---
_id: '4392'
abstract:
- lang: eng
  text: 'While a boolean notion of correctness is given by a preorder on systems and
    properties, a quantitative notion of correctness is defined by a distance function
    on systems and properties, where the distance between a system and a property
    provides a measure of “fit” or “desirability.” In this article, we explore several
    ways how the simulation preorder can be generalized to a distance function. This
    is done by equipping the classical simulation game between a system and a property
    with quantitative objectives. In particular, for systems that satisfy a property,
    a quantitative simulation game can measure the “robustness” of the satisfaction,
    that is, how much the system can deviate from its nominal behavior while still
    satisfying the property. For systems that violate a property, a quantitative simulation
    game can measure the “seriousness” of the violation, that is, how much the property
    has to be modified so that it is satisfied by the system. These distances can
    be computed in polynomial time, since the computation reduces to the value problem
    in limit average games with constant weights. Finally, we demonstrate how the
    robustness distance can be used to measure how many transmission errors are tolerated
    by error correcting codes. '
alternative_title:
- LNCS
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
citation:
  ama: 'Cerny P, Henzinger TA, Radhakrishna A. Quantitative Simulation Games. In:
    Manna Z, Peled D, eds. <i>Time For Verification: Essays in Memory of Amir Pnueli</i>.
    Vol 6200. Essays in Memory of Amir Pnueli. Springer; 2010:42-60. doi:<a href="https://doi.org/10.1007/978-3-642-13754-9_3">10.1007/978-3-642-13754-9_3</a>'
  apa: 'Cerny, P., Henzinger, T. A., &#38; Radhakrishna, A. (2010). Quantitative Simulation
    Games. In Z. Manna &#38; D. Peled (Eds.), <i>Time For Verification: Essays in
    Memory of Amir Pnueli</i> (Vol. 6200, pp. 42–60). Springer. <a href="https://doi.org/10.1007/978-3-642-13754-9_3">https://doi.org/10.1007/978-3-642-13754-9_3</a>'
  chicago: 'Cerny, Pavol, Thomas A Henzinger, and Arjun Radhakrishna. “Quantitative
    Simulation Games.” In <i>Time For Verification: Essays in Memory of Amir Pnueli</i>,
    edited by Zohar Manna and Doron Peled, 6200:42–60. Essays in Memory of Amir Pnueli.
    Springer, 2010. <a href="https://doi.org/10.1007/978-3-642-13754-9_3">https://doi.org/10.1007/978-3-642-13754-9_3</a>.'
  ieee: 'P. Cerny, T. A. Henzinger, and A. Radhakrishna, “Quantitative Simulation
    Games,” in <i>Time For Verification: Essays in Memory of Amir Pnueli</i>, vol.
    6200, Z. Manna and D. Peled, Eds. Springer, 2010, pp. 42–60.'
  ista: 'Cerny P, Henzinger TA, Radhakrishna A. 2010.Quantitative Simulation Games.
    In: Time For Verification: Essays in Memory of Amir Pnueli. LNCS, vol. 6200, 42–60.'
  mla: 'Cerny, Pavol, et al. “Quantitative Simulation Games.” <i>Time For Verification:
    Essays in Memory of Amir Pnueli</i>, edited by Zohar Manna and Doron Peled, vol.
    6200, Springer, 2010, pp. 42–60, doi:<a href="https://doi.org/10.1007/978-3-642-13754-9_3">10.1007/978-3-642-13754-9_3</a>.'
  short: 'P. Cerny, T.A. Henzinger, A. Radhakrishna, in:, Z. Manna, D. Peled (Eds.),
    Time For Verification: Essays in Memory of Amir Pnueli, Springer, 2010, pp. 42–60.'
corr_author: '1'
date_created: 2018-12-11T12:08:37Z
date_published: 2010-07-29T00:00:00Z
date_updated: 2024-10-09T20:53:58Z
day: '29'
department:
- _id: ToHe
doi: 10.1007/978-3-642-13754-9_3
ec_funded: 1
editor:
- first_name: Zohar
  full_name: Manna, Zohar
  last_name: Manna
- first_name: Doron
  full_name: Peled, Doron
  last_name: Peled
intvolume: '      6200'
language:
- iso: eng
month: '07'
oa_version: None
page: 42 - 60
project:
- _id: 25EFB36C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '215543'
  name: COMponent-Based Embedded Systems design Techniques
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
publication: 'Time For Verification: Essays in Memory of Amir Pnueli'
publication_status: published
publisher: Springer
publist_id: '1064'
quality_controlled: '1'
scopus_import: 1
series_title: Essays in Memory of Amir Pnueli
status: public
title: Quantitative Simulation Games
type: book_chapter
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6200
year: '2010'
...
