{"date_created":"2018-12-11T11:48:07Z","language":[{"iso":"eng"}],"date_updated":"2021-01-12T08:12:18Z","publication_identifier":{"issn":["00015903"]},"author":[{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu"},{"last_name":"Ehlers","first_name":"Rüdiger","full_name":"Ehlers, Rüdiger"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","title":"Special issue: Synthesis and SYNT 2014","year":"2017","day":"01","_id":"719","page":"543 - 544","issue":"6","intvolume":" 54","doi":"10.1007/s00236-017-0299-0","quality_controlled":"1","publication_status":"published","type":"journal_article","publist_id":"6961","publication":"Acta Informatica","month":"09","publisher":"Springer","citation":{"mla":"Chatterjee, Krishnendu, and Rüdiger Ehlers. “Special Issue: Synthesis and SYNT 2014.” Acta Informatica, vol. 54, no. 6, Springer, 2017, pp. 543–44, doi:10.1007/s00236-017-0299-0.","ista":"Chatterjee K, Ehlers R. 2017. Special issue: Synthesis and SYNT 2014. Acta Informatica. 54(6), 543–544.","short":"K. Chatterjee, R. Ehlers, Acta Informatica 54 (2017) 543–544.","ieee":"K. Chatterjee and R. Ehlers, “Special issue: Synthesis and SYNT 2014,” Acta Informatica, vol. 54, no. 6. Springer, pp. 543–544, 2017.","ama":"Chatterjee K, Ehlers R. Special issue: Synthesis and SYNT 2014. Acta Informatica. 2017;54(6):543-544. doi:10.1007/s00236-017-0299-0","chicago":"Chatterjee, Krishnendu, and Rüdiger Ehlers. “Special Issue: Synthesis and SYNT 2014.” Acta Informatica. Springer, 2017. https://doi.org/10.1007/s00236-017-0299-0.","apa":"Chatterjee, K., & Ehlers, R. (2017). Special issue: Synthesis and SYNT 2014. Acta Informatica. Springer. https://doi.org/10.1007/s00236-017-0299-0"},"volume":54,"scopus_import":1,"department":[{"_id":"KrCh"}],"oa_version":"None","date_published":"2017-09-01T00:00:00Z","status":"public","abstract":[{"text":"The ubiquity of computation in modern machines and devices imposes a need to assert the correctness of their behavior. Especially in the case of safety-critical systems, their designers need to take measures that enforce their safe operation. Formal methods has emerged as a research field that addresses this challenge: by rigorously proving that all system executions adhere to their specifications, the correctness of an implementation under concern can be assured. To achieve this goal, a plethora of techniques are nowadays available, all of which are optimized for different system types and application domains.","lang":"eng"}]}