{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:46:54Z","timestamp":1726033614878},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223472"},{"type":"electronic","value":"9783030223489"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22348-9_1","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T13:04:54Z","timestamp":1561467894000},"page":"3-13","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Models, Mindsets, Meta: The What, the How, and the Why Not?"],"prefix":"10.1007","author":[{"given":"Tiziana","family":"Margaria","sequence":"first","affiliation":[]},{"given":"Susanne","family":"Graf","sequence":"additional","affiliation":[]},{"given":"Kim G.","family":"Larsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,26]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-61042-1_66","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J Bengtsson","year":"1996","unstructured":"Bengtsson, J., Larsen, K.G., Larsson, F., Pettersson, P., Yi, W.: Uppaal in 1995. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 431\u2013434. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61042-1_66"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60630-0","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","year":"1995","unstructured":"Brinksma, E., Cleaveland, W.R., Larsen, K.G., Margaria, T., Steffen, B. (eds.): TACAS 1995. LNCS, vol. 1019. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60630-0"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/B978-044482830-9\/50027-8","volume-title":"Handbook of Process Algebra","author":"O Burkart","year":"2001","unstructured":"Burkart, O., Caucal, D., Moller, F., Steffen, B.: Verification on infinite structures. In: Bergstra, J., Ponse, A., Smolka, S. (eds.) Handbook of Process Algebra, pp. 545\u2013623. Elsevier Science, Amsterdam (2001). http:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780444828309500278"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BFb0084787","volume-title":"CONCUR \u201992","author":"O Burkart","year":"1992","unstructured":"Burkart, O., Steffen, B.: Model checking for context-free processes. In: Cleaveland, W.R. (ed.) CONCUR 1992. LNCS, vol. 630, pp. 123\u2013137. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/BFb0084787"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-48654-1_9","volume-title":"CONCUR 1994: Concurrency Theory","author":"O Burkart","year":"1994","unstructured":"Burkart, O., Steffen, B.: Pushdown processes: parallel composition and model checking. In: Jonsson, B., Parrow, J. (eds.) CONCUR 1994. LNCS, vol. 836, pp. 98\u2013113. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/978-3-540-48654-1_9"},{"issue":"2","key":"1_CR6","first-page":"89","volume":"2","author":"O Burkart","year":"1995","unstructured":"Burkart, O., Steffen, B.: Composition, decomposition and model checking of pushdown processes. Nordic J. Comput. 2(2), 89\u2013125 (1995). http:\/\/dl.acm.org\/citation.cfm?id=642068.642070","journal-title":"Nordic J. Comput."},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/3-540-63165-8_198","volume-title":"Automata, Languages and Programming","author":"O Burkart","year":"1997","unstructured":"Burkart, O., Steffen, B.: Model checking the full modal mu-calculus for infinite sequential processes. In: Degano, P., Gorrieri, R., Marchetti-Spaccamela, A. (eds.) ICALP 1997. LNCS, vol. 1256, pp. 419\u2013429. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-63165-8_198"},{"issue":"1\u20132","key":"1_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s100090050001","volume":"1","author":"R Cleaveland","year":"1997","unstructured":"Cleaveland, R., Margaria, T., Steffen, B.: Editorial. STTT 1(1\u20132), 1\u20135 (1997). https:\/\/doi.org\/10.1007\/s100090050001","journal-title":"STTT"},{"key":"1_CR9","unstructured":"Cleaveland, R., Parrow, J., Steffen, B.: A semantics based verification tool for finite state systems. In: Proceedings of the 9th International Symposium on Protocol Specification, Testing and Verification, Enschede, The Netherlands, 6\u20139 June 1989, pp. 287\u2013302. North-Holland (1989)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/3-540-52148-8_3","volume-title":"Automatic Verification Methods for Finite State Systems","author":"R Cleaveland","year":"1990","unstructured":"Cleaveland, R., Parrow, J., Steffen, B.: The concurrency workbench. In: Sifakis, J. (ed.) CAV 1989. LNCS, vol. 407, pp. 24\u201337. Springer, Heidelberg (1990). https:\/\/doi.org\/10.1007\/3-540-52148-8_3"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/151646.151648","volume":"15","author":"R Cleaveland","year":"1993","unstructured":"Cleaveland, R., Parrow, J., Steffen, B.: The concurrency workbench: a semantics-based tool for the verification of concurrent systems. ACM Trans. Program. Lang. Syst. 15(1), 36\u201372 (1993). http:\/\/doi.acm.org\/10.1145\/151646.151648","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/3-540-54233-7_129","volume-title":"Automata, Languages and Programming","author":"R Cleaveland","year":"1991","unstructured":"Cleaveland, R., Steffen, B.: Computing behavioural relations, logically. In: Albert, J.L., Monien, B., Artalejo, M.R. (eds.) ICALP 1991. LNCS, vol. 510, pp. 127\u2013138. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-54233-7_129"},{"key":"1_CR13","unstructured":"van Glabbeek, R.J., Smolka, S.A., Steffen, B., Tofts, C.M.N.: Reactive, generative, and stratified models of probabilistic processes. In: Proceedings of the Fifth Annual Symposium on Logic in Computer Science (LICS 1990), pp. 130\u2013141. LICS, IEEE Computer Society (1990)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-45923-5_6","volume-title":"Fundamental Approaches to Software Engineering","author":"A Hagerer","year":"2002","unstructured":"Hagerer, A., Hungar, H., Niese, O., Steffen, B.: Model generation by moderated regular extrapolation. In: Kutsche, R.-D., Weber, H. (eds.) FASE 2002. LNCS, vol. 2306, pp. 80\u201395. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45923-5_6"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-27940-9_17","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"F Howar","year":"2012","unstructured":"Howar, F., Steffen, B., Jonsson, B., Cassel, S.: Inferring canonical register automata. In: Kuncak, V., Rybalchenko, A. (eds.) VMCAI 2012. LNCS, vol. 7148, pp. 251\u2013266. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27940-9_17"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-642-18275-4_19","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"F Howar","year":"2011","unstructured":"Howar, F., Steffen, B., Merten, M.: Automata learning with automated alphabet abstraction refinement. In: Jhala, R., Schmidt, D. (eds.) VMCAI 2011. LNCS, vol. 6538, pp. 263\u2013277. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18275-4_19"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-540-45069-6_31","volume-title":"Computer Aided Verification","author":"H Hungar","year":"2003","unstructured":"Hungar, H., Niese, O., Steffen, B.: Domain-specific optimization in automata learning. In: Hunt, W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 315\u2013327. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45069-6_31"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Knoop, J., R\u00fcthing, O., Steffen, B.: Lazy code motion. In: Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation (PLDI), pp. 224\u2013234. ACM (1992)","DOI":"10.1145\/143103.143136"},{"key":"1_CR19","first-page":"71","volume":"1","author":"J Knoop","year":"1993","unstructured":"Knoop, J., R\u00fcthing, O., Steffen, B.: Lazy strength reduction. J. Program. Lang. 1, 71\u201391 (1993)","journal-title":"J. Program. Lang."},{"issue":"4","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1145\/183432.183443","volume":"16","author":"J Knoop","year":"1994","unstructured":"Knoop, J., R\u00fcthing, O., Steffen, B.: Optimal code motion: theory and practice. ACM Trans. Program. Lang. Syst. 16(4), 1117\u20131155 (1994)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Knoop, J., R\u00fcthing, O., Steffen, B.: Partial dead code elimination. In: Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI), pp. 147\u2013158. ACM (1994)","DOI":"10.1145\/773473.178256"},{"issue":"3","key":"1_CR22","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1145\/229542.229545","volume":"18","author":"J Knoop","year":"1996","unstructured":"Knoop, J., Steffen, B., Vollmer, J.: Parallelism for free: efficient and optimal bitvector analyses for parallel programs. ACM Trans. Program. Lang. Syst. (TOPLAS) 18(3), 268\u2013299 (1996). http:\/\/doi.acm.org\/10.1145\/229542.229545","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"1_CR23","first-page":"41","volume":"73","author":"C Kubczak","year":"2008","unstructured":"Kubczak, C., Margaria, T., Nagel, R., Steffen, B.: Plug and play with FMICS-jETI: beyond scripting and coding. ERCIM News 73, 41\u201342 (2008)","journal-title":"ERCIM News"},{"issue":"Suppl 10","key":"1_CR24","doi-asserted-by":"publisher","first-page":"S8","DOI":"10.1186\/1471-2105-10-S10-S8","volume":"10","author":"AL Lamprecht","year":"2009","unstructured":"Lamprecht, A.L., Margaria, T., Steffen, B.: Bio-jETI: a framework for semantics-based service composition. BMC Bioinform. 10(Suppl 10), S8 (2009)","journal-title":"BMC Bioinform."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Lamprecht, A.L., Margaria, T., Steffen, B.: From bio-jETI process models to native code. In: 14th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2009, Potsdam, Germany, 2\u20134 June 2009, pp. 95\u2013101. IEEE Computer Society, June 2009. http:\/\/www2.computer.org\/portal\/web\/csdl\/doi\/10.1109\/ICECCS.2009.50","DOI":"10.1109\/ICECCS.2009.50"},{"issue":"1\u20132","key":"1_CR26","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s100090050010","volume":"1","author":"KG Larsen","year":"1997","unstructured":"Larsen, K.G., Pettersson, P., Yi, W.: UPPAAL in a nutshell. STTT 1(1\u20132), 134\u2013152 (1997). https:\/\/doi.org\/10.1007\/s100090050010","journal-title":"STTT"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-55179-4","volume-title":"Computer Aided Verification","year":"1992","unstructured":"Larsen, K.G., Skou, A. (eds.): CAV 1991. LNCS, vol. 575. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-55179-4"},{"issue":"10","key":"1_CR28","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MC.2006.355","volume":"39","author":"T Margaria","year":"2006","unstructured":"Margaria, T., Steffen, B.: Service engineering: linking business and IT. Computer 39(10), 45\u201355 (2006). http:\/\/portal.acm.org\/citation.cfm?id=1175939","journal-title":"Computer"},{"issue":"Suppl 4","key":"1_CR29","doi-asserted-by":"publisher","first-page":"S12","DOI":"10.1186\/1471-2105-9-S4-S12","volume":"9","author":"T Margaria","year":"2008","unstructured":"Margaria, T., Kubczak, C., Steffen, B.: Bio-jETI: a service integration, design, and provisioning platform for orchestrated bioinformatics processes. BMC Bioinform. 9(Suppl 4), S12 (2008)","journal-title":"BMC Bioinform."},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Margaria, T., Kubczak, C., Steffen, B., Naujokat, S.: The FMICS-jETI platform: status and perspectives. In: Proceedings of the 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2006), pp. 414\u2013418. IEEE Computer Society Press, Paphos, 11 2006","DOI":"10.1109\/ISoLA.2006.50"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-04930-9_25","volume-title":"The Semantic Web - ISWC 2009","author":"T Margaria","year":"2009","unstructured":"Margaria, T., Meyer, D., Kubczak, C., Isberner, M., Steffen, B.: Synthesizing semantic web service compositions with jMosel and golog. In: Bernstein, A., et al. (eds.) ISWC 2009. LNCS, vol. 5823, pp. 392\u2013407. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04930-9_25"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-31980-1_38","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T Margaria","year":"2005","unstructured":"Margaria, T., Nagel, R., Steffen, B.: jETI: a tool for remote tool integration. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 557\u2013562. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31980-1_38"},{"key":"1_CR33","unstructured":"Margaria, T., Nagel, R., Steffen, B.: Remote integration and coordination of verification tools in JETI. In: Proceedings of 12th IEEE International Conference on the Engineering of Computer-Based Systems, pp. 431\u2013436. IEEE Computer Society, Los Alamitos (2005)"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Margaria, T., Raffelt, H., Steffen, B., Leucker, M.: The LearnLib in FMICS-jETI. In: ICECCS 2007 Proceedings of the 12th IEEE International Conference on Engineering Complex Computer Systems, pp. 340\u2013352. IEEE Computer Society, Washington, DC (2007)","DOI":"10.1109\/ICECCS.2007.43"},{"key":"1_CR35","unstructured":"Margaria, T., Steffen, B.: Aggressive model-driven development: synthesizing systems from models viewed as constraints. In: MBEES, pp. 51\u201362 (2005)"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/978-3-540-69149-5_48","volume-title":"Verified Software: Theories, Tools, Experiments","author":"T Margaria","year":"2008","unstructured":"Margaria, T., Steffen, B.: From the how to the what. In: Meyer, B., Woodcock, J. (eds.) VSTTE 2005. LNCS, vol. 4171, pp. 448\u2013459. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69149-5_48"},{"key":"1_CR37","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/978-3-540-88479-8_35","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation","author":"T Margaria","year":"2008","unstructured":"Margaria, T., Steffen, B.: Agile IT: thinking in user-centric models. In: Margaria, T., Steffen, B. (eds.) ISoLA 2008. CCIS, vol. 17, pp. 490\u2013502. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88479-8_35"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Margaria, T., Steffen, B.: Business process modelling in the jABC: the one-thing-approach. In: Cardoso, J., van der Aalst, W. (eds.) Handbook of Research on Business Process Modeling. IGI Global (2009)","DOI":"10.4018\/978-1-60566-288-6.ch001"},{"key":"1_CR39","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-1-4471-2297-5_10","volume-title":"Conquering Complexity","author":"T Margaria","year":"2012","unstructured":"Margaria, T., Steffen, B.: Service-orientation: conquering complexity with XMDD. In: Hinchey, M., Coyle, L. (eds.) Conquering Complexity, pp. 217\u2013236. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-1-4471-2297-5_10"},{"key":"1_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/11596141_34","volume-title":"Service-Oriented Computing - ICSOC 2005","author":"T Margaria","year":"2005","unstructured":"Margaria, T., Steffen, B., Reitenspie\u00df, M.: Service-oriented design: the roots. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 450\u2013464. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11596141_34"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-19835-9_18","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M Merten","year":"2011","unstructured":"Merten, M., Steffen, B., Howar, F., Margaria, T.: Next generation LearnLib. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 220\u2013223. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19835-9_18"},{"issue":"4","key":"1_CR42","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10009-009-0120-7","volume":"11","author":"H Raffelt","year":"2009","unstructured":"Raffelt, H., Merten, M., Steffen, B., Margaria, T.: Dynamic testing via automata learning. Int. J. Softw. Tools Technol. Transf. (STTT) 11(4), 307\u2013324 (2009)","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"issue":"5","key":"1_CR43","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s10009-009-0111-8","volume":"11","author":"H Raffelt","year":"2009","unstructured":"Raffelt, H., Steffen, B., Berg, T., Margaria, T.: LearnLib: a framework for extrapolating behavioral models. Int. J. Softw. Tools Technol. Transf. (STTT) 11(5), 393\u2013407 (2009)","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"key":"1_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-49727-7_22","volume-title":"Static Analysis","author":"D Schmidt","year":"1998","unstructured":"Schmidt, D., Steffen, B.: Program analysis as model checking of abstract interpretations. In: Levi, G. (ed.) SAS 1998. LNCS, vol. 1503, pp. 351\u2013380. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-49727-7_22 . http:\/\/portal.acm.org\/citation.cfm?coll=GUIDE&dl=GUIDE&id=760066"},{"key":"1_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-54415-1_54","volume-title":"Data flow analysis as model checking","author":"B Steffen","year":"1991","unstructured":"Steffen, B.: Data flow analysis as model checking. In: Ito, T., Meyer, A.R. (eds.) TACS 1991. LNCS, vol. 526, pp. 346\u2013364. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-54415-1_54 . http:\/\/www.springerlink.com\/content\/y5p607674g6q1482\/"},{"key":"1_CR46","unstructured":"Steffen, B.: Generating data flow analysis algorithms from modal specifications. In: Selected Papers of the Conference on Theoretical Aspects of Computer Software, pp. 115\u2013139. Elsevier Science Publishers B. V., Sendai (1993). http:\/\/portal.acm.org\/citation.cfm?id=172313"},{"key":"1_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/3-540-60218-6_6","volume-title":"CONCUR \u201995: Concurrency Theory","author":"B Steffen","year":"1995","unstructured":"Steffen, B., Cla\u00dfen, A., Klein, M., Knoop, J., Margaria, T.: The fixpoint-analysis machine. In: Lee, I., Smolka, S.A. (eds.) CONCUR 1995. LNCS, vol. 962, pp. 72\u201387. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60218-6_6"},{"issue":"1","key":"1_CR48","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1006\/inco.1994.1028","volume":"110","author":"B Steffen","year":"1994","unstructured":"Steffen, B., Ing\u00f3lfsd\u00f3ttir, A.: Characteristic formulae for processes with divergence. Inf. Comput. 110(1), 149\u2013163 (1994)","journal-title":"Inf. Comput."},{"key":"1_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-642-39176-7_21","volume-title":"Model Checking Software","author":"B Steffen","year":"2013","unstructured":"Steffen, B., Isberner, M., Naujokat, S., Margaria, T., Geske, M.: Property-driven benchmark generation. In: Bartocci, E., Ramakrishnan, C.R. (eds.) SPIN 2013. LNCS, vol. 7976, pp. 341\u2013357. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39176-7_21"},{"issue":"4es","key":"1_CR50","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1145\/242224.242385","volume":"28","author":"B Steffen","year":"1996","unstructured":"Steffen, B., Margaria, T.: Tools get formal methods into practice. ACM Comput. Surv. 28(4es), 126 (1996). http:\/\/doi.acm.org\/10.1145\/242224.242385","journal-title":"ACM Comput. Surv."},{"key":"1_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/3-540-48092-7_17","volume-title":"Correct System Design","author":"B Steffen","year":"1999","unstructured":"Steffen, B., Margaria, T.: METAFrame in practice: design of intelligent network services. In: Olderog, E.-R., Steffen, B. (eds.) Correct System Design. LNCS, vol. 1710, pp. 390\u2013415. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48092-7_17"},{"key":"1_CR52","first-page":"847","volume":"51","author":"B Steffen","year":"1997","unstructured":"Steffen, B., Margaria, T., Braun, V., Kalt, N.: Hierarchical service definition. Ann. Rev. Commun. ACM 51, 847\u2013856 (1997)","journal-title":"Ann. Rev. Commun. ACM"},{"issue":"1\u20132","key":"1_CR53","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s100090050003","volume":"1","author":"B Steffen","year":"1997","unstructured":"Steffen, B., Margaria, T., Braun, V.: The electronic tool integration platform: concepts and design. Int. J. Softw. Tools Technol. Transf. (STTT) 1(1\u20132), 9\u201330 (1997)","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"key":"1_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68397-3","volume-title":"Mathematical Foundations of Advanced Informatics, Volume: 1 Inductive Approaches","author":"B Steffen","year":"2018","unstructured":"Steffen, B., R\u00fcthing, O., Huth, M.: Mathematical Foundations of Advanced Informatics, Volume: 1 Inductive Approaches. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-68397-3"},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Steffen, B., R\u00fcthing, O., Isberner, M.: Grundlagen der h\u00f6heren Informatik - Induktives Vorgehen. Springer Vieweg (2014)","DOI":"10.1007\/978-3-642-40146-6"}],"container-title":["Lecture Notes in Computer Science","Models, Mindsets, Meta: The What, the How, and the Why Not?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22348-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T17:51:32Z","timestamp":1663782692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22348-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223472","9783030223489"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22348-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}