---
_id: '4393'
abstract:
- lang: eng
  text: Boolean notions of correctness are formalized by preorders on systems. Quantitative
    measures of correctness can be formalized by real-valued distance functions between
    systems, where the distance between implementation and specification provides
    a measure of “fit” or “desirability.” We extend the simulation preorder to the
    quantitative setting, by making each player of a simulation game pay a certain
    price for her choices. We use the resulting games with quantitative objectives
    to define three different simulation distances. The correctness distance measures
    how much the specification must be changed in order to be satisfied by the implementation.
    The coverage distance measures how much the implementation restricts the degrees
    of freedom offered by the specification. The robustness distance measures how
    much a system can deviate from the implementation description without violating
    the specification. We consider these distances for safety as well as liveness
    specifications. The distances can be computed in polynomial time for safety specifications,
    and for liveness specifications given by weak fairness constraints. We show that
    the distance functions satisfy the triangle inequality, that the distance between
    two systems does not increase under parallel composition with a third system,
    and that the distance between two systems can be bounded from above and below
    by distances between abstractions of the two systems. These properties suggest
    that our simulation distances provide an appropriate basis for a quantitative
    theory of discrete systems. We also demonstrate how the robustness distance can
    be used to measure how many transmission errors are tolerated by error correcting
    codes.
acknowledgement: This work was partially supported by the European Union project COMBEST
  and the European Network of Excellence ArtistDesign.
alternative_title:
- LNCS
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
citation:
  ama: 'Cerny P, Henzinger TA, Radhakrishna A. Simulation distances. In: Vol 6269.
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2010:235-268. doi:<a href="https://doi.org/10.1007/978-3-642-15375-4_18">10.1007/978-3-642-15375-4_18</a>'
  apa: 'Cerny, P., Henzinger, T. A., &#38; Radhakrishna, A. (2010). Simulation distances
    (Vol. 6269, pp. 235–268). Presented at the CONCUR: Concurrency Theory, Paris,
    France: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.1007/978-3-642-15375-4_18">https://doi.org/10.1007/978-3-642-15375-4_18</a>'
  chicago: Cerny, Pavol, Thomas A Henzinger, and Arjun Radhakrishna. “Simulation Distances,”
    6269:235–68. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2010. <a href="https://doi.org/10.1007/978-3-642-15375-4_18">https://doi.org/10.1007/978-3-642-15375-4_18</a>.
  ieee: 'P. Cerny, T. A. Henzinger, and A. Radhakrishna, “Simulation distances,” presented
    at the CONCUR: Concurrency Theory, Paris, France, 2010, vol. 6269, pp. 235–268.'
  ista: 'Cerny P, Henzinger TA, Radhakrishna A. 2010. Simulation distances. CONCUR:
    Concurrency Theory, LNCS, vol. 6269, 235–268.'
  mla: Cerny, Pavol, et al. <i>Simulation Distances</i>. Vol. 6269, Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik, 2010, pp. 235–68, doi:<a href="https://doi.org/10.1007/978-3-642-15375-4_18">10.1007/978-3-642-15375-4_18</a>.
  short: P. Cerny, T.A. Henzinger, A. Radhakrishna, in:, Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2010, pp. 235–268.
