International Journal on Software Tools for Technology Transfer

Papers
(The median citation count of International Journal on Software Tools for Technology Transfer is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Strong Simple Policies for POMDPs130
Introduction to the Special Issue on Runtime Verification38
Predicate monitoring in distributed cyber-physical systems21
From linear temporal logic and limit-deterministic Büchi automata to deterministic parity automata19
The probabilistic model checker Storm18
Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps15
DivSIM , an interactive simulator for LLVM bitcode14
Formal verification and security analysis of MQTT-SN13
State of the art in program analysis13
Interface control document modeling with Citrus (avionics systems interfaces)11
Using linear algebra in decomposition of Farkas interpolants11
Formal methods and tools for industrial critical systems11
Extended abstract dependency graphs10
Rigorous engineering of collective adaptive systems – 2nd special section10
Generating adaptation rule-specific neural networks9
GSDetector: a tool for automatic detection of bad smells in GRL goal models9
Monitoring with verified guarantees9
A logic-based incremental approach to graph repair featuring delta preservation8
Formal Methods for Industrial Critical Systems8
Interactive abstract interpretation: reanalyzing multithreaded C programs for cheap7
MoonLight: a lightweight tool for monitoring spatio-temporal properties7
Automated property-based testing from AADL component contracts6
The RERS challenge: towards controllable and scalable benchmark synthesis6
An automated framework for verifying or refuting trace properties of extended finite state machines6
Software test results exploration and visualization with continuous integration and nightly testing6
A modal approach to conscious social agents6
Verifiable strategy synthesis for multiple autonomous agents: a scalable approach6
LLM-based code generation and system migration in language-driven engineering6
Monitoring of spatio-temporal properties with nonlinear SAT solvers6
Pattern-based verification of ROS 2 applications using UPPAAL5
Compositional runtime enforcement of safety and co-safety timed properties5
What is the best algorithm for MDP model checking?5
Rance Cleaveland: a life for formal methods5
Multi-level privacy analysis of business processes: the Pleak toolset5
Evaluation of a distributed explicit state space exploration algorithm with state reconstruction for RDMA networks5
Randomized reachability analysis in UPPAAL: fast error detection in timed systems5
Exploring the ERTMS/ETCS full moving block specification: an experience with formal methods5
TOOLympics II: competitions on formal methods5
DisCoveR: accurate and efficient discovery of declarative process models5
Conformance in the railway industry: Single-Input-Change testing a EULYNX controller5
An adaptive, provable correct simplex architecture5
WhyRel: an auto-active relational verifier4
Bounded DBM-based clock state construction for timed automata in Uppaal4
AutoHyper: leveraging language inclusion checking for hyperproperty model-checking4
Preface to the special issue on engineering of computer-based systems4
The Reactive Synthesis Competition (SYNTCOMP): 2018–20214
Visualization, transformation, and analysis of execution traces with the eclipse TRACE4CPS trace tool4
Envelopes and waves: safe multivehicle collision avoidance for horizontal non-deterministic turns4
Reusable formal models for concurrency and communication in custom real-time operating systems4
Specifying and detecting temporal patterns with shape expressions4
A verified low-level implementation and visualization of the adaptive exterior light and speed control system4
User-assisted code query customization and optimization4
ccReact: a rewriting framework for the formal analysis of reaction systems4
First three years of the international verification of neural networks competition (VNN-COMP)4
Study of the efficiency of model checking techniques using results of the MCC from 2015 To 20194
Deterministic state space exploration3
A technology transfer journey to a model-driven access control system3
Reproducible and hackable software benchmarking with(out) compute clusters3
An extension of first-order LTL with rules with application to runtime verification3
Certification of avionic software based on machine learning: the case for formal monotony analysis3
The CoLiS platform for the analysis of maintainer scripts in Debian software packages3
Analysis of recurrent neural networks via property-directed verification of surrogate models3
Verifying safety of synchronous fault-tolerant algorithms by bounded model checking3
Correct by design coordination of autonomous driving systems3
An Event-B model of an automotive adaptive exterior light system3
