{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:13:13Z","timestamp":1748405593091,"version":"3.41.0"},"publisher-location":"Cham","reference-count":101,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031921957","type":"print"},{"value":"9783031921964","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92196-4_1","type":"book-chapter","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T12:23:08Z","timestamp":1748348588000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Tale of\u00a0Formal Methods, Organic Computing, and\u00a0Intelligent Robotics \u2014 The Scientific Life of\u00a0Wolfgang Reif"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7646-806X","authenticated-orcid":false,"given":"Dominik","family":"Haneberg","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4050-3249","authenticated-orcid":false,"given":"Alexander","family":"Knapp","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0563-9797","authenticated-orcid":false,"given":"Oliver","family":"Kosak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5725-4827","authenticated-orcid":false,"given":"Florian","family":"Nafz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6376-9683","authenticated-orcid":false,"given":"Hella","family":"Ponsar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6712-7178","authenticated-orcid":false,"given":"Gerhard","family":"Schellhorn","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6677-4525","authenticated-orcid":false,"given":"Martin","family":"Wirsing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,28]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Ahrendt, W., et al.: Integrating automated and interactive theorem proving. In: Automated Deduction \u2013 A Basis for Applications, vol. II: Systems and Implementation Techniques, pp. 97\u2013116. Kluwer Academic Publishers (1998)","DOI":"10.1007\/978-94-017-0435-9_4"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Anders, G., Stegh\u00f6fer, J.P., Siefert, F., Reif, W.: Patterns to measure and utilize trust in multi-agent systems. In: Proceedings of 5th IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops, pp. 35\u201340. IEEE (2011). https:\/\/doi.org\/10.1109\/sasow.2011.21","DOI":"10.1109\/sasow.2011.21"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Angerer, A., Hoffmann, A., Schierl, A., Vistein, M., Reif, W.: The robotics API: an object-oriented framework for modeling industrial robotics applications. In: Proceedings of IEEE\/RSJ International Conference Intelligent Robots and Systems (2010)","DOI":"10.1109\/IROS.2010.5649098"},{"issue":"1","key":"1_CR4","first-page":"1","volume":"4","author":"A Angerer","year":"2013","unstructured":"Angerer, A., Hoffmann, A., Schierl, A., Vistein, M., Reif, W.: Robotics API: object-oriented software development for industrial robots. J. Softw. Eng. Robotics 4(1), 1\u201322 (2013)","journal-title":"J. Softw. Eng. Robotics"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Angerer, A., Vistein, M., Hoffmann, A., Reif, W., Krebs, F., Schnheits, M.: Towards multi-functional robot-based automation systems. In: Proceedings of 12th International Conference Informatics in Control, Automation and Robotics (ICINCO), vol. 2. pp. 438\u2013443. IEEE (2015)","DOI":"10.5220\/0005573804380443"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-030-76020-5_14","volume-title":"Logic, Computation and Rigorous Methods","author":"S Bodenm\u00fcller","year":"2021","unstructured":"Bodenm\u00fcller, S., Schellhorn, G., Bitterlich, M., Reif, W.: Flashix: modular verification of a concurrent and crash-safe flash file system. In: Raschke, A., Riccobene, E., Schewe, K.-D. (eds.) Logic, Computation and Rigorous Methods. LNCS, vol. 12750, pp. 239\u2013265. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-76020-5_14"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3523737","volume":"34","author":"S Bodenm\u00fcller","year":"2022","unstructured":"Bodenm\u00fcller, S., Schellhorn, G., Reif, W.: Verification of crashsafe caching in a virtual file system switch. Formal Aspects Comp. 34, 1\u201333 (2022)","journal-title":"Formal Aspects Comp."},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-662-54054-1_3","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XXX","author":"M Borek","year":"2016","unstructured":"Borek, M., Stenzel, K., Katkalov, K., Reif, W.: Secure integration of third party components in a model-driven approach. In: Hameurlain, A., K\u00fcng, J., Wagner, R., Schewe, K.-D., Bosa, K. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXX. LNCS, vol. 10130, pp. 66\u201386. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-54054-1_3"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-40561-7_6","volume-title":"Software Engineering and Formal Methods","author":"M Borek","year":"2013","unstructured":"Borek, M., Moebius, N., Stenzel, K., Reif, W.: Model checking of security-critical applications in a model-driven approach. In: Hierons, R.M., Merayo, M.G., Bravetti, M. (eds.) SEFM 2013. LNCS, vol. 8137, pp. 76\u201390. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40561-7_6"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Broy, M., J\u00e4hnichen, S. (eds.): KORSO \u2014 Methods, Languages, and Tools for the Construction of Correct Software, LNCS, vol.\u00a01009. Springer (1995). https:\/\/doi.org\/10.1007\/BFB0015452","DOI":"10.1007\/BFB0015452"},{"issue":"2\u20133","key":"1_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.3233\/AIC-2010-0458","volume":"23","author":"S B\u00e4umler","year":"2010","unstructured":"B\u00e4umler, S., Balser, M., Nafz, F., Reif, W., Schellhorn, G.: Interactive verification of concurrent systems using symbolic execution. AI Comm. 23(2\u20133), 285\u2013307 (2010)","journal-title":"AI Comm."},{"key":"1_CR12","unstructured":"Drton, M., H\u00e4gele, G., Haneberg, D., Pukelsheim, F., Reif, W.: The augsburg web edition of Llull\u2019s electoral writings (2001). www.uni-augsburg.de\/llull\/"},{"key":"1_CR13","unstructured":"Drton, M., H\u00e4gele, G., Haneberg, D., Pukelsheim, F., Reif, W.: A rediscovered Llull tract and the Augsburg web edition of Llull\u2019s electoral writings. Le m\u00e9di\u00e9viste et l\u2019ordinateur, vol. 43 (2004)"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Eberhardinger, B., Anders, G., Seebach, H., Siefert, F., Reif, W.: A research overview and evaluation of performance metrics for self-organization algorithms. In: Proceedings of IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, pp. 122\u2013127. IEEE (2015). https:\/\/doi.org\/10.1109\/sasow.2015.25","DOI":"10.1109\/sasow.2015.25"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-662-44857-1_13","volume-title":"Testing Software and Systems","author":"B Eberhardinger","year":"2014","unstructured":"Eberhardinger, B., Seebach, H., Knapp, A., Reif, W.: Towards testing self-organizing, adaptive systems. In: Merayo, M.G., de Oca, E.M. (eds.) ICTSS 2014. LNCS, vol. 8763, pp. 180\u2013185. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44857-1_13"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2016.04.009","volume":"131","author":"G Ernst","year":"2016","unstructured":"Ernst, G., Pf\u00e4hler, J., Schellhorn, G., Reif, W.: Modular, crash-safe refinement for asms with submachines. Sci. Comp. Program. 131, 3\u201321 (2016)","journal-title":"Sci. Comp. Program."},{"key":"1_CR17","unstructured":"Eym\u00fcller, C.: RealCaPP \u2014 Real-time capable plug & produce for distributed robot-based automation. Dissertation, Universit\u00e4t Augsburg (2024)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Eym\u00fcller, C., Hanke, J., Hoffmann, A., Reif, M.K.W.: Real-time capable opc-ua programs over tsn for distributed industrial control. In: Proceedings of 25th IEEE International Conference Emerging Technologies and Factory Automation (ETFA), vol. 1. pp. 278\u2013285. IEEE (2020)","DOI":"10.1109\/ETFA46521.2020.9212171"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Eym\u00fcller, C., Hanke, J., Poeppel, A., Wanninger, C., Reif, W.: RealCaPP: real-time capable plug & produce service architecture for distributed robot control. In: Proceedings of 7th IEEE International Conference Robotic Computing (IRC), pp. 352\u2013355 (2023). https:\/\/doi.org\/10.1109\/IRC59093.2023.00063","DOI":"10.1109\/IRC59093.2023.00063"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Gajek, C., Schiendorfer, A., Reif, W.: A recommendation system for cad assembly modeling based on graph neural networks. In: Proceedings of Joint European Conference Machine Learning and Knowledge Discovery in Databases (ECML\/PKDD), Part I, LNCS, vol. 13713, pp. 457\u2013473. Springer (2022)","DOI":"10.1007\/978-3-031-26387-3_28"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/11839569_4","volume-title":"Autonomic and Trusted Computing","author":"M G\u00fcdemann","year":"2006","unstructured":"G\u00fcdemann, M., Ortmeier, F., Reif, W.: Formal modeling and verification of systems with self-x properties. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 38\u201347. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11839569_4"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75101-4","volume-title":"Computer Safety, Reliability, and Security","year":"2007","unstructured":"Saglietti, F., Oster, N. (eds.): SAFECOMP 2007. LNCS, vol. 4680. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75101-4"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-45943-1_7","volume-title":"Critical Systems: Formal Methods and Automated Verification","author":"A Habermaier","year":"2016","unstructured":"Habermaier, A., Knapp, A., Leupolz, J., Reif, W.: Fault-aware modeling and specification for efficient formal safety analysis. In: ter Beek, M.H., Gnesi, S., Knapp, A. (eds.) FMICS\/AVoCS -2016. LNCS, vol. 9933, pp. 97\u2013114. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45943-1_7"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-16780-3_99","volume-title":"8th International Conference on Automated Deduction","author":"R H\u00e4hnle","year":"1986","unstructured":"H\u00e4hnle, R., Heisel, M., Reif, W., Stephan, W.: An interactive verification system based on dynamic logic. In: Siekmann, J.H. (ed.) CADE 1986. LNCS, vol. 230, pp. 306\u2013315. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-16780-3_99"},{"issue":"1","key":"1_CR25","first-page":"159","volume":"5","author":"D Haneberg","year":"2011","unstructured":"Haneberg, D., Moebius, N., Reif, W., Schellhorn, G., Stenzel, K.: Mondex: engineering a provable secure electronic purse. Intl. J. Softw. Inform. 5(1), 159\u2013184 (2011)","journal-title":"Intl. J. Softw. Inform."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Haneberg, D., Schellhorn, G., Grandy, H., Reif, W.: Verification of mondex electronic purses with KIV: from transactions to a security protocol. Formal Aspects Comp. 20(1) (2008)","DOI":"10.1007\/s00165-007-0057-0"},{"key":"1_CR27","unstructured":"Hanke, J.: Robot-based component testing on software-defined test benches. Dissertation, Universit\u00e4t Augsburg (2024)"},{"key":"1_CR28","doi-asserted-by":"publisher","unstructured":"Hanke, J., Eym\u00fcller, C., Reichmann, J., Trauth, A., Sause, M., Reif, W.: Software-defined testing facility for component testing with industrial robots. In: Proceedings of 27th IEEE International Conference Emerging Technologies and Factory Automation (ETFA), pp.\u00a01\u20138 (2022).https:\/\/doi.org\/10.1109\/ETFA52439.2022.9921625","DOI":"10.1109\/ETFA52439.2022.9921625"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Hanke, J., Kosak, O., Schiendorfer, A., Reif, W.: Self-organized resource allocation for reconfigurable robot ensembles. In: Proceedings of 12th IEEE International Conference Self-Adaptive and Self-Organizing Systems (SASO), IEEE (2018). https:\/\/doi.org\/10.1109\/saso.2018.00022","DOI":"10.1109\/saso.2018.00022"},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-50241-6_32","volume-title":"CSL \u201987","author":"M Heisel","year":"1988","unstructured":"Heisel, M., Reif, W., Stephan, W.: Program verification using dynamic logic. In: B\u00f6rger, E., B\u00fcning, H.K., Richter, M.M. (eds.) CSL 1987. LNCS, vol. 329, pp. 102\u2013117. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-50241-6_32"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Hoffmann, A., Angerer, A., Ortmeier, F., Vistein, M., Reif, W.: Hiding real-time: a new approach for the software development of industrial robots. In: Proceedings of IEEE\/RSJ International Conference Intelligent Robots and Systems (2009)","DOI":"10.1109\/IROS.2009.5354589"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Hoffmann, A., Angerer, A., Schierl, A., Vistein, M., Reif, W.: Managing extensibility and maintainability of industrial robotics software. In: Proceedings of 16th International Conference Advanced Robotics (ICAR) (2013)","DOI":"10.1109\/ICAR.2013.6766561"},{"key":"1_CR33","unstructured":"Hoffmann, A., N\u00e4gele, L., Angerer, A., Schierl, A., Reif, W.: Using object-oriented development for planning and controlling industrial robot systems. In: Proceedings of Workshop Recent Advances in Planning and Manipulation for Industrial Robots (2016)"},{"key":"1_CR34","unstructured":"Hoffmann, A., Angerer, A., Schierl, A., Vistein, M., Reif, W.: Service-oriented robotics manufacturing by reasoning about the scene graph of a robotics cell. In: Proceedings of 41st International Symposium on Robotics (ISR\/Robotik), pp.\u00a01\u20138. VDE (2014)"},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"Hu\u00dfmann, H., Loeckx, J., Reif, W.: KORSO: das Verbundprojekt \u201cKorrekte Software\u201d. In: Proceedings of 23. GI-Jahrestagung: Informatik \u2014 Wirtschaft \u2014 Gesellschaft, pp. 266\u2013271. Informatik Aktuell, Springer (1993). https:\/\/doi.org\/10.1007\/978-3-642-78486-6_42","DOI":"10.1007\/978-3-642-78486-6_42"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Joshi, R., Holzmann, G.: A mini challenge: Build a verifiable filesystem. Formal Aspects Comput. 19(2) (2007)","DOI":"10.1007\/s00165-006-0022-3"},{"key":"1_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-319-72395-2_20","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"K Katkalov","year":"2017","unstructured":"Katkalov, K., Stenzel, K., Reif, W.: Code abstractions for automatic information flow control in a model-driven approach. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 209\u2013218. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72395-2_20"},{"key":"1_CR38","unstructured":"Kosak, O.: Mission programming for flying ensembles: combining planning with self-organization. Dissertation, Universit\u00e4t Augsburg (2021)"},{"key":"1_CR39","doi-asserted-by":"publisher","unstructured":"Kosak, O., Anders, G., Siefert, F., Reif, W.: An approach to robust resource allocation in large-scale systems of systems. In: Proceedings of 9th IEEE International Conference Self-Adaptive and Self-Organizing Systems (SASO), pp. 1\u201310 (2015). https:\/\/doi.org\/10.1109\/SASO.2015.8","DOI":"10.1109\/SASO.2015.8"},{"key":"1_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-61470-6_31","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles","author":"O Kosak","year":"2020","unstructured":"Kosak, O., et al.: Swarm and collective capabilities for multipotent robot ensembles. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12477, pp. 525\u2013540. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61470-6_31"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-030-61470-6_30","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles","author":"O Kosak","year":"2020","unstructured":"Kosak, O., Huhn, L., Bohn, F., Wanninger, C., Hoffmann, A., Reif, W.: Maple-swarm: programming collective behavior for ensembles by extending HTN-planning. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12477, pp. 507\u2013524. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61470-6_30"},{"key":"1_CR42","doi-asserted-by":"publisher","unstructured":"Kosak, O., Kastenm\u00fcller, P., Wanninger, C., Reif, W.: An approach for extended swarm formation flight with drones: PROTEASE2.0. In: Proceedings of 12th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, Part II, LNCS, vol. 15220, pp. 263\u2013280. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-75107-3_16","DOI":"10.1007\/978-3-031-75107-3_16"},{"key":"1_CR43","doi-asserted-by":"publisher","unstructured":"Kosak, O., Wanninger, C., Angerer, A., Hoffmann, A., Schiendorfer, A., Seebach, H.: Towards self-organizing swarms of reconfigurable self-aware robots. In: Proceedings of 1st IEEE International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 204\u2013209 (2016). https:\/\/doi.org\/10.1109\/FAS-W.2016.52","DOI":"10.1109\/FAS-W.2016.52"},{"key":"1_CR44","doi-asserted-by":"publisher","unstructured":"Kosak, O., Wanninger, C., Angerer, A., Hoffmann, A., Schierl, A., Seebach, H.: Decentralized coordination of heterogeneous ensembles using jadex. In: Proceedings of 1st IEEE International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 271\u2013272 (2016). https:\/\/doi.org\/10.1109\/FAS-W.2016.65","DOI":"10.1109\/FAS-W.2016.65"},{"key":"1_CR45","doi-asserted-by":"publisher","unstructured":"Kosak, O., Wanninger, C., Hoffmann, A., Ponsar, H., Reif, W.: Multipotent systems: combining planning, self-organization, and reconfiguration in modular robot ensembles. Sensors 19(1) (2019). https:\/\/doi.org\/10.3390\/s19010017","DOI":"10.3390\/s19010017"},{"key":"1_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-64580-9_6","volume-title":"Machine Learning, Optimization, and Data Science","author":"J Kr\u00fctzmann","year":"2020","unstructured":"Kr\u00fctzmann, J., Schiendorfer, A., Beratz, S., Moosburger-Will, J., Reif, W., Horn, S.: Learning controllers for adaptive spreading of carbon fiber tows. In: Nicosia, G., et al. (eds.) LOD 2020. LNCS, vol. 12566, pp. 65\u201377. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64580-9_6"},{"key":"1_CR47","doi-asserted-by":"publisher","unstructured":"Lehner, C., Kosak, O., Ponsar, H., Reif, W.: Flexible assembly planning for self-organizing production cells. In: Proceedings of 6th International Conference Industry 4.0 and Smart Manufacturing. Procedia Computer Science, vol.\u00a0253, pp. 1860\u20131869 (2025). https:\/\/doi.org\/10.1016\/j.procs.2025.01.248","DOI":"10.1016\/j.procs.2025.01.248"},{"key":"1_CR48","unstructured":"Lenzen, C., Schiendorfer, A., Reif, W.: Graph machine learning for assembly modeling. In: Proceedings of 1st Learning on Graphs Conference (2022)"},{"issue":"4","key":"1_CR49","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10009-017-0464-3","volume":"20","author":"J Leupolz","year":"2018","unstructured":"Leupolz, J., Knapp, A., Habermaier, A., Reif, W.: Qualitative and quantitative analysis of safety-critical systems with s#. Int. J. Softw. Tools Technol. Transf. 20(4), 359\u2013377 (2018). https:\/\/doi.org\/10.1007\/s10009-017-0464-3","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"M\u00fcller-Schloer, C., Tomforde, S.: Organic Computing-Technical Systems for Survival in the Real World, vol.