conference:
  end_date: 2010-09-03
  location: Paris, France
  name: 'CONCUR: Concurrency Theory'
  start_date: 2010-08-31
corr_author: '1'
date_created: 2018-12-11T12:08:37Z
date_published: 2010-11-01T00:00:00Z
date_updated: 2025-09-30T07:46:05Z
day: '01'
ddc:
- '005'
department:
- _id: ToHe
doi: 10.1007/978-3-642-15375-4_18
ec_funded: 1
file:
- access_level: open_access
  checksum: ea567903676ba8afe0507ee11313dce5
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:15:12Z
  date_updated: 2020-07-14T12:46:28Z
  file_id: '5130'
  file_name: IST-2012-42-v1+1_Simulation_distances.pdf
  file_size: 198913
  relation: main_file
file_date_updated: 2020-07-14T12:46:28Z
has_accepted_license: '1'
intvolume: '      6269'
language:
- iso: eng
month: '11'
oa: 1
oa_version: Submitted Version
page: 235 - 268
project:
- _id: 25EFB36C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '215543'
  name: COMponent-Based Embedded Systems design Techniques
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '1065'
pubrep_id: '42'
quality_controlled: '1'
related_material:
  record:
  - id: '5389'
    relation: earlier_version
    status: public
  - id: '3249'
    relation: later_version
    status: public
scopus_import: 1
status: public
title: Simulation distances
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 6269
year: '2010'
...
---
_id: '4395'
abstract:
- lang: eng
  text: The problem of locally transforming or translating programs without altering
    their semantics is central to the construction of correct compilers. For concurrent
    shared-memory programs this task is challenging because (1) concurrent threads
    can observe transformations that would be undetectable in a sequential program,
    and (2) contemporary multiprocessors commonly use relaxed memory models that complicate
    the reasoning. In this paper, we present a novel proof methodology for verifying
    that a local program transformation is sound with respect to a specific hardware
    memory model, in the sense that it is not observable in any context. The methodology
    is based on a structural induction and relies on a novel compositional denotational
    semantics for relaxed memory models that formalizes (1) the behaviors of program
    fragments as a set of traces, and (2) the effect of memory model relaxations as
    local trace rewrite operations. To apply this methodology in practice, we implemented
    a semi- automated tool called Traver and used it to verify/falsify several compiler
    transformations for a number of different hardware memory models.
alternative_title:
- LNCS
author:
- first_name: Sebastian
  full_name: Burckhardt, Sebastian
  last_name: Burckhardt
- first_name: Madanlal
  full_name: Musuvathi, Madanlal
  last_name: Musuvathi
- first_name: Vasu
  full_name: Singh, Vasu
  id: 4DAE2708-F248-11E8-B48F-1D18A9856A87
  last_name: Singh
citation:
  ama: 'Burckhardt S, Musuvathi M, Singh V. Verifying local transformations on relaxed
    memory models. In: Gupta R, ed. Vol 6011. Springer; 2010:104-123. doi:<a href="https://doi.org/10.1007/978-3-642-11970-5_7">10.1007/978-3-642-11970-5_7</a>'
  apa: 'Burckhardt, S., Musuvathi, M., &#38; Singh, V. (2010). Verifying local transformations
    on relaxed memory models. In R. Gupta (Ed.) (Vol. 6011, pp. 104–123). Presented
    at the CC: Compiler Construction, Pahos, Cyprus: Springer. <a href="https://doi.org/10.1007/978-3-642-11970-5_7">https://doi.org/10.1007/978-3-642-11970-5_7</a>'
  chicago: Burckhardt, Sebastian, Madanlal Musuvathi, and Vasu Singh. “Verifying Local
    Transformations on Relaxed Memory Models.” edited by Rajiv Gupta, 6011:104–23.
    Springer, 2010. <a href="https://doi.org/10.1007/978-3-642-11970-5_7">https://doi.org/10.1007/978-3-642-11970-5_7</a>.
  ieee: 'S. Burckhardt, M. Musuvathi, and V. Singh, “Verifying local transformations
    on relaxed memory models,” presented at the CC: Compiler Construction, Pahos,
    Cyprus, 2010, vol. 6011, pp. 104–123.'
  ista: 'Burckhardt S, Musuvathi M, Singh V. 2010. Verifying local transformations
    on relaxed memory models. CC: Compiler Construction, LNCS, vol. 6011, 104–123.'
  mla: Burckhardt, Sebastian, et al. <i>Verifying Local Transformations on Relaxed
    Memory Models</i>. Edited by Rajiv Gupta, vol. 6011, Springer, 2010, pp. 104–23,
    doi:<a href="https://doi.org/10.1007/978-3-642-11970-5_7">10.1007/978-3-642-11970-5_7</a>.
