWEC.2010.40},
  doi          = {10.1109/ASWEC.2010.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aswec/HineSHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biocomp/SoysalCBS10,
  author       = {{\"{O}}mer M. Soysal and
                  Jianhua Chen and
                  Steven Bujenovic and
                  Helmut Schneider},
  editor       = {Hamid R. Arabnia and
                  Quoc{-}Nam Tran and
                  Rui Chang and
                  Matthew He and
                  Andy Marsh and
                  Ashu M. G. Solo and
                  Jack Y. Yang},
  title        = {A Hierarchical Decision Engine for Computer Aided Lung Nodule Detection
                  from {CT} Images},
  booktitle    = {International Conference on Bioinformatics {\&} Computational
                  Biology, {BIOCOMP} 2010, July 12-15, 2010, Las Vegas Nevada, USA,
                  2 Volumes},
  pages        = {387--393},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biocomp/SoysalCBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/AbdelhalimSST10,
  author       = {Islam Abdelhalim and
                  James Sharp and
                  Steve A. Schneider and
                  Helen Treharne},
  editor       = {Jin Song Dong and
                  Huibiao Zhu},
  title        = {Formal Verification of Tokeneer Behaviours Modelled in fUML Using
                  {CSP}},
  booktitle    = {Formal Methods and Software Engineering - 12th International Conference
                  on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November
                  17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6447},
  pages        = {371--387},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16901-4\_25},
  doi          = {10.1007/978-3-642-16901-4\_25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/AbdelhalimSST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/HewardHMSV10,
  author       = {Garth Heward and
                  Jun Han and
                  Ingo M{\"{u}}ller and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  editor       = {Paul P. Maglio and
                  Mathias Weske and
                  Jian Yang and
                  Marcelo Fantinato},
  title        = {Optimizing the Configuration of Web Service Monitors},
  booktitle    = {Service-Oriented Computing - 8th International Conference, {ICSOC}
                  2010, San Francisco, CA, USA, December 7-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6470},
  pages        = {587--595},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17358-5\_43},
  doi          = {10.1007/978-3-642-17358-5\_43},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/HewardHMSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/HewardHMSV10a,
  author       = {Garth Heward and
                  Jun Han and
                  Ingo M{\"{u}}ller and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  editor       = {E. Michael Maximilien and
                  Gustavo Rossi and
                  Soe{-}Tsyr Yuan and
                  Heiko Ludwig and
                  Marcelo Fantinato},
  title        = {A Case Study on Optimizing Web Service Monitoring Configurations},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2010 International Workshops,
                  PAASC, WESOA, SEE, and SOC-LOG, San Francisco, CA, USA, December 7-10,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6568},
  pages        = {4--14},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19394-1\_2},
  doi          = {10.1007/978-3-642-19394-1\_2},
  timestamp    = {Sun, 02 Jun 2019 21:20:24 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/HewardHMSV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/SchneiderTW10,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Heike Wehrheim},
  editor       = {Dominique M{\'{e}}ry and
                  Stephan Merz},
  title        = {A {CSP} Approach to Control in Event-B},
  booktitle    = {Integrated Formal Methods - 8th International Conference, {IFM} 2010,
                  Nancy, France, October 11-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6396},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16265-7\_19},
  doi          = {10.1007/978-3-642-16265-7\_19},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/SchneiderTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10,
  author       = {Zhe Xia and
                  Chris Culnane and
                  James Heather and
                  Hugo Jonker and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods
                  with a Unified Interface},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {98--114},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_8},
  doi          = {10.1007/978-3-642-17401-8\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/XiaCHJRSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HineSV10,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  editor       = {Charles Pecheur and
                  Jamie Andrews and
                  Elisabetta Di Nitto},
  title        = {Reac2o: a runtime for enterprise system models},
  booktitle    = {{ASE} 2010, 25th {IEEE/ACM} International Conference on Automated
                  Software Engineering, Antwerp, Belgium, September 20-24, 2010},
  pages        = {177--178},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1858996.1859034},
  doi          = {10.1145/1858996.1859034},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/HineSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/inc/2010,
  editor       = {Udo Bleimann and
                  Paul Dowland and
                  Steven Furnell and
                  Oliver Schneider},
  title        = {Eighth International Network Conference {(INC} 2010), Heidelberg,
                  Germany, July 6-8, 2010. Proceedings},
  publisher    = {University of Plymouth},
  year         = {2010},
  url          = {http://www.cscan.org/?page=openaccess\&eid=2},
  isbn         = {978-1-84102-259-8},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/inc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShaikhBS09,
  author       = {Siraj A. Shaikh and
                  Vicky J. Bush and
                  Steve A. Schneider},
  title        = {Specifying authentication using signal events in {CSP}},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {310--324},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2008.10.001},
  doi          = {10.1016/J.COSE.2008.10.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShaikhBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/VajarST09,
  author       = {Beeta Vajar and
                  Steve A. Schneider and
                  Helen Treharne},
  title        = {Mobile CSP{\(\vert\)}{\(\vert\)}B},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {23},
  year         = {2009},
  url          = {https://doi.org/10.14279/tuj.eceasst.23.338},
  doi          = {10.14279/TUJ.ECEASST.23.338},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/VajarST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RyanBHSX09,
  author       = {Peter Y. A. Ryan and
                  David Bismark and
                  James Heather and
                  Steve A. Schneider and
                  Zhe Xia},
  title        = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {662--673},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033233},
  doi          = {10.1109/TIFS.2009.2033233},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RyanBHSX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aswec/HineSHV09,
  author       = {Cameron M. Hine and
                  Jean{-}Guy Schneider and
                  Jun Han and
                  Steven Versteeg},
  title        = {Scalable Emulation of Enterprise Systems},
  booktitle    = {20th Australian Software Engineering Conference {(ASWEC} 2009), 14-17
                  April 2009, Gold Cost, Australia},
  pages        = {142--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ASWEC.2009.34},
  doi          = {10.1109/ASWEC.2009.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aswec/HineSHV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/TreharneSGEI09,
  author       = {Helen Treharne and
                  Steve A. Schneider and
                  Neil Grant and
                  Neil Evans and
                  Wilson Ifill},
  editor       = {Jean{-}Raymond Abrial and
                  Uwe Gl{\"{a}}sser},
  title        = {A Step towards Merging xUML and {CSP} {\(\vert\)}{\(\vert\)} \{{\textbackslash}{\(\vert\)}
                  {\textbackslash} \}B},
  booktitle    = {Rigorous Methods for Software Construction and Analysis, Essays Dedicated
                  to Egon B{\"{o}}rger on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {5115},
  pages        = {130--146},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11447-2\_9},
  doi          = {10.1007/978-3-642-11447-2\_9},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/TreharneSGEI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ZhouKHSLW09,
  author       = {Steven Zhiying Zhou and
                  Jayashree Karlekar and
                  Daniel Hii and
                  Miriam Schneider and
                  Weiquan Lu and
                  Stephen Wittkopf},
  editor       = {Constantine Stephanidis},
  title        = {Robust Pose Estimation for Outdoor Mixed Reality with Sensor Fusion},
  booktitle    = {Universal Access in Human-Computer Interaction. Applications and Services,
                  5th International Conference, {UAHCI} 2009, Held as Part of {HCI}
                  International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5616},
  pages        = {281--289},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02713-0\_30},
  doi          = {10.1007/978-3-642-02713-0\_30},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ZhouKHSLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/SchneiderT09,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  editor       = {Michael Leuschel and
                  Heike Wehrheim},
  title        = {Changing System Interfaces Consistently: {A} New Refinement Strategy
                  for CSP{\(\vert\)}{\(\vert\)}B},
  booktitle    = {Integrated Formal Methods, 7th International Conference, {IFM} 2009,
                  D{\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5423},
  pages        = {103--117},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00255-7\_8},
  doi          = {10.1007/978-3-642-00255-7\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifm/SchneiderT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BismarkHPSXR09,
  author       = {David Bismark and
                  James Heather and
                  Roger M. A. Peel and
                  Steve A. Schneider and
                  Zhe Xia and
                  Peter Y. A. Ryan},
  title        = {Experiences Gained from the first Pr{\^{e}}t {\`{a}} Voter Implementation},
  booktitle    = {First International Workshop on Requirements Engineering for e-Voting
                  Systems, {RE-VOTE} 2009, Atlanta, Georgia, USA, August 31, 2009},
  pages        = {19--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/RE-VOTE.2009.5},
  doi          = {10.1109/RE-VOTE.2009.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BismarkHPSXR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nms/Haas08,
  author       = {Gretchen Haas},
  title        = {Book Review: Kirsten A. Foot and Steven M. Schneider, Web Campaigning.
