Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
All about maude - a high-performance logical framework: how to specify, program and verify systems in rewriting logicJanuary 2007
  • Authors:
  • Manuel Clavel,
  • Francisco Durán,
  • Steven Eker,
  • Patrick Lincoln,
  • Narciso Martí-Oliet,
  • José Meseguer,
  • Carolyn Talcott
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-3-540-71940-3
Published:01 January 2007
Pages:
756
Skip Bibliometrics Section
Reflects downloads up to 06 Feb 2025Bibliometrics
Abstract

No abstract available.

References

  1. Agha, G.: Actors: A Model of Concurrent Computation in Distributed Systems. MIT Press, Cambridge (1986) Google ScholarGoogle Scholar
  2. Agha, G., Gunter, C., Greenwald, M., Khanna, S., Meseguer, J., Sen, K., Thati, P.: Formal modeling and analysis of DoS using probabilistic rewrite theories. In: Sabelfeld, A. (ed.) Proceedings Workshop on Foundations of Computer Security, FCS'05 (affiliated with LICS'05), Chicago, IL, June 30- July 1, 2005, pp. 91-102 (2005), http://www.cs.chalmers.se/~andrei/FCS05/fcs05.pdfGoogle ScholarGoogle Scholar
  3. Agha, G., Meseguer, J., Sen, K.: PMaude: Rewrite-based specification language for probabilistic object systems. In: Cerone, A., Wiklicky, H. (eds.) Proceedings Third Workshop on Quantitative Aspects of Programming Languages, QAPL'05, Edinburgh, UK, April 2005. Electronic Notes in Theoretical Computer Science, vol. 153(2), pp. 213-239. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  4. Ahrendt, W., Roth, A., Sasse, R.: Automatic validation of transformation rules for Java verification against a rewriting semantics. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 412-426. Springer, Heidelberg (2005)Google ScholarGoogle Scholar
  5. Al-Turki, M.: A rewriting logic approach to the semantics of Orc. Master's thesis, Computer Science Department, University of Illinois at Urbana-Champaign (December 2005)Google ScholarGoogle Scholar
  6. Albarrán, A., Durán, F., Vallecillo, A.: From Maude specifications to SOAP distributed implementations: A smooth transition. In: VI Jornadas Ingeniería del Software y Bases de Datos (JISBD'01), pp. 419-433 (2001)Google ScholarGoogle Scholar
  7. Albarrán, A., Durán, F., Vallecillo, A.: Maude meets CORBA. In: Proceedings 2nd Argentine Symposium on Software Engineering, Buenos Aires, Argentina, September 10-11, 2001 (2001)Google ScholarGoogle Scholar
  8. lbarrán, A., Durán, F., Vallecillo, A.: On the smooth implementation of component-based system specifications. In: Proceedings 6th ECOOP International Workshop on Component-Oriented Programming, WCOP'01, Budapest, Hungary, June 2001Google ScholarGoogle Scholar
  9. van Baalen, J., Caldwell, J. L., Mishra, S.: Specifying and checking fault-tolerant agent-based protocols using Maude. In: Rash, J. L., Rouff, C. A., Truszkowski, W., Gordon, D. F., Hinchey, M. G. (eds.) FAABS 2000. LNCS (LNAI), vol. 1871, pp. 180-193. Springer, Heidelberg (2001)Google ScholarGoogle Scholar
  10. Baker, H. G., Hewitt, C.: Laws for communicating parallel processes. In: Proceedings of the 1977 IFIP Congress, pp. 987-992. IFIP Press (1977)Google ScholarGoogle Scholar
  11. Ball, W. W. R., Coxeter, H. S. M.: Mathematical Recreations and Essays. Dover (1987)Google ScholarGoogle Scholar
  12. Basin, D., Clavel, M., Meseguer, J.: Reflective metalogical frameworks. In: Proceedings of LFM'99: Workshop on Logical Frameworks and Metalanguages, Paris, France, September 28, 1999 (1999), http://www.site.uottawa.ca/~afelty/LFM99/index.htmlGoogle ScholarGoogle Scholar
  13. Basin, D., Clavel, M., Meseguer, J.: Rewriting logic as a metalogical framework. In: Kapoor, S., Prasad, S. (eds.) FST TCS 2000. LNCS, vol. 1974, pp. 55-80. Springer, Heidelberg (2000)Google ScholarGoogle Scholar
  14. Basin, D., Clavel, M., Meseguer, J.: Reflective metalogical frameworks. ACM Transactions on Computational Logic 5(3), 528-576 (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Basin, D., Denker, G.: Maude versus Haskell: An experimental comparison in security protocol analysis. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 235-256. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  16. Bergstra, J., Tucker, J.: Characterization of computable data types by means of a finite equational specification method. In: de Bakker, J.W., van Leeuwen, J. (eds.) Automata, Languages and Programming. LNCS, vol. 85, pp. 76-90. Springer, Heidelberg (1980) Google ScholarGoogle Scholar
  17. Berkling, K. J., Fehr, E.: A consistent extension of the lambda-calculus as a base for functional programming languages. Information and Control 55, 89-101 (1982)Google ScholarGoogle ScholarCross RefCross Ref
  18. Blaha, M., Rumbaugh, J.: Object-oriented modeling and design with UML, 2nd edn. Prentice-Hall, Englewood Cliffs (2005)Google ScholarGoogle Scholar
  19. Boehm, H.-J., Atkinson, R. R., Plass, M. F.: Ropes: An alternative to strings. Software Practice and Experience 25(12), 1315-1330 (1995) Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Bogomolny, A.: Interactive mathematics miscellany and puzzles, http://www.cut-the-knot.org/games.shtml.Google ScholarGoogle Scholar
  21. Boronat, A., Carsí, J.A., Ramos, I.: Algebraic specification of a model transformation engine. In: Baresi, L., Heckel, R. (eds.) FASE 2006 and ETAPS 2006. LNCS, vol. 3922, pp. 262-277. Springer, Heidelberg (2006)Google ScholarGoogle Scholar
  22. Borovansky, P., Kirchner, C., Kirchner, H., Moreau, P.-E.: ELAN from a rewriting logic point of view. Theoretical Computer Science 285(2), 155-185 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Bouhoula, A., Jouannaud, J.-P., Meseguer, J.: Specification and proof in membership equational logic. Theoretical Computer Science 236, 35-132 (2000) Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Braga, C.: Rewriting Logic as a Semantic Framework for Modular Structural Operational Semantics. PhD thesis, Departamento de Informática, Pontificia Universidade Católica de Rio de Janeiro, Brasil (2001)Google ScholarGoogle Scholar
  25. Braga, C., Haeusler, H., Meseguer, J., Mosses, P.: Maude Action Tool: Using reflection to map action semantics to rewriting logic. In: Rus, T. (ed.) AMAST 2000. LNCS, vol. 1816, pp. 407-421. Springer, Heidelberg (2000)Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Braga, C., Meseguer, J.: Modular rewriting semantics in practice. In: MartíOliet, N. (ed.) Proceedings Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer, vol. 117, pp. 393-416. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  27. Bruni, R.: Tile Logic for Synchronized Rewriting of Concurrent Systems. PhD thesis, Dipartimento di Informatica, Università di Pisa. Technical Report TD- 1/99 (1999), http://www.di.unipi.it/phd/tesi/tesi_1999/TD-1-99.ps.gzGoogle ScholarGoogle Scholar
  28. Bruni, R., Meseguer, J.: Generalized rewrite theories. In: Baeten, J. C. M., Lenstra, J. K., Parrow, J., Woeginger, G. J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 252-266. Springer, Heidelberg (2003)Google ScholarGoogle Scholar
  29. Bruni, R., Meseguer, J., Montanari, U.: Implementing tile systems: Some examples from process calculi. In: Degano, P., Vaccaro, U., Pirillo, G. (eds.) Proceedings 6th Italian Conference on Theoretical Computer Science, ICTCS'98, pp. 168-179. World Scientific (1998)Google ScholarGoogle Scholar
  30. Bruni, R., Meseguer, J., Montanari, U.: Internal strategies in a rewriting implementation of tile systems. In: Kirchner, C., Kirchner, H. (eds.) Proceedings Second International Workshop on Rewriting Logic and its Applications, WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15, pp. 95-116. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  31. Bruni, R., Meseguer, J., Montanari, U.: Process and term tile logic. Technical Report SRI-CSL-98-06, Computer Science Laboratory, SRI International, July 1998. Also TR-98-09, Dipartimento di Informatica, Università di Pisa, http://www.di.unipi.it/~bruni/publications/techrep98.ps.gz Google ScholarGoogle Scholar
  32. Bruni, R., Meseguer, J., Montanari, U.: Executable tile specifications for process calculi. In: Finance, J.-P. (ed.) FASE 1999 and ETAPS 1999. LNCS, vol. 1577, pp. 60-76. Springer, Heidelberg (1999) Google ScholarGoogle Scholar
  33. Burstall, R., Goguen, J. A.: The semantics of Clear, a specification language. In: Bjorner, D. (ed.) Abstract Software Specifications. LNCS, vol. 86, pp. 292-332. Springer, Heidelberg (1980) Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Butler, F., Cervesato, I., Jaggard, A. D., Scedrov, A.: A formal analysis of some properties of Kerberos 5 using MSR. In: Fifteenth Computer Security Foundations Workshop - CSFW-15, Cape Breton, NS, Canada, 24-26 June 2002, pp. 175-190. IEEE Computer Society Press, Los Alamitos (2002) Google ScholarGoogle Scholar
  35. Calder, M., Shankland, C.: A symbolic semantics and bisimulation for Full LOTOS. In: Kim, M., Chin, B., Kang, S., Lee, D. (eds.) Proceedings of FORTE 2001, 21st International Conference on Formal Techniques for Networked and Distributed Systems, pp. 184-200. Kluwer Academic Publishers, Dordrecht (2001) Google ScholarGoogle Scholar
  36. Carabetta, G., Degano, P., Gadducci, F.: CCS semantics via proved transition systems and rewriting logic. In: Kirchner, C., Kirchner, H. (eds.) Proceedings Second International Workshop on Rewriting Logic and its Applications, WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15, pp. 253-272. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  37. Carrano, F. M., Prichard, J. J.: Data Abstraction and Problem Solving with C++, 3rd edn. Addison-Wesley, Reading (2002)Google ScholarGoogle Scholar
  38. Cervesato, I.: A specification language for crypto-protocols based on multiset rewriting, dependent types and subsorting. In: Workshop on Specification, Analysis and Validation for Emerging Technologies, pp. 1-22 (2001)Google ScholarGoogle Scholar
  39. Cervesato, I.: Typed MSR: Syntax and examples. In: Gorodetski, V. I., Skormin, V. A., Popyack, L. J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 159-177. Springer, Heidelberg (2001)Google ScholarGoogle Scholar
  40. Cervesato, I.: Data access specification and the most powerful symbolic attacker in MSR. In: Okada, M., Pierce, B. C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 384-416. Springer, Heidelberg (2003)Google ScholarGoogle Scholar
  41. Cervesato, I., Durgin, N., Lincoln, P. D., Mitchell, J. C., Scedrov, A.: A meta-notation for protocol analysis. In: 12th Computer Security Foundations Workshop - CSFW-12, Mordano, Italy, 28-30 June 1999, pp. 55-69. IEEE Computer Society Press, Los Alamitos (1999) Google ScholarGoogle ScholarCross RefCross Ref
  42. Cervesato, I., Stehr, M.-O.: Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types. In: Martí-Oliet, N. (ed.) Proceedings Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117, pp. 183-207. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  43. Cervesato, I., Stehr, M.-O.: Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types. Higher-Order and Symbolic Computation 20(1-2), 3-35 (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Chalub, F.: An Implementation of Modular SOS in Maude. Master's thesis, Universidade Federal Fluminense (May 2005), http://www.ic.uff.br/~frosario/dissertation.pdf.Google ScholarGoogle Scholar
  45. Chalub, F., Braga, C.: A modular rewriting semantics for CML. Journal of Universal Computer Science 10(7), 789-807 (2004), http://www.jucs.org/jucs_10_7/a_modular_rewriting_semanticsGoogle ScholarGoogle Scholar
  46. Chalub, F., Braga, C.: Maude MSOS tool. In: Denker, G., Talcott, C. (eds.) Proceedings Sixth International Workshop on Rewriting Logic and its Applications, WRLA 2006, Vienna, Austria, April 1-2, 2006. Electronic Notes in Theoretical Computer Science, pp. 3-17. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  47. Chen, F., Rosu, G., Venkatesan, R. P.: Rule-based analysis of dimensional safety. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 197-207. Springer, Heidelberg (2003)Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Cirstea, H.: Calcul de Réécriture: Fondements et Applications. PhD thesis, Université Henri Poincaré - Nancy I (2000)Google ScholarGoogle Scholar
  49. Cirstea, H., Kirchner, C.: Combining higher-order and first-order computations using ρ-calculus: Towards a semantics of ELAN. In: Gabbay, D., de Rijke, M. (eds.) Frontiers of Combining Systems 2, pp. 95-121. Research Studies Press/Wiley, Chichester (1999)Google ScholarGoogle Scholar
  50. Cirstea, H., Kirchner, C.: The simply typed rewriting calculus. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 23-41. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  51. Cirstea, H., Kirchner, C.: The rewriting calculus - Part I. Logic Journal of the Interest Group in Pure and Applied Logics 9(3), 363-399 (2001)Google ScholarGoogle Scholar
  52. Cirstea, H., Kirchner, C.: The rewriting calculus - Part II. Logic Journal of the Interest Group in Pure and Applied Logics 9(3), 401-434 (2001)Google ScholarGoogle Scholar
  53. Cirstea, H., Kirchner, C., Liquori, L.: The rho cube. In: Honsell, F., Miculan, M. (eds.) FOSSACS 2001 and ETAPS 2001. LNCS, vol. 2030, pp. 168-183. Springer, Heidelberg (2001)Google ScholarGoogle Scholar
  54. Clarke, E. M., Grumberg, O., Peled, D. A.: Model Checking. MIT Press, Cambridge (1999) Google ScholarGoogle Scholar
  55. Clavel, M.: Reflection in General Logics and in Rewriting Logic, with Applications to the Maude Language. PhD thesis, Universidad de Navarra, Spain (February 1998)Google ScholarGoogle Scholar
  56. Clavel, M.: Reflection in Rewriting Logic: Metalogical Foundations and Metaprogramming Applications. CSLI Publications (2000) Google ScholarGoogle Scholar
  57. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J. F.: Maude: specification and programming in rewriting logic. SRI International (January 1999), http://maude.cs.uiuc.edu/maude1/manual/Google ScholarGoogle Scholar
  58. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J. F.: A tutorial on Maude. SRI International (March 2000), http://maude.cs.uiuc.edu/maude1/tutorial/Google ScholarGoogle Scholar
  59. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J. F.: Towards Maude 2.0. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 294-315. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  60. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J. F.: Maude: specification and programming in rewriting logic. Theoretical Computer Science 285(2), 187-243 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Clavel, M., Durán, F., Eker, S., Meseguer, J.: Building equational proving tools by reflection in rewriting logic. In: Proceedings of the CafeOBJ Symposium '98, Numazu, Japan, CafeOBJ Project (April 1998), http://maude.cs.uiuc.edu/papers/Google ScholarGoogle Scholar
  62. Clavel, M., Durán, F., Eker, S., Meseguer, J.: Design and implementation of the Cafe prover and the Church-Rosser checker tools. Technical report. Computer Science Laboratory, SRI International (March 1998), http://maude.cs.uiuc.edu/papers/Google ScholarGoogle Scholar
  63. Clavel, M., Durán, F., Eker, S., Meseguer, J.: Building equational proving tools by reflection in rewriting logic. In: Futatsugi, K., Nakagawa, A. T., Tamai, T. (eds.) CAFE: An Industrial-Strength Algebraic Formal Method, Elsevier, Amsterdam (2000), http://maude.cs.uiuc.edu/papers/Google ScholarGoogle Scholar
  64. Clavel, M., Durán, F., Eker, S., Meseguer, J., Stehr, M.-O.: Maude as a formal meta-tool. In: Woodcock, J. C. P., Davies, J., Wing, J. M. (eds.) FM 1999. LNCS, vol. 1709, pp. 1684-1703. Springer, Heidelberg (1999)Google ScholarGoogle Scholar
  65. Clavel, M., Egea, M.: ITP/OCL: A rewriting-based validation tool for UML+OCL static class diagrams. In: Johnson, M., Vene, V. (eds.) AMAST 2006. LNCS, vol. 4019, pp. 368-373. Springer, Heidelberg (2006)Google ScholarGoogle Scholar