Tools and algorithms for the construction and analysis of systems: a special issue for TACAS 20172
Rigorous pattern matching as a language feature2
Program analysis using empirical abstraction2
Tools and algorithms for the construction and analysis of systems: a special issue for TACAS 20202
Coordinating and programming multiple ROS-based robots with X-KLAIM2
Verified Propagation Redundancy and Compositional UNSAT Checking in CakeML2
Challenges of software verification: the past, the present, the future2
Formal analysis of an AUTOSAR-based basic software module2
A toolchain for strategy synthesis with spatial properties2
Explanation Paradigms Leveraging Analytic Intuition (ExPLAIn)2
Extending a brainiac prover to lambda-free higher-order logic2
Tools and algorithms for the construction and analysis of systems: a special issue for TACAS 20192
Interleaving static analysis and LLM prompting with applications to error specification inference2
Correct orchestration of federated learning generic algorithms: Python translation to CSP and verification by PAT2
A causal, time-independent synchronization pattern for collective adaptive systems2
An overview of structural coverage metrics for testing neural networks2
Learning of behavioural models and dependency graphs for communicating systems with CkTailv22
Machine-learning abstractions for component-based self-optimizing systems2
Leveraging static analysis for cost-aware serverless scheduling policies2
Diamont: dynamic monitoring of uncertainty for distributed asynchronous programs2
Correction to: How to model and prove hybrid systems with KeYmaera: a tutorial on safety1
Formally verifying decompositions of stochastic specifications1
Speeding up static analysis with the split operator1
Temporal-logic query checking over finite data streams1
Publisher Correction: Algorithm selection for SMT1
Challenges of software verification1
An evaluation of approaches to model checking real-time task schedulability analysis1
Validating multiple variants of an automotive light system with Alloy 61
A compositional framework for algebraic quantitative online monitoring over continuous-time signals1
Integrating formal specifications in the development and testing of UIs by formal model–view–controller pattern1
Parameterized verification of systems with component identities, using view abstraction1
Towards language-to-language transformation1
Decision-making under uncertainty: beyond probabilities1
Machine learning-based cache miss prediction1
RTAMT – Runtime Robustness Monitors with Application to CPS and Robotics1
Generating interactive documents for domain-specific validation of formal models1
Static analysis to make the most of CHERI C/C++ for existing code: improving memory safety at scale1
IoT backends in the Asset Administration Shell – four integration approaches1
Efficient and expressive bytecode-level instrumentation for Java programs1
SyReNN: A tool for analyzing deep neural networks1
Supporting safe metamodel evolution with edelta1
Combining rule- and SMT-based reasoning for verifying floating-point Java programs in KeY1
Analysing futex-based synchronisation primitives using model checking1
Towards rigorous understanding of neural networks via semantics-preserving transformations1
What can we monitor over unreliable channels?1
Introduction to the special issue for SPIN 20211
Introduction to the Special Issue on Runtime Verification1
Generating test as a web service (TaaWS) through a method-based attribute grammar1
Debugging convergence problems in probabilistic programs via program representation learning with SixthSense1
Software verification challenges in the blockchain ecosystem1
A process for creating KDM2PSM transformation engines1
Verifying OpenJDK’s LinkedList using KeY (extended paper)1
Analyzing neural network behavior through deep statistical model checking1
Replicable theory1
When long jumps fall short: control-flow tracking and misuse detection for nonlocal jumps in C1
Tools and algorithms for the construction and analysis of systems: a special issue on tool papers for TACAS 20211
SaBRe: load-time selective binary rewriting1
Language support for verifying reconfigurable interacting systems1
Programming event monitors1
A kinetic approach to investigate the collective dynamics of multi-agent systems1
Containers for specification in SPARK1
Analysis of non-Markovian repairable fault trees through rare event simulation1
Comparing controlled system synthesis and suppression enforcement1
Machine learning-based ambient temperature prediction in radio access network environments1
Approximate verification of concurrent systems using token structures and invariants1
Formal modeling and verification for amplification timing anomalies in the superscalar TriCore architecture1
Modelling flocks of birds and colonies of ants from the bottom up1
0.095124959945679