\u00a01. Springer (2017)","DOI":"10.1007\/978-3-319-68477-2_1"},{"key":"1_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-02704-8_3","volume-title":"Autonomic and Trusted Computing","author":"F Nafz","year":"2009","unstructured":"Nafz, F., Ortmeier, F., Seebach, H., Stegh\u00f6fer, J.-P., Reif, W.: A universal self-organization mechanism for role-based organic computing systems. In: Gonz\u00e1lez Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol. 5586, pp. 17\u201331. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02704-8_3"},{"key":"1_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-16576-4_2","volume-title":"Autonomic and Trusted Computing","author":"F Nafz","year":"2010","unstructured":"Nafz, F., Seebach, H., Stegh\u00f6fer, J.-P., B\u00e4umler, S., Reif, W.: A formal framework for compositional verification of organic computing systems. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds.) ATC 2010. LNCS, vol. 6407, pp. 17\u201331. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16576-4_2"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"N\u00e4gele, L., Hoffmann, A., Schierl, A., Reif, W.: Legobot: automated planning for coordinated multi-robot assembly of lego structures. In: Proceedings of IEEE\/RSJ International Conference Intelligent Robots and Systems (IROS), pp. 9088\u20139095. IEEE (2020)","DOI":"10.1109\/IROS45743.2020.9341428"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"N\u00e4gele, L., et al.: A backward-oriented approach for offline programming of complex manufacturing tasks. In: Proceedings of 6th International Conference on Automation, Robotics and Applications (ICARA), pp. 124\u2013130. IEEE (2015)","DOI":"10.1109\/ICARA.2015.7081135"},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11408901_15","volume-title":"Dependable Computing - EDCC 5","author":"F Ortmeier","year":"2005","unstructured":"Ortmeier, F., Reif, W., Schellhorn, G.: Formal safety analysis of a radio-based railroad crossing using deductive cause-consequence analysis (DCCA). In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol. 3463, pp. 210\u2013224. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11408901_15"},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Ortmeier, F., Reif, W., Schellhorn, G.: Deductive cause-consequence analysis (DCCA). In: Proceedings of IFAC World Congress. Elsevier (2006)","DOI":"10.3182\/20050703-6-CZ-1902.01435"},{"key":"1_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/3-540-45732-1_29","volume-title":"Computer Safety, Reliability and Security","author":"F Ortmeier","year":"2002","unstructured":"Ortmeier, F., Schellhorn, G., Thums, A., Reif, W., Hering, B., Trappschuh, H.: Safety analysis of the height control system for the Elbtunnel. In: Anderson, S., Felici, M., Bologna, S. (eds.) SAFECOMP 2002. LNCS, vol. 2434, pp. 296\u2013308. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45732-1_29"},{"key":"1_CR58","unstructured":"Ortmeier, F., Schellhorn, G., Reif, W.: Safety optimization of a radio-based railroad crossing. In: Proceedings of Formal Methods for Automation and Safety in Railway and Automotive Systems (FORMS) (2004)"},{"key":"1_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b100778","volume-title":"Integration of Software Specification Techniques for Applications in Engineering","year":"2004","unstructured":"Ehrig, H., et al. (eds.): Integration of Software Specification Techniques for Applications in Engineering. LNCS, vol. 3147. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/b100778"},{"key":"1_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-319-66845-1_25","volume-title":"Integrated Formal Methods","author":"J Pf\u00e4hler","year":"2017","unstructured":"Pf\u00e4hler, J., Ernst, G., Bodenm\u00fcller, S., Schellhorn, G., Reif, W.: Modular verification of order-preserving write-back caches. In: Polikarpova, N., Schneider, S. (eds.) IFM 2017. LNCS, vol. 10510, pp. 375\u2013390. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66845-1_25"},{"key":"1_CR61","doi-asserted-by":"publisher","unstructured":"Poeppel, A., Eym\u00fcller, C., Reif, W.: SensorClouds: a framework for real-time processing of multi-modal sensor data for human-robot-collaboration. In: Proceedings of 9th International Conference on Automation, Robotics and Applications (ICARA), pp. 294\u2013298 (2023). https:\/\/doi.org\/10.1109\/ICARA56516.2023.10125740","DOI":"10.1109\/ICARA56516.2023.10125740"},{"key":"1_CR62","doi-asserted-by":"publisher","unstructured":"Poeppel, A., Hoffmann, A., Siehler, M., Reif, W.: Robust distance estimation of capacitive proximity sensors in hri using neural networks. In: Proceedings of 4th IEEE International Conference on Robotic Computing (IRC), pp. 344\u2013351 (2020). https:\/\/doi.org\/10.1109\/IRC.2020.00061","DOI":"10.1109\/IRC.2020.00061"},{"key":"1_CR63","doi-asserted-by":"crossref","unstructured":"Reeves, G., Neilson, T.: The mars rover spirit FLASH anomaly. In: Aerospace Conference on, pp. 4186\u20134199. IEEE (2005)","DOI":"10.1109\/AERO.2005.1559723"},{"key":"1_CR64","unstructured":"Reif, W.: Vollst\u00e4ndigkeit einer modifizierten Goldblatt-Logik und Approximation der Omega-Regel durch Induktion. Diplomarbeit, Universit\u00e4t Karlsruhe, Fakult\u00e4t f\u00fcr Informatik (1984). (in German)"},{"key":"1_CR65","unstructured":"Reif, W.: Korrektheit von Spezifikationen und generischen Moduln. Ph.D. thesis, Karlsruhe Institute of Technology, Germany (1991). https:\/\/d-nb.info\/931877865"},{"key":"1_CR66","doi-asserted-by":"publisher","unstructured":"Reif, W.: Correctness of full first-order specifications. In: Proceedings of 4th International Conference on Software Engineering and Knowledge Engineering (SEKE), pp. 276\u2013283. IEEE Computer Society (1992). https:\/\/doi.org\/10.1109\/SEKE.1992.227918","DOI":"10.1109\/SEKE.1992.227918"},{"key":"1_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/BFb0023893","volume-title":"Logical Foundations of Computer Science \u2014 Tver \u201992","author":"W Reif","year":"1992","unstructured":"Reif, W.: Correctness of generic modules. In: Nerode, A., Taitslin, M. (eds.) LFCS 1992. LNCS, vol. 620, pp. 406\u2013417. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/BFb0023893"},{"key":"1_CR68","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/3-540-55602-8_218","volume-title":"Automated Deduction\u2014CADE-11","author":"W Reif","year":"1992","unstructured":"Reif, W.: The KIV system: systematic construction of verified software. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 753\u2013757. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-55602-8_218"},{"key":"1_CR69","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-56287-7","volume-title":"Foundations of Software Technology and Theoretical Computer Science","year":"1992","unstructured":"Shyamasundar, R. (ed.): FSTTCS 1992. LNCS, vol. 652. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-56287-7"},{"key":"1_CR70","doi-asserted-by":"publisher","unstructured":"Reif, W.: The KIV-approach to software verification. In: Broy and J\u00e4hnichen [10], pp. 339\u2013370. https:\/\/doi.org\/10.1007\/BFB0015471","DOI":"10.1007\/BFB0015471"},{"key":"1_CR71","doi-asserted-by":"publisher","unstructured":"Reif, W., Ortmeier, F., G\u00fcdemann, M.: Safety and dependability analysis of self-adaptive systems. In: Proceedings of 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), pp. 177\u2013184. IEEE (2006). https:\/\/doi.org\/10.1109\/ISoLA.2006.38","DOI":"10.1109\/ISoLA.2006.38"},{"key":"1_CR72","doi-asserted-by":"crossref","unstructured":"Schellhorn, G., Ahrendt, W.: The WAM Case Study: Verifying Compiler Correctness for Prolog with KIV. In: Automated Deduction \u2014 A Basis for Applications, vol. III: Applications, pp. 165\u2013194. Kluwer Academic Publishers (1998)","DOI":"10.1007\/978-94-017-0437-3_7"},{"key":"1_CR73","doi-asserted-by":"crossref","unstructured":"Schellhorn, G., Bodenm\u00fcller, S., Bitterlich, M., Reif, W.: Software & system verification with KIV. In: The Logic of Software. A Tasting Menu of Formal Methods: Essays Dedicated to Reiner H\u00e4hnle on the Occasion of His 60th Birthday, LNCS, vol. 13360, pp. 408\u2013436. Springer (2022)","DOI":"10.1007\/978-3-031-08166-8_20"},{"key":"1_CR74","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-030-48077-6_2","volume-title":"Rigorous State-Based Methods","author":"G Schellhorn","year":"2020","unstructured":"Schellhorn, G., Bodenm\u00fcller, S., Pf\u00e4hler, J., Reif, W.: Adding concurrency to a sequential refinement tower. In: Raschke, A., M\u00e9ry, D., Houdek, F. (eds.) ABZ 2020. LNCS, vol. 12071, pp. 6\u201323. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-48077-6_2"},{"issue":"4","key":"1_CR75","first-page":"339","volume":"10","author":"G Schellhorn","year":"2002","unstructured":"Schellhorn, G., Reif, W., Schairer, A., Karger, P., Austel, V., Toll, D.: Verified formal security models for Multiapplicative smart cards. J. Comp. Sec. 10(4), 339\u2013367 (2002)","journal-title":"J. Comp. Sec."},{"key":"1_CR76","doi-asserted-by":"publisher","unstructured":"Schellhorn, G., Tofan, B., Ernst, G., Pf\u00e4hler, J., Reif, W.: RGITL: a temporal logic framework for compositional reasoning about interleaved programs. Ann. Math. Artif. Intell. 131\u2013174 (2014). https:\/\/doi.org\/10.1007\/s10472-013-9389-z","DOI":"10.1007\/s10472-013-9389-z"},{"key":"1_CR77","doi-asserted-by":"publisher","unstructured":"Schiendorfer, A., Knapp, A., Anders, G., Reif, W.: MiniBrass: soft constraints for MiniZinc. Constraints 23(4), 403\u2013450 (2018). https:\/\/doi.org\/10.1007\/s10601-018-9289-2","DOI":"10.1007\/s10601-018-9289-2"},{"key":"1_CR78","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-319-02621-3_17","volume-title":"Research and Development in Intelligent Systems XXX","author":"A Schiendorfer","year":"2013","unstructured":"Schiendorfer, A., Stegh\u00f6fer, J.