                  Cambridge, {MA:} {MIT} Press, 2006. xix + 263 pp. {ISBN} 0262062585,
                  {\textdollar}60.00 (hbk), {\textdollar}27.50 (pbk)},
  journal      = {New Media Soc.},
  volume       = {10},
  number       = {2},
  pages        = {355--357},
  year         = {2008},
  url          = {https://doi.org/10.1177/14614448080100020902},
  doi          = {10.1177/14614448080100020902},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nms/Haas08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/polity/X08b,
  title        = {Book Review: Response to Wainer Lusoli's review of Web Campaigning,
                  by Kirsten Foot and Steven Schneider},
  journal      = {Inf. Polity},
  volume       = {13},
  number       = {1-2},
  pages        = {119--121},
  year         = {2008},
  url          = {https://doi.org/10.3233/ip-2008-0149},
  doi          = {10.3233/IP-2008-0149},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/polity/X08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asm/TreharneTSE08,
  author       = {Helen Treharne and
                  Edward Turner and
                  Steve A. Schneider and
                  Neil Evans},
  editor       = {Egon B{\"{o}}rger and
                  Michael J. Butler and
                  Jonathan P. Bowen and
                  Paul Boca},
  title        = {Object Modelling in the SystemB Industrial Project},
  booktitle    = {Abstract State Machines, {B} and Z, First International Conference,
                  {ABZ} 2008, London, UK, September 16-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5238},
  pages        = {359},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87603-8\_46},
  doi          = {10.1007/978-3-540-87603-8\_46},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asm/TreharneTSE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/MullerHSV08,
  author       = {Ingo M{\"{u}}ller and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Steven Versteeg},
  editor       = {George Feuerlicht and
                  Winfried Lamersdorf},
  title        = {A Conceptual Framework for Unified and Comprehensive {SOA} Management},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2008 Workshops, {ICSOC} 2008
                  International Workshops, Sydney, Australia, December 1st, 2008, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5472},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01247-1\_4},
  doi          = {10.1007/978-3-642-01247-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/MullerHSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictac/TurnerTSE08,
  author       = {Edward Turner and
                  Helen Treharne and
                  Steve A. Schneider and
                  Neil Evans},
  editor       = {John S. Fitzgerald and
                  Anne E. Haxthausen and
                  H{\"{u}}sn{\"{u}} Yenig{\"{u}}n},
  title        = {Automatic Generation of {CSP} {\(\vert\)}{\(\vert\)} {B} Skeletons
                  from xUML Models},
  booktitle    = {Theoretical Aspects of Computing - {ICTAC} 2008, 5th International
                  Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5160},
  pages        = {364--379},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85762-4\_25},
  doi          = {10.1007/978-3-540-85762-4\_25},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictac/TurnerTSE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XiaSHT08,
  author       = {Zhe Xia and
                  Steve A. Schneider and
                  James Heather and
                  Jacques Traor{\'{e}}},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Analysis, Improvement, and Simplification of Pr{\^{e}}t {\`{a}} Voter
                  with Paillier Encryption},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/xia/xia.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XiaSHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wotug/SchneiderTMI08,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Alistair A. McEwan and
                  Wilson Ifill},
  editor       = {Peter H. Welch and
                  Susan Stepney and
                  Fiona Polack and
                  Fred R. M. Barnes and
                  Alistair A. McEwan and
                  Gardiner S. Stiles and
                  Jan F. Broenink and
                  Adam T. Sampson},
  title        = {Experiments in Translating {CSP} {\(\vert\)}{\(\vert\)} {B} to Handel-C},
  booktitle    = {The thirty-first Communicating Process Architectures Conference, {CPA}
                  2008, organised under the auspices of WoTUG and the Department of
                  Computer Science of the University of York, York, Yorkshire, UK, 7-10
                  September 2008},
  series       = {Concurrent Systems Engineering Series},
  volume       = {66},
  pages        = {115--133},
  publisher    = {{IOS} Press},
  year         = {2008},
  url          = {https://doi.org/10.3233/978-1-58603-907-3-115},
  doi          = {10.3233/978-1-58603-907-3-115},
  timestamp    = {Sun, 18 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wotug/SchneiderTMI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DelicataS07,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  title        = {An algebraic approach to the verification of a class of Diffie-Hellman
                  protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {183--196},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0013-2},
  doi          = {10.1007/S10207-007-0013-2},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DelicataS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DimitrakosMRS07,
  author       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest Editors' Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {65--66},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0012-3},
  doi          = {10.1007/S10207-007-0012-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DimitrakosMRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/b/IfillST07,
  author       = {Wilson Ifill and
                  Steve A. Schneider and
                  Helen Treharne},
  editor       = {Jacques Julliand and
                  Olga Kouchnarenko},
  title        = {Augmenting {B} with Control Annotations},
  booktitle    = {B 2007: Formal Specification and Development in B, 7th International
                  Conference of {B} Users, Besan{\c{c}}on, France, January 17-19, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4355},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11955757\_6},
  doi          = {10.1007/11955757\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/b/IfillST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/KarkinskyST07,
  author       = {Damien Karkinsky and
                  Steve A. Schneider and
                  Helen Treharne},
  editor       = {Jim Davies and
                  Jeremy Gibbons},
  title        = {Combining Mobility with State},
  booktitle    = {Integrated Formal Methods, 6th International Conference, {IFM} 2007,
                  Oxford, UK, July 2-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4591},
  pages        = {373--392},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73210-5\_20},
  doi          = {10.1007/978-3-540-73210-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/KarkinskyST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miigp/SchneiderS07,
  author       = {Mark Schneider and
                  Charles Stevens},
  editor       = {Kevin R. Cleary and
                  Michael I. Miga},
  title        = {Development and testing of a new magnetic-tracking device for image
                  guidance},
  booktitle    = {Medical Imaging 2007: Visualization and Image-Guided Procedures, San
                  Diego, CA, United States, 17-22 February 2007},
  series       = {{SPIE} Proceedings},
  volume       = {6509},
  pages        = {65090I},
  publisher    = {{SPIE}},
  year         = {2007},
  url          = {https://doi.org/10.1117/12.713249},
  doi          = {10.1117/12.713249},
  timestamp    = {Wed, 23 May 2018 15:10:40 +0200},
  biburl       = {https://dblp.org/rec/conf/miigp/SchneiderS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mtsummit/YeSA07,
  author       = {Yang Ye and
                  Karl{-}Michael Schneider and
                  Steven P. Abney},
  editor       = {Bente Maegaard},
  title        = {Aspect marker generation in English-to-Chinese machine translation},
  booktitle    = {Proceedings of Machine Translation Summit {XI:} Papers, Copenhagen,
                  Denmark, September 10-14, 2007},
  year         = {2007},
  url          = {https://aclanthology.org/2007.mtsummit-papers.69},
  timestamp    = {Mon, 25 Oct 2021 15:03:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mtsummit/YeSA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/FoulleSTX07,
  author       = {S{\'{e}}bastien Foulle and
                  Steve A. Schneider and
                  Jacques Traor{\'{e}} and
                  Zhe Xia},
  editor       = {Ammar Alkassar and
                  Melanie Volkamer},
  title        = {Threat Analysis of a Practical Voting Scheme with Receipts},