  short: S. Burckhardt, M. Musuvathi, V. Singh, in:, R. Gupta (Ed.), Springer, 2010,
    pp. 104–123.
conference:
  end_date: 2010-03-28
  location: Pahos, Cyprus
  name: 'CC: Compiler Construction'
  start_date: 2010-03-20
date_created: 2018-12-11T12:08:38Z
date_published: 2010-04-21T00:00:00Z
date_updated: 2021-01-12T07:56:39Z
day: '21'
doi: 10.1007/978-3-642-11970-5_7
editor:
- first_name: Rajiv
  full_name: Gupta, Rajiv
  last_name: Gupta
extern: '1'
intvolume: '      6011'
language:
- iso: eng
month: '04'
oa_version: None
page: 104 - 123
publication_status: published
publisher: Springer
publist_id: '1063'
quality_controlled: '1'
status: public
title: Verifying local transformations on relaxed memory models
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6011
year: '2010'
...
---
_id: '4396'
abstract:
- lang: eng
  text: 'Shape analysis is a promising technique to prove program properties about
    recursive data structures. The challenge is to automatically determine the data-structure
    type, and to supply the shape analysis with the necessary information about the
    data structure. We present a stepwise approach to the selection of instrumentation
    predicates for a TVLA-based shape analysis, which takes us a step closer towards
    the fully automatic verification of data structures. The approach uses two techniques
    to guide the refinement of shape abstractions: (1) during program exploration,
    an explicit heap analysis collects sample instances of the heap structures, which
    are used to identify the data structures that are manipulated by the program;
    and (2) during abstraction refinement along an infeasible error path, we consider
    different possible heap abstractions and choose the coarsest one that eliminates
    the infeasible path. We have implemented this combined approach for automatic
    shape refinement as an extension of the software model checker BLAST. Example
    programs from a data-structure library that manipulate doubly-linked lists and
    trees were successfully verified by our tool.'
alternative_title:
- LNCS
author:
- first_name: Dirk
  full_name: Beyer, Dirk
  last_name: Beyer
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Grégory
  full_name: Théoduloz, Grégory
  last_name: Théoduloz
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Beyer D, Henzinger TA, Théoduloz G, Zufferey D. Shape refinement through explicit
    heap analysis. In: Rosenblum D, Taenzer G, eds. Vol 6013. Springer; 2010:263-277.
    doi:<a href="https://doi.org/10.1007/978-3-642-12029-9_19">10.1007/978-3-642-12029-9_19</a>'
  apa: 'Beyer, D., Henzinger, T. A., Théoduloz, G., &#38; Zufferey, D. (2010). Shape
    refinement through explicit heap analysis. In D. Rosenblum &#38; G. Taenzer (Eds.)
    (Vol. 6013, pp. 263–277). Presented at the FASE: Fundamental Approaches To Software
    Engineering, Paphos, Cyprus: Springer. <a href="https://doi.org/10.1007/978-3-642-12029-9_19">https://doi.org/10.1007/978-3-642-12029-9_19</a>'
  chicago: Beyer, Dirk, Thomas A Henzinger, Grégory Théoduloz, and Damien Zufferey.
    “Shape Refinement through Explicit Heap Analysis.” edited by David Rosenblum and
    Gabriele Taenzer, 6013:263–77. Springer, 2010. <a href="https://doi.org/10.1007/978-3-642-12029-9_19">https://doi.org/10.1007/978-3-642-12029-9_19</a>.
  ieee: 'D. Beyer, T. A. Henzinger, G. Théoduloz, and D. Zufferey, “Shape refinement
    through explicit heap analysis,” presented at the FASE: Fundamental Approaches
    To Software Engineering, Paphos, Cyprus, 2010, vol. 6013, pp. 263–277.'
  ista: 'Beyer D, Henzinger TA, Théoduloz G, Zufferey D. 2010. Shape refinement through
    explicit heap analysis. FASE: Fundamental Approaches To Software Engineering,
    LNCS, vol. 6013, 263–277.'
  mla: Beyer, Dirk, et al. <i>Shape Refinement through Explicit Heap Analysis</i>.
