000814598 001__ 814598 000814598 005__ 20240311095757.0 000814598 0247_ $$2ISBN$$a978-3-030-45189-9 000814598 0247_ $$2ISBN$$a978-3-030-45190-5 000814598 0247_ $$2ISBN$$a978-3-030-45191-2 000814598 0247_ $$2ISSN$$a0302-9743 000814598 0247_ $$2ISSN$$a1611-3349 000814598 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85083962673 000814598 0247_ $$2doi$$a10.1007/978-3-030-45190-5_3 000814598 0247_ $$2datacite_doi$$a10.18154/RWTH-2021-02249 000814598 037__ $$aRWTH-2021-02249 000814598 041__ $$aEnglish 000814598 1001_ $$0P:(DE-82)814873$$aŠvejda, Jan$$b0$$urwth 000814598 1112_ $$a26. International Conference on Tools and Algorithms for the Construction and Analysis of Systems$$conline$$d2020-04-25 - 2020-04-30$$gTACAS 2020 000814598 245__ $$aInterpretation-Based Violation Witness Validation for C : NITWIT$$honline, print 000814598 260__ $$aCham$$bSpringer International Publishing$$c2020 000814598 29510 $$aTools and Algorithms for the Construction and Analysis of Systems : 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25–30, 2020, Proceedings, Part I / edited by Armin Biere, David Parker 000814598 300__ $$a40-57 000814598 3367_ $$033$$2EndNote$$aConference Paper 000814598 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book 000814598 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib 000814598 3367_ $$2BibTeX$$aINPROCEEDINGS 000814598 3367_ $$2DRIVER$$aconferenceObject 000814598 3367_ $$2DataCite$$aOutput Types/Conference Paper 000814598 3367_ $$2ORCID$$aCONFERENCE_PAPER 000814598 4900_ $$aLecture Notes in Computer Science$$v12078, Theoretical Computer Science and General Issues 000814598 500__ $$aWeitere Reihe: Springer eBook Collection 000814598 588__ $$aDataset connected to CrossRef Book Series 000814598 591__ $$aGermany 000814598 7001_ $$0P:(DE-82)IDM03441$$aBerger, Philipp$$b1$$urwth 000814598 7001_ $$0P:(DE-82)IDM00048$$aKatoen, Joost-Pieter$$b2$$urwth 000814598 7112_ $$aEuropean Joint Conferences on Theory and Practice of Software$$d2020-04-25 - 2020-04-30$$gETAPS 2020 000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.pdf$$yOpenAccess 000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.gif?subformat=icon$$xicon$$yOpenAccess 000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.jpg?subformat=icon-180$$xicon-180$$yOpenAccess 000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.jpg?subformat=icon-700$$xicon-700$$yOpenAccess 000814598 909CO $$ooai:publications.rwth-aachen.de:814598$$popenaire$$popen_access$$pVDB$$pdriver$$pdnbdelivery 000814598 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)814873$$aRWTH Aachen$$b0$$kRWTH 000814598 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03441$$aRWTH Aachen$$b1$$kRWTH 000814598 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00048$$aRWTH Aachen$$b2$$kRWTH 000814598 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0 000814598 915__ $$0StatID:(DE-HGF)0200$$2StatID$$aDBCoverage$$bSCOPUS$$d2020-08-25 000814598 915__ $$0LIC:(DE-HGF)CCBY4$$2HGFVOC$$aCreative Commons Attribution CC BY 4.0 000814598 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess 000814598 915__ $$0StatID:(DE-HGF)0420$$2StatID$$aNationallizenz$$d2020-08-25$$wger 000814598 9201_ $$0I:(DE-82)121310_20140620$$k121310$$lLehrstuhl für Informatik 2 (Softwaremodellierung und Verifikation)$$x0 000814598 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1 000814598 961__ $$c2021-02-27T11:03:50.488416$$x2021-02-27T11:03:50.488416$$z2021-03-01 000814598 9801_ $$aFullTexts 000814598 980__ $$aI:(DE-82)120000_20140620 000814598 980__ $$aI:(DE-82)121310_20140620 000814598 980__ $$aUNRESTRICTED 000814598 980__ $$aVDB 000814598 980__ $$acontb 000814598 980__ $$acontrib