  booktitle    = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007,
                  Bochum, Germany, October 4-5, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4896},
  pages        = {156--165},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77493-8\_14},
  doi          = {10.1007/978-3-540-77493-8\_14},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/FoulleSTX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wotug/IfillS07,
  author       = {Wilson Ifill and
                  Steve A. Schneider},
  editor       = {Alistair A. McEwan and
                  Steve A. Schneider and
                  Wilson Ifill and
                  Peter H. Welch},
  title        = {A Step Towards Refining and Translating {B} Control Annotations to
                  Handel-C},
  booktitle    = {The 30th Communicating Process Architectures Conference, {CPA} 2007,
                  organised under the auspices of WoTUG and the University of Surrey,
                  Guildford, Surrey, UK, 8-11 July 2007},
  series       = {Concurrent Systems Engineering Series},
  volume       = {65},
  pages        = {399--424},
  publisher    = {{IOS} Press},
  year         = {2007},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5985},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wotug/IfillS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wotug/McEwanS07,
  author       = {Alistair A. McEwan and
                  Steve A. Schneider},
  editor       = {Alistair A. McEwan and
                  Steve A. Schneider and
                  Wilson Ifill and
                  Peter H. Welch},
  title        = {Modeling and Analysis of the {AMBA} Bus Using {CSP} and {B}},
  booktitle    = {The 30th Communicating Process Architectures Conference, {CPA} 2007,
                  organised under the auspices of WoTUG and the University of Surrey,
                  Guildford, Surrey, UK, 8-11 July 2007},
  series       = {Concurrent Systems Engineering Series},
  volume       = {65},
  pages        = {379--398},
  publisher    = {{IOS} Press},
  year         = {2007},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5984},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wotug/McEwanS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2006,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75227-1},
  doi          = {10.1007/978-3-540-75227-1},
  isbn         = {978-3-540-75226-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wotug/2007,
  editor       = {Alistair A. McEwan and
                  Steve A. Schneider and
                  Wilson Ifill and
                  Peter H. Welch},
  title        = {The 30th Communicating Process Architectures Conference, {CPA} 2007,
                  organised under the auspices of WoTUG and the University of Surrey,
                  Guildford, Surrey, UK, 8-11 July 2007},
  series       = {Concurrent Systems Engineering Series},
  volume       = {65},
  publisher    = {{IOS} Press},
  year         = {2007},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5962},
  isbn         = {978-1-58603-767-3},
  timestamp    = {Tue, 03 Mar 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wotug/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/SchneiderHRT06,
  author       = {Steve A. Schneider and
                  Thai Son Hoang and
                  Ken Robinson and
                  Helen Treharne},
  title        = {Tank monitoring: a pAMN case study},
  journal      = {Formal Aspects Comput.},
  volume       = {18},
  number       = {3},
  pages        = {308--328},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00165-006-0004-5},
  doi          = {10.1007/S00165-006-0004-5},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/SchneiderHRT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RyanS06,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Pr{\^{e}}t {\`{a}} Voter with Re-encryption Mixes},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_20},
  doi          = {10.1007/11863908\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RyanS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/SchneiderTCW06,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Ana Cavalcanti and
                  Jim Woodcock},
  title        = {A Layered Behavioural Model of Platelets},
  booktitle    = {11th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2006), 15-17 August 2006, Stanford, California, {USA}},
  pages        = {98--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICECCS.2006.80},
  doi          = {10.1109/ICECCS.2006.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/SchneiderTCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/memocode/McEwanS06,
  author       = {Alistair A. McEwan and
                  Steve A. Schneider},
  title        = {A verified development of hardware using CSP{\(\parallel\)}B},
  booktitle    = {4th {ACM} {\&} {IEEE} International Conference on Formal Methods
                  and Models for Co-Design {(MEMOCODE} 2006), 27-29 July 2006, Embassy
                  Suites, Napa, California, {USA}},
  pages        = {81},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MEMCOD.2006.1695904},
  doi          = {10.1109/MEMCOD.2006.1695904},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/memocode/McEwanS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/HeatherS06,
  author       = {James Heather and
                  Steve A. Schneider},
  editor       = {Hisham Haddad},
  title        = {To infinity and beyond or, avoiding the infinite in security protocol
                  analysis},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {346--353},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141359},
  doi          = {10.1145/1141277.1141359},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/HeatherS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2005,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11679219},
  doi          = {10.1007/11679219},
  isbn         = {3-540-32628-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/SchneiderT05,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  title        = {{CSP} theorems for communicating {B} machines},
  journal      = {Formal Aspects Comput.},
  volume       = {17},
  number       = {4},
  pages        = {390--422},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00165-005-0076-7},
  doi          = {10.1007/S00165-005-0076-7},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/SchneiderT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmc/FootWS05,
  author       = {Kirsten A. Foot and
                  Barbara Warnick and
                  Steven M. Schneider},
  title        = {Web-Based Memorializing After September 11: Toward a Conceptual Framework},
  journal      = {J. Comput. Mediat. Commun.},
  volume       = {11},
  number       = {1},
  pages        = {72--96},
  year         = {2005},
  url          = {https://doi.org/10.1111/j.1083-6101.2006.tb00304.x},
  doi          = {10.1111/J.1083-6101.2006.TB00304.X},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmc/FootWS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HeatherS05,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {A decision procedure for the existence of a rank function},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {317--344},
  year         = {2005},
  url          = {https://doi.org/10.3233/jcs-2005-13204},
  doi          = {10.3233/JCS-2005-13204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HeatherS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/EvansS05,
  author       = {Neil Evans and
                  Steve A. Schneider},
  title        = {Verifying security protocols with {PVS:} widening the rank function
                  approach},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {253--284},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.005},
  doi          = {10.1016/J.JLAP.2004.09.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/EvansS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/polity/JankowskiFKS05,
  author       = {Nicholas W. Jankowski and
                  Kirsten Foot and
                  Randy Kluver and
                  Steve Schneider},
  title        = {The Web and the 2004 {EP} election: Comparing political actor Web
                  sites in 11 {EU} Member States},
  journal      = {Inf. Polity},
  volume       = {10},
  number       = {3-4},
  pages        = {165--176},
  year         = {2005},
  url          = {https://doi.org/10.3233/ip-2005-0076},
  doi          = {10.3233/IP-2005-0076},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/polity/JankowskiFKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/DingSDR05,
  author       = {Steven X. Ding and
                  Stefan Schneider and
                  Eve L. Ding and
                  Ansgar Rehm},
  title        = {Fault tolerant monitoring of vehicle lateral dynamics stabilization
                  systems},
  booktitle    = {44th {IEEE} {IEEE} Conference on Decision and Control and 8th European
                  Control Conference Control, {CDC/ECC} 2005, Seville, Spain, 12-15
                  December, 2005},