    Edited by David Rosenblum and Gabriele Taenzer, vol. 6013, Springer, 2010, pp.
    263–77, doi:<a href="https://doi.org/10.1007/978-3-642-12029-9_19">10.1007/978-3-642-12029-9_19</a>.
  short: D. Beyer, T.A. Henzinger, G. Théoduloz, D. Zufferey, in:, D. Rosenblum, G.
    Taenzer (Eds.), Springer, 2010, pp. 263–277.
conference:
  end_date: 2010-03-28
  location: Paphos, Cyprus
  name: 'FASE: Fundamental Approaches To Software Engineering'
  start_date: 2010-03-20
date_created: 2018-12-11T12:08:38Z
date_published: 2010-04-21T00:00:00Z
date_updated: 2021-01-12T07:56:40Z
day: '21'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.1007/978-3-642-12029-9_19
editor:
- first_name: David
  full_name: Rosenblum, David
  last_name: Rosenblum
- first_name: Gabriele
  full_name: Taenzer, Gabriele
  last_name: Taenzer
file:
- access_level: open_access
  checksum: 7d26e59a9681487d7283eba337292b2c
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:18:13Z
  date_updated: 2020-07-14T12:46:29Z
  file_id: '5332'
  file_name: IST-2012-41-v1+1_Shape_refinement_through_explicit_heap_analysis.pdf
  file_size: 312147
  relation: main_file
file_date_updated: 2020-07-14T12:46:29Z
has_accepted_license: '1'
intvolume: '      6013'
language:
- iso: eng
month: '04'
oa: 1
oa_version: Submitted Version
page: 263 - 277
project:
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: Springer
publist_id: '1061'
pubrep_id: '41'
quality_controlled: '1'
scopus_import: 1
status: public
title: Shape refinement through explicit heap analysis
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6013
year: '2010'
...
---
_id: '4361'
abstract:
- lang: eng
  text: Depth-bounded processes form the most expressive known fragment of the π-calculus
    for which interesting verification problems are still decidable. In this paper
    we develop an adequate domain of limits for the well-structured transition systems
    that are induced by depth-bounded processes. An immediate consequence of our result
    is that there exists a forward algorithm that decides the covering problem for
    this class. Unlike backward algorithms, the forward algorithm terminates even
    if the depth of the process is not known a priori. More importantly, our result
    suggests a whole spectrum of forward algorithms that enable the effective verification
    of a large class of mobile systems.
alternative_title:
- LNCS
author:
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: 'Wies T, Zufferey D, Henzinger TA. Forward analysis of depth-bounded processes.
    In: Ong L, ed. Vol 6014. Springer; 2010:94-108. doi:<a href="https://doi.org/10.1007/978-3-642-12032-9_8">10.1007/978-3-642-12032-9_8</a>'
  apa: 'Wies, T., Zufferey, D., &#38; Henzinger, T. A. (2010). Forward analysis of
    depth-bounded processes. In L. Ong (Ed.) (Vol. 6014, pp. 94–108). Presented at
    the FoSSaCS: Foundations of Software Science and Computation Structures, Paphos,
    Cyprus: Springer. <a href="https://doi.org/10.1007/978-3-642-12032-9_8">https://doi.org/10.1007/978-3-642-12032-9_8</a>'
  chicago: Wies, Thomas, Damien Zufferey, and Thomas A Henzinger. “Forward Analysis
    of Depth-Bounded Processes.” edited by Luke Ong, 6014:94–108. Springer, 2010.