  66. Clavel, M., Meseguer, J.: Reflection and strategies in rewriting logic. In: Meseguer, J. (ed.) Proceedings First International Workshop on Rewriting Logic and its Applications, WRLA'96, Asilomar, California, September 3-6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4, pp. 126-148. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  67. Clavel, M., Meseguer, J.: Reflection in conditional rewriting logic. Theoretical Computer Science 285(2), 245-288 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Clavel, M., Meseguer, J., Palomino, M.: Reflection in membership equational logic, many-sorted equational logic, Horn logic with equality, and rewriting logic. In: Gadducci, F., Montanari, U. (eds.) Proceedings Fourth International Workshop on Rewriting Logic and its Applications, WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71, pp. 91-107. Elsevier, Amsterdam (2004)Google ScholarGoogle Scholar
  69. Clavel, M., Palomino, M., Riesco, A.: Introducing the ITP tool: a tutorial. Journal of Universal Computer Science 12(11), 1618-1650 (2006)Google ScholarGoogle Scholar
  70. Clavel, M., Palomino, M., Santa-Cruz, J.: Integrating decision procedures in reflective rewriting-based theorem provers. In: Antoy, S., Toyama, Y. (eds.) Proceedings 4th InternationalWorkshop on Reduction Strategies in Rewriting and Programming (WRS'04), Aachen, Germany, June 2004, pp. 15-24 (2004), http://www-i2.informatik.rwth-aachen.de/WRS04/WRS-proceedings.pdfGoogle ScholarGoogle Scholar
  71. Clavel, M., Santa-Cruz, J.: ASIP + ITP: A verification tool based on algebraic semantics. In: López-Fraguas, F.J. (ed.) V Jornadas sobre Programación y Lenguajes, PROLE 2005, pp. 149-158. Thomson, Madrid (2005)Google ScholarGoogle Scholar
  72. Contejean, E., Devie, H.: An efficient incremental algorithm for solving systems of linear diophantine equations. Information and Computation 113(1), 143-172 (1994) Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Coquand, T., Huet, G.: The calculus of constructions. Information and Computation 76(2/3), 95-120 (1988) Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. d'Amorim, M., Rosu, G.: An equational specification for the Scheme language. Journal of Universal Computer Science 11(7), 1327-1348 (2005)Google ScholarGoogle Scholar
  75. Degano, P., Gadducci, F., Priami, C.: A causal semantics for CCS via rewriting logic. Theoretical Computer Science 275(1-2), 271-304 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Denker, G., García-Luna-Aceves, J. J., Meseguer, J., Ölveczky, P. C., Raju, J., Smith, B., Talcott, C. L.: Specification and analysis of a reliable broadcasting protocol in Maude. In: Hajek, B., Sreenivas, R. S. (eds.) Proceedings 37th Allerton Conference on Communication, Control and Computation, pp. 738- 747. University of Illinois (1999)Google ScholarGoogle Scholar
  77. Denker, G., García-Luna-Aceves, J.J., Meseguer, J., Ölveczky, P. C., Raju, J., Smith, B., Talcott, C. L.: Specifying a reliable broadcasting protocol in Maude. Technical report, Computer Science Laboratory, SRI International (1999)Google ScholarGoogle Scholar
  78. Denker, G., Meseguer, J., Talcott, C. L.: Protocol specification and analysis in Maude. In: Heintze, N., Wing, J. (eds.) Proceedings of Workshop on Formal Methods and Security Protocols, June 25, 1998, Indianapolis, Indiana (1998)Google ScholarGoogle Scholar
  79. Denker, G., Meseguer, J., Talcott, C. L.: Formal specification and analysis of active networks and communication protocols: The Maude experience. In: Maughan, D., Koob, G., Saydjari, S. (eds.) Proceedings DARPA Information Survivability Conference and Exposition, DISCEX 2000, Hilton Head Island, South Carolina, January 25-27, 2000, pp. 251-265. IEEE Computer Society Press, Los Alamitos (2000)Google ScholarGoogle Scholar
  80. Denker, G., Meseguer, J., Talcott, C. L.: Rewriting semantics of meta-objects and composable distributed services. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 407-427. Elsevier, Amsterdam (2000)Google ScholarGoogle Scholar
  81. Denker, G., Millen, J.: CAPSL and CIL language design: A common authentication protocol specification language and its intermediate language. Technical Report SRI-CSL-99-02, Computer Science Laboratory, SRI International (1999), http://www.csl.sri.com/~denker/pub_99.htmlGoogle ScholarGoogle Scholar
  82. Denker, G., Millen, J.: CAPSL intermediate language. In: Heintze, N., Clarke, E. (eds.) Proceedings ofWorkshop on Formal Methods and Security Protocols, FMSP'99, July 1999, Trento, Italy (1999)Google ScholarGoogle Scholar
  83. Denker, G., Millen, J.: CAPSL integrated protocol environment. In: Maughan, D., Koob, G., Saydjari, S. (eds.) Proceedings DARPA Information Survivability Conference and Exposition, DISCEX 2000, Hilton Head Island, South Carolina, January 25-27, 2000, pp. 207-222. IEEE Computer Society Press, Los Alamitos (2000)Google ScholarGoogle Scholar
  84. Denker, G., Millen, J.: The CAPSL integrated protocol environment. Computer Science Laboratory, SRI International. Technical Report SRI-CSL-2000- 02 (2000)Google ScholarGoogle Scholar
  85. Denker, G., Talcott, C. (eds.): Proceedings Sixth International Workshop on Rewriting Logic and its Applications, WRLA 2006, Vienna, Austria, April 1- 2, 2006. Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  86. Denker, G., Talcott, C. L.: Formal checklists for remote agent dependability. In: Martí-Oliet, N. (ed.) Proceedings Fifth InternationalWorkshop on Rewriting Logic and its Applications. WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117, pp. 229- 248. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  87. Denker, G., Talcott, C. L.: A formal framework for goal net analysis. In:Workshop on Verification and Validation of Planning Systems, AAAI (2005)Google ScholarGoogle Scholar
  88. Deplagne, E.: Sequent calculus viewed modulo. In: Pilièere, C. (ed.) Proceedings of the Fifth ESSLLI Student Session, pp. 66-76 (2000)Google ScholarGoogle Scholar
  89. Dershowitz, N., Jouannaud, J.-P.: Rewrite systems. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics, pp. 243-320. North-Holland, Amsterdam (1990) Google ScholarGoogle Scholar
  90. van Deursen, A.: Executable Language Definitions. PhD thesis, University of Amsterdam (1994)Google ScholarGoogle Scholar
  91. van Deursen, A., Heering, J., Klint, P. (eds.): Language Prototyping: An Algebraic Specification Approach. World Scientific (1996) Google ScholarGoogle Scholar
  92. Domenjoud, E.: Solving systems of linear diophantine equations: An algebraic approach. In: Tarlecki, A. (ed.) Mathematical Foundations of Computer Science 1991. LNCS, vol. 520, pp. 9-13. Springer, Heidelberg (1991)Google ScholarGoogle Scholar
  93. Dowek, G., Hardin, T., Kirchner, C.: Higher order unification via explicit substitutions. Information and Computation 157(1/2), 183-235 (2000) Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Dowek, G., Hardin, T., Kirchner, C.: HOL-λσ: An intentional first-order expression of higher-order logic. Mathematical Structures in Computer Science 11(1), 21-45 (2001) Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Dowek, G., Hardin, T., Kirchner, C.: Theorem proving modulo. Journal of Automated Reasoning 31(1), 33-72 (2003) Google ScholarGoogle ScholarCross RefCross Ref
  96. Durán, F.: Coherence checker and completion tools for Maude specifications. Manuscript, Computer Science Laboratory, SRI International (2000), http://www.lcc.uma.es/~duran/ChC/Google ScholarGoogle Scholar
  97. Durán, F.: Termination checker and Knuth-Bendix completion tools for Maude equational specifications. Manuscript, Computer Science Laboratory, SRI International (2000), http://maude.cs.uiuc.edu/papers/Google ScholarGoogle Scholar
  98. Durán, F.: A Reflective Module Algebra with Applications to the Maude Language. PhD thesis, University of Málaga, Spain (1999), http://maude.cs.uiuc.edu/papers/Google ScholarGoogle Scholar
  99. Durán, F.: The extensibility of Maude's module algebra. In: Rus, T. (ed.) AMAST 2000. LNCS, vol. 1816, pp. 422-437. Springer, Heidelberg (2000)Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Durán, F., Eker, S., Lincoln, P., Meseguer, J.: Principles of Mobile Maude. In: Kotz, D., Mattern, F. (eds.) MA 2000, ASA/MA 2000, and ASA 2000. LNCS, vol. 1882, pp. 73-85. Springer, Heidelberg (2000) Google ScholarGoogle Scholar
  101. Durán, F., Escobar, S., Lucas, S.: Towards (constructor) normal forms for Maude within Full Maude. In: Lucas, S., Gallardo, M.-M., Pimentel, E. (eds.) IV Jornadas sobre Programación y Lenguajes, PROLE 2004, pp. 125-136 (2004)Google ScholarGoogle Scholar
  102. Durán, F., Escobar, S., Lucas, S.: New evaluation commands for Maude within Full Maude. In: Martí-Oliet, N. (ed.) Proceedings Fifth International Workshop on Rewriting Logic and its Applications. WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117, pp. 263-284. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  103. Durán, F., Escobar, S., Lucas, S.: On-demand evaluation for Maude. In: Abdennadher, S., Ringeissen, C. (eds.) Proceedings Fifth International Workshop on Rule-Based Programming. RULE 2004, Aachen, Germany. Electronic Notes in Theoretical Computer Science, vol. 124(1), pp. 25-39. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  104. Durán, F., Lucas, S., Meseguer, J., Marché, C., Urbain, X.: Proving termination of membership equational programs. In: Sestoft, P., Heintze, N. (eds.) Proceedings ACM SIGPLAN 2004 Symposium on Partial Evaluation and Program Manipulation, PEPM'04, pp. 147-158. ACM Press, New York (2004) Google ScholarGoogle Scholar
  105. Durán, F., Lucas, S., Meseguer, J., Marché, C., Urbain, X.: Proving operational termination of membership equational programs. Higher-Order and Symbolic Computation (to appear, 2007) Google ScholarGoogle Scholar
  106. Durán, F., Meseguer, J.: A Church-Rosser checker tool for Maude equational specifications. Manuscript, Computer Science Laboratory, SRI International (2000), http://www.lcc.uma.es/~duran/CRC/Google ScholarGoogle Scholar
  107. Durán, F., Meseguer, J.: An extensible module algebra for Maude. In: Kirchner, C., Kirchner, H. (eds.) Proceedings Second International Workshop on Rewriting Logic and its Applications. WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15, pp. 174-195. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  108. Durán, F., Meseguer, J.: The Maude specification of Full Maude. Technical report, Computer Science Laboratory, SRI International (Feb. 1999), http://maude.cs.uiuc.edu/papers/Google ScholarGoogle Scholar
  109. Durán, F., Meseguer, J.: Parameterized theories and views in Full Maude 2.0. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications. WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 316-338. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  110. Durán, F., Meseguer, J.: Structured theories and institutions. Theoretical Computer Science 309(1-3), 357-380 (2003) Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Durán, F., Meseguer, J.: Maude's module algebra. Science of Computer Programming 66(2), 125-153 (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Durán, F., Roldán, M., Vallecillo, A.: Using Maude to write and execute ODP information viewpoint specifications. Computer Standards and Interfaces 27(6), 597-620 (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. Durán, F., Vallecillo, A.: Formalizing ODP enterprise specifications in Maude. Computer Standards and Interfaces 25(2), 83-102 (2003) Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Durán, F., Verdejo, A.: A conference reviewing system in Mobile Maude. In: Gadducci, F., Montanari, U. (eds.) Proceedings Fourth International Workshop on Rewriting Logic and its Applications. WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71, pp. 79-95. Elsevier, Amsterdam (2004), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  115. Egea, M.: ITP/OCL: A theorem prover-based tool for UML+OCL class diagrams. Master's thesis, Facultad de Informática, Universidad Complutense de Madrid (Sept. 2005), http://maude.sip.ucm.es/~marina/pubs/dea.pdfGoogle ScholarGoogle Scholar
  116. Ehrig, H., Mahr, B.: Fundamentals of Algebraic Specification 1, Equations and Initial Semantics. EATCS Monographs on Theoretical Computer Science, vol. 6. Springer, Heidelberg (1985)Google ScholarGoogle ScholarCross RefCross Ref
  117. Eker, S.: Fast matching in combination of regular equational theories. In: Meseguer, J. (ed.) Proceedings First International Workshop on Rewriting Logic and its Applications. WRLA'96, Asilomar, California, September 3-6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4, pp. 90-109. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  118. Eker, S.: Term rewriting with operator evaluation strategies. In: Kirchner, C., Kirchner, H. (eds.) Proceedings Second International Workshop on Rewriting Logic and its Applications. WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15, pp. 311-330. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  119. Eker, S.: Associative-commutative rewriting on large terms. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 14-29. Springer, Heidelberg (2003)Google ScholarGoogle Scholar
  120. Eker, S., Knapp, M., Laderoute, K., Lincoln, P., Talcott, C.: Pathway Logic: Executable models of biological networks. In: Gadducci, F., Montanari, U. (eds.) Proceedings Fourth International Workshop on Rewriting Logic and its Applications. WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71, pp. 125-142. Elsevier, Amsterdam (2004), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  121. Eker, S., Meseguer, J., Sridharanarayanan, A.: The Maude LTL model checker. In: Gadducci, F., Montanari, U. (eds.) Proceedings Fourth International Workshop on Rewriting Logic and its Applications. WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71, pp. 143-168. Elsevier, Amsterdam (2004), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  122. Enderton, H. B.: A Mathematical Introduction to Logic, 2nd edn. Academic Press, London (2000)Google ScholarGoogle Scholar
  123. Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer: Grammar generation. In: Proceedings FMSE'05, Formal Methods in Security Engineering, Alexandria, Virginia, November 2005, pp. 1-12. ACM Press, New York (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Escobar, S., Meadows, C., Meseguer, J.: Equational cryptographic reasoning in the Maude-NRL Protocol Analyzer. In: Fernández, M., Kirchner, C. (eds.) Proceedings First International Workshop on Security and Rewriting Techniques, SecReT 2006, Venice, Italy, July 15, 2006. Electronic Notes in Theoretical Computer Science, Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  125. Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theoretical Computer Science 367(1-2), 162-202 (2006) Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Escobar, S., Meseguer, J., Thati, P.: Natural narrowing for general term rewriting systems. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 279-293. Springer, Heidelberg (2005)Google ScholarGoogle Scholar
  127. Farzan, A., Cheng, F., Meseguer, J., Rosu, G.: Formal analysis of Java programs in JavaFAN. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol. 3114, pp. 501-505. Springer, Heidelberg (2004)Google ScholarGoogle Scholar
  128. Farzan, A., Meseguer, J.: Partial order reduction for rewriting semantics of programming languages. In: Denker, G., Talcott, C. (eds.) Proceedings Sixth International Workshop on Rewriting Logic and its Applications. WRLA 2006, Vienna, Austria, April 1-2, 2006. Electronic Notes in Theoretical Computer Science, pp. 56-75. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  129. Farzan, A., Meseguer, J.: State space reduction of rewrite theories using invisible transitions. In: Johnson, M., Vene, V. (eds.) AMAST 2006. LNCS, vol. 4019, pp. 142-157. Springer, Heidelberg (2006)Google ScholarGoogle Scholar
  130. Farzan, A., Meseguer, J., Rosu, G.: Formal JVM code analysis in JavaFAN. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004. LNCS, vol. 3116, pp. 132-147. Springer, Heidelberg (2004)Google ScholarGoogle Scholar
  131. Fernández, J. L., Toval, A.: Can intuition become rigorous? Foundations for UML model verification tools. In: Titsworth, F. M. (ed.) International Symposium on Software Reliability Engineering, pp. 344-355. IEEE Computer Society Press, Los Alamitos (2000) Google ScholarGoogle Scholar
  132. Fernández, J. L., Toval, A.: Seamless formalizing the UML semantics through metamodels. In: Siau, K., Halpin, T. (eds.) Unified Modeling Language: Systems Analysis, Design, and Development Issues, pp. 224-248. Idea Group Publishing (2001) Google ScholarGoogle Scholar
