Author:
Zhang Gexiang,Pérez-Jiménez Mario J.,Riscos-Núñez Agustín,Verlan Sergey,Konur Savas,Hinze Thomas,Gheorghe Marian
Reference69 articles.
1. H. Abbink, R. van Dijk, T. Dobos, M. Hoogendoorn, C. Jonker, S. Konur, P.P. van Maanen, V. Popova, A. Sharpanskykh, P. van Tooren, J. Treur, J. Valk, L. Xu, P. Yolum, Automated support for adaptive incident management, in Proceedings of the 1st International Workshop on Information Systems for Crisis Response and Management (ISCRAM’04) (Brussels, Belgium, 2004), pp. 153–170
2. U. Alon, Network motifs: theory and experimental approaches. Nat. Rev. Genet. 8(6), 450–61 (2007). https://doi.org/10.1038/nrg2102
3. R. Alur, K. McMillan, D. Peled, Model-checking of correctness conditions for concurrent objects. Inf. Comput. 160(1–2), 167–188 (2000). https://doi.org/10.1006/inco.1999.2847
4. M. Arapinis, M. Calder, L. Denis, M. Fisher, P. Gray, S. Konur, A. Miller, E. Ritter, M. Ryan, S. Schewe, C. Unsworth, R. Yasmin, Towards the verification of pervasive systems. Electron. Commun. EASST 22, 1–15 (2009). https://doi.org/10.14279/tuj.eceasst.22.315
5. C. Baier, B Haverkort, H. Hermanns, J.P. Katoen, Model-checking algorithms for continuous-time markov chains. IEEE Trans. Software Eng. 29, 524–541 (2003). https://doi.org/10.1109/TSE.2003.1205180