-P., Knapp, A., Nafz, F., Reif, W.: Constraint Relationships for Soft Constraints. In: Bramer, M., Petridis, M. (eds.) Research and Development in Intelligent Systems XXX, pp. 241\u2013255. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-02621-3_17"},{"key":"1_CR79","unstructured":"Schierl, A., Angerer, A., Hoffmann, A., Vistein, M., Reif, W.: From robot command to real-time robot control \u2014 transforming high-level robot commands into real-time dataflow graphs. In: Proceedings of 9th International Conference on Informatics in Control, Automation and Robotics, vol. 2 (2012)"},{"key":"1_CR80","doi-asserted-by":"crossref","unstructured":"Schierl, A., Angerer, A., Hoffmann, A., Reif, W.: Consistent world models for cooperating robots: separating logical relationships, sensor interpretation and estimation. In: Proceedings of 1st IEEE International Conference on Robotic Computing (IRC), pp. 101\u2013108. IEEE (2017)","DOI":"10.1109\/IRC.2017.62"},{"key":"1_CR81","doi-asserted-by":"crossref","unstructured":"Sch\u00f6rner, M., Katschinsky, R., Wanninger, C., Hoffmann, A., Reif, W.: Towards fully automated inspection of large components with UAVs: offline path planning and view angle dependent optimization strategies. In: Gusikhin, O., Madani, K., Zaytoon, J. (eds.) Rev. Sel. Papers 17th International Conference on Informatics in Control, Automation and Robotics (ICINCO), LNEE, vol.\u00a0793, pp. 105\u2013123. Springer (2022)","DOI":"10.1007\/978-3-030-92442-3_7"},{"key":"1_CR82","doi-asserted-by":"publisher","unstructured":"Sch\u00f6rner, M., Wanninger, C., Hoffmann, A., Kosak, O., Ponsar, H., Reif, W.: Modeling and execution of coordinated missions in reconfigurable robot ensembles. In: Proceedings of 4th IEEE International Conference on Robotic Computing (IRC), pp. 290\u2013293 (2020). https:\/\/doi.org\/10.1109\/IRC.2020.00053","DOI":"10.1109\/IRC.2020.00053"},{"key":"1_CR83","doi-asserted-by":"publisher","unstructured":"Sch\u00f6rner, M., et al.: UAV inspection of large components: determination of alternative inspection points and online route optimization. In: Proceedings of 5th IEEE\/ACM International Workshops on Robotics Software Engineering (RoSE), pp. 45\u201352 (2023). https:\/\/doi.org\/10.1109\/RoSE59155.2023.00012","DOI":"10.1109\/RoSE59155.2023.00012"},{"key":"1_CR84","doi-asserted-by":"publisher","unstructured":"Seebach, H., Nafz, F., Steghofer, J.P., Reif, W.: A software engineering guideline for self-organizing resource-flow systems. In: Proceedings of 4th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp. 194\u2013203. IEEE (2010). https:\/\/doi.org\/10.1109\/SASO.2010.26","DOI":"10.1109\/SASO.2010.26"},{"key":"1_CR85","doi-asserted-by":"publisher","unstructured":"Seebach, H., Ortmeier, F., Reif, W.: Design and construction of organic computing systems. In: Proceedings of IEEE Congress on Evolutionary Computation (2007). https:\/\/doi.org\/10.1109\/cec.2007.4425021","DOI":"10.1109\/cec.2007.4425021"},{"key":"1_CR86","unstructured":"Stegh\u00f6fer, J.P., Anders, G., Siefert, F., Reif, W.: A system of systems approach to the evolutionary transformation of power management systems. In: Proceedings of 43. Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. GI (2013). https:\/\/dl.gi.de\/handle\/20.500.12116\/20584"},{"key":"1_CR87","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-16576-4_5","volume-title":"Autonomic and Trusted Computing","author":"J-P Stegh\u00f6fer","year":"2010","unstructured":"Stegh\u00f6fer, J.-P., et al.: Trustworthy organic computing systems: challenges and perspectives. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds.) ATC 2010. LNCS, vol. 6407, pp. 62\u201376. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16576-4_5"},{"key":"1_CR88","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b98770","volume-title":"Algebraic Methodology and Software Technology","year":"2004","unstructured":"Rattray, C., Maharaj, S., Shankland, C. (eds.): AMAST 2004. LNCS, vol. 3116. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/b98770"},{"key":"1_CR89","unstructured":"Stenzel, K., Katkalov, K., Borek, M., Reif, W.: A model-driven approach to noninterference. J. Wireless Mobile Netw. Ubiq. Comput. Depend. Appl. 5(3), 30\u201343 (2014)"},{"key":"1_CR90","doi-asserted-by":"crossref","unstructured":"Stenzel, K., Katkalov, K., Borek, M., Reif, W.: Declassification of information with complex filter functions. In: Proceedings of 2nd International Conference on Information Systems Security and Privacy, pp. 490\u2013497 (2016)","DOI":"10.5220\/0005782904900497"},{"key":"1_CR91","doi-asserted-by":"crossref","unstructured":"Stieber, S., Heber, L., Obertscheider, C., Reif, W.: Control of composite manufacturing processes through deep reinforcement learning. In: Proceedings of International Conference on Machine Learning and Applications (ICMLA), pp. 17\u201322. IEEE (2023)","DOI":"10.1109\/ICMLA58977.2023.00011"},{"key":"1_CR92","doi-asserted-by":"crossref","unstructured":"Stieber, S., Schr\u00f6ter, N., Fauster, E., Bender, M., Schiendorfer, A., Reif, W.: Inferring material properties from frp processes via sim-to-real learning. Intl. J. Adv. Manufact. Technol. 