h1

h2

h3

h4

h5
h6
000814598 001__ 814598
000814598 005__ 20240311095757.0
000814598 0247_ $$2ISBN$$a978-3-030-45189-9
000814598 0247_ $$2ISBN$$a978-3-030-45190-5
000814598 0247_ $$2ISBN$$a978-3-030-45191-2
000814598 0247_ $$2ISSN$$a0302-9743
000814598 0247_ $$2ISSN$$a1611-3349
000814598 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85083962673
000814598 0247_ $$2doi$$a10.1007/978-3-030-45190-5_3
000814598 0247_ $$2datacite_doi$$a10.18154/RWTH-2021-02249
000814598 037__ $$aRWTH-2021-02249
000814598 041__ $$aEnglish
000814598 1001_ $$0P:(DE-82)814873$$aŠvejda, Jan$$b0$$urwth
000814598 1112_ $$a26. International Conference on Tools and Algorithms for the Construction and Analysis of Systems$$conline$$d2020-04-25 - 2020-04-30$$gTACAS 2020
000814598 245__ $$aInterpretation-Based Violation Witness Validation for C : NITWIT$$honline, print
000814598 260__ $$aCham$$bSpringer International Publishing$$c2020
000814598 29510 $$aTools and Algorithms for the Construction and Analysis of Systems : 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25–30, 2020, Proceedings, Part I / edited by Armin Biere, David Parker
000814598 300__ $$a40-57
000814598 3367_ $$033$$2EndNote$$aConference Paper
000814598 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book
000814598 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib
000814598 3367_ $$2BibTeX$$aINPROCEEDINGS
000814598 3367_ $$2DRIVER$$aconferenceObject
000814598 3367_ $$2DataCite$$aOutput Types/Conference Paper
000814598 3367_ $$2ORCID$$aCONFERENCE_PAPER
000814598 4900_ $$aLecture Notes in Computer Science$$v12078, Theoretical Computer Science and General Issues
000814598 500__ $$aWeitere Reihe: Springer eBook Collection
000814598 588__ $$aDataset connected to CrossRef Book Series
000814598 591__ $$aGermany
000814598 7001_ $$0P:(DE-82)IDM03441$$aBerger, Philipp$$b1$$urwth
000814598 7001_ $$0P:(DE-82)IDM00048$$aKatoen, Joost-Pieter$$b2$$urwth
000814598 7112_ $$aEuropean Joint Conferences on Theory and Practice of Software$$d2020-04-25 - 2020-04-30$$gETAPS 2020
000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.pdf$$yOpenAccess
000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.gif?subformat=icon$$xicon$$yOpenAccess
000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.jpg?subformat=icon-180$$xicon-180$$yOpenAccess
000814598 8564_ $$uhttps://publications.rwth-aachen.de/record/814598/files/814598.jpg?subformat=icon-700$$xicon-700$$yOpenAccess
000814598 909CO $$ooai:publications.rwth-aachen.de:814598$$popenaire$$popen_access$$pVDB$$pdriver$$pdnbdelivery
000814598 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)814873$$aRWTH Aachen$$b0$$kRWTH
000814598 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03441$$aRWTH Aachen$$b1$$kRWTH
000814598 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00048$$aRWTH Aachen$$b2$$kRWTH
000814598 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0
000814598 915__ $$0StatID:(DE-HGF)0200$$2StatID$$aDBCoverage$$bSCOPUS$$d2020-08-25
000814598 915__ $$0LIC:(DE-HGF)CCBY4$$2HGFVOC$$aCreative Commons Attribution CC BY 4.0
000814598 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000814598 915__ $$0StatID:(DE-HGF)0420$$2StatID$$aNationallizenz$$d2020-08-25$$wger
000814598 9201_ $$0I:(DE-82)121310_20140620$$k121310$$lLehrstuhl für Informatik 2 (Softwaremodellierung und Verifikation)$$x0
000814598 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1
000814598 961__ $$c2021-02-27T11:03:50.488416$$x2021-02-27T11:03:50.488416$$z2021-03-01
000814598 9801_ $$aFullTexts
000814598 980__ $$aI:(DE-82)120000_20140620
000814598 980__ $$aI:(DE-82)121310_20140620
000814598 980__ $$aUNRESTRICTED
000814598 980__ $$aVDB
000814598 980__ $$acontb
000814598 980__ $$acontrib