  133. Ferrari, G., Montanari, U.: Tile formats for located and mobile systems. Information and Computation 156(1/2), 173-235 (2000) Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. Fischer, B., Rosu, G.: Interpreting abstract interpretations in membership equational logic. Technical report, Research Institute for Advanced Computer Science. Technical Report RIACS 01.16 (2001)Google ScholarGoogle Scholar
  135. Fomin, D., Genkin, S., Itenberg, I.: Mathematical Circles: The Russian Experience. Mathematical World, vol. 7. American Mathematical Association (1996)Google ScholarGoogle Scholar
  136. Frühwirth, T., Abdennadher, S.: Essentials of Constraint Programming. Springer, Heidelberg (2003) Google ScholarGoogle Scholar
  137. Futatsugi, K. (ed.): Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18- 20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  138. Futatsugi, K., Diaconescu, R.: CafeOBJ Report. AMAST Series. World Scientific (1998)Google ScholarGoogle Scholar
  139. Gadducci, F., Montanari, U.: Tiles, rewriting rules, and CCS. In: Meseguer, J. (ed.) Proceedings First International Workshop on Rewriting Logic and its Applications. WRLA'96, Asilomar, California, September 3-6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4, pp. 1-19. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  140. Gadducci, F., Montanari, U.: The tile model. In: Plotkin, G., Stirling, C., Tofte, M. (eds.) Proof, Language and Interaction: Essays in Honour of Robin Milner, pp. 133-166. MIT Press, Cambridge (2000) Google ScholarGoogle Scholar
  141. Gadducci, F., Montanari, U.: Comparing logics for rewriting: Rewriting logic, action calculi and tile logic. Theoretical Computer Science 285(2), 319-358 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. Gadducci, F., Montanari, U. (eds.): Proceedings Fourth International Workshop on Rewriting Logic and its Applications, WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71. Elsevier, Amsterdam (2004), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  143. Genesereth, M. R., Nilsson, N. J.: Logical Foundations of Artificial Intelligence. Morgan Kaufmann, San Francisco (1987) Google ScholarGoogle Scholar
  144. Glynn, P.: On the role of generalized semi-Markov processes in simulation output analysis. In: Proceedings of the 1983 Winter Simulation Conference, pp. 38-42 (1983) Google ScholarGoogle Scholar
  145. Goguen, J., Meseguer, J.: Order-sorted algebra I: Equational deduction for multiple inheritance, overloading, exceptions and partial operations. Theoretical Computer Science 105, 217-273 (1992) Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. Goguen, J., Winkler, T., Meseguer, J., Futatsugi, K., Jouannaud, J.-P.: Introducing OBJ. In: Goguen, J. A., Malcolm, G. (eds.) Software Engineering with OBJ: Algebraic Specification in Action, pp. 3-167. Kluwer Academic Publishers, Dordrecht (2000)Google ScholarGoogle Scholar
  147. Goguen, J. A., Jouannaud, J.-P., Meseguer, J.: Operational semantics for order-sorted algebra. In: Brauer, W. (ed.) Automata, Languages and Programming. LNCS, vol. 194, pp. 221-231. Springer, Heidelberg (1985) Google ScholarGoogle Scholar
  148. Goodloe, A., Gunter, C. A., Stehr, M.-O.: Formal prototyping in early stages of protocol design. In: Proceedings Workshop on Issues in the Theory of Security (WITS'05), Long Beach, California, January 2005, pp. 67-80. ACM Press, New York (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. Grimeland, M.: Modeling and analysis of time-dependent security protocols in Real-Time Maude. Master's thesis, Dept. of Informatics, University of Oslo (June 2006)Google ScholarGoogle Scholar
  150. Gutierrez-Nolasco, S., Venkatasubramanian, N., Stehr, M.-O., Talcott, C.: Exploring adaptability of secure group communication using formal prototyping techniques. In: Proceedings Third Workshop on Adaptive and Reflective Middleware (RM2004), Toronto, Ontario, Canada, October 19, 2004, pp. 232-237. ACM Press, New York (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Harman, N. A.: Correctness and verification of hardware systems using Maude. Technical Report 3-2000, Department of Computer Science, University of Wales at Swansea (2000)Google ScholarGoogle Scholar
  152. Neal, A.: Harman: Verifying a simple pipelined microprocessor using Maude. In: Cerioli, M., Reggio, G. (eds.) WADT 2001 and CoFI WG Meeting 2001. LNCS, vol. 2267, pp. 128-151. Springer, Heidelberg (2002)Google ScholarGoogle Scholar
  153. Havelund, K., Rosu, G.: Java PathExplorer - A runtime verification tool. In: Proceedings 6th International Symposium on Artificial Intelligence, Robotics and Automation in Space, ISAIRAS'01, Montreal, Canada, June 18-22 (2001)Google ScholarGoogle Scholar
  154. Havelund, K., Rosu, G.: Monitoring Java programs with Java PathExplorer. In: Havelund, K., Rosu, G. (eds.) Proceedings First Workshop on Runtime Verification, RV'2001, Paris, France, July 23, 2001. Electronic Notes in Theoretical Computer Science, vol. 55(2), pp. 200-217. Elsevier, Amsterdam (2001), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  155. Havelund, K., Rosu, G.: Monitoring programs using rewriting. Technical report, Research Institute for Advanced Computer Science (2001)Google ScholarGoogle Scholar
  156. Havelund, K., Rosu, G.: Testing linear temporal logic formulae on finite execution traces. Technical Report RIACS 01.08, Research Institute for Advanced Computer Science (May 2001) Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. ayes, P. J.: What the frame problem is and isn't. In: Pylyshyn, Z. W. (ed.) The Robot's Dilemma: The Frame Problem in Artificial Intelligence, pp. 123- 137. Ablex Publishing, Greenwich (1987)Google ScholarGoogle Scholar
  158. Hendrix, J., Clavel, M., Meseguer, J.: A sufficient completeness reasoning tool for partial specifications. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 165-174. Springer, Heidelberg (2005)Google ScholarGoogle Scholar
  159. Hendrix, J., Meseguer, J.: On the completeness of context-sensitive order-sorted specifications. Technical Report UIUCDCS-R-2007-2812, Computer Science Dept., University of Illinois at Urbana-Champaign (Feb. 2007)Google ScholarGoogle Scholar
  160. Hendrix, J., Meseguer, J., Ohsaki, H.: A sufficient completeness checker for linear order-sorted specifications modulo axioms. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), vol. 4130, pp. 151-155. Springer, Heidelberg (2006)Google ScholarGoogle Scholar
  161. Hendrix, J., Ohsaki, H., Meseguer, J.: Sufficient completeness checking with propositional tree automata. Technical Report UIUCDCS-R-2005-2635, University of Illinois at Urbana-Champaign (2005), http://maude.cs.uiuc.edu/tools/scc/Google ScholarGoogle Scholar
  162. Hendrix, J., Ohsaki, H., Viswanathan, M.: Propositional tree automata. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 50-65. Springer, Heidelberg (2006)Google ScholarGoogle Scholar
  163. Hennessy, M., Milner, R.: Algebraic laws for nondeterminism and concurrency. Journal of the Association for Computing Machinery 32(1), 137-172 (1985) Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Hidalgo-Herrero, M., Verdejo, A., Ortega-Mallén, Y.: Looking for Eden through Maude and its strategies. In: López-Fraguas, F.J. (ed.) V Jornadas sobre Programación y Lenguajes, PROLE 2005, pp. 13-23. Thomson, Madrid (2005)Google ScholarGoogle Scholar
  165. Horowitz, E., Sahni, S.: Fundamentals of Data Structures in Pascal. Fourth Edition. Computer Science Press (1994)Google ScholarGoogle Scholar
  166. Ishikawa, H., Futatsugi, K., Watanabe, T.: An operational semantics of GAEA in CafeOBJ. In: Futatsugi, K., Goguen, J. A., Meseguer, J. (eds.) OBJ/CafeOBJ/Maude Workshop at Formal Methods '99: Formal Specification, Proof, and Applications, pp. 213-227. Theta (1999)Google ScholarGoogle Scholar
  167. Ishikawa, H., Meseguer, J., Watanabe, T., Futatsugi, K., Nakashima, H.: On the semantics of GAEA - An object-oriented specification of a concurrent reflective language in rewriting logic. In: Proceedings IMSA'97, pp. 70-109. Information-Technology Promotion Agency, Japan (1997)Google ScholarGoogle Scholar
  168. Johnsen, E. B., Owe, O., Axelsen, E. W.: A runtime environment for concurrent objects with asynchronous method calls. In: Martí-Oliet, N. (ed.) Proceedings Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117, pp. 375-392. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  169. Kapur, D., Subramaniam, M.: New uses of linear arithmetic in automated theorem proving by induction. Journal of Automated Reasoning 16(1-2), 39- 78 (1996)Google ScholarGoogle ScholarCross RefCross Ref
  170. Kapur, D., Zhang, H.: An overview of rewrite rule laboratory (RRL). J. Computer and Mathematics with Applications 29(2), 91-114 (1995)Google ScholarGoogle ScholarCross RefCross Ref
  171. Kasera, S., Bhattacharyya, S., Keaton, M., Kiwior, D., Kurose, J., Towsley, D., Zabele, S.: Scalable fair reliable multicast using active services. Technical Report TR 99-44, University of Massachusetts, Amherst, CMPSCI (1999)Google ScholarGoogle Scholar
  172. Katelman, M., Meseguer, J.: A rewriting semantics for ABEL with applications to hardware/software co-design and analysis. In: Denker, G., Talcott, C. (eds.) Proceedings Sixth International Workshop on Rewriting Logic and its Applications, WRLA 2006, Vienna, Austria, April 1-2, 2006. Electronic Notes in Theoretical Computer Science. Elsevier, pp. 95-109. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  173. Kaufmann, M., Manolios, P., Moore, J. S.: Computer-Aided Reasoning: An Approach. Kluwer Academic Publishers, Dordrecht (2000) Google ScholarGoogle Scholar
  174. Kernighan, B. W., Ritchie, D. M.: The C Programming Language, 2nd edn. Prentice-Hall, Englewood Cliffs (1988) Google ScholarGoogle Scholar
  175. Kirchner, C.: Order-sorted equational unification. Technical Report 954, INRIA Lorraine & LORIA, Nancy, France (Dec. 1988)Google ScholarGoogle Scholar
  176. Kirchner, C., Kirchner, H. (ed.): Proceedings Second International Workshop on Rewriting Logic and its Applications, WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  177. Knapp, A.: Generating rewrite theories from UML collaborations. In: Futatsugi, K., Nakagawa, A. T., Tamai, T. (eds.) Cafe: An Industrial-Strength Algebraic Formal Method, pp. 97-120. Elsevier, Amsterdam (2000)Google ScholarGoogle Scholar
  178. Knapp, A.: A Formal Approach to Object-Oriented Software Engineering. PhD thesis, Institut für Informatik, Universität München, 2000. Shaker Verlag, Aachen (2001)Google ScholarGoogle Scholar
  179. Kolch, W.: Meaningful relationships: The regulation of the Ras/ Raf/ MEK/ ERK pathway by protein interactions. Biochemical Journal 351, 289-305 (2000)Google ScholarGoogle ScholarCross RefCross Ref
  180. Kosiuczenko, P., Wirsing, M.: Timed rewriting logic with application to object-oriented specification. Technical report, Institut für Informatik, Universität München (1995)Google ScholarGoogle Scholar
  181. Kotz, D., Gray, R.: Mobile agents and the future of the internet. ACM Operating Systems Review 33(3), 7-13 (1999) Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. Kumar, N., Sen, K., Meseguer, J., Agha, G.: Probabilistic rewrite theories: Unifying models, logics and tools. Technical Report UIUCDCS-R-2003-2347, Computer Science Dept., University of Illinois at Urbana-Champaign (May 2003)Google ScholarGoogle Scholar
  183. Kumar, N., Sen, K., Meseguer, J., Agha, G.: A rewriting based model of probabilistic distributed object systems. In: Najm, E., Nestmann, U., Stevens, P. (eds.) FMOODS 2003. LNCS, vol. 2884, pp. 32-46. Springer, Heidelberg (2003)Google ScholarGoogle Scholar
  184. Laneve, C., Montanari, U.: Axiomatizing permutation equivalence in the λ-calculus. In: Kirchner, H., Levi, G. (eds.) Algebraic and Logic Programming. LNCS, vol. 632, pp. 350-363. Springer, Heidelberg (1992) Google ScholarGoogle Scholar
  185. Laneve, C., Montanari, U.: Axiomatizing permutation equivalence. Mathematical Structures in Computer Science 6, 219-249 (1996)Google ScholarGoogle ScholarCross RefCross Ref
  186. Lange, D., Oshima, M.: Seven good reasons for mobile agents. Communications of the ACM 42, 88-89 (1999) Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. Lescanne, P.: From λσ to λv, a journey through calculi of explicit substitutions. In: Boehm, H. (ed.) Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Portland, Oregon, January 17-21, 1994, pp. 60-69. ACM Press, New York (1994) Google ScholarGoogle Scholar
  188. Leucker, M., Noll, T.: Rewriting logic as a framework for generic verification tools. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 117-133. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  189. Lien, E.: Formal modeling and analysis of the NORM multicast protocol in Real-Time Maude. Master's thesis, Department of Linguistics, University of Oslo (April 2004), http://wo.uio.no/as/WebObjects/theses.woa/wo/0.3.9Google ScholarGoogle Scholar
  190. Lucas, S.: Context-sensitive computations in functional and functional logic programs. Journal of Functional and Logic Programming 1(4), 446-453 (1998)Google ScholarGoogle Scholar
  191. Lucas, S.: Termination of rewriting with strategy annotations. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), vol. 2250, pp. 669- 684. Springer, Heidelberg (2001)Google ScholarGoogle Scholar
  192. Lucas, S.: Context-sensitive rewriting strategies. Information and Computation 178(1), 294-343 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  193. Luo, Z.: Computation and Reasoning: A Type Theory for Computer Science. International Series of Monographs on Computer Science. Oxford University Press, Oxford (1994) Google ScholarGoogle Scholar
  194. Manna, Z., Pnueli, A.: The Temporal Logic of Reactive and Concurrent Systems - Specification. Springer, Heidelberg (1992) Google ScholarGoogle Scholar
  195. Martí-Oliet, N. (ed.): Proceedings Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  196. Martí-Oliet, N., Meseguer, J.: General logics and logical frameworks. In: Gabbay, D. M. (ed.)What is a Logical System? Studies in Logic and Computation, vol. 4, pp. 355-392. Oxford University Press, Oxford (1994) Google ScholarGoogle Scholar
  197. Martí-Oliet, N., Meseguer, J.: Action and change in rewriting logic. In: Pareschi, R., Fronhöfer, B. (eds.) Dynamic Worlds: From the Frame Problem to Knowledge Management. Applied Logic Series, vol. 12, pp. 1-53. Kluwer Academic Publishers, Dordrecht (1999)Google ScholarGoogle Scholar
  198. Martí-Oliet, N., Meseguer, J.: Rewriting logic as a logical and semantic framework. In: Gabbay, D. M., Guenthner, F. (eds.) Handbook of Philosophical Logic, vol. 9, 2nd edn., pp. 1-87. Kluwer Academic Publishers, Dordrecht (2002)Google ScholarGoogle Scholar
  199. Martí-Oliet, N., Meseguer, J.: Rewriting logic: roadmap and bibliography. Theoretical Computer Science 285(2), 121-154 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  200. Martí-Oliet, N., Meseguer, J., Palomino, M.: Algebraic simulations (Submitted for publication, 2007), http://maude.sip.ucm.es/~miguelpt/bibliographyGoogle ScholarGoogle Scholar
  201. Martí-Oliet, N., Meseguer, J., Palomino, M.: Theoroidal maps as algebraic simulations. In: Fiadeiro, J. L., Mosses, P. D., Orejas, F. (eds.) WADT 2004. LNCS, vol. 3423, pp. 126-143. Springer, Heidelberg (2005)Google ScholarGoogle Scholar
  202. Martí-Oliet, N., Meseguer, J., Verdejo, A.: Towards a strategy language for Maude. In: Martí-Oliet, N. (ed.) Proceedings Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117, pp. 417-441. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  203. Martí-Oliet, N., Palomino, M., Verdejo, A.: A tutorial on specifying data structures in Maude. In: Lucas, S. (ed.) Proceedings Fourth Spanish Conference on Programming and Computer Languages, PROLE 2004, Málaga, Spain, 10-12 November 2004. Electronic Notes in Theoretical Computer Science, vol. 137(1), pp. 105-132. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  204. Martin-Löf, P.: Intuitionistic Type Theory. Bibliopolis (1984)Google ScholarGoogle Scholar
  205. Mason, I. A., Talcott, C. L.: A semantics preserving actor translation. In: Degano, P., Gorrieri, R., Marchetti-Spaccamela, A. (eds.) ICALP 1997. LNCS, vol. 1256, pp. 369-378. Springer, Heidelberg (1997) Google ScholarGoogle Scholar
  206. Mason, I. A., Talcott, C. L.: Actor languages: Their syntax, semantics, translation, and equivalence. Theoretical Computer Science 228(1) (1999)Google ScholarGoogle Scholar
  207. Mason, I. A., Talcott, C. L.: Simple network protocol simulation within Maude. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 277-294. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  208. Mason, I. A., Talcott, C. L.: IOP: The InterOperability Platform & IMaude: An interactive extension of Maude. In: Martí-Oliet, N. (ed.) Proceedings Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117, pp. 315-333. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  209. Mason, I. A., Talcott, C. L.: The InterOperability Platform Manual (2006), http://mcs.une.edu.au/~iop/Data/Manual/manual.pdfGoogle ScholarGoogle Scholar
  210. Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113-131 (1996)Google ScholarGoogle ScholarCross RefCross Ref
  211. Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theoretical Computer Science 96(1), 73-155 (1992) Google ScholarGoogle ScholarDigital LibraryDigital Library
  212. Meseguer, J.: A logical theory of concurrent objects and its realization in the Maude language. In: Agha, G., Wegner, P., Yonezawa, A. (eds.) Research Directions in Concurrent Object-Oriented Programming, pp. 314-390. MIT Press, Cambridge (1993) Google ScholarGoogle Scholar
  213. Meseguer, J. (ed.): Proceedings First International Workshop on Rewriting Logic and its Applications, WRLA'96, Asilomar, California, September 3- 6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  214. Meseguer, J.: Rewriting logic as a semantic framework for concurrency: A progress report. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol. 1119, pp. 331-372. Springer, Heidelberg (1996) Google ScholarGoogle ScholarDigital LibraryDigital Library
  215. Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.)WADT 1997. LNCS, vol. 1376, pp. 18-61. Springer, Heidelberg (1998) Google ScholarGoogle Scholar
  216. Meseguer, J.: Research directions in rewriting logic. In: Berger, U., Schwichtenberg, H. (eds.) Computational Logic, Proceedings of the NATO Advanced Study Institute on Computational Logic held in Marktoberdorf, Germany, July 29 - August 6, 1997. NATO ASI Series F: Computer and Systems Sciences, vol. 165, pp. 347-398. Springer, Heidelberg (1998)Google ScholarGoogle Scholar
  217. Meseguer, J.: A rewriting logic sampler. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol. 3722, pp. 1-28. Springer, Heidelberg (2005)Google ScholarGoogle Scholar
  218. Meseguer, J., Braga, C.: Modular rewriting semantics of programming languages. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004. LNCS, vol. 3116, pp. 364-378. Springer, Heidelberg (2004)Google ScholarGoogle Scholar
  219. Meseguer, J., Futatsugi, K., Winkler, T.: Using rewriting logic to specify, program, integrate, and reuse open concurrent systems of cooperating agents. In: Proceedings of the 1992 International Symposium on New Models for Software Architecture, Tokyo, Japan, November 1992, pp. 61-106. Research Institute of Software Engineering (1992)Google ScholarGoogle Scholar
  220. Meseguer, J., Goguen, J.: Initiality, induction and computability. In: Nivat, M., Reynolds, J. (eds.) Algebraic Methods in Semantics, pp. 459-541. Cambridge University Press, Cambridge (1985) Google ScholarGoogle Scholar
  221. Meseguer, J., Montanari, U.: Mapping tile logic into rewriting logic. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 62-91. Springer, Heidelberg (1998) Google ScholarGoogle Scholar
  222. Meseguer, J., Palomino, M., Martí-Oliet, N.: Equational abstractions. In: Baader, F. (ed.) CADE 2003. LNCS (LNAI), vol. 2741, pp. 2-16. Springer, Heidelberg (2003)Google ScholarGoogle Scholar
  223. Meseguer, J., Rosu, G.: Rewriting logic semantics: From language specifications to formal analysis tools. In: Basin, D., Rusinowitch, M. (eds.) IJCAR 2004. LNCS (LNAI), vol. 3097, pp. 1-44. Springer, Heidelberg (2004)Google ScholarGoogle Scholar
  224. Meseguer, J., Rosu, G.: The rewriting logic semantics project. In: Mosses, P. D., Ulidowski, I. (eds.) Proceedings Second Workshop on Structural Operational Semantics, SOS 2005, Lisbon, Portugal, July 10, 2005. Electronic Notes in Theoretical Computer Science, vol. 156(1), pp. 27-56. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  225. Meseguer, J., Sharykin, R.: Specification and analysis of distributed object-based stochastic hybrid systems. In: Hespanha, J. P., Tiwari, A. (eds.) HSCC 2006. LNCS, vol. 3927, pp. 460-475. Springer, Heidelberg (2006)Google ScholarGoogle Scholar
  226. Meseguer, J., Stehr, M.-O., Talcott, C. L.: Specifying the PLAN language in Maude (2000), Slides available at: http://www-formal.stanford.edu/clt/Talks/00sep-utokyo-talk.ps.gzGoogle ScholarGoogle Scholar
  227. Meseguer, J., Talcott, C.: Semantic models for distributed object reflection. In: Magnusson, B. (ed.) ECOOP 2002. LNCS, vol. 2374, pp. 1-36. Springer, Heidelberg (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  228. Meseguer, J., Talcott, C. L.: Using rewriting logic to interoperate architectural description languages (I and II). Lectures at the Santa Fe and Seattle DARPA-EDCS Workshops, March and July (1997), http://www-formal.stanford.edu/clt/ArpaNsf/adl-interop.htmlGoogle ScholarGoogle Scholar
  229. Meseguer, J., Talcott, C. L.: A partial order event model for concurrent objects. In: Baeten, J. C. M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol. 1664, pp. 415-430. Springer, Heidelberg (1999)Google ScholarGoogle Scholar
  230. Meseguer, J., Thati, P.: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. In: Martí-Oliet, N. (ed.) Proceedings Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, March 27-28, 2004. Electronic Notes in Theoretical Computer Science, vol. 117, pp. 153-182. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  231. Meseguer, J., Thati, P.: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation 20(1-2), 123-160 (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  232. Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989) Google ScholarGoogle Scholar
  233. Mosses, P. D.: Semantics, modularity, and rewriting logic. In: Kirchner, C., Kirchner, H. (eds.) Proceedings Second International Workshop on Rewriting Logic and its Applications, WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15, pp. 404-421. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  234. Mosses, P. D.: Logical specification of operational semantics. In: Flum, J., Rodríguez-Artalejo, M. (eds.) CSL 1999. LNCS, vol. 1683, pp. 32-49. Springer, Heidelberg (1999)Google ScholarGoogle Scholar
  235. Mosses, P. D.: Modular structural operational semantics. Journal of Logic and Algebraic Programming 60-61, 195-228 (2004)Google ScholarGoogle ScholarDigital LibraryDigital Library
  236. Najm, E., Stefani, J.-B.: A formal operational semantics for the ODP computational model with signals, explicit binding, and reactive objects. Manuscript, ENST, Paris, France (1994)Google ScholarGoogle Scholar
  237. Najm, E., Stefani, J.-B.: A formal semantics for the ODP computational model. Computer Networks and ISDN Systems 27, 1305-1329 (1995) Google ScholarGoogle ScholarDigital LibraryDigital Library
  238. Najm, E., Stefani, J.-B.: Computational models for open distributed systems. In: Bowman, H., Derrick, J. (eds.) Proceedings Second IFIP Conference on Formal Methods for Open Object-Based Distributed Systems. FMOODS'97, Canterbury, Kent, UK, July 21-23, 1997, pp. 157-176. Chapman & Hall, Boca Raton (1997) Google ScholarGoogle Scholar
  239. Nakajima, S.: Encoding mobility in CafeOBJ: An exercise of describing mobile code-based software architecture. In: Proceedings of the CafeOBJ Symposium '98, Numazu, Japan, CafeOBJ Project (April 1998)Google ScholarGoogle Scholar
  240. Nakajima, S., Futatsugi, K.: An object-oriented modeling method for algebraic specifications in CafeOBJ. In: Proceedings, 19th International Conference on Software Engineering, Boston, Massachussets, May 1997, pp. 34-44. IEEE Computer Society Press, Los Alamitos (1997) Google ScholarGoogle ScholarDigital LibraryDigital Library
  241. Naumov, P., Stehr, M.-O., Meseguer, J.: The HOL/NuPRL proof translator - A practical approach to formal interoperability. In: Boulton, R. J., Jackson, P. B. (eds.) TPHOLs 2001. LNCS, vol. 2152, pp. 329-345. Springer, Heidelberg (2001)Google ScholarGoogle Scholar
  242. Object Management Group: Object Constraint Language specification (2004), http://www.omg.org/technology/documents/modeling spec catalog. htm#OCLGoogle ScholarGoogle Scholar
  243. Object Management Group: Unified Modeling Language specification (2004), http://www.omg.org/technology/documents/modeling spec catalog. htm#UMLGoogle ScholarGoogle Scholar
  244. Object Management Group: Mof 2.0 query/views/transformations final adopted specification (2005), http://www.omg.org/technology/documents/ modeling spec catalog.htm#MOF_ QVTGoogle ScholarGoogle Scholar
  245. Ohsaki, H.: Beyond regularity: Equational tree automata for associative and commutative theories. In: Fribourg, L. (ed.) CSL 2001 and EACSL 2001. LNCS, vol. 2142, pp. 539-553. Springer, Heidelberg (2001)Google ScholarGoogle ScholarDigital LibraryDigital Library
  246. Okasaki, C.: Purely Functional Data Structures. Cambridge University Press, Cambridge (1998) Google ScholarGoogle Scholar
  247. Ölveczky, P. C.: Specification and Analysis of Real-Time and Hybrid Systems in Rewriting Logic. PhD thesis, University of Bergen, Norway (2000), http://maude.cs.uiuc.edu/papers/Google ScholarGoogle Scholar
  248. Ölveczky, P. C., Caccamo, M.: Formal simulation and analysis of the CASH scheduling algorithm in Real-Time Maude. In: Baresi, L., Heckel, R. (eds.) FASE 2006 and ETAPS 2006. LNCS, vol. 3922, pp. 357-372. Springer, Heidelberg (2006)Google ScholarGoogle Scholar
  249. Ölveczky, P. C., Keaton, M., Meseguer, J., Talcott, C. L., Zabele, S.: Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude. In: Hussmann, H. (ed.) FASE 2001 and ETAPS 2001. LNCS, vol. 2029, pp. 333-347. Springer, Heidelberg (2001) Google ScholarGoogle Scholar
  250. Ölveczky, P. C., Kosiuczenko, P., Wirsing, M.: An object-oriented algebraic steam-boiler control specification. In: Abrial, J.-R., Börger, E., Langmaack, H. (eds.) Formal Methods for Industrial Applications. LNCS, vol. 1165, pp. 379-402. Springer, Heidelberg (1996) Google ScholarGoogle Scholar
  251. Ölveczky, P. C., Meseguer, J.: Real-Time Maude: A tool for simulating and analyzing real-time and hybrid systems. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 361-382. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  252. Ölveczky, P. C., Meseguer, J.: Specification of real-time and hybrid systems in rewriting logic. Theoretical Computer Science 285(2), 359-405 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  253. Ölveczky, P. C., Meseguer, J.: Specification and analysis of real-time systems using Real-Time Maude. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004 and ETAPS 2004. LNCS, vol. 2984, pp. 354-358. Springer, Heidelberg (2004)Google ScholarGoogle Scholar
  254. Ölveczky, P. C., Meseguer, J.: Abstraction and completeness for Real-Time Maude. In: Denker, G., Talcott, C. (eds.) Proceedings Sixth International Workshop on Rewriting Logic and its Applications, WRLA 2006, Vienna, Austria, April 1-2, 2006. Electronic Notes in Theoretical Computer Science, pp. 128-153. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  255. Ölveczky, P. C., Meseguer, J.: Semantics and pragmatics of Real-Time Maude. Higher-Order and Symbolic Computation 20(1-2), 161-196 (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  256. Ölveczky, P. C., Meseguer, J., Talcott, C.L.: Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude. Formal Methods in System Design 29(3), 253-293 (2006) Google ScholarGoogle ScholarDigital LibraryDigital Library
  257. Ölveczky, P. C., Thorvaldsen, S.: Formal modeling and analysis of wireless sensor network algorithms in Real-Time Maude. In: 20th International Parallel and Distributed Processing Symposium, IPDPS 2006, Rhodes Island, Greece, April 2006, IEEE Computer Society Press, Los Alamitos (2006)Google ScholarGoogle ScholarCross RefCross Ref
  258. Palomino, M.: Reflexión, Abstracción y Simulación en la Lógica de Reescritura. PhD thesis, Universidad Complutense de Madrid, Spain (March 2005)Google ScholarGoogle Scholar
  259. Palomino, M., Martí-Oliet, N., Verdejo, A.: Playing with Maude. In: Abdennadher, S., Ringeissen, C. (eds.) Proceedings Fifth InternationalWorkshop on Rule-Based Programming, RULE 2004, Aachen, Germany. Electronic Notes in Theoretical Computer Science, vol. 124(1), pp. 3-23. Elsevier, Amsterdam (2005), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  260. Peña, R.: Diseñno de Programas. Formalismo y Abstracción. Tercera Edición. Prentice-Hall, Madrid (2005)Google ScholarGoogle Scholar
  261. Petersson, K., Smith, J., Nordström, B.: Programming in Martin-Löf's Type Theory. An Introduction. International Series of Monographs on Computer Science. Clarendon Press, Oxford (1990) Google ScholarGoogle Scholar
  262. Pita, I., Martí-Oliet, N.: A Maude specification of an object oriented database model for telecommunication networks. In: Meseguer, J. (ed.) Proceedings First International Workshop on Rewriting Logic and its Applications, WRLA'96, Asilomar, California, September 3-6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4, pp. 404-422. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  263. Pita, I., Martí-Oliet, N.: Using reflection to specify transaction sequences in rewriting logic. In: Fiadeiro, J. L. (ed.) WADT 1998. LNCS, vol. 1589, pp. 261-276. Springer, Heidelberg (1999)Google ScholarGoogle Scholar
  264. Pita, I., Martí-Oliet, N.: A Maude specification of an object-oriented model for telecommunication networks. Theoretical Computer Science 285(2), 407-439 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  265. Plotkin, G. D.: A structural approach to operational semantics. Journal of Logic and Algebraic Programming 60-61, 17-139 (2004)Google ScholarGoogle ScholarCross RefCross Ref
  266. Pollack, R.: Implicit syntax. In: Huet, G., Plotkin, G. (eds.) Proceedings of the First Workshop on Logical Frameworks (May 1990)Google ScholarGoogle Scholar
  267. Pollack, R.: Closure under alpha-conversion. In: Barendregt, H., Nipkow, T. (eds.) TYPES 1993. LNCS, vol. 806, pp. 313-332. Springer, Heidelberg (1994) Google ScholarGoogle ScholarDigital LibraryDigital Library
  268. 268. Porter, D.: An interpreter for JLambda. A thesis submitted for the degree of BCompSci (Honours), University of New England (2004), http://mcs.une.edu.au/~iop/Data/Papers/dporter-honours-thesis.pdfGoogle ScholarGoogle Scholar
  269. Pottier, L.: Minimal solutions of linear diophantine systems: bounds and algorithms. In: Book, R. V. (ed.) Rewriting Techniques and Applications. LNCS, vol. 488, pp. 162-173. Springer, Heidelberg (1991) Google ScholarGoogle ScholarDigital LibraryDigital Library
  270. Puterman, M.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. John Wiley and Sons, Chichester (1994) Google ScholarGoogle Scholar
  271. Quesada, J. F.: The SCP Parsing Algorithm Based on Syntactic Constraint Propagation. PhD thesis, Universidad de Sevilla, Spain (1997)Google ScholarGoogle Scholar
  272. Quesada, J. F.: The Maude parser: Parsing and meta-parsing β-extended context-free grammars. Technical Report, SRI International, Computer Science Laboratory (1999)Google ScholarGoogle Scholar
  273. Rabhi, F., Lapalme, G.: Algorithms. A Functional Programming Approach. Addison-Wesley, Reading (1999) Google ScholarGoogle Scholar
  274. Reich, S.: Implementing and extending the MSR crypto-protocol specification language. Diplomarbeit. Universität Hamburg, Fachbereich Informatik (April 2006)Google ScholarGoogle Scholar
  275. Reisig, W.: Petri Nets. Springer, Heidelberg (1985)Google ScholarGoogle Scholar
  276. Rodríguez, D. E.: Case studies in the specification and analysis of protocols in Maude. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 257-275. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  277. Rosa-Velardo, F., Segura, C., Verdejo, A.: Typed mobile ambients in Maude. In: Cirstea, H., Martí-Oliet, N. (eds.) Proceedings 6th International Workshop on Rule-Based Programming, RULE 2005, Nara, Japan. Electronic Notes in Theoretical Computer Science, vol. 147, pp. 135-161. Elsevier, Amsterdam (2006), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  278. Rosu, G., Havelund, K.: Generating optimal monitors from temporal formulae. Technical report, Research Institute for Advanced Computer Science (2001)Google ScholarGoogle Scholar
  279. Rosu, G., Venkatesan, R. P., Whittle, J., Leustean, L.: Certifying optimality of state estimation programs. In: Hunt Jr., W. A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 301-314. Springer, Heidelberg (2003)Google ScholarGoogle Scholar
  280. Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual, 2nd edn. Addison-Wesley, Reading (2004)Google ScholarGoogle Scholar
  281. Sasse, R.: Taclets vs. rewriting logic - relating semantics of Java. Master's thesis, Fakultät für Informatik, Universität Karlsruhe, Germany, May 2005. Technical Report in Computing Science No. 2005-16 (2005), http://www. ubka.uni-karlsruhe.de/cgi-bin/psview?document=ira/2005/16Google ScholarGoogle Scholar
  282. Sasse, R., Meseguer, J.: Java+ITP: A verification tool based on Hoare logic and algebraic semantics. In: Denker, G., Talcott, C. (eds.) Proceedings Sixth International Workshop on Rewriting Logic and its Applications, WRLA 2006, Vienna, Austria, April 1-2, 2006. Electronic Notes in Theoretical Computer Science, pp. 202-222. Elsevier, Amsterdam (2007), http://www.sciencedirect.com/science/journal/15710661 Google ScholarGoogle Scholar
  283. Sasse, R., Meseguer, J.: Java+ITP: A verification tool based on Hoare logic and algebraic semantics. Technical Report UIUCDCS-R-2006-2685, Department of Computer Science, University of Illinois at Urbana-Champaign, USA (February 2006)Google ScholarGoogle Scholar
  284. Schmidt, K.: LoLA: Low Level Petri net Analyzer (2004), http://www.informatik.hu-berlin.de/~kschmidt/lola.htmlGoogle ScholarGoogle Scholar
  285. Segala, R.: Modelling and Verification of Randomized Distributed Real Time Systems. PhD thesis, Massachusetts Institute of Technology (1995) Google ScholarGoogle Scholar
  286. Sen, K., Viswanathan, M., Agha, G.: On statistical model checking of stochastic systems. In: Etessami, K., Rajamani, S. K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 266-280. Springer, Heidelberg (2005)Google ScholarGoogle Scholar
  287. Shklarsky, D. O., Chentzov, N. N., Yaglom, I. M.: The USSR Olympiad Problem Book. Dover (1993)Google ScholarGoogle Scholar
  288. Siekmann, J., Szabó, P.: A Noetherian and confluent rewrite system for idempotent semigroups. Semigroup Forum 25, 83-110 (1982)Google ScholarGoogle ScholarCross RefCross Ref
  289. Steggles, L., Kosiuczenko, P.: A timed rewriting logic semantics for SDL: a case study of the alternating bit protocol. In: Kirchner, C., Kirchner, H. (eds.) Proceedings Second International Workshop on Rewriting Logic and its Applications, WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15, pp. 295-316. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  290. Steggles, L. J.: Rewriting logic and Elan: Prototyping tools for Petri nets with time. In: Colom, J.-M., Koutny, M. (eds.) ICATPN 2001. LNCS, vol. 2075, pp. 363-381. Springer, Heidelberg (2001)Google ScholarGoogle Scholar
  291. Stehr, M.-O.: CINNI - A generic calculus of explicit substitutions and its application to λ-, - and πcalculi. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications, WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 71-92. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  292. Stehr, M.-O.: A rewriting semantics for algebraic nets. In: Girault, C., Valk, R. (eds.) Petri Nets for System Engineering - A Guide to Modelling, Verification, and Applications, pp. 318-338. Springer, Heidelberg (2001)Google ScholarGoogle Scholar
  293. Stehr, M.-O.: Programming, Specification, and Interactive Theorem Proving - Towards a Unified Language based on Equational Logic, Rewriting Logic, and Type Theory. PhD thesis, Universität Hamburg, Fachbereich Informatik, Germany (2002), http://www.sub.uni-hamburg.de/disse/810/Google ScholarGoogle Scholar
  294. Stehr, M.-O.: The open calculus of constructions (Part I): An equational type theory with dependent types for programming, specification, and interactive theorem proving. Fundamenta Informaticae 68(1-2), 131-174 (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  295. Stehr, M.-O.: The open calculus of constructions (Part II): An equational type theory with dependent types for programming, specification, and interactive theorem proving. Fundamenta Informaticae 68(3), 249-288 (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  296. Stehr, M.-O., Cervesato, I., Reich, S.: An execution environment for the MSR cryptoprotocol specification language (2004), http://formal.cs.uiuc.edu/stehr/msr.htmlGoogle ScholarGoogle Scholar
  297. Stehr, M.-O., Meseguer, J.: Pure type systems in rewriting logic. In: Proceedings of LFM'99: Workshop on Logical Frameworks and Meta-languages, Paris, France, September 28 (1999), http://www.site.uottawa.ca/~afelty/LFM99/index.htmlGoogle ScholarGoogle Scholar
  298. Stehr, M.-O., Meseguer, J.: Pure type systems in rewriting logic: Specifying typed higher-order languages in a first-order logical framework. In: Owe, O., Krogdahl, S., Lyche, T. (eds.) From Object-Orientation to Formal Methods. LNCS, vol. 2635, pp. 334-375. Springer, Heidelberg (2004)Google ScholarGoogle Scholar
  299. Stehr, M.-O., Meseguer, J., Ölveczky, P. C.: Rewriting logic as a unifying framework for Petri nets. In: Ehrig, H., Juhás, G., Padberg, J., Rozenberg, G. (eds.) Unifying Petri Nets. LNCS, vol. 2128, pp. 250-303. Springer, Heidelberg (2001) Google ScholarGoogle Scholar
  300. Stehr, M.-O., Naumov, P., Meseguer, J.: A proof-theoretic approach to the HOL-Nuprl connection with applications to proof translation. In: Cerioli, M., Mosses, P. D., Reggio, G. (eds.) Preliminary Proceedings WADT/CoFI'01, 15th International Workshop on Algebraic Development Techniques and General Workshop of the CoFI WG (2001), http://formal.cs.uiuc.edu/stehr/holnuprl-ext.ps.gzGoogle ScholarGoogle Scholar
  301. Stehr, M.-O., Talcott, C.: PLAN in Maude: Specifying an active network programming language. In: Gadducci, F., Montanari, U. (eds.) Proceedings Fourth International Workshop on Rewriting Logic and its Applications, WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71, pp. 221-241. Elsevier, Amsterdam (2004), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  302. Stehr, M.-O., Talcott, C. L.: Practical techniques for language design and prototyping. In: Luiz Fiadeiro, J., Montanari, U., Wirsing, M. (eds.) Foundations of Global Computing, number 05081 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum (IBFI), Schloss Dagstuhl, Germany (2006), http://drops.dagstuhl.de/opus/volltexte/2006/300Google ScholarGoogle Scholar
  303. Stewart, W. J.: Introduction to the Numerical Solution of Markov Chains. Princeton (1994)Google ScholarGoogle Scholar
  304. Talcott, C. L.: An actor rewriting theory. In: Meseguer, J. (ed.) Proceedings First International Workshop on Rewriting Logic and its Applications, WRLA'96, Asilomar, California, September 3-6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4, pp. 360-383. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  305. Talcott, C. L.: Composable semantic models for actor theories. In: Ito, T., Abadi, M. (eds.) TACS 1997. LNCS, vol. 1281, pp. 321-364. Springer, Heidelberg (1997) Google ScholarGoogle Scholar
  306. Talcott, C. L.: Interaction semantics for components of distributed systems. In: Najm, E., Stefani, J.-B. (eds.) Proceedings IFIP Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS'96, pp. 154- 169. Chapman & Hall (1997)Google ScholarGoogle Scholar
  307. Talcott, C. L.: Composable semantic models for actor theories. Higher-Order and Symbolic Computation 11(3), 281-343 (1998) Google ScholarGoogle ScholarCross RefCross Ref
  308. Talcott, C. L.: Towards a toolkit for actor system specification. In: Rus, T. (ed.) AMAST 2000. LNCS, vol. 1816, pp. 391-406. Springer, Heidelberg (2000)Google ScholarGoogle Scholar
  309. Talcott, C. L.: Actor theories in rewriting logic. Theoretical Computer Science 285(2), 441-485 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  310. Talcott, C. L., Dill, D. L.: The pathway logic assistant. In: Plotkin, G. (ed.) Third International Workshop on Computational Methods in Systems Biology, pp. 228-239 (2005)Google ScholarGoogle Scholar
  311. Talcott, C. L., Eker, S., Knapp, M., Lincoln, P., Laderoute, K.: Pathway logic modeling of protein functional domains in signal transduction. In: Altman, R. B., Dunker, A. K., Hunter, L., Klein, T. E. (eds.) Proceedings of the 9th Pacific Symposium on Biocomputing (PSB 2004), Fairmont Orchid, Hawaii, USA, January 6-10, 2004, pp. 568-580 (2004), http://helix-web.stanford.edu/psb04/Google ScholarGoogle Scholar
  312. Thati, P., Meseguer, J.: Complete symbolic reachability analysis using back-and-forth narrowing. In: Fiadeiro, J. L., Harman, N., Roggenbach, M., Rutten, J. (eds.) CALCO 2005. LNCS, vol. 3629, pp. 379-394. Springer, Heidelberg (2005)Google ScholarGoogle Scholar
  313. Thati, P., Sen, K., Martí-Oliet, N.: An executable specification of asynchronous pi-calculus semantics and may testing in Maude 2.0. In: Gadducci, F., Montanari, U. (eds.) Proceedings Fourth International Workshop on Rewriting Logic and its Applications, WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71, pp. 242-262. Elsevier, Amsterdam (2004), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  314. The Open Group. The Single UNIX Specification Version 3 Homepage (2004), http://www.unix-systems.orgGoogle ScholarGoogle Scholar
  315. Thorvaldsen, S., Ölveczky, P. C.: Formal modeling and analysis of the OGDC wireless sensor network algorithm in Real-Time Maude (2005), http://www.ifi.uio.no/RealTimeMaude/OGDC/Google ScholarGoogle Scholar
  316. Tomás, A. P.: On Solving Linear Diophantine Constraints. PhD thesis, Universidade do Porto (1997)Google ScholarGoogle Scholar
  317. Toval, A., Fernández, J. L.: Formally modeling UML and its evolution: A holistic approach. In: Smith, S. F., Talcott, C. L. (eds.) Proceedings IFIP Conference on Formal Methods for Open Object-Based Distributed Systems IV, FMOODS 2000, September 6-8, 2000, Stanford, California, USA, pp. 183- 206. Kluwer Academic Publishers, Dordrecht (2000) Google ScholarGoogle Scholar
  318. Toval, A., Fernández, J. L.: Improving system reliability via rigorous software modeling: The UML case. In: Proceedings IEEE Aerospace Conference, vol. 6, pp. 6-17. IEEE Computer Society Press, Los Alamitos (2001)Google ScholarGoogle ScholarCross RefCross Ref
  319. Verdejo, A.: Building tools for LOTOS symbolic semantics in Maude. In: Peled, D. A., Vardi, M. Y. (eds.) FORTE 2002. LNCS, vol. 2529, pp. 292-397. Springer, Heidelberg (2002) Google ScholarGoogle Scholar
  320. Verdejo, A.: Maude como Marco Semántico Ejecutable. PhD thesis, Universidad Complutense de Madrid, Spain (2003)Google ScholarGoogle Scholar
  321. Verdejo, A., Martí-Oliet, N.: Executing and verifying CCS in Maude. Technical Report 99-00, Departamento de Sistemas Informáticos y Programación, Universidad Complutense de Madrid (February 2000), http://maude.csl.sri.com/casestudies/ccsGoogle ScholarGoogle Scholar
  322. Verdejo, A., Martí-Oliet, N.: Executing E-LOTOS processes in Maude. In: Ehrig, H., Grosse-Rhode, M., Orejas, F. (eds.) INT 2000, Integration of Specification Techniques with Applications in Engineering, Extended Abstracts, pp. 49-53. Technical report 2000/04, Technische Universität Berlin (2000)Google ScholarGoogle Scholar
  323. Verdejo, A., Martí-Oliet, N.: Implementing CCS in Maude. In: Bolognesi, T., Latella, D. (eds.) Formal Methods For Distributed System Development. FORTE/PSTV 2000 IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XIII) and Protocol Specification, Testing and Verification (PSTV XX) October 10-13, 2000, Pisa, Italy. International Federation for Information Processing, vol. 183, pp. 351-366. Kluwer Academic Publishers, Dordrecht (2000) Google ScholarGoogle Scholar
  324. Verdejo, A., Martí-Oliet, N.: Implementing CCS in Maude 2. In: Gadducci, F., Montanari, U. (eds.) Proceedings Fourth International Workshop on Rewriting Logic and its Applications, WRLA 2002, Pisa, Italy, September 19-21, 2002. Electronic Notes in Theoretical Computer Science, vol. 71, pp. 263- 281. Elsevier, Amsterdam (2004), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  325. Verdejo, A., Martí-Oliet, N.: Two case studies of semantics execution in Maude: CCS and LOTOS. Formal Methods in System Design 27, 113-172 (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  326. Verdejo, A., Martí-Oliet, N.: Executable structural operational semantics in Maude. Journal of Logic and Algebraic Programming 67(1-2), 226-293 (2006)Google ScholarGoogle ScholarCross RefCross Ref
  327. Verdejo, A., Pita, I., Martí-Oliet, N.: The leader election protocol of IEEE 1394 in Maude. In: Futatsugi, K. (ed.) Proceedings Third International Workshop on Rewriting Logic and its Applications,WRLA 2000, Kanazawa, Japan, September 18-20, 2000. Electronic Notes in Theoretical Computer Science, vol. 36, pp. 385-406. Elsevier, Amsterdam (2000), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  328. Viry, P.: Rewriting: An effective model of concurrency. In: Halatsis, C., Philokyprou, G., Maritsas, D., Theodoridis, S. (eds.) PARLE 1994. LNCS, vol. 817, pp. 648-660. Springer, Heidelberg (1994) Google ScholarGoogle Scholar
  329. Viry, P.: Input/output for ELAN. In: Meseguer, J. (ed.) Proceedings First International Workshop on Rewriting Logic and its Applications, WRLA'96, Asilomar, California, September 3-6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4, pp. 51-64. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  330. Viry, P.: Adventures in sequent calculus modulo equations. In: Kirchner, C., Kirchner, H. (eds.) Proceedings Second International Workshop on Rewriting Logic and its Applications, WRLA'98, Pont-à-Mousson, France, September 1-4, 1998. Electronic Notes in Theoretical Computer Science, vol. 15, pp. 367-378. Elsevier, Amsterdam (1998), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  331. Viry, P.: Equational rules for rewriting logic. Theoretical Computer Science 285(2), 487-517 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  332. Vittek, M.: ELAN: Un Cadre Logique pour le Prototypage de Langages de Programmation avec Contraintes. PhD thesis, Université Henri Poincaré - Nancy I (November 1994)Google ScholarGoogle Scholar
  333. Wang, B.-Y., Meseguer, J., Gunter, C. A.: Specification and formal analysis of a PLAN algorithm in Maude. In: Hsiung, P.-A. (ed.) Proceedings International Workshop on Distributed System Validation and Verification, Taipei, Taiwan, April 2000, pp. 49-56 (2000)Google ScholarGoogle Scholar
  334. Warmer, J., Kleppe, A.: The Object Constraint Language: Getting Your Models Ready for MDA, 2nd edn. Addison-Wesley, Reading (2003) Google ScholarGoogle Scholar
  335. Weiss, M. A.: Data Structures and Problem Solving Using Java. Addison-Wesley, Reading (1998) Google ScholarGoogle Scholar
  336. Wirsing, M., Knapp, A.: A formal approach to object-oriented software engineering. In: Meseguer, J. (ed.) Proceedings First International Workshop on Rewriting Logic and its Applications, WRLA'96, Asilomar, California, September 3-6, 1996. Electronic Notes in Theoretical Computer Science, vol. 4, pp. 321-359. Elsevier, Amsterdam (1996), http://www.sciencedirect.com/science/journal/15710661Google ScholarGoogle Scholar
  337. Wirsing, M., Knapp, A.: A formal approach to object-oriented software engineering. Theoretical Computer Science 285(2), 519-560 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  338. Zhang, H., Kapur, D., Krishnamoorthy, M. S.: A mechanizable induction principle for equational specifications. In: Lusk, E., Overbeek, R. (eds.) CADE 1988. LNCS, vol. 310, pp. 162-181. Springer, Heidelberg (1988) Google ScholarGoogle Scholar

Cited By

  1. Whitters G, Nigam V and Talcott C Incremental Rewriting Modulo SMT Automated Deduction – CADE 29, (560-576)
  2. Fortas A, Kerkouche E and Chaoui A (2022). Formal verification of IoT applications using rewriting logic, Science of Computer Programming, 222:C, Online publication date: 1-Oct-2022.
  3. ACM
    Bae K and Ölveczky P (2021). MSYNC: A Generalized Formal Design Pattern for Virtually Synchronous Multirate Cyber-physical Systems, ACM Transactions on Embedded Computing Systems, 20:5s, (1-26), Online publication date: 31-Oct-2021.
  4. Durán F, Krishna A, Pallec M, Mateescu R and Salaün G R-MOZART Proceedings of the 43rd International Conference on Software Engineering: Companion Proceedings, (41-44)
  5. ACM
    Wideł W, Audinot M, Fila B and Pinchinat S (2019). Beyond 2014, ACM Computing Surveys, 52:4, (1-36), Online publication date: 31-Jul-2020.
  6. Gutiérrez R and Lucas S mu-term: Verify Termination Properties Automatically (System Description) Automated Reasoning, (436-447)
  7. Alturki M and Roşu G Statistical Model Checking of RANDAO’s Resilience to Pre-computed Reveal Strategies Formal Methods. FM 2019 International Workshops, (337-349)
  8. Marmsoler D (2022). A calculus for dynamic architectures, Science of Computer Programming, 182:C, (1-41), Online publication date: 1-Aug-2019.
  9. Alpuente M, Ballis D and Sapiña J (2022). Static correction of Maude programs with assertions, Journal of Systems and Software, 153:C, (64-85), Online publication date: 1-Jul-2019.
  10. ACM
    Tabrizi F and Pattabiraman K (2019). Design-Level and Code-Level Security Analysis of IoT Devices, ACM Transactions on Embedded Computing Systems, 18:3, (1-25), Online publication date: 13-Jun-2019.
  11. Ogata K (2019). A divide & conquer approach to liveness model checking under fairness & anti-fairness assumptions, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:1, (51-72), Online publication date: 1-Feb-2019.
  12. Gabmeyer S, Kaufmann P, Seidl M, Gogolla M and Kappel G (2019). A feature-based classification of formal verification techniques for software models, Software and Systems Modeling (SoSyM), 18:1, (473-498), Online publication date: 1-Feb-2019.
  13. ACM
    Santos J, Muchaluat-Saade D, Roisin C and Layaïda N (2018). A Hybrid Approach for Spatio-Temporal Validation of Declarative Multimedia Documents, ACM Transactions on Multimedia Computing, Communications, and Applications, 14:4, (1-24), Online publication date: 30-Nov-2018.
  14. ACM
    Alturki M, Kanovich M, Ban Kirigin T, Nigam V, Scedrov A and Talcott C Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, (60-71)
  15. Osais Y Towards a framework to detect modeling and semantic errors in event graphs Proceedings of the 21st International Symposium on Performance Evaluation of Computer and Telecommunication Systems, (1-10)
  16. Oakes B, Troya J, Lúcio L and Wimmer M (2018). Full contract verification for ATL using symbolic execution, Software and Systems Modeling (SoSyM), 17:3, (815-849), Online publication date: 1-Jul-2018.
  17. ACM
    Riesco A and Ogata K (2018). Prove it! Inferring Formal Proof Scripts from CafeOBJ Proof Scores, ACM Transactions on Software Engineering and Methodology, 27:2, (1-32), Online publication date: 30-Apr-2018.
  18. ACM
    Seghiri A, Belala F and Teniou A Towards Software Architectural Description for Systems of Systems Proceedings of the 2018 1st International Conference on Internet and e-Business, (183-187)
  19. Lucas S and Gutiérrez R (2018). Automatic Synthesis of Logical Models for Order-Sorted First-Order Theories, Journal of Automated Reasoning, 60:4, (465-501), Online publication date: 1-Apr-2018.
  20. Aguirre L, Martí-Oliet N, Palomino M and Pita I (2018). Sentence-Normalized Conditional Narrowing Modulo in Rewriting Logic and Maude, Journal of Automated Reasoning, 60:4, (421-463), Online publication date: 1-Apr-2018.
  21. Fleck M, Troya J, Kessentini M, Wimmer M and Alkhazi B (2017). Model Transformation Modularization as a Many-Objective Optimization Problem, IEEE Transactions on Software Engineering, 43:11, (1009-1032), Online publication date: 1-Nov-2017.
  22. Corradini F, Fornari F, Polini A, Re B, Tiezzi F and Vandin A BProVe: tool support for business process verification Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (937-942)
  23. Corradini F, Fornari F, Polini A, Re B, Tiezzi F and Vandin A BProVe: a formal verification framework for business process models Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (217-228)
  24. ACM
    Aguirre L, Martí-Oliet N, Palomino M and Pita I Conditional narrowing modulo SMT and axioms Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming, (17-28)
  25. ACM
    Feliú M, Rocha C and Balachandran S Verification-driven development of ICAROUS based on automatic reachability analysis: a preliminary case study Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, (94-97)
  26. ACM
    Amrani M and Schobbens P Formal Analysis of Object-Oriented Mograms Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs, (1-6)
  27. Lucanu D, Rusu V and Arusoaie A (2017). A generic framework for symbolic execution, Journal of Symbolic Computation, 80:P1, (125-163), Online publication date: 1-May-2017.
  28. Riesco A, AsăźVoae I and AsăźVoae M Slicing from Formal Semantics Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (374-378)
  29. Riesco A, Ogata K and Futatsugi K (2017). A Maude environment for CafeOBJ, Formal Aspects of Computing, 29:2, (309-334), Online publication date: 1-Mar-2017.
  30. ACM
    Tabrizi F and Pattabiraman K Formal security analysis of smart embedded systems Proceedings of the 32nd Annual Conference on Computer Security Applications, (1-15)
  31. Durán F and Salaün G (2016). Robust and reliable reconfiguration of cloud applications, Journal of Systems and Software, 122:C, (524-537), Online publication date: 1-Dec-2016.
  32. Fleck M, Troya J and Wimmer M (2016). Search-based model transformations, Journal of Software: Evolution and Process, 28:12, (1081-1117), Online publication date: 1-Dec-2016.
  33. ACM
    Goknil A, Kurtev I and van den Berg K A rule-based approach for evolution of AADL models based on changes in functional requirements Proccedings of the 10th European Conference on Software Architecture Workshops, (1-7)
  34. Doan H, Bonnet F and Ogata K Model Checking of a Mobile Robots Perpetual Exploration Algorithm 6th International Workshop on Structured Object-Oriented Formal Language and Method - Volume 10189, (201-219)
  35. ACM
    Barreto F, Batista D, dos Santos J and Muchaluat-Saade D NCL-Tester Proceedings of the 22nd Brazilian Symposium on Multimedia and the Web, (91-94)
  36. Lúcio L, Amrani M, Dingel J, Lambers L, Salay R, Selim G, Syriani E and Wimmer M (2016). Model transformation intents and their properties, Software and Systems Modeling (SoSyM), 15:3, (647-684), Online publication date: 1-Jul-2016.
  37. Durán F, Eker S, Escobar S, Martí-Oliet N, Meseguer J and Talcott C Built-in Variant Generation and Unification, and Their Applications in Maude 2.7 Proceedings of the 8th International Joint Conference on Automated Reasoning - Volume 9706, (183-192)
  38. Talcott C, Nigam V, Arbab F and Kappé T Formal Specification and Analysis of Robust Adaptive Distributed Cyber-Physical Systems Advanced Lectures of the 16th International School on Formal Methods for the Quantitative Evaluation of Collective Adaptive Systems - Volume 9700, (1-35)
  39. Lin J, Yu I, Johnsen E and Lee M ABS-YARN Proceedings of the 19th International Conference on Fundamental Approaches to Software Engineering - Volume 9633, (49-65)
  40. Petrocchi M, Spognardi A and Santi P (2016). Bioinspired Security Analysis of Wireless Protocols, Mobile Networks and Applications, 21:1, (139-148), Online publication date: 1-Feb-2016.
  41. ACM
    Bekki K, Belbachir H and Kasri W A K-BPEL Semantics Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication, (1-5)
  42. Pita I and Riesco A Specifying and Analyzing the Kademlia Protocol in Maude Proceedings of the 12th International Colloquium on Theoretical Aspects of Computing - ICTAC 2015 - Volume 9399, (524-541)
  43. ACM
    dos Santos J, Braga C, Muchaluat-Saade D, Roisin C and Layaïda N Spatio-temporal Validation of Multimedia Documents Proceedings of the 2015 ACM Symposium on Document Engineering, (133-142)
  44. Modeling and verifying context-aware non-monotonic reasoning agents Proceedings of the 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign, (61-69)
  45. Liu S, Nguyen S, Ganhotra J, Rahman M, Gupta I and Meseguer J Quantitative Analysis of Consistency in NoSQL Key-Value Stores Proceedings of the 12th International Conference on Quantitative Evaluation of Systems - Volume 9259, (228-243)
  46. Chemaa S, Bouarioua M and Chaoui A (2015). A high-level Petri net based model for web services composition and verification, International Journal of Computer Applications in Technology, 51:4, (306-323), Online publication date: 1-Jul-2015.
  47. Alpuente M, Ballis D, Frechina F and Sapiña J (2015). Exploring conditional rewriting logic computations, Journal of Symbolic Computation, 69:C, (3-39), Online publication date: 1-Jul-2015.
  48. Lucanu D and Rusu V (2015). Program equivalence by circular reasoning, Formal Aspects of Computing, 27:4, (701-726), Online publication date: 1-Jul-2015.
  49. Maximova M, Ehrig H and Ermel C (2015). Local confluence analysis of hypergraph transformation systems with application conditions based on M -functors and Agg, Science of Computer Programming, 104:C, (44-70), Online publication date: 15-Jun-2015.
  50. Gasparini L, Norman T, Kollingbaum M, Chen L and Meyer J Verifying Normative System Specification containing Collective Imperatives and Deadlines Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1821-1822)
  51. Salvaneschi G, Ghezzi C and Pradella M (2015). ContextErlang, Science of Computer Programming, 102:C, (20-43), Online publication date: 1-May-2015.
  52. Kanovich M, Kirigin T, Nigam V, Scedrov A and Talcott C Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols Proceedings of the 4th International Conference on Principles of Security and Trust - Volume 9036, (259-279)
  53. Poyias K and Tuosto E (2015). A design-by-contract approach to recover the architectural style from run-time misbehaviour, Science of Computer Programming, 100:C, (2-27), Online publication date: 15-Mar-2015.
  54. Asăvoae I, de Boer F, Bonsangue M, Lucanu D and Rot J (2015). Model checking recursive programs interacting via the heap, Science of Computer Programming, 100:C, (61-83), Online publication date: 15-Mar-2015.
  55. Eckhardt J, Mühlbauer T, Meseguer J and Wirsing M (2015). Semantics, distributed implementation, and formal analysis of KLAIM models in Maude, Science of Computer Programming, 99:C, (24-74), Online publication date: 1-Mar-2015.
  56. Lucas S (2015). Completeness of context-sensitive rewriting, Information Processing Letters, 115:2, (87-92), Online publication date: 1-Feb-2015.
  57. Petrocchi M, Spognardi A and Santi P Cryptofraglets reloaded Proceedings of the 8th International Conference on Bioinspired Information and Communications Technologies, (149-156)
  58. Lochau M, Mennicke S, Baller H and Ribbeck L DeltaCCS Part I of the Proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - Volume 8802, (320-335)
  59. Alpuente M, Escobar S, Espert J and Meseguer J ACUOS Proceedings of the 14th European Conference on Logics in Artificial Intelligence - Volume 8761, (573-581)
  60. ACM
    Lucas S and Meseguer J Proving Operational Termination of Declarative Programs in General Logics Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, (111-122)
  61. Vissani I, Pombo C, Ţu ţU I and Fiadeiro J A Full Operational Semantics for Asynchronous Relational Networks Revised Selected Papers of the 22nd International Workshop on Recent Trends in Algebraic Development Techniques - Volume 9463, (131-150)
  62. Ciobâcă Ş, Lucanu D, Rusu V and Roşu G A Theoretical Foundation for Programming Languages Aggregation Revised Selected Papers of the 22nd International Workshop on Recent Trends in Algebraic Development Techniques - Volume 9463, (30-47)
  63. ACM
    El-Saber N and Boronat A BPMN Formalization and Verification using Maude Proceedings of the 2014 Workshop on Behaviour Modelling-Foundations and Applications, (1-12)
  64. Moreno-Delgado A, Durán F, Zschaler S and Troya J Modular DSLs for Flexible Analysis Proceedings of the 10th European Conference on Modelling Foundations and Applications - Volume 8569, (132-147)
  65. ACM
    Durán F and Salaün G Robust reconfiguration of cloud applications Proceedings of the 17th international ACM Sigsoft symposium on Component-based software engineering, (179-184)
  66. ACM
    Smaali S, Choutri A and Belala F Towards a meta-model for dynamic applications Proceedings of the 17th international ACM Sigsoft symposium on Component-based software engineering, (23-28)
  67. Morandi B, Nanz S and Meyer B Safe and Efficient Data Sharing for Message-Passing Concurrency Proceedings of the 16th IFIP WG 6.1 International Conference on Coordination Models and Languages - Volume 8459, (99-114)
  68. Belzner L Verifiable Decisions in Autonomous Concurrent Systems Proceedings of the 16th IFIP WG 6.1 International Conference on Coordination Models and Languages - Volume 8459, (17-32)
  69. Bae K, Ölveczky P and Meseguer J Definition, Semantics, and Analysis of Multirate Synchronous AADL Proceedings of the 19th International Symposium on FM 2014: Formal Methods - Volume 8442, (94-109)
  70. Gasparini L, Norman T, Kollingbaum M and Chen L Severity-Sensitive Robustness Analysis in Normative Systems Revised Selected Papers of the International Workshops on Coordination, Organizations, Institutions, and Norms in Agent Systems X - Volume 9372, (72-88)
  71. ACM
    Escobar S, Meadows C, Meseguer J and Santiago S A rewriting-based forwards semantics for Maude-NPA Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, (1-12)
  72. Alpuente M, Ballis D, Frechina F and Romero D (2014). Using conditional trace slicing for improving Maude programs, Science of Computer Programming, 80:PB, (385-415), Online publication date: 1-Feb-2014.
  73. Alpuente M, Ballis D and Romero D (2014). A rewriting logic approach to the formal specification and verification of web applications, Science of Computer Programming, 81, (79-107), Online publication date: 1-Feb-2014.
  74. Meredith P and Rosu G Efficient parametric runtime verification with deterministic string rewriting Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (70-80)
  75. ACM
    dos Santos J, Braga C and Muchaluat-Saade D Automating the analysis of NCL documents with a model-driven approach Proceedings of the 19th Brazilian symposium on Multimedia and the web, (193-200)
  76. ACM
    Musser D and Varela C Structured reasoning about actor systems Proceedings of the 2013 workshop on Programming based on actors, agents, and decentralized control, (37-48)
  77. Bentea L, Ölveczky P and Bentea E Using Probabilistic Strategies to Formalize and Compare α-Synuclein Aggregation and Propagation under Different Scenarios Proceedings of the 11th International Conference on Computational Methods in Systems Biology - Volume 8130, (92-105)
  78. Mokhati F and Menassel Y (2013). Towards formalising use case maps in Maude strategy language, International Journal of Computer Applications in Technology, 47:2/3, (138-151), Online publication date: 1-Jun-2013.
  79. Skeirik S, Bobba R and Meseguer J Formal analysis of fault-tolerant group key management using ZooKeeper Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (636-641)
  80. Diaconescu R (2013). Institutional semantics for many-valued logics, Fuzzy Sets and Systems, 218, (32-52), Online publication date: 1-May-2013.
  81. ACM
    Qin Z, Denker G, Talcott C and Venkatasubramanian N Achieving resilience of heterogeneous networks through predictive, formal analysis Proceedings of the 2nd ACM international conference on High confidence networked systems, (85-92)
  82. ACM
    Alpuente M, Feliú M and Villanueva A Automatic inference of specifications using matching logic Proceedings of the ACM SIGPLAN 2013 workshop on Partial evaluation and program manipulation, (127-136)
  83. ACM
    Kim M, Stehr M, Talcott C, Dutt N and Venkatasubramanian N (2013). xTune, ACM Transactions on Embedded Computing Systems, 11:4, (1-23), Online publication date: 1-Dec-2012.
  84. Bae K, Ölveczky P, Feng T, Lee E and Tripakis S (2012). Verifying hierarchical Ptolemy II discrete-event models using Real-Time Maude, Science of Computer Programming, 77:12, (1235-1271), Online publication date: 1-Oct-2012.
  85. Wong P, Albert E, Muschevici R, Proença J, Schäfer J and Schlatte R (2012). The ABS tool suite, International Journal on Software Tools for Technology Transfer (STTT), 14:5, (567-588), Online publication date: 1-Oct-2012.
  86. Din C, Dovland J and Owe O Compositional reasoning about shared futures Proceedings of the 10th international conference on Software Engineering and Formal Methods, (94-108)
  87. Riesco A Using semantics specified in maude to generate test cases Proceedings of the 9th international conference on Theoretical Aspects of Computing, (90-104)
  88. Riesco A and Rodríguez-Hortalá J S-Narrowing for constructor systems Proceedings of the 9th international conference on Theoretical Aspects of Computing, (136-150)
  89. Meseguer J and Ölveczky P (2012). Formalization and correctness of the PALS architectural pattern for distributed real-time systems, Theoretical Computer Science, 451, (1-37), Online publication date: 1-Sep-2012.
  90. Rocha C, Cadavid H, Muñoz C and Siminiceanu R A formal interactive verification environment for the plan execution interchange language Proceedings of the 9th international conference on Integrated Formal Methods, (343-357)
  91. Kazemeyni F, Johnsen E, Owe O and Balasingham I MULE-Based wireless sensor networks Proceedings of the 9th international conference on Integrated Formal Methods, (143-157)
  92. Wimmer M, Moreno N and Vallecillo A Viewpoint co-evolution through coarse-grained changes and coupled transformations Proceedings of the 50th international conference on Objects, Models, Components, Patterns, (336-352)
  93. Pita I and Riesco A (2012). A Tool for Testing Data Type Implementations from Maude Algebraic Specifications, Electronic Notes in Theoretical Computer Science (ENTCS), 282:C, (61-71), Online publication date: 5-May-2012.
  94. Jalali L, Talcott C, Venkatasubramanian N and Mehrotra S Formal specification of multisimulations using Maude Proceedings of the 2012 Symposium on Theory of Modeling and Simulation - DEVS Integrative M&S Symposium, (1-8)
  95. Gutiérrez R, Meseguer J and Rocha C Order-Sorted equality enrichments modulo axioms Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (162-181)
  96. Fadlisyah M, Ölveczky P and Ábrahám E Formal modeling and analysis of human body exposure to extreme heat in HI-Maude Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (139-161)
  97. Bruni R, Corradini A, Gadducci F, Lluch Lafuente A and Vandin A Modelling and analyzing adaptive self-assembly strategies with maude Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (118-138)
  98. Bae K and Meseguer J Model checking LTLR formulas under localized fairness Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (99-117)
  99. Arusoaie A, Şerbănuţă T, Ellison C and Roşu G Making maude definitions more interactive Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (83-98)
  100. Wirsing M, Eckhardt J, Mühlbauer T and Meseguer J Design and analysis of cloud-based architectures with KLAIM and maude Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (54-82)
  101. Lucanu D, Şerbănuţă T and Roşu G K framework distilled Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (31-53)
  102. Hills M, Klint P and Vinju J Program analysis scenarios in rascal Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (10-30)
  103. Riesco A Using narrowing to test maude specifications Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (201-220)
  104. Lepri D, Ábrahám E and Ölveczky P Timed CTL model checking in real-time maude Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (182-200)
  105. Eckhardt J, Mühlbauer T, AlTurki M, Meseguer J and Wirsing M Stable availability under denial of service attacks through formal patterns Proceedings of the 15th international conference on Fundamental Approaches to Software Engineering, (78-93)
  106. ACM
    Nigam V, Kirigin T, Scedrov A, Talcott C, Kanovich M and Perovic R Towards an automated assistant for clinical investigations Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, (773-778)
  107. ACM
    Ellison C and Rosu G An executable formal semantics of C with applications Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (533-544)
  108. ACM
    Ellison C and Rosu G (2012). An executable formal semantics of C with applications, ACM SIGPLAN Notices, 47:1, (533-544), Online publication date: 18-Jan-2012.
  109. Gadducci F, Lafuente A and Vandin A (2012). Counterpart Semantics for a Second-Order μ-Calculus, Fundamenta Informaticae, 118:1-2, (177-205), Online publication date: 1-Jan-2012.
  110. Fadlisyah M, Ölveczky P and Ábrahám E Object-oriented formal modeling and analysis of interacting hybrid systems in HI-maude Proceedings of the 9th international conference on Software engineering and formal methods, (415-430)
  111. Bae K, Ölveczky P, Al-Nayeem A and Meseguer J Synchronous AADL and its formal analysis in real-time Maude Proceedings of the 13th international conference on Formal methods and software engineering, (651-667)
  112. Lausdahl K, Larsen P and Battle N A Deterministic Interpreter Simulating A Distributed real time system using VDM Proceedings of the 13th international conference on Formal methods and software engineering, (179-194)
  113. Bentea L and Owe O A probabilistic framework for object-oriented modeling and analysis of distributed systems Proceedings of the 2011 international conference on Formal Verification of Object-Oriented Software, (105-122)
  114. Rusu V and Lucanu D A K-based formal framework for domain-specific modelling languages Proceedings of the 2011 international conference on Formal Verification of Object-Oriented Software, (214-231)
  115. Johnsen E, Schlatte R and Tapia Tarifa S A formal model of user-defined resources in resource-restricted deployment scenarios Proceedings of the 2011 international conference on Formal Verification of Object-Oriented Software, (196-213)
  116. Rocha C and Muñoz C Simulation and verification of synchronous set relations in rewriting logic Proceedings of the 14th Brazilian conference on Formal Methods: foundations and Applications, (60-75)
  117. Matteucci I, Petrocchi M, Sbodio M and Wiegand L A design phase for data sharing agreements Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security, (25-41)
  118. Durán F, Rocha C and Álvarez J Tool interoperability in the Maude formal environment Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (400-406)
  119. Aceto L, Caltais G, Goriac E and Ingolfsdottir A PREG axiomatizer Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (378-385)
  120. Rocha C and Meseguer J Proving safety properties of rewrite theories Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (314-328)
  121. Meseguer J and Roşu G The rewriting logic semantics project Proceedings of the 18th international conference on Fundamentals of computation theory, (1-37)
  122. Liu Z and Lynch C Efficient general unification for XOR with homomorphism Proceedings of the 23rd international conference on Automated deduction, (407-421)
  123. Alpuente M, Ballis D, Espert J and Romero D Backward trace slicing for rewriting logic theories Proceedings of the 23rd international conference on Automated deduction, (34-48)
  124. ACM
    Bourdier T and Cirstea H Symbolic analysis of network security policies using rewrite systems Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming, (77-88)
  125. ACM
    Escobar S, Kapur D, Lynch C, Meadows C, Meseguer J, Narendran P and Sasse R Protocol analysis in Maude-NPA using unification modulo homomorphic encryption Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming, (65-76)
  126. ACM
    Schernhammer F and Meseguer J Incremental checking of well-founded recursive specifications modulo axioms Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming, (5-16)
  127. Caballero R, Riesco A, Verdejo A and Martí-Oliet N Simplifying questions in maude declarative debugger by transforming proof trees Proceedings of the 21st international conference on Logic-Based Program Synthesis and Transformation, (73-89)
  128. Bae K and Meseguer J State/event-based LTL model checking under parametric generalized fairness Proceedings of the 23rd international conference on Computer aided verification, (132-148)
  129. Hills M, Klint P and Vinju J RLSRunner Proceedings of the 4th international conference on Software Language Engineering, (344-353)
  130. Braga C (2011). A transformation contract to generate aspects from access control policies, Software and Systems Modeling (SoSyM), 10:3, (395-409), Online publication date: 1-Jul-2011.
  131. Troya J, Bautista J, López-Romero F and Vallecillo A Lightweight testing of communication networks with e-motions Proceedings of the 5th international conference on Tests and proofs, (187-204)
  132. Albert E, Genaim S, Gómez-Zamalloa M, Johnsen E, Schlatte R and Tarifa S Simulating concurrent behaviors with worst-case cost bounds Proceedings of the 17th international conference on Formal methods, (353-368)
  133. Wang A, Talcott C, Jia L, Loo B and Scedrov A Analyzing BGP instances in Maude Proceedings of the joint 13th IFIP WG 6.1 and 30th IFIP WG 6.1 international conference on Formal techniques for distributed systems, (334-348)
  134. ACM
    Stuurman G and Kurtev I Action semantics for defining dynamic semantics of modeling languages Proceedings of the Third Workshop on Behavioural Modelling, (64-71)
  135. AsĂvoae M, AsĂvoae I and Lucanu D On abstractions for timing analysis in the K framework Proceedings of the Second international conference on Foundational and Practical Aspects of Resource Analysis, (90-107)
  136. Bourdier T, Cirstea H, Jaume M and Kirchner H Formal specification and validation of security policies Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security, (148-163)
  137. Kim M, Stehr M and Talcott C A distributed logic for networked cyber-physical systems Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering, (190-205)
  138. ACM
    Rusu V (2011). Embedding domain-specific modelling languages in maude specifications, ACM SIGSOFT Software Engineering Notes, 36:1, (1-8), Online publication date: 24-Jan-2011.
  139. Panikkar A, Knapp M, Mi H, Anderson D, Kodukula K, Galande A and Talcott C Applications of pathway logic modeling to target identification Formal modeling, (434-445)
  140. Hartmann L, Jones N, Simonsen J and Vrist S Computational biology Formal modeling, (403-433)
  141. Ölveczky P Semantics, simulation, and formal analysis of modeling languages for embedded systems in real-time Maude Formal modeling, (368-402)
  142. Durán F, Rocha C and Álvarez J Towards a Maude formal environment Formal modeling, (329-351)
  143. Eker S Fast sort computations for order-sorted matching and unification Formal modeling, (299-314)
  144. Hölzl M and Wirsing M Towards a system model for ensembles Formal modeling, (241-261)
  145. Kim M, Stehr M, Talcott C, Dutt N and Venkatasubramanian N A formal methodology for compositional cross-layer optimization Formal modeling, (207-222)
  146. Stehr M, Talcott C, Rushby J, Lincoln P, Kim M, Cheung S and Poggio A Fractionated software for networked cyber-physical systems Formal modeling, (110-143)
  147. Pinsky S Honoring Carolyn Talcott's contributions to science Formal modeling, (4-19)
  148. Bergmann G, Boronat A, Heckel R, Torrini P, Ráth I and Varró D Advances in model transformations by graph transformation Rigorous software engineering for service-oriented systems, (561-584)
  149. Montanari U A unifying formal basis for the SENSORIA approach Rigorous software engineering for service-oriented systems, (15-25)
  150. Johnsen E, Hähnle R, Schäfer J, Schlatte R and Steffen M ABS Proceedings of the 9th international conference on Formal Methods for Components and Objects, (142-164)
  151. Ogata K and Futatsugi K A combination of forward and backward reachability analysis methods Proceedings of the 12th international conference on Formal engineering methods and software engineering, (501-517)
  152. Meseguer J and Ölveczky P Formalization and correctness of the PALS architectural pattern for distributed real-time systems Proceedings of the 12th international conference on Formal engineering methods and software engineering, (303-320)
  153. Bonsangue M, Caltais G, Goriac E, Lucanu D, Rutten J and Silva A A decision procedure for bisimilarity of generalized regular expressions Proceedings of the 13th Brazilian conference on Formal methods: foundations and applications, (226-241)
  154. Nakajima S, Ishiguro M and Tanaka K Rewriting logic approach to modeling and analysis of client behavior in open systems Proceedings of the 8th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems, (83-94)
  155. ACM
    Donaldson R, Talcott C, Knapp M and Calder M Understanding signalling networks as collections of signal transduction pathways Proceedings of the 8th International Conference on Computational Methods in Systems Biology, (86-95)
  156. Alpuente M, Ballis D, Espert J and Romero D Model-checking web applications with web-TLR Proceedings of the 8th international conference on Automated technology for verification and analysis, (341-346)
  157. Riesco A and Rodríguez-Hortalá J (2010). A Natural Implementation of Plural Semantics in Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 253:7, (165-175), Online publication date: 1-Sep-2010.
  158. Alpuente M, Comini M, Escobar S, Falaschi M and Iborra J (2010). A compact fixpoint semantics for term rewriting systems, Theoretical Computer Science, 411:37, (3348-3371), Online publication date: 1-Aug-2010.
  159. Rusu V Combining theorem proving and narrowing for rewriting-logic specifications Proceedings of the 4th international conference on Tests and proofs, (135-150)
  160. A formal executable semantics of Verilog Proceedings of the Eighth ACM/IEEE International Conference on Formal Methods and Models for Codesign, (179-188)
  161. Bruni R, Kersten A, Lanese I and Spagnolo G A new strategy for distributed compensations with interruption in long-running transactions Proceedings of the 20th international conference on Recent Trends in Algebraic Development Techniques, (42-60)
  162. Riesco A Test-Case generation for maude functional modules Proceedings of the 20th international conference on Recent Trends in Algebraic Development Techniques, (287-301)
  163. Kreowski H, Kuske S and von Totth C Combining graph transformation and algebraic specification into model transformation Proceedings of the 20th international conference on Recent Trends in Algebraic Development Techniques, (193-208)
  164. Bauer S, Hennicker R and Wirsing M Building a modal interface theory for concurrency and data Proceedings of the 20th international conference on Recent Trends in Algebraic Development Techniques, (1-12)
  165. Troya J and Vallecillo A Towards a rewriting logic semantics for ATL Proceedings of the Third international conference on Theory and practice of model transformations, (230-244)
  166. Schäfer J and Poetzsch-Heffter A JCoBox Proceedings of the 24th European conference on Object-oriented programming, (275-299)
  167. ACM
    Goknil A, Kurtev I and van den Berg K Tool support for generation and validation of traces between requirements and architecture Proceedings of the 6th ECMFA Traceability Workshop, (39-46)
  168. ACM
    Merouani H, Mokhati F and Seridi-Bouchelaghem H Towards formalizing web service composition in Maude's strategy language Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications, (1-6)
  169. Ölveczky P, Boronat A and Meseguer J Formal semantics and analysis of behavioral AADL models in real-time maude Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems, (47-62)
  170. Boronat A, Bruni R, Lluch Lafuente A, Montanari U and Paolillo G Exploiting the hierarchical structure of rule-based specifications for decision planning Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems, (2-16)
  171. Aştefănoaei L, de Boer F and Dastani M Strategic executions of choreographed timed normative multi-agent systems Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (965-972)
  172. ACM
    Yun H, Wu P, Rahmaniheris M, Kim C and Sha L A reduced complexity design pattern for distributed hierarchical command and control system Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, (42-49)
  173. Troya J, Rivera J and Vallecillo A Simulating domain specific visual models by observation Proceedings of the 2010 Spring Simulation Multiconference, (1-8)
  174. Haxthausen A Towards a framework for modelling and verification of relay interlocking systems Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (176-192)
  175. Kang E, Jackson E and Schulte W An approach for effective design space exploration Proceedings of the 16th Monterey conference on Foundations of computer software: modeling, development, and verification of adaptive systems, (33-54)
  176. ACM
    Matteucci I, Petrocchi M and Sbodio M CNL4DSA Proceedings of the 2010 ACM Symposium on Applied Computing, (616-620)
  177. Durán F, Roldán M, Bach J, Balland E, Van Den Brand M, Cordy J, Eker S, Engelen L, De Jonge M, Kalleberg K, Kats L, Moreau P and Visser E The third rewrite engines competition Proceedings of the 8th international conference on Rewriting logic and its applications, (243-261)
  178. Riesco A, Verdejo A and Martí-Oliet N Enhancing the debugging of Maude specifications Proceedings of the 8th international conference on Rewriting logic and its applications, (226-242)
  179. Bae K and Meseguer J The linear temporal logic of rewriting Maude model checker Proceedings of the 8th international conference on Rewriting logic and its applications, (208-225)
  180. Rivera J, Durán F and Vallecillo A On the behavioral semantics of real-time domain specific visual languages Proceedings of the 8th international conference on Rewriting logic and its applications, (174-190)
  181. Sun M, Meseguer J and Sha L A formal pattern architecture for safe medical systems Proceedings of the 8th international conference on Rewriting logic and its applications, (157-173)
  182. Katelman M, Keller S and Meseguer J Concurrent rewriting semantics and analysis of asynchronous digital circuits Proceedings of the 8th international conference on Rewriting logic and its applications, (140-156)
  183. Şerbănuţă T and Roşu G K-Maude Proceedings of the 8th international conference on Rewriting logic and its applications, (104-122)
  184. Durán F and Meseguer J A Maude coherence checker tool for conditional order-sorted rewrite theories Proceedings of the 8th international conference on Rewriting logic and its applications, (86-103)
  185. Durán F and Meseguer J A Church-Rosser checker tool for conditional order-sorted equational Maude specifications Proceedings of the 8th international conference on Rewriting logic and its applications, (69-85)
  186. Boronat A and Ölveczky P Formal real-time model transformations in MOMENT2 Proceedings of the 13th international conference on Fundamental Approaches to Software Engineering, (29-43)
  187. Alpuente M, Feliú M, Joubert C and Villanueva A Datalog-Based program analysis with BES and RWL Proceedings of the First international conference on Datalog Reloaded, (1-20)
  188. ACM
    Riesco A and Rodríguez-Hortalá J Programming with singular and plural non-deterministic functions Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation, (83-92)
  189. ACM
    Alpuente M, Ballis D, Baggi M and Falaschi M A fold/unfold transformation framework for rewrite theories extended to CCT Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation, (43-52)
  190. Alpuente M, Ballis D and Falaschi M Transformation and debugging of functional logic programs A 25-year perspective on logic programming, (271-299)
  191. Alpuente M, Escobar S, Gramlich B and Lucas S (2010). On-demand strategy annotations revisited, Theoretical Computer Science, 411:2, (504-541), Online publication date: 1-Jan-2010.
  192. Hammer M and Knapp A (2010). Correct Execution of Reconfiguration for Stateful Components, Electronic Notes in Theoretical Computer Science (ENTCS), 260, (91-108), Online publication date: 1-Jan-2010.
  193. Lescaylle A and Villanueva A (2009). The tccp Interpreter, Electronic Notes in Theoretical Computer Science (ENTCS), 258:1, (63-77), Online publication date: 1-Dec-2009.
  194. Alba-Castro M, Alpuente M and Escobar S Abstract certification of global non-interference in rewriting logic Proceedings of the 8th international conference on Formal methods for components and objects, (105-124)
  195. Alpuente M, Escobar S and Iborra J (2009). Termination of narrowing revisited, Theoretical Computer Science, 410:46, (4608-4625), Online publication date: 1-Nov-2009.
  196. Shankesi R, AlTurki M, Sasse R, Gunter C and Meseguer J Model-checking DoS amplification for VoIP session initiation Proceedings of the 14th European conference on Research in computer security, (390-405)
  197. Durán F, Lucas S and Meseguer J Termination modulo combinations of equational theories Proceedings of the 7th international conference on Frontiers of combining systems, (246-262)
  198. Astefanoaei L, Boer F and Dastani M Rewriting Agent Societies Strategically Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (441-444)
  199. Bendiksen L and Ölveczky P The priced-timed Maude tool Proceedings of the 3rd international conference on Algebra and coalgebra in computer science, (443-448)
  200. Găină D, Futatsugi K and Ogata K Constructor-based institutions Proceedings of the 3rd international conference on Algebra and coalgebra in computer science, (398-412)
  201. Roşu G and Lucanu D Circular coinduction Proceedings of the 3rd international conference on Algebra and coalgebra in computer science, (127-144)
  202. Bucchiarone A, Lafuente A, Marconi A and Pistore M A formalisation of adaptable pervasive flows Proceedings of the 6th international conference on Web services and formal methods, (61-75)
  203. Alpuente M, Feliú M, Joubert C and Villanueva A Defining datalog in rewriting logic Proceedings of the 19th international conference on Logic-Based Program Synthesis and Transformation, (188-204)
  204. Aştefănoaei L, de Boer F and van Riemsdijk M Using rewrite strategies for testing BUpL agents Proceedings of the 19th international conference on Logic-Based Program Synthesis and Transformation, (143-157)
  205. ACM
    Mosses P Component-based semantics Proceedings of the 8th international workshop on Specification and verification of component-based systems, (3-10)
  206. ACM
    Gárcia-Mateos G and Fernández-Alemán J (2009). A course on algorithms and data structures using on-line judging, ACM SIGCSE Bulletin, 41:3, (45-49), Online publication date: 25-Aug-2009.
  207. Roldán M, Durán F and Vallecillo A (2009). Invariant-driven specifications in Maude, Science of Computer Programming, 74:10, (812-835), Online publication date: 1-Aug-2009.
  208. Durán F, Lucas S and Meseguer J (2009). Methods for Proving Termination of Rewriting-based Programming Languages by Transformation, Electronic Notes in Theoretical Computer Science (ENTCS), 248, (93-113), Online publication date: 1-Aug-2009.
  209. Durán F, Lucas S, Meseguer J and Gutiérrez F (2009). Web Services and Interoperability for the Maude Termination Tool, Electronic Notes in Theoretical Computer Science (ENTCS), 248, (83-92), Online publication date: 1-Aug-2009.
  210. Alpuente M, Feliú M, Joubert C and Villanueva A (2009). DATALOG_SOLVE, Electronic Notes in Theoretical Computer Science (ENTCS), 248, (57-66), Online publication date: 1-Aug-2009.
  211. Alba-Castro M, Alpuente M, Escobar S, Ojeda P and Romero D (2009). A Tool for Automated Certification of Java Source Code in Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 248, (19-29), Online publication date: 1-Aug-2009.
  212. Alpuente M, Escobar S, Meseguer J and Ojeda P (2009). Order-Sorted Generalization, Electronic Notes in Theoretical Computer Science (ENTCS), 246, (27-38), Online publication date: 1-Aug-2009.
  213. ACM
    Gárcia-Mateos G and Fernández-Alemán J A course on algorithms and data structures using on-line judging Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education, (45-49)
  214. Falke S and Kapur D Termination of context-sensitive rewriting with built-in numbers and collection data structures Proceedings of the 18th international conference on Functional and Constraint Logic Programming, (44-61)
  215. Aoumeur N, Kamel B and Saake G Rapid-Prototyping of Adaptive Component-Based Systems Using Runtime Aspectual Interactions Proceedings of the 2009 IEEE/IFIP International Symposium on Rapid System Prototyping, (18-25)
  216. Durán F, Roldán M, Balland E, van den Brand M, Eker S, Kalleberg K, Kats L, Moreau P, Schevchenko R and Visser E (2009). The Second Rewrite Engines Competition, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (281-291), Online publication date: 1-Jun-2009.
  217. Rodríguez D (2009). Combining Techniques to Reduce State Space and Prove Strong Properties, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (267-280), Online publication date: 1-Jun-2009.
  218. Riesco A and Verdejo A (2009). Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (249-266), Online publication date: 1-Jun-2009.
  219. Martí-Oliet N, Meseguer J and Verdejo A (2009). A Rewriting Semantics for Maude Strategies, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (227-247), Online publication date: 1-Jun-2009.
  220. Lucas S and Meseguer J (2009). Operational Termination of Membership Equational Programs, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (207-225), Online publication date: 1-Jun-2009.
  221. Goriac E, Caltais G, Lucanu D, Andrei O and Grigoraş G (2009). Patterns for Maude Metalanguage Applications, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (121-138), Online publication date: 1-Jun-2009.
  222. Caballero R, Martí-Oliet N, Riesco A and Verdejo A (2009). A Declarative Debugger for Maude Functional Modules, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (63-81), Online publication date: 1-Jun-2009.
  223. Bruni R, Lluch Lafuente A and Montanari U (2009). Hierarchical Design Rewriting with Maude, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (45-62), Online publication date: 1-Jun-2009.
  224. Andrei O and Lucanu D (2009). Strategy-Based Proof Calculus for Membrane Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 238:3, (23-43), Online publication date: 1-Jun-2009.
  225. Aştefănoaei L, de Boer F and Dastani M The refinement of choreographed multi-agent systems Proceedings of the 7th international conference on Declarative Agent Languages and Technologies, (20-34)
  226. Falke S and Kapur D (2009). Operational Termination of Conditional Rewriting with Built-in Numbers and Semantic Data Structures, Electronic Notes in Theoretical Computer Science (ENTCS), 237, (75-90), Online publication date: 1-Apr-2009.
  227. Braga C, Chalub F and Sztajnberg A (2009). A Formal Semantics for a Quality of Service Contract Language, Electronic Notes in Theoretical Computer Science (ENTCS), 203:7, (103-120), Online publication date: 1-Apr-2009.
  228. Rivera J, Guerra E, Lara J and Vallecillo A Analyzing Rule-Based Behavioral Semantics of Visual Modeling Languages with Maude Software Language Engineering, (54-73)
  229. Ölveczky P and Thorvaldsen S (2009). Formal modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude, Theoretical Computer Science, 410:2-3, (254-280), Online publication date: 1-Feb-2009.
  230. Şerbănuţă T, Roşu G and Meseguer J (2009). A rewriting logic approach to operational semantics, Information and Computation, 207:2, (305-340), Online publication date: 1-Feb-2009.
  231. Orejas F and Wirsing M On the specification and verification of model transformations Semantics and algebraic specification, (140-161)
  232. Braga C A constructive semantics for basic aspect constructs Semantics and algebraic specification, (106-120)
  233. Meseguer J Order-sorted parameterization and induction Semantics and algebraic specification, (43-80)
  234. Sha L and Meseguer J Design of Complex Cyber Physical Systems with Formalized Architectural Patterns Software-Intensive Systems and New Computing Paradigms, (92-100)
  235. Varró D, Asztalos M, Bisztray D, Boronat A, Dang D, Geiß R, Greenyer J, Van Gorp P, Kniemeyer O, Narayanan A, Rencis E and Weinell E Transformation of UML Models to CSP Applications of Graph Transformations with Industrial Relevance, (540-565)
  236. Meredith P, Jin D, Chen F and Rosu G Efficient Monitoring of Parametric Context-Free Patterns Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (148-157)
  237. Durán F, Lucas S and Meseguer J MTT Proceedings of the 4th international joint conference on Automated Reasoning, (313-319)
  238. Riesco A, Verdejo A, Martí-Oliet N and Caballero R A Declarative Debugger for Maude Proceedings of the 12th international conference on Algebraic Methodology and Software Technology, (116-121)
  239. Durán F, Gutiérrez F, López P and Pimentel E A formalization of the SMEPP model in Maude Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, (1-6)
  240. ACM
    Lucas S and Meseguer J Order-sorted dependency pairs Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming, (108-119)
  241. Chadha R, Gunter C, Meseguer J, Shankesi R and Viswanathan M Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers Proceedings of the 10th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems, (39-58)
  242. Katelman M, Meseguer J and Hou J Redesign of the LMST Wireless Sensor Protocol through Formal Modeling and Statistical Model Checking Proceedings of the 10th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems, (150-169)
  243. Talcott C Pathway logic Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (21-53)
  244. Directed-Logical Testing for Functional Verification of Microprocessors Proceedings of the Sixth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (89-100)
  245. Bruni R, Bucchiarone A, Gnesi S, Hirsch D and Lluch Lafuente A Graph-Based Design and Analysis of Dynamic Software Architectures Concurrency, Graphs and Models, (37-56)
  246. Meseguer J The Temporal Logic of Rewriting Concurrency, Graphs and Models, (354-382)
  247. Caballero R, Martí-Oliet N, Riesco A and Verdejo A Declarative Debugging of Membership Equational Logic Specifications Concurrency, Graphs and Models, (174-193)
  248. Astefanoaei L and de Boer F Model-checking agent refinement Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2, (705-712)
  249. Flores S, Lucas S and Villanueva A (2008). Formal Verification of Websites, Electronic Notes in Theoretical Computer Science (ENTCS), 200:3, (103-118), Online publication date: 1-May-2008.
  250. AlTurki M and Meseguer J (2008). Reduction Semantics and Formal Analysis of Orc Programs, Electronic Notes in Theoretical Computer Science (ENTCS), 200:3, (25-41), Online publication date: 1-May-2008.
  251. Rocha C and Meseguer J Theorem proving modulo based on Boolean equational procedures Proceedings of the 10th international conference on Relational and kleene algebra methods in computer science, and 5th international conference on Applications of kleene algebra, (337-351)
  252. Ölveczky P and Meseguer J The real-time Maude tool Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems, (332-336)
  253. Bruni R, Lafuente A, Montanari U and Tuosto E Service oriented architectural design Proceedings of the 3rd conference on Trustworthy global computing, (186-203)
  254. Kim M, Stehr M, Talcott C, Dutt N and Venkatasubramanian N Combining formal verification with observed system execution behavior to tune system parameters Proceedings of the 5th international conference on Formal modeling and analysis of timed systems, (257-273)
  255. Clavel M, Durán F, Hendrix J, Lucas S, Meseguer J and Ölveczky P The maude formal tool environment Proceedings of the 2nd international conference on Algebra and coalgebra in computer science, (173-178)
  256. ACM
    AlTurki M and Meseguer J Real-time rewriting semantics of orc Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming, (131-142)
  257. Alba-Castro M, Alpuente M and Escobar S Automatic certification of Java source code in rewriting logic Proceedings of the 12th international conference on Formal methods for industrial critical systems, (200-217)
  258. Wirsing M, Denker G, Talcott C, Poggio A and Briesemeister L (2007). A Rewriting Logic Framework for Soft Constraints, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (181-197), Online publication date: 1-Jul-2007.
  259. Escobar S and Meseguer J Symbolic model checking of infinite-state systems using narrowing Proceedings of the 18th international conference on Term rewriting and applications, (153-168)
  260. Kim M, Stehr M, Talcott C, Dutt N and Venkatasubramanian N A probabilistic formal analysis approach to cross layer optimization in distributed embedded systems Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems, (285-300)
  261. Clavel M, Meseguer J and Palomino M (2007). Reflection in membership equational logic, many-sorted equational logic, Horn logic with equality, and rewriting logic, Theoretical Computer Science, 373:1-2, (70-91), Online publication date: 10-Mar-2007.
Contributors
  • Eastern International University
  • University of Malaga
  • SRI International
  • SRI International
  • Complutense University of Madrid
  • University of Illinois Urbana-Champaign
  • SRI International

Recommendations