[{"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:12:18Z","citation":{"ama":"Chatterjee K, Ehlers R. Special issue: Synthesis and SYNT 2014. Acta Informatica. 2017;54(6):543-544. doi:10.1007/s00236-017-0299-0","apa":"Chatterjee, K., & Ehlers, R. (2017). Special issue: Synthesis and SYNT 2014. Acta Informatica. Springer. https://doi.org/10.1007/s00236-017-0299-0","ieee":"K. Chatterjee and R. Ehlers, “Special issue: Synthesis and SYNT 2014,” Acta Informatica, vol. 54, no. 6. Springer, pp. 543–544, 2017.","short":"K. Chatterjee, R. Ehlers, Acta Informatica 54 (2017) 543–544.","mla":"Chatterjee, Krishnendu, and Rüdiger Ehlers. “Special Issue: Synthesis and SYNT 2014.” Acta Informatica, vol. 54, no. 6, Springer, 2017, pp. 543–44, doi:10.1007/s00236-017-0299-0.","ista":"Chatterjee K, Ehlers R. 2017. Special issue: Synthesis and SYNT 2014. Acta Informatica. 54(6), 543–544.","chicago":"Chatterjee, Krishnendu, and Rüdiger Ehlers. “Special Issue: Synthesis and SYNT 2014.” Acta Informatica. Springer, 2017. https://doi.org/10.1007/s00236-017-0299-0."},"title":"Special issue: Synthesis and SYNT 2014","department":[{"_id":"KrCh"}],"author":[{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee"},{"full_name":"Ehlers, Rüdiger","last_name":"Ehlers","first_name":"Rüdiger"}],"publist_id":"6961","_id":"719","status":"public","type":"journal_article","day":"01","language":[{"iso":"eng"}],"publication":"Acta Informatica","publication_identifier":{"issn":["00015903"]},"publication_status":"published","year":"2017","issue":"6","date_published":"2017-09-01T00:00:00Z","doi":"10.1007/s00236-017-0299-0","volume":54,"date_created":"2018-12-11T11:48:07Z","page":"543 - 544","oa_version":"None","abstract":[{"text":"The ubiquity of computation in modern machines and devices imposes a need to assert the correctness of their behavior. Especially in the case of safety-critical systems, their designers need to take measures that enforce their safe operation. Formal methods has emerged as a research field that addresses this challenge: by rigorously proving that all system executions adhere to their specifications, the correctness of an implementation under concern can be assured. To achieve this goal, a plethora of techniques are nowadays available, all of which are optimized for different system types and application domains.","lang":"eng"}],"month":"09","intvolume":" 54","quality_controlled":"1","publisher":"Springer","scopus_import":1}]