  pages        = {2000--2005},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/CDC.2005.1582454},
  doi          = {10.1109/CDC.2005.1582454},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/DingSDR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ShaikhBS05,
  author       = {Siraj A. Shaikh and
                  Vicky J. Bush and
                  Steve A. Schneider},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Specifying Authentication Using Signal Events in {CSP}},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {63--74},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_6},
  doi          = {10.1007/11599548\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ShaikhBS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelicataS05,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  title        = {Temporal Rank Functions for Forward Secrecy},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {126--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.26},
  doi          = {10.1109/CSFW.2005.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelicataS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChaumRS05,
  author       = {David Chaum and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {A Practical Voter-Verifiable Election Scheme},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {118--139},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_8},
  doi          = {10.1007/11555827\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DelicataS05,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_4},
  doi          = {10.1007/11679219\_4},
  timestamp    = {Sun, 02 Oct 2022 16:07:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DelicataS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/SchneiderTE05,
  author       = {Steve A. Schneider and
                  Helen Treharne and
                  Neil Evans},
  editor       = {Judi Romijn and
                  Graeme Smith and
                  Jaco van de Pol},
  title        = {Chunks: Component Verification in CSP{\(\vert\)}{\(\vert\)}B},
  booktitle    = {Integrated Formal Methods, 5th International Conference, {IFM} 2005,
                  Eindhoven, The Netherlands, November 29 - December 2, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3771},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11589976\_7},
  doi          = {10.1007/11589976\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/SchneiderTE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/KaddouraRS05,
  author       = {Maher Kaddoura and
                  Ranga S. Ramanujan and
                  Steven Schneider},
  editor       = {Lawrence Chung and
                  Yeong{-}Tae Song},
  title        = {Routing Optimization Techniques for Wireless Ad Hoc Networks},
  booktitle    = {Proceedings of the 6th {ACIS} International Conference on Software
                  Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing {(SNPD} 2005), May 23-25, 2005, Towson, Maryland, {USA}},
  pages        = {454--459},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SNPD-SAWN.2005.65},
  doi          = {10.1109/SNPD-SAWN.2005.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/KaddouraRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/OuaknineS06,
  author       = {Jo{\"{e}}l Ouaknine and
                  Steve A. Schneider},
  editor       = {Luca Aceto and
                  Andrew D. Gordon},
  title        = {Timed {CSP:} {A} Retrospective},
  booktitle    = {Proceedings of the Workshop "Essays on Algebraic Process Calculi",
                  {APC} 25, Bertinoro, Italy, August 1-5, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {162},
  pages        = {273--276},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.12.093},
  doi          = {10.1016/J.ENTCS.2005.12.093},
  timestamp    = {Fri, 20 Jan 2023 12:38:53 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/OuaknineS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/SchneiderHRT05,
  author       = {Steve A. Schneider and
                  Thai Son Hoang and
                  Ken Robinson and
                  Helen Treharne},
  editor       = {John Derrick and
                  Eerke A. Boiten},
  title        = {Tank Monitoring: {A} pAMN Case Study},
  booktitle    = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford,
                  UK, April 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {137},
  number       = {2},
  pages        = {183--204},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.04.031},
  doi          = {10.1016/J.ENTCS.2005.04.031},
  timestamp    = {Mon, 12 Dec 2022 16:45:39 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/SchneiderHRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/zum/2005,
  editor       = {Helen Treharne and
                  Steve King and
                  Martin C. Henson and
                  Steve A. Schneider},
  title        = {{ZB} 2005: Formal Specification and Development in {Z} and B, 4th
                  International Conference of {B} and {Z} Users, Guildford, UK, April
                  13-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3455},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b135596},
  doi          = {10.1007/B135596},
  isbn         = {3-540-25559-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/zum/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nms/SchneiderF04,
  author       = {Steven M. Schneider and
                  Kirsten A. Foot},
  title        = {The Web as an Object of Study},
  journal      = {New Media Soc.},
  volume       = {6},
  number       = {1},
  pages        = {114--122},
  year         = {2004},
  url          = {https://doi.org/10.1177/1461444804039912},
  doi          = {10.1177/1461444804039912},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nms/SchneiderF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Petride04,
  author       = {Sabina Petride},
  title        = {Review of "Concurrent and real-time systems: the {CSP} approach" by
                  Steve Schneider. Wiley 1999},
  journal      = {{SIGACT} News},
  volume       = {35},
  number       = {2},
  pages        = {4--12},
  year         = {2004},
  url          = {https://doi.org/10.1145/992287.992291},
  doi          = {10.1145/992287.992291},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigact/Petride04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/SchneiderD04,
  author       = {Steve A. Schneider and
                  Rob Delicata},
  editor       = {Ali E. Abdallah and
                  Cliff B. Jones and
                  Jeff W. Sanders},
  title        = {Verifying Security Protocols: An Application of {CSP}},
  booktitle    = {Communicating Sequential Processes: The First 25 Years, Symposium
                  on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised
                  Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3525},
  pages        = {243--263},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423348\_14},
  doi          = {10.1007/11423348\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/SchneiderD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/SchneiderT04,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  editor       = {Eerke A. Boiten and
                  John Derrick and
                  Graeme Smith},
  title        = {Verifying Controlled Components},
  booktitle    = {Integrated Formal Methods, 4th International Conference, {IFM} 2004,
                  Canterbury, UK, April 4-7, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2999},
  pages        = {87--107},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24756-2\_6},
  doi          = {10.1007/978-3-540-24756-2\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifm/SchneiderT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/YeungS03,
  author       = {Wing Lok Yeung and
                  Steve A. Schneider},
  title        = {Design and Verification of Distributed Recovery Blocks with {CSP}},
  journal      = {Formal Methods Syst. Des.},
  volume       = {22},
  number       = {3},
  pages        = {225--248},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1022997110855},
  doi          = {10.1023/A:1022997110855},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/YeungS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmc/FootSDXL03,
  author       = {Kirsten A. Foot and
                  Steven M. Schneider and
                  Meghan Dougherty and
                  Michael Xenos and
                  Elena Larsen},
  title        = {Analyzing Linking Practices: Candidate Sites in the 2002 {US} Electoral
                  Web Sphere},
  journal      = {J. Comput. Mediat. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {0},
  year         = {2003},
  url          = {https://doi.org/10.1111/j.1083-6101.2003.tb00220.x},
  doi          = {10.1111/J.1083-6101.2003.TB00220.X},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmc/FootSDXL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HeatherLS03,
  author       = {James Heather and
                  Gavin Lowe and
                  Steve A. Schneider},