    <a href="https://doi.org/10.1007/978-3-642-12032-9_8">https://doi.org/10.1007/978-3-642-12032-9_8</a>.
  ieee: 'T. Wies, D. Zufferey, and T. A. Henzinger, “Forward analysis of depth-bounded
    processes,” presented at the FoSSaCS: Foundations of Software Science and Computation
    Structures, Paphos, Cyprus, 2010, vol. 6014, pp. 94–108.'
  ista: 'Wies T, Zufferey D, Henzinger TA. 2010. Forward analysis of depth-bounded
    processes. FoSSaCS: Foundations of Software Science and Computation Structures,
    LNCS, vol. 6014, 94–108.'
  mla: Wies, Thomas, et al. <i>Forward Analysis of Depth-Bounded Processes</i>. Edited
    by Luke Ong, vol. 6014, Springer, 2010, pp. 94–108, doi:<a href="https://doi.org/10.1007/978-3-642-12032-9_8">10.1007/978-3-642-12032-9_8</a>.
  short: T. Wies, D. Zufferey, T.A. Henzinger, in:, L. Ong (Ed.), Springer, 2010,
    pp. 94–108.
conference:
  end_date: 2010-03-28
  location: Paphos, Cyprus
  name: 'FoSSaCS: Foundations of Software Science and Computation Structures'
  start_date: 2010-03-20
corr_author: '1'
date_created: 2018-12-11T12:08:27Z
date_published: 2010-03-01T00:00:00Z
date_updated: 2026-04-09T14:35:23Z
day: '01'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.1007/978-3-642-12032-9_8
editor:
- first_name: Luke
  full_name: Ong, Luke
  last_name: Ong
file:
- access_level: open_access
  checksum: 3e610de84937d821316362658239134a
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:08:17Z
  date_updated: 2020-07-14T12:46:27Z
  file_id: '4677'
  file_name: IST-2012-50-v1+1_Forward_analysis_of_depth-bounded_processes.pdf
  file_size: 240766
  relation: main_file
file_date_updated: 2020-07-14T12:46:27Z
has_accepted_license: '1'
intvolume: '      6014'
language:
- iso: eng
month: '03'
oa: 1
oa_version: Submitted Version
page: 94 - 108
publication_status: published
publisher: Springer
publist_id: '1099'
pubrep_id: '50'
quality_controlled: '1'
related_material:
  record:
  - id: '1405'
    relation: dissertation_contains
    status: public
scopus_import: 1
status: public
title: Forward analysis of depth-bounded processes
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6014
year: '2010'
...
---
OA_place: publisher
_id: '3962'
alternative_title:
- ISTA Thesis
article_processing_charge: No
author:
- first_name: Holger
  full_name: Pflicke, Holger
  id: CAA57A9A-5B61-11E9-B130-E0C1E1F2C83D
  last_name: Pflicke
citation:
  ama: Pflicke H.   Dendritic cell migration across basement membranes in the skin.
    2010.
  apa: Pflicke, H. (2010). <i>  Dendritic cell migration across basement membranes
    in the skin</i>. Institute of Science and Technology Austria.
  chicago: Pflicke, Holger. “  Dendritic Cell Migration across Basement Membranes
    in the Skin.” Institute of Science and Technology Austria, 2010.
  ieee: H. Pflicke, “  Dendritic cell migration across basement membranes in the skin,”
    Institute of Science and Technology Austria, 2010.
  ista: Pflicke H. 2010.   Dendritic cell migration across basement membranes in the
    skin. Institute of Science and Technology Austria.
  mla: Pflicke, Holger. <i>  Dendritic Cell Migration across Basement Membranes in
    the Skin</i>. Institute of Science and Technology Austria, 2010.
  short: H. Pflicke,   Dendritic Cell Migration across Basement Membranes in the Skin,
    Institute of Science and Technology Austria, 2010.
corr_author: '1'
date_created: 2018-12-11T12:06:08Z
date_published: 2010-07-01T00:00:00Z
date_updated: 2026-04-09T14:37:07Z
day: '01'
degree_awarded: PhD
department:
- _id: CaHe
- _id: GradSch
language:
- iso: eng
month: '07'
oa_version: None
publication_identifier:
  issn:
  - 2663-337X
publication_status: published
publisher: Institute of Science and Technology Austria
publist_id: '2165'
status: public
supervisor:
- first_name: Carl-Philipp J
  full_name: Heisenberg, Carl-Philipp J
  id: 39427864-F248-11E8-B48F-1D18A9856A87
  last_name: Heisenberg
  orcid: 0000-0002-0912-4566
title: "\uFEFF\uFEFFDendritic cell migration across basement membranes in the skin"
type: dissertation
user_id: ba8df636-2132-11f1-aed0-ed93e2281fdd
year: '2010'
...