1\u201317 (2023)","DOI":"10.21203\/rs.3.rs-2186337\/v1"},{"key":"1_CR93","doi-asserted-by":"crossref","unstructured":"Stieber, S., Schr\u00f6ter, N., Schiendorfer, A., Hoffmann, A., Reif, W.: Flowfrontnet: improving carbon composite manufacturing with cnns. In: Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML\/PKDD), Part IV, LNCS, vol. 12460, pp. 411\u2013426. Springer (2020)","DOI":"10.1007\/978-3-030-67667-4_25"},{"key":"1_CR94","doi-asserted-by":"publisher","unstructured":"St\u00fcben, M., Hoffmann, A., Reif, W.: Constraint-based whole-body-control of mobile manipulators in human-centered environments. In: Proceedings of 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp.\u00a01\u20138 (2021). https:\/\/doi.org\/10.1109\/ETFA45728.2021.9613281","DOI":"10.1109\/ETFA45728.2021.9613281"},{"key":"1_CR95","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-642-13321-3_21","volume-title":"Mathematics of Program Construction","author":"B Tofan","year":"2010","unstructured":"Tofan, B., B\u00e4umler, S., Schellhorn, G., Reif, W.: Temporal logic verification of lock-freedom. In: Bolduc, C., Desharnais, J., Ktari, B. (eds.) MPC 2010. LNCS, vol. 6120, pp. 377\u2013396. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13321-3_21"},{"key":"1_CR96","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-23283-1_16","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2011","author":"B Tofan","year":"2011","unstructured":"Tofan, B., Schellhorn, G., Reif, W.: Formal verification of a lock-free stack with hazard pointers. In: Cerone, A., Pihlajasaari, P. (eds.) ICTAC 2011. LNCS, vol. 6916, pp. 239\u2013255. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23283-1_16"},{"key":"1_CR97","doi-asserted-by":"crossref","unstructured":"Vistein, M., Angerer, A., Hoffmann, A., Schierl, A., Reif, W.: Interfacing industrial robots using realtime primitives. In: Proceedings of IEEE International Conference on Automation and Logistics (2010)","DOI":"10.1109\/ICAL.2010.5585330"},{"key":"1_CR98","doi-asserted-by":"publisher","unstructured":"Vistein, M., Angerer, A., Hoffmann, A., Schierl, A., Reif, W.: Instantaneous switching between real-time commands for continuous execution of complex robotic tasks. In: Proceedings of IEEE International Conference on Mechatronics and Automation (2012). https:\/\/doi.org\/10.1109\/icma.2012.6284329","DOI":"10.1109\/icma.2012.6284329"},{"issue":"1","key":"1_CR99","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1504\/IJMA.2014.059773","volume":"4","author":"M Vistein","year":"2014","unstructured":"Vistein, M., Angerer, A., Hoffmann, A., Schierl, A., Reif, W.: Flexible and continuous execution of real-time critical robotic tasks. Intl. J. Mechatron. Automat. 4(1), 27\u201338 (2014)","journal-title":"Intl. J. Mechatron. Automat."},{"key":"1_CR100","doi-asserted-by":"publisher","unstructured":"Wanninger, C., Eym\u00fcller, C., Hoffmann, A., Kosak, O., Reif, W.: Synthesizing capabilities for collective adaptive systems from self-descriptive hardware devices bridging the reality gap. In: Proc. 8th Intl. Symp. Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), Part III, Distributed Systems. LNCS, vol. 11246, pp. 94\u2013108 (2018). https:\/\/doi.org\/10.1007\/978-3-030-03424-5_7","DOI":"10.1007\/978-3-030-03424-5_7"},{"issue":"6","key":"1_CR101","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1175\/BAMS-D-15-00277.1","volume":"98","author":"B Wolf","year":"2017","unstructured":"Wolf, B., et al.: The SCALEX campaign: scale-crossing land surface and boundary layer processes in the TERENO-preAlpine observatory. Bull. Am. Meteor. Soc. 98(6), 1217\u20131234 (2017). https:\/\/doi.org\/10.1175\/BAMS-D-15-00277.1","journal-title":"Bull. Am. Meteor. Soc."}],"container-title":["Lecture Notes in Computer Science","Go Where the Bugs Are"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92196-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T12:23:23Z","timestamp":1748348603000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92196-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031921957","9783031921964"],"references-count":101,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92196-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}