  title        = {How to Prevent Type Flaw Attacks on Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {217--244},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11204},
  doi          = {10.3233/JCS-2003-11204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HeatherLS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GongGRS03,
  author       = {Li Gong and
                  Joshua D. Guttman and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest editorial overview},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {1},
  pages        = {1--4},
  year         = {2003},
  url          = {https://doi.org/10.1109/JSAC.2002.806120},
  doi          = {10.1109/JSAC.2002.806120},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/GongGRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vr/BaumannNFSBVS03,
  author       = {Steve Baumann and
                  Chris Neff and
                  Scott Fetzick and
                  Gregg Stangl and
                  Lee Basler and
                  Ray Vereneck and
                  Walter Schneider},
  title        = {A Virtual Reality System for Neurobehavioral and fMRI Studie},
  booktitle    = {{IEEE} Virtual Reality Conference 2003 {(VR} 2003), 22-26 March 2003,
                  Los Angeles, CA, USA, Proceedings},
  pages        = {312},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/VR.2003.1191192},
  doi          = {10.1109/VR.2003.1191192},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vr/BaumannNFSBVS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/zum/TreharneSB03,
  author       = {Helen Treharne and
                  Steve A. Schneider and
                  Marchia Bramble},
  editor       = {Didier Bert and
                  Jonathan P. Bowen and
                  Steve King and
                  Marina Wald{\'{e}}n},
  title        = {Composing Specifications Using Communication},
  booktitle    = {{ZB} 2003: Formal Specification and Development in {Z} and B, Third
                  International Conference of {B} and {Z} Users, Turku, Finland, June
                  4-6, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2651},
  pages        = {58--78},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44880-2\_5},
  doi          = {10.1007/3-540-44880-2\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/zum/TreharneSB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fasec/2002,
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b94774},
  doi          = {10.1007/B94774},
  isbn         = {3-540-20693-0},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fasec/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeatherS02,
  author       = {James Heather and
                  Steve A. Schneider},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Equal To The Task?},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_10},
  doi          = {10.1007/3-540-45853-0\_10},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HeatherS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmoods/Schneider02,
  author       = {Steve A. Schneider},
  editor       = {Bart Jacobs and
                  Arend Rensink},
  title        = {Verifying Authentication Protocol Implementations},
  booktitle    = {Formal Methods for Open Object-Based Distributed Systems V, {IFIP}
                  {TC6/WG6.1} Fifth International Conference on Formal Methods for Open
                  Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002,
                  Enschede, The Netherlands},
  series       = {{IFIP} Conference Proceedings},
  volume       = {209},
  pages        = {5--24},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fmoods/Schneider02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/zum/SchneiderT02,
  author       = {Steve A. Schneider and
                  Helen Treharne},
  editor       = {Didier Bert and
                  Jonathan P. Bowen and
                  Martin C. Henson and
                  Ken Robinson},
  title        = {Communicating {B} Machines},
  booktitle    = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd
                  International Conference of {B} and {Z} Users, Grenoble, France, January
                  23-25, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2272},
  pages        = {416--435},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45648-1\_22},
  doi          = {10.1007/3-540-45648-1\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/zum/SchneiderT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0009544,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Modelling and analysis of security protocols},
  publisher    = {Addison-Wesley-Longman},
  year         = {2001},
  isbn         = {978-0-201-67471-2},
  timestamp    = {Fri, 25 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0009544.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0015710,
  author       = {Steve A. Schneider},
  title        = {The B-method - an introduction},
  series       = {The cornerstones of computing series},
  publisher    = {Macmillan Publ.},
  year         = {2001},
  isbn         = {978-0-333-79284-1},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0015710.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RyanS01,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Process Algebra and Non-Interference},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {75--103},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-91-204},
  doi          = {10.3233/JCS-2001-91-204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RyanS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/MaximSSHCS01,
  author       = {Adrian Maxim and
                  Baker Scott and
                  Edmund M. Schneider and
                  Melvin Hagge and
                  Steve Chacko and
                  Dan Stiurca},
  title        = {A low-jitter 125-1250-MHz process-independent and ripple-poleless
                  0.18-{\(\mu\)}m {CMOS} {PLL} based on a sample-reset loop filter},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {36},
  number       = {11},
  pages        = {1673--1683},
  year         = {2001},
  url          = {https://doi.org/10.1109/4.962287},
  doi          = {10.1109/4.962287},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jssc/MaximSSHCS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/Schneider01,
  author       = {Steve A. Schneider},
  editor       = {Kim Guldstrand Larsen and
                  Mogens Nielsen},
  title        = {Process Algebra and Security},
  booktitle    = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference,
                  Aalborg, Denmark, August 20-25, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2154},
  pages        = {37--38},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44685-0\_4},
  doi          = {10.1007/3-540-44685-0\_4},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/Schneider01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/MaximSSHCS01,
  author       = {Adrian Maxim and
                  Baker Scott and
                  Ed Schneider and
                  Melvin Hagge and
                  Steve Chacko and
                  Dan Stiurca},
  title        = {Sample-reset loop filter architecture for process independent and
                  ripple-pole-less low jitter {CMOS} charge-pump PLLs},
  booktitle    = {Proceedings of the 2001 International Symposium on Circuits and Systems,
                  {ISCAS} 2001, Sydney, Australia, May 6-9, 2001},
  pages        = {766--769},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ISCAS.2001.922350},
  doi          = {10.1109/ISCAS.2001.922350},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/MaximSSHCS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/Schneider00,
  author       = {Steve A. Schneider},
  title        = {Abstraction and Testing in {CSP}},
  journal      = {Formal Aspects Comput.},
  volume       = {12},
  number       = {3},
  pages        = {165--181},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001650070027},
  doi          = {10.1007/S001650070027},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/Schneider00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/Derrick00,
  author       = {John Derrick},
  title        = {Concurrent and Real-Time Systems: The {CSP} Approach, Steve Schneider,
                  Wiley, 2000 (Book Review)},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {10},
  number       = {3},
  pages        = {195},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1689(200009)10:3\<195::AID-STVR207\>3.0.CO;2-F},
  doi          = {10.1002/1099-1689(200009)10:3\<195::AID-STVR207\>3.0.CO;2-F},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stvr/Derrick00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HeatherLS00,
  author       = {James Heather and
                  Gavin Lowe and
                  Steve A. Schneider},
  title        = {How to Prevent Type Flaw Attacks on Security Protocols},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {255--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856942},
  doi          = {10.1109/CSFW.2000.856942},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HeatherLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HeatherS00,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {Towards Automatic Verification of Authentication Protocols on an Unbounded
                  Network},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {132--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856932},
  doi          = {10.1109/CSFW.2000.856932},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HeatherS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EvansS00,
  author       = {Neil Evans and
                  Steve A. Schneider},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Analysing Time Dependent Security Properties in {CSP} Using {PVS}},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {222--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_14},
  doi          = {10.1007/10722599\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/EvansS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/zum/TreharneS00,
  author       = {Helen Treharne and
                  Steve A. Schneider},
  editor       = {Jonathan P. Bowen and
                  Steve Dunne and
                  Andy Galloway and
                  Steve King},
  title        = {How to Drive a {B} Machine},
  booktitle    = {{ZB} 2000: Formal Specification and Development in {Z} and B, First
                  International Conference of {B} and {Z} Users, York, UK, August 29
                  - September 2, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1878},
  pages        = {188--208},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44525-0\_12},
  doi          = {10.1007/3-540-44525-0\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/zum/TreharneS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Schneider00,
  author       = {Steve A. Schneider},
  editor       = {Ted Hurley and
                  M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and
                  Michel P. Schellekens and
                  Anthony Karel Seda},
  title        = {May Testing, Non-interference, and Compositionality},
  booktitle    = {First Irish Conference on the Mathematical Foundations of Computer
                  Science and Information Technology, {MFCSIT} 2000, Cork, Ireland,
                  July 20-21, 2000},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {40},
  pages        = {361--391},
  publisher    = {Elsevier},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1571-0661(05)80064-7},
  doi          = {10.1016/S1571-0661(05)80064-7},
  timestamp    = {Wed, 30 Nov 2022 10:58:03 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Schneider00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wsaif/1999,
  editor       = {Steve A. Schneider and
                  Peter Ryan},
  title        = {Workshop on Secure Architectures and Information Flow 1999, Royal
                  Holloway, London, UK, December 1-3, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {32},
  publisher    = {Elsevier},
  year         = {2000},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/32/suppl/C},
  timestamp    = {Wed, 30 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsaif/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SchneiderB99,
  author       = {Fred B. Schneider and
                  Steven M. Bellovin},
  title        = {Evolving Telephone Networks},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {1},
  pages        = {160},
  year         = {1999},
  url          = {https://doi.org/10.1145/291469.291485},
  doi          = {10.1145/291469.291485},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SchneiderB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/Solano-FloresRST99,
  author       = {Guillermo Solano{-}Flores and
                  Bruce Raymond and
                  Steven A. Schneider and
                  Michael J. Timms},
  title        = {Management of scoring sessions in alternative assessment: the computer-assisted
                  scoring approach},
  journal      = {Comput. Educ.},
  volume       = {33},
  number       = {1},
  pages        = {47--63},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0360-1315(99)00018-4},
  doi          = {10.1016/S0360-1315(99)00018-4},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ce/Solano-FloresRST99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/SchneiderBI99,
  author       = {Fred B. Schneider and
                  Steven M. Bellovin and
                  Alan S. Inouye},
  title        = {Building Trustworthy Systems: Lessons from the {PTN} and Internet},
  journal      = {{IEEE} Internet Comput.},
  volume       = {3},
  number       = {6},
  pages        = {64--72},
  year         = {1999},
  url          = {https://doi.org/10.1109/4236.807013},
  doi          = {10.1109/4236.807013},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/SchneiderBI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RyanS99,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Process Algebra and Non-Interference},
  booktitle    = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  pages        = {214--227},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSFW.1999.779775},
  doi          = {10.1109/CSFW.1999.779775},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RyanS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Schneider99,
  author       = {Steve A. Schneider},
  editor       = {Jeannette M. Wing and
                  Jim Woodcock and
                  Jim Davies},
  title        = {Abstraction and Testing},
  booktitle    = {FM'99 - Formal Methods, World Congress on Formal Methods in the Development
                  of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings,
                  Volume {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1708},
  pages        = {738--757},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48119-2\_41},
  doi          = {10.1007/3-540-48119-2\_41},
  timestamp    = {Fri, 17 Feb 2023 09:02:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fm/Schneider99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/TreharneS99,
  author       = {Helen Treharne and
                  Steve A. Schneider},
  editor       = {Keijiro Araki and
                  Andy Galloway and
                  Kenji Taguchi},
  title        = {Using a Process Algebra to Control {B} Operations},
  booktitle    = {Integrated Formal Methods, Proceedings of the 1st International Conference
                  on Integrated Formal Methods, {IFM} 99, York, UK, 28-29 June 1999},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-1-4471-0851-1\_23},
  doi          = {10.1007/978-1-4471-0851-1\_23},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/TreharneS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spin/AdekunleS99,
  author       = {Carl B. Adekunle and
                  Steve A. Schneider},
  editor       = {Dennis Dams and
                  Rob Gerth and
                  Stefan Leue and
                  Mieke Massink},
  title        = {Detecting Feature Interactions in the Terrestrial Trunked Radio {(TETRA)}
                  Network Using Promela and Xspin},
  booktitle    = {Theoretical and Practical Aspects of {SPIN} Model Checking, 5th and
                  6th International {SPIN} Workshops, Trento, Italy, July 5, 1999, Toulouse,
                  France, September 21 and 24 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1680},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48234-2\_10},
  doi          = {10.1007/3-540-48234-2\_10},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spin/AdekunleS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/SchneiderR00,
  author       = {Steve A. Schneider and
                  Peter Ryan},
  editor       = {Steve A. Schneider and
                  Peter Ryan},
  title        = {Preface},
  booktitle    = {Workshop on Secure Architectures and Information Flow 1999, Royal
                  Holloway, London, UK, December 1-3, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {32},
  pages        = {113--114},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(05)80565-1},
  doi          = {10.1016/S1571-0661(05)80565-1},
  timestamp    = {Wed, 30 Nov 2022 10:28:30 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/SchneiderR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/egh/1999,
  editor       = {Arie E. Kaufman and
                  Wolfgang Stra{\ss}er and
                  Steven Molnar and
                  Bengt{-}Olaf Schneider},
  title        = {Proceedings of the 1999 {ACM} {SIGGRAPH/EUROGRAPHICS} Workshop on
                  Graphics Hardware, Los Angeles, CA, USA, August 8-9, 1999},
  publisher    = {The Eurographics Association},
  year         = {1999},
  url          = {http://diglib.eg.org/handle/10.2312/336},
  doi          = {10.1145/311534},
  isbn         = {1-58113-170-4},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/egh/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RyanS98,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {An Attack on a Recursive Authentication Protocol. {A} Cautionary Tale},
  journal      = {Inf. Process. Lett.},
  volume       = {65},
  number       = {1},
  pages        = {7--10},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(97)00180-4},
  doi          = {10.1016/S0020-0190(97)00180-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/RyanS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/Schneider98,
  author       = {Steve A. Schneider},
  title        = {Verifying Authentication Protocols in {CSP}},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {24},
  number       = {9},
  pages        = {741--758},
  year         = {1998},
  url          = {https://doi.org/10.1109/32.713329},
  doi          = {10.1109/32.713329},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/Schneider98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/b/TreharneDS98,
  author       = {Helen Treharne and
                  J. Draper and
                  Steve A. Schneider},
  editor       = {Didier Bert},
  title        = {Test Case Preparation Using a Prototype},
  booktitle    = {B'98: Recent Advances in the Development and Use of the {B} Method,
                  Second International {B} Conference, Montpellier, France, April 22-24,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1393},
  pages        = {293--311},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053368},
  doi          = {10.1007/BFB0053368},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/b/TreharneDS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Schneider98,
  author       = {Steve A. Schneider},
  title        = {Formal Analysis of a Non-Repudiation Protocol},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {54--65},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683155},
  doi          = {10.1109/CSFW.1998.683155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Schneider98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icre/SchneiderECH98,
  author       = {Francis Schneider and
                  Steve M. Easterbrook and
                  John R. Callahan and
                  Gerard J. Holzmann},
  title        = {Validating Requirements for Fault Tolerant Systems using Model Checking},
  booktitle    = {3rd International Conference on Requirements Engineering {(ICRE} '98),
                  Putting Requirements Engineering to Practice, April 6-10, 1998, Colorado
                  Springs, CO, USA, Proceedings},
  pages        = {4--13},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICRE.1998.667803},
  doi          = {10.1109/ICRE.1998.667803},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icre/SchneiderECH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Schneider97,
  author       = {Steve A. Schneider},
  title        = {Timewise Refinement for Communicating Processes},
  journal      = {Sci. Comput. Program.},
  volume       = {28},
  number       = {1},
  pages        = {43--90},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-6423(96)00016-0},
  doi          = {10.1016/S0167-6423(96)00016-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/Schneider97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Schneider97,
  author       = {Steve A. Schneider},
  title        = {Verifying authentication protocols with {CSP}},
  booktitle    = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
                  1997, Rockport, Massachusetts, {USA}},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSFW.1997.596775},
  doi          = {10.1109/CSFW.1997.596775},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Schneider97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/DutertreS97,
  author       = {Bruno Dutertre and
                  Steve A. Schneider},
  editor       = {Elsa L. Gunter and
                  Amy P. Felty},
  title        = {Using a {PVS} Embedding of {CSP} to Verify Authentication Protocols},
  booktitle    = {Theorem Proving in Higher Order Logics, 10th International Conference,
                  TPHOLs'97, Murray Hill, NJ, USA, August 19-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1275},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028390},
  doi          = {10.1007/BFB0028390},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tphol/DutertreS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/egh/1997,
  editor       = {Arie E. Kaufman and
                  Wolfgang Stra{\ss}er and
                  Steven Molnar and
                  Bengt{-}Olaf Schneider},
  title        = {Proceedings of the 1997 {ACM} {SIGGRAPH/EUROGRAPHICS} Workshop on
                  Graphics Hardware, Los Angeles, CA, USA, August 3-4, 1997},
  publisher    = {The Eurographics Association},
  year         = {1997},
  url          = {https://doi.org/10.1145/258694},
  doi          = {10.1145/258694},
  isbn         = {0-89791-961-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/egh/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SchneiderS96,
  author       = {Steve A. Schneider and
                  Abraham Sidiropoulos},
  editor       = {Elisa Bertino and
                  Helmut Kurth and
                  Giancarlo Martella and
                  Emilio Montolivo},
  title        = {{CSP} and Anonymity},
  booktitle    = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
                  in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {198--218},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61770-1\_38},
  doi          = {10.1007/3-540-61770-1\_38},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SchneiderS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/ReynaertCGDLLPS96,
  author       = {Philippe Reynaert and
                  Ludwig Callewaert and
                  Georges G. E. Gielen and
                  Geert Debyser and
                  Koen Lampaert and
                  Francky Leyn and
                  Geert Van der Plas and
                  Willy Sansen and
                  Birger Schneider and
                  Ren{\'{e}} Bloch and
                  Dave Orton and
                  Steve Boardman and
                  Jeremy Stent and
                  Jean{-}Fran{\c{c}}ois Aga{\"{e}}sse and
                  J{\"{o}}rg{-}Olliver Fischer{-}Binder and
                  Jukka Riihiaho and
                  Kari Tukkiniemi},
  title        = {{ADMIRE:} advanced mixed signal design environment},
  booktitle    = {Proceedings of Third International Conference on Electronics, Circuits,
                  and Systems, {ICECS} 1996, Rodos, Greece, October 13-16, 1996},
  pages        = {428--431},
  publisher    = {{IEEE}},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICECS.1996.582867},
  doi          = {10.1109/ICECS.1996.582867},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/ReynaertCGDLLPS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/HotovySO96,
  author       = {Steven Hotovy and
                  David Schneider and
                  Timothy J. O'Donnell},
  editor       = {Daniel A. Reed and
                  Blaine D. Gaither},
  title        = {Analysis of the Early Workload on the Cornell Theory Center {IBM}
                  {SP2}},
  booktitle    = {Proceedings of the 1996 {ACM} {SIGMETRICS} international conference
                  on Measurement and modeling of computer systems, Philadelphia, Pennsylvania,
                  USA, May 23-26, 1996},
  pages        = {272--273},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/233013.233060},
  doi          = {10.1145/233013.233060},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/HotovySO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Schneider96,
  author       = {Steve A. Schneider},
  title        = {Security Properties and {CSP}},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {174--187},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502680},
  doi          = {10.1109/SECPRI.1996.502680},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Schneider96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Schneider95,
  author       = {Steve A. Schneider},
  title        = {An Operational Semantics for Timed {CSP}},
  journal      = {Inf. Comput.},
  volume       = {116},
  number       = {2},
  pages        = {193--213},
  year         = {1995},
  url          = {https://doi.org/10.1006/inco.1995.1014},
  doi          = {10.1006/INCO.1995.1014},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Schneider95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/DaviesS95,
  author       = {Jim Davies and
                  Steve A. Schneider},
  title        = {A Brief History of Timed {CSP}},
  journal      = {Theor. Comput. Sci.},
  volume       = {138},
  number       = {2},
  pages        = {243--271},
  year         = {1995},
  url          = {https://doi.org/10.1016/0304-3975(94)00169-J},
  doi          = {10.1016/0304-3975(94)00169-J},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/DaviesS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MisloveRS95,
  author       = {Michael W. Mislove and
                  A. W. Roscoe and
                  Steve A. Schneider},
  title        = {Fixed Points Without Completeness},
  journal      = {Theor. Comput. Sci.},
  volume       = {138},
  number       = {2},
  pages        = {273--314},
  year         = {1995},
  url          = {https://doi.org/10.1016/0304-3975(94)00170-N},
  doi          = {10.1016/0304-3975(94)00170-N},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/MisloveRS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/BryansDS95,
  author       = {Jeremy W. Bryans and
                  Jim Davies and
                  Steve A. Schneider},
  editor       = {Insup Lee and
                  Scott A. Smolka},
  title        = {Towards a denotational semantics for {ET-LOTOS}},
  booktitle    = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia,
                  PA, USA, August 21-24, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {962},
  pages        = {269--283},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60218-6\_20},
  doi          = {10.1007/3-540-60218-6\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/BryansDS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/DaviesBS95,
  author       = {Jim Davies and
                  Jeremy W. Bryans and
                  Steve A. Schneider},
  editor       = {Gregor von Bochmann and
                  Rachida Dssouli and
                  Omar Rafiq},
  title        = {Real-time {LOTOS} and Timed Observations},
  booktitle    = {Formal Description Techniques VIII, Proceedings of the {IFIP} {TC6}
                  Eighth International Conference on Formal Description Techniques,
                  Montreal, Canada, October 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {43},
  pages        = {383--397},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/DaviesBS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/DaviesS94,
  author       = {Jim Davies and
                  Steve A. Schneider},
  title        = {Recursion Induction for Real-Time Processes},
  journal      = {Formal Aspects Comput.},
  volume       = {5},
  number       = {6},
  pages        = {530--553},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01211248},
  doi          = {10.1007/BF01211248},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/DaviesS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/Schneider93,
  author       = {Steve A. Schneider},
  editor       = {Maurice Nivat and
                  Charles Rattray and
                  Teodor Rus and
                  Giuseppe Scollo},
  title        = {Rigorous Specification of Real-Time Systems},
  booktitle    = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings
                  of the Third International Conference on Methodology and Software
                  Technology, University of Twente, Enschede, The Netherlands, 21-25
                  June, 1993},
  series       = {Workshops in Computing},
  pages        = {59--74},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/Schneider93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfps/Schneider93,
  author       = {Steve A. Schneider},
  editor       = {Stephen D. Brookes and
                  Michael G. Main and
                  Austin Melton and
                  Michael W. Mislove and
                  David A. Schmidt},
  title        = {Timewise Refinement for Communicating Processes},
  booktitle    = {Mathematical Foundations of Programming Semantics, 9th International
                  Conference, New Orleans, LA, USA, April 7-10, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {802},
  pages        = {177--214},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58027-1\_9},
  doi          = {10.1007/3-540-58027-1\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mfps/Schneider93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/DaviesS92,
  author       = {Jim Davies and
                  Steve A. Schneider},
  editor       = {Rance Cleaveland},
  title        = {Using {CSP} to Verify a Timed Protocol over a Fair Medium},
  booktitle    = {{CONCUR} '92, Third International Conference on Concurrency Theory,
                  Stony Brook, NY, USA, August 24-27, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {630},
  pages        = {355--369},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0084803},
  doi          = {10.1007/BFB0084803},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/DaviesS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftrtft/DaviesJS92,
  author       = {Jim Davies and
                  Dave Jackson and
                  Steve A. Schneider},
  editor       = {Jan Vytopil},
  title        = {Broadcast Communication for Real-time Processes},
  booktitle    = {Formal Techniques in Real-Time and Fault-Tolerant Systems, Second
                  International Symposium, Nijmegen, The Netherlands, January 8-10,
                  1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {571},
  pages        = {149--169},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55092-5\_9},
  doi          = {10.1007/3-540-55092-5\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ftrtft/DaviesJS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rex/SchneiderDJRRR91,
  author       = {Steve A. Schneider and
                  Jim Davies and
                  D. M. Jackson and
                  George M. Reed and
                  Joy N. Reed and
                  A. W. Roscoe},
  editor       = {J. W. de Bakker and
                  Cornelis Huizing and
                  Willem P. de Roever and
                  Grzegorz Rozenberg},
  title        = {Timed {CSP:} Theory and Practice},
  booktitle    = {Real-Time: Theory in Practice, {REX} Workshop, Mook, The Netherlands,
                  June 3-7, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {600},
  pages        = {640--675},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/BFb0032011},
  doi          = {10.1007/BFB0032011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rex/SchneiderDJRRR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpca/BerryCKKLPPRSCCSFMWHSLOSJGM89,
  author       = {Michael W. Berry and
                  Da{-}Ren Chen and
                  Peter F. Koss and
                  David J. Kuck and
                  Sy{-}Shin Lo and
                  Yingxin Pang and
                  Lynn Pointer and
                  Richard Roloff and
                  Ahmed H. Sameh and
                  Enrico Clementi and
                  Shaoan Chin and
                  David J. Schneider and
                  Geoffrey C. Fox and
                  Paul Messina and
                  David W. Walker and
                  Chris Hsiung and
                  Jim Schwarzmeier and
                  Kok{-}Meng Lue and
                  Steve Orszag and
                  Fred Seidl and
                  Olin G. Johnson and
                  Richard Goodrum and
                  Joanne Martin},
  title        = {The Perfect Club Benchmarks: Effective Performance Evaluation of Supercomputers},
  journal      = {Int. J. High Perform. Comput. Appl.},
  volume       = {3},
  number       = {3},
  pages        = {5--40},
  year         = {1989},
  url          = {https://doi.org/10.1177/109434208900300302},
  doi          = {10.1177/109434208900300302},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpca/BerryCKKLPPRSCCSFMWHSLOSJGM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfps/DaviesS89,
  author       = {Jim Davies and
                  Steve A. Schneider},
  editor       = {Michael G. Main and
                  Austin Melton and
                  Michael W. Mislove and
                  David A. Schmidt},
  title        = {Factorizing Proofs in Timed {CSP}},
  booktitle    = {Mathematical Foundations of Programming Semantics, 5th International
                  Conference, Tulane University, New Orleans, Louisiana, USA, March
                  29 - April 1, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {442},
  pages        = {129--159},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0040256},
  doi          = {10.1007/BFB0040256},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mfps/DaviesS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigart/Schneider88,
  author       = {Victor Schneider},
  title        = {Book review: {A} quick Review of the Elements of Artificial Intelligence:
                  An Introduction Using Lisp by Steven L. Tanimoto (Computer Science
                  Press, 1987)},
  journal      = {{SIGART} Newsl.},
  volume       = {103},
  pages        = {20},
  year         = {1988},
  url          = {https://doi.org/10.1145/44418.1057642},
  doi          = {10.1145/44418.1057642},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigart/Schneider88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MahaneyS85,
  author       = {Stephen R. Mahaney and
                  Fred B. Schneider},
  editor       = {Michael A. Malcolm and
                  H. Raymond Strong},
  title        = {Inexact Agreement: Accuracy, Precision, and Graceful Degradation},
  booktitle    = {Proceedings of the Fourth Annual {ACM} Symposium on Principles of
                  Distributed Computing, Minaki, Ontario, Canada, August 5-7, 1985},
  pages        = {237--249},
  publisher    = {{ACM}},
  year         = {1985},
  url          = {https://doi.org/10.1145/323596.323618},
  doi          = {10.1145/323596.323618},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/MahaneyS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics