{"id":55,"date":"2018-04-17T08:42:29","date_gmt":"2018-04-17T08:42:29","guid":{"rendered":"http:\/\/dalila.sip.ucm.es\/fadoss\/?page_id=55"},"modified":"2023-12-09T11:53:11","modified_gmt":"2023-12-09T11:53:11","slug":"seleccion-de-publicaciones","status":"publish","type":"page","link":"https:\/\/maude.ucm.es\/fadoss\/seleccion-de-publicaciones\/","title":{"rendered":"Selecci\u00f3n de publicaciones"},"content":{"rendered":"<p><strong>Publicaciones del a\u00f1o: <\/strong><a href=\"\/fadoss\/publicaciones\/\">M\u00e1s recientes<\/a> &#8211; <a href=\"#2013\">2013<\/a> &#8211; <a href=\"#2012\">2012<\/a> &#8211; <a href=\"#2011\">2011<\/a> &#8211; <a href=\"#2010\">2010<\/a> &#8211; <a href=\"#2019\">2009<\/a> &#8211; <a href=\"#2008\">2008<\/a> &#8211; <a href=\"#2007\">2007<\/a> &#8211; <a href=\"#2016\">2006<\/a> &#8211; <a href=\"#2005\">2005<\/a> &#8211; <a href=\"#2004\">2004<\/a> &#8211; <a href=\"#2003\">2003<\/a><\/p>\n<h3 id=\"2013\">2013<\/h3>\n<p><b>Autores:<\/b> L. Aceto, D. de Frutos-Escrig, C. Gregorio-Rodriguez y A. Ing\u00f3lfsd\u00f3ttir<br \/>\n<b>T\u00edtulo:<\/b> Axiomatizing weak simulations semantics over BCCSP<br \/>\n<b>Revista:<\/b> Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 537<br \/>\n<b>P\u00e1ginas:<\/b> 42-71<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> L. Aceto, I. F\u00e1bregas, D. de Frutos-Escrig, A. Ing\u00f3lfsd\u00f3ttir y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> On the specification of modal systems: a comparison of three frameworks<br \/>\n<b>Revista:<\/b> Science of Computer Programming<br \/>\n<b>Volumen:<\/b> 78(12)<br \/>\n<b>P\u00e1ginas:<\/b> 2468-2487<\/p>\n<p><b>Autores:<\/b> R. Bonnet, A. Finkel, S. Haddad y F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Ordinal theory for expressiveness of well-structured transition systems<br \/>\n<b>Revista:<\/b> Information and Computation<br \/>\n<b>Volumen:<\/b> 224<br \/>\n<b>P\u00e1ginas:<\/b> 1-22<\/p>\n<p><b>Autores:<\/b> R. Caballero, E. Martin-Martin, A. Riesco y S. Tamarit<br \/>\n<b>T\u00edtulo:<\/b> Speeding up algorithmic debugging using balanced execution trees<br \/>\n<b>Libro:<\/b> 7th International Conference on Tests and Proofs, TAP 2013<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7942<br \/>\n<b>P\u00e1ginas:<\/b> 133-151<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> C. Dania y M. Clavel<br \/>\n<b>T\u00edtulo:<\/b> OCL2FOL+: Coping with undefinedness<br \/>\n<b>Libro:<\/b> Proceedings of the MODELS 2013 OCL Workshop co-located with the 16th International ACM\/IEEE Conference on Model Driven Engineering Languages and Systems (MODELS 2013), Miami, USA, September 30, 2013<br \/>\n<b>Serie:<\/b> CEUR Workshop Proceedings<br \/>\n<b>Volumen:<\/b> 1092<br \/>\n<b>P\u00e1ginas:<\/b> 53-62<br \/>\n<b>Editorial:<\/b> CEUR-WS.org<\/p>\n<p><b>Autores:<\/b> G. Delzanno y F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> On the coverability and reachability languages of monotonic extensions of Petri nets<br \/>\n<b>Revista:<\/b> Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 467<br \/>\n<b>P\u00e1ginas:<\/b> 12-29<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> D. de Frutos Escrig, C. Gregorio-Rodr\u00edguez, M. Palomino y D. Romero-Hern\u00e1ndez<br \/>\n<b>T\u00edtulo:<\/b> Unifying the linear time-branching time spectrum of process semantics<br \/>\n<b>Revista:<\/b> Logical Methods in Computer Science<br \/>\n<b>Volumen:<\/b> 9(2)<br \/>\n<b>P\u00e1ginas:<\/b> 12-29<br \/>\n1-74<\/p>\n<p><b>Autores:<\/b> M. Hidalgo-Herrero, P. Rabanal, I. Rodr\u00edguez y F. Rubio<br \/>\n<b>T\u00edtulo:<\/b> Comparing problem solving strategies for NP-hard optimization problems<br \/>\n<b>Revista:<\/b> Fundamenta Informaticae<br \/>\n<b>Volumen:<\/b> 124(1-2)<br \/>\n<b>P\u00e1ginas:<\/b> 1-25<\/p>\n<p><b>Autores:<\/b> D. Insa, J. Silva y A. Riesco<br \/>\n<b>T\u00edtulo:<\/b> A declarative debugger for sequential Erlang programs<br \/>\n<b>Libro:<\/b> 7th International Conference on Tests and Proofs, TAP 2013<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7942<br \/>\n<b>P\u00e1ginas:<\/b> 96-114<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Montenegro, R. Pe\u00f1a, C. Segura<br \/>\n<b>T\u00edtulo:<\/b> Shape Analysis in a Functional Language by Using Regular Languages<br \/>\n<b>Libro:<\/b> Proceedings of the 15th International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming, PPDP 2013. Revised Selected Papers<br \/>\n<b>P\u00e1ginas:<\/b> 251-262<br \/>\n<b>Editorial:<\/b> Editorial: ACM Press<\/p>\n<p><b>Autores:<\/b> I. Pita y M.-I. Fern\u00e1ndez Camacho<br \/>\n<b>T\u00edtulo:<\/b> Formal specification of the Kademlia and the Kad Routing Tables in Maude<br \/>\n<b>Libro:<\/b> Recent Trends in Algebraic Development Techniques, 21st International Workshop, WADT 2012, Salamanca, Spain, June 7-10, 2012, Revised Selected Papers<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7841<br \/>\n<b>P\u00e1ginas:<\/b> 231-247<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco, I. M. Asavoae y M. Asavoae<br \/>\n<b>T\u00edtulo:<\/b> A generic program slicing technique based on language definitions<br \/>\n<b>Libro:<\/b> Recent Trends in Algebraic Development Techniques, 21st International Workshop, WADT 2012, Salamanca, Spain, June 7-10, 2012, Revised Selected Papers<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7841<br \/>\n<b>P\u00e1ginas:<\/b> 248-264<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. Romero-Hern\u00e1ndez y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Distances between processes: a pure algebraic approach<br \/>\n<b>Libro:<\/b> Recent Trends in Algebraic Development Techniques, 21st International Workshop, WADT 2012, Salamanca, Spain, June 7-10, 2012, Revised Selected Papers<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7841<br \/>\n<b>P\u00e1ginas:<\/b> 265-282<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Petri nets with name creation for transient secure association<br \/>\n<b>Revista:<\/b> Acta Informatica<br \/>\n<b>Volumen:<\/b> 50<br \/>\n<b>P\u00e1ginas:<\/b> 403-436<\/p>\n<h3 id=\"2012\">2012<\/h3>\n<p><b>Autores:<\/b> L. Aceto, D. de Frutos Escrig, C. Gregorio-Rodr\u00edguez y A. Ing\u00f3lfsd\u00f3ttir<br \/>\n<b>T\u00edtulo:<\/b> The equational theory of weak complete simulation semantics over BCCSP<br \/>\n<b>Libro:<\/b> SOFSEM 2012: Theory and Practice of Computer Science &#8211; 38th Conference on Current Trends in Theory and Practice of Computer Science, pindlerv Ml\u00b4yn, Czech Republic, January 21-27, 2012<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7147<br \/>\n<b>P\u00e1ginas:<\/b> 141-152<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> R. Caballero, A. Riesco, A. Verdejo y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Simplifying questions in Maude Declarative Debugger by transforming proof trees<br \/>\n<b>Libro:<\/b> Logic-Based Program Synthesis and Transformation &#8211; 21st International Symposium, LOPSTR 2011, Odense, Denmark, July 18-20, 2011. Revised Selected Papers<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7225<br \/>\n<b>P\u00e1ginas:<\/b> 73-89<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> R. Kersten, O. Shkaravska, B. van Gastel, M. Montenegro, M. van Eekelen<br \/>\n<b>T\u00edtulo:<\/b> Interpolation-based height analysis for improving a recurrence solver<br \/>\n<b>Libro:<\/b> Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems, JTRES 2012<br \/>\n<b>Editorial:<\/b> ACM<br \/>\n<b>P\u00e1ginas:<\/b> 251-262<\/p>\n<p><b>Autores:<\/b> N. Mart\u00ed-Oliet, M. Palomino y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Rewriting logic bibliography by topic: 1990-2011<br \/>\n<b>Revista:<\/b> Journal of Logic and Algebraic Programming<br \/>\n<b>Volumen:<\/b> 81<br \/>\n<b>P\u00e1ginas:<\/b> 782-815<\/p>\n<p><b>Autores:<\/b> M. Martos-Salgado y F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Cost soundness for priced resource-constrained workflow nets<br \/>\n<b>Libro:<\/b> Application and Theory of Petri Nets &#8211; 33rd International<br \/>\nConference, PETRI NETS 2012, Hamburg, Germany, June 25-29, 2012 Proceedings<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7347<br \/>\n<b>P\u00e1ginas:<\/b> 108-127<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Montenegro, O. Shkaravska, M. van Eekelen, R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Interpolation-based height analysis for improving a recurrence solver<br \/>\n<b>Libro:<\/b> Proceedings of the 2nd International Workshop on Foundational and Practical Aspects of Resource Analysis, FOPARA 2011. Revised Selected Papers<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Editorial:<\/b> Springer<br \/>\n<b>Volumen:<\/b> 7177<br \/>\n<b>P\u00e1ginas:<\/b> 36-53<\/p>\n<p><b>Autores:<\/b> I. Pita y A. Riesco<br \/>\n<b>T\u00edtulo:<\/b> A tool for testing data types implementations from Maude algebraic specifications<br \/>\n<b>Libro:<\/b> Proceedings of the 11st Spanish Workshop on Programming Languages, PROLE 2011<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 282<br \/>\n<b>P\u00e1ginas:<\/b> 61-71<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> D. Romero-Hern\u00e1ndez y D. de Frutos Escrig<br \/>\n<b>T\u00edtulo:<\/b> Defining distances for all process semantics<br \/>\n<b>Libro:<\/b> FMOODS\/FORTE<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7273<br \/>\n<b>P\u00e1ginas:<\/b> 169-185<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco<br \/>\n<b>T\u00edtulo:<\/b> Test-case generation for Maude functional modules<br \/>\n<b>Libro:<\/b> Proceedings of the 20th International Workshop on Algebraic Development Techniques, WADT 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7137<br \/>\n<b>P\u00e1ginas:<\/b> 287-301<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco<br \/>\n<b>T\u00edtulo:<\/b> Using narrowing to test Maude specifications<br \/>\n<b>Libro:<\/b> Rewriting Logic and Its Applications &#8211; 9th International Workshop, WRLA 2012, Held as a Satellite Event of ETAPS, Tallinn, Estonia, March 24-25, 2012, Revised Selected Papers<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7571<br \/>\n<b>P\u00e1ginas:<\/b> 201-220<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco<br \/>\n<b>T\u00edtulo:<\/b> Using semantics specified in Maude to generate test cases<br \/>\n<b>Libro:<\/b> Theoretical Aspects of Computing &#8211; ICTAC 2012 &#8211; 9th International Colloquium, Bangalore, India, September 24-27, 2012. Proceedings<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7521<br \/>\n<b>P\u00e1ginas:<\/b> 90-104<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco y J. Rodr\u00edguez-Hortal\u00e1<br \/>\n<b>T\u00edtulo:<\/b> S-narrowing for constructor systems<br \/>\n<b>Libro:<\/b> Theoretical Aspects of Computing &#8211; ICTAC 2012 &#8211; 9th International Colloquium, Bangalore, India, September 24-27, 2012. Proceedings<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7521<br \/>\n<b>P\u00e1ginas:<\/b> 136-150<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco, A. Verdejo, N. Mart\u00ed-Oliet y R. Caballero<br \/>\n<b>T\u00edtulo:<\/b> Declarative debugging of rewriting logic specifications<br \/>\n<b>Libro:<\/b> Rewriting Logic and its Applications<br \/>\n<b>Serie:<\/b> The Journal of Logic and Algebraic Programming (JLAP)<br \/>\n<b>Volumen:<\/b> 81(7-8)<br \/>\n<b>P\u00e1ginas:<\/b> 851-897<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo y M. Martos-Salgado<br \/>\n<b>T\u00edtulo:<\/b> Multiset rewriting for the verification of depth-bounded processes with name binding<br \/>\n<b>Revista:<\/b> Information and Computation<br \/>\n<b>Volumen:<\/b> 215<br \/>\n<b>P\u00e1ginas:<\/b> 68-87<\/p>\n<p><b>Autores:<\/b> L. S\u00e1nchez-Gil, M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> A formalization in Coq of Launchbury&#8217;s natural semantics for lazy evaluation<br \/>\n<b>Revista:<\/b> Electronic Communications of the EASST<br \/>\n<b>Volumen:<\/b> 10<br \/>\n<b>P\u00e1ginas:<\/b> 15<\/p>\n<p><b>Autores:<\/b> L. S\u00e1nchez-Gil, M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> A locally nameless representation for a natural semantics for lazy evaluation<br \/>\n<b>Libro:<\/b> Theoretical Aspects of Computing, ICTAC 2012<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7521<br \/>\n<b>P\u00e1ginas:<\/b> 105-119<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Verdejo y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Basic completion strategies as another application of the Maude strategy language<br \/>\n<b>Libro:<\/b> Proceedings of the 10th International Workshop on Reduction Strategies in Rewriting and Programming, WRS 2011, Novi Sad, Serbia, May 29, 2011<br \/>\n<b>Serie:<\/b> Electronic Proceedings in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 82<br \/>\n<b>P\u00e1ginas:<\/b> 17-36<\/p>\n<h3 id=\"2011\">2011<\/h3>\n<p><b>Autores:<\/b> L. Aceto, D. de Frutos-Escrig, C. Gregorio-Rodr\u00edguez y A. Ing\u00f3lfsd\u00f3ttir<br \/>\n<b>T\u00edtulo:<\/b> Axiomatizing weak ready simulation semantics over BCCSP<br \/>\n<b>Libro:<\/b> Theoretical Aspects of Computing &#8211; ICTAC 2011 &#8211; 8th International Colloquium, Johannesburg, South Africa, August 31 &#8211; September 2, 2011. Proceedings<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6916<br \/>\n<b>P\u00e1ginas:<\/b> 7-24<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> L. Aceto, I. F\u00e1bregas, D. de Frutos Escrig, A. Ing\u00f3lfsd\u00f3ttir y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Graphical representation of covariant-contravariant modal formulas<br \/>\n<b>Libro:<\/b> Proceedings 18th International Workshop on Expressiveness in Concurrency, Aachen, Germany, 5th September 2011<br \/>\n<b>Serie:<\/b> Electronic Proceedings in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 64<br \/>\n<b>P\u00e1ginas:<\/b> 1-15<\/p>\n<p><b>Autores:<\/b> L. Aceto, D. de Frutos-Escrig, C. Gregorio-Rodr\u00edguez y A. Ing\u00f3lfsd\u00f3ttir<br \/>\n<b>T\u00edtulo:<\/b> Complete and ready simulation semantics are not finitely based over BCCSP, even with a singleton alphabet<br \/>\n<b>Libro:<\/b> Information Processing Letters<br \/>\n<b>Volumen:<\/b> 111(9)<br \/>\n<b>P\u00e1ginas:<\/b> 408-413<\/p>\n<p><b>Autores:<\/b> L. Aceto, I. F\u00e1bregas, D. de Frutos Escrig, A. Ing\u00f3lfsd\u00f3ttir y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Relating modal refinements, covariant-contravariant simulations and partial bisimulations<br \/>\n<b>Libro:<\/b> Fundamentals of Software Engineering, FSEN 2011<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7141<br \/>\n<b>P\u00e1ginas:<\/b> 268-283<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D.A. Basin, M. Clavel y M. Egea<br \/>\n<b>T\u00edtulo:<\/b> A decade of model-driven security<br \/>\n<b>Libro:<\/b> SACMAT 2011, 16th ACM Symposium on Access Control Models and Technologies, Innsbruck, Austria, June 15-17, 2011, Proceedings<br \/>\n<b>P\u00e1ginas:<\/b> 1-10<br \/>\n<b>Editorial:<\/b> ACM<\/p>\n<p><b>Autores:<\/b> D.A. Basin, M. Clavel, M. Egea, M.A.G. de Dios, C. Dania, G. Ortiz y J. Valdazo<br \/>\n<b>T\u00edtulo:<\/b> Model-driven development of security-aware GUIs for data-centric applications<br \/>\n<b>Libro:<\/b> Foundations of Security Analysis and Design VI &#8211; FOSAD Tutorial Lectures<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6858<br \/>\n<b>P\u00e1ginas:<\/b> 101-124<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> R. Bonnet, A. Finkel, S. Haddad y F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Ordinal theory for expressiveness of well structured transition systems<br \/>\n<b>Libro:<\/b> 14th International Conference on Foundations of Software Sciences and Computation Structures, FOSSACS 2011<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6604<br \/>\n<b>P\u00e1ginas:<\/b> 153-167<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Clavel, N. Mart\u00ed-Oliet y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Parameterized metareasoning in membership equational logic<br \/>\n<b>Libro:<\/b> Formal Modeling: Actors, Open Systems Biological Systems. Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7000<br \/>\n<b>P\u00e1ginas:<\/b> 277-298<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Codescu, T. Mossakowski, A. Riesco y C. Maeder<br \/>\n<b>T\u00edtulo:<\/b> Integrating Maude into Hets<br \/>\n<b>Libro:<\/b> Proceedings of the 13th International Conference on Algebraic Methodology and Software Technology, AMAST 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6486<br \/>\n<b>P\u00e1ginas:<\/b> 60-75<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J. de Dios; R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Certification of Safe Polynomial Memory Bounds<br \/>\n<b>Libro:<\/b> Int. Symp. on Formal Methods, FM&#8217;11, Limerick, Ireland, June 2011<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6664<br \/>\n<b>P\u00e1ginas:<\/b> 184-199<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Martos-Salgado y F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Dynamic Soundness in Resource-Constrained Workflow Nets<br \/>\n<b>Libro:<\/b> Formal Techniques for Distributed Systems, Joint 13th IFIP WG 6.1 International Conference, FMOODS 2011 and 31st IFIP WG 6.1 International Conference, FORTE 2011, Reykjavic, Iceland, June 7-9, 2011<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6722<br \/>\n<b>P\u00e1ginas:<\/b> 259-273<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> R. Pe\u00f1a y A. Delgado<br \/>\n<b>T\u00edtulo:<\/b> Size Invariants and Ranking Functions Synthesis in a Functional Language<br \/>\n<b>Libro:<\/b> Int. Work. on Funtional and Constraint Logic Programming, WFLP&#8217;11, Odense, Denmark, July 2011<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6816<br \/>\n<b>P\u00e1ginas:<\/b> 52-67<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco<br \/>\n<b>T\u00edtulo:<\/b> Test-case generation for Maude functional modules<br \/>\n<b>Libro:<\/b> Proceedings of the 20th International Workshop on Algebraic Development Techniques, WADT 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 7137<br \/>\n<b>P\u00e1ginas:<\/b> 287-301<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco, A. Verdejo y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> A complete declarative debugger for Maude<br \/>\n<b>Libro:<\/b> Proceedings of the 13th International Conference on Algebraic Methodology and Software Technology, AMAST 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6486<br \/>\n<b>P\u00e1ginas:<\/b> 216-225<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. Romero-Hern\u00e1ndez y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> On the unification of process semantics: Logical semantics<br \/>\n<b>Libro:<\/b> Proceedings Eight Workshop on Structural Operational Semantics 2011<br \/>\n<b>Serie:<\/b> EPTCS<br \/>\n<b>Volumen:<\/b> 62<br \/>\n<b>P\u00e1ginas:<\/b> 47-61<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Decidability and complexity of Petri nets with unordered data<br \/>\n<b>Revista:<\/b> Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 412(34)<br \/>\n<b>P\u00e1ginas:<\/b> 4439-4451<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo, M. Martos-Salgado y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Accelerations for the coverability set of Petri nets with names<br \/>\n<b>Revista:<\/b> Fundamenta Informaticae<br \/>\n<b>Volumen:<\/b> 113(3-4)<br \/>\n<b>P\u00e1ginas:<\/b> 313-341<\/p>\n<p><b>Autores:<\/b> L. S\u00e1nchez-Gil, M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> Relating function spaces to resourced function spaces<br \/>\n<b>Libro:<\/b> 26th Symposium on Applied Computing, SAC&#8217;11<br \/>\n<b>Volumen:<\/b> 2<br \/>\n<b>P\u00e1ginas:<\/b> 1301-1308<br \/>\n<b>Editorial:<\/b> ACM<\/p>\n<p><b>Autores:<\/b> L. S\u00e1nchez-Gil, M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> An operational semantics for distributed lazy evaluation<br \/>\n<b>Libro:<\/b> Trends in Functional Programming<br \/>\n<b>Volumen:<\/b> 10<br \/>\n<b>P\u00e1ginas:<\/b> 65-80<\/p>\n<h3 id=\"2010\">2010<\/h3>\n<p><b>Autores:<\/b> D. A. Basin, M. Clavel, M. Egea y M. Schl\u00e4pfer<br \/>\n<b>T\u00edtulo:<\/b> Automatic generation of smart, security-aware GUI models<br \/>\n<b>Libro:<\/b> Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5965<br \/>\n<b>P\u00e1ginas:<\/b> 201-217<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> C. Braga<br \/>\n<b>T\u00edtulo:<\/b> A transformation contract to generate aspects from access control policies<br \/>\n<b>Revista:<\/b> Software and Systems Modeling Fecha: 2010<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J. de Dios, M. Montenegro y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Certified Absence of Dangling Pointers in a Language with Explicit Deallocation<br \/>\n<b>Libro:<\/b> Proceedings of the Eighth International Conference on Integrated Formal Methods, IFM 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6396<br \/>\n<b>P\u00e1ginas:<\/b> 305-319<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J. de Dios y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> A Certified Implementation on top of the Java Virtual Machine<br \/>\n<b>Libro:<\/b> Formal Method in Industrial Critical Systems, FMICS&#8217;09<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5825<br \/>\n<b>P\u00e1ginas:<\/b> 181-196<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J. de Dios y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Formal Certification of a Resource-Aware Language Implementation<br \/>\n<b>Libro:<\/b> Int. Conf. on Theorem Proving in Higher Order Logics, TPHOL&#8217;09, Munich (Germany)<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5674<br \/>\n<b>P\u00e1ginas:<\/b> 196-211<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Egea, C. Dania y M. Clavel<br \/>\n<b>T\u00edtulo:<\/b> MySQL4OCL: A Stored Procedure-Based MySQL Code Generator for OCL<br \/>\n<b>Libro:<\/b> Electronic Communications of the EASST<br \/>\n<b>Volumen:<\/b> 36<\/p>\n<p><b>Autores:<\/b> I. F\u00e1bregas, D. de Frutos-Escrig y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Equational characterization of covariant-contravariant simulation and conformance simulation semantics<br \/>\n<b>Libro:<\/b> Proceedings Seventh Workshop on Structural Operational Semantics, Paris, France, 30 August 2010<br \/>\n<b>Serie:<\/b> Electronic Proceedings in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 32<br \/>\n<b>P\u00e1ginas:<\/b> 1-14<\/p>\n<p><b>Autores:<\/b> I. F\u00e1bregas, D. de Frutos-Escrig y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Logics for contravariant simulations<br \/>\n<b>Libro:<\/b> Formal Techniques for Distributed Systems, Joint 12th IFIP WG 6.1 International Conference, FMOODS 2010 and 30th IFIP WG 6.1 International Conference, FORTE 2010, Amsterdam, The Netherlands, June 7-9, 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6117<br \/>\n<b>P\u00e1ginas:<\/b> 224-231<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. A. Garc\u00eda de Dios, C. Dania, M. Schl\u00e4pfer, D. A. Basin, M. Clavel y M. Egea<br \/>\n<b>T\u00edtulo:<\/b> Ssg: a modelbased development environment for smart, security-aware GUIs<br \/>\n<b>Libro:<\/b> Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering &#8211; Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010<br \/>\n<b>P\u00e1ginas:<\/b> 311-312<br \/>\n<b>Editorial:<\/b> ACM<\/p>\n<p><b>Autores:<\/b> M. Montenegro, R. Pe\u00f1a y C. Segura<br \/>\n<b>T\u00edtulo:<\/b> A space consumption analysis by abstract interpretation<br \/>\n<b>Libro:<\/b> Selected Papers of the First International Workshop on Foundational and Practical Aspects of Resource Analysis, FOPARA 2009<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6324<br \/>\n<b>P\u00e1ginas:<\/b> 34-50<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Montenegro, R. Pe\u00f1a y C. Segura<br \/>\n<b>T\u00edtulo:<\/b> A Simple Region Inference Algorithm for a First-Order Functional Language<br \/>\n<b>Libro:<\/b> Proceedings of the 18th International Workshop on Functional and (Constraint) Logic Programming, WFLP 2009<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5979<br \/>\n<b>P\u00e1ginas:<\/b> 145-161<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> I. Pita<br \/>\n<b>T\u00edtulo:<\/b> A formal specification of the Kademlia distributed hash table<br \/>\n<b>Libro:<\/b> Actas de las X Jornadas sobre Programaci\u00f3n y Lenguajes, PROLE 2010, Valencia, 8-10 septiembre 2010<br \/>\n<b>P\u00e1ginas:<\/b> 223-234<br \/>\n<b>Editorial:<\/b> Garceta grupo editorial<\/p>\n<p><b>Autores:<\/b> A. Riesco y J. Rodr\u00edguez-Hortal\u00e1<br \/>\n<b>T\u00edtulo:<\/b> A natural implementation of plural semantics in Maude<br \/>\n<b>Libro:<\/b> Proceedings of the Ninth Workshop on Language Descriptions Tools and Applications, LDTA 2009, York, UK, March 27-28, 2009<br \/>\n<b>Serie:<\/b> Electronic Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 253(7)<br \/>\n<b>P\u00e1ginas:<\/b> 165-175<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> A. Riesco y J. Rodr\u00edguez-Hortal\u00e1<br \/>\n<b>T\u00edtulo:<\/b> Programming with singular and plural non-deterministic functions<br \/>\n<b>Libro:<\/b> Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, PEPM 2010, Madrid, Spain, January 18-19, 2010<br \/>\n<b>P\u00e1ginas:<\/b> 83-92<br \/>\n<b>Editorial:<\/b> ACM<\/p>\n<p><b>Autores:<\/b> A. Riesco, A. Verdejo y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Declarative debugging of missing answers for Maude specifications<br \/>\n<b>Libro:<\/b> Proceedings of the 21st International Conference on Rewriting Techniques and Applications, RTA 2010<br \/>\n<b>Serie:<\/b> Leibniz International Proceedings in Informatics<br \/>\n<b>Volumen:<\/b> 6<br \/>\n<b>P\u00e1ginas:<\/b> 277-294<br \/>\n<b>Editorial:<\/b> Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik<\/p>\n<p><b>Autores:<\/b> A. Riesco, A. Verdejo y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Enhancing the debugging of Maude specifications<br \/>\n<b>Libro:<\/b> Proceedings of the 8th International Workshop on Rewriting Logic and its Applications, WRLA 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6381<br \/>\n<b>P\u00e1ginas:<\/b> 226-242<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Riesco, A. Verdejo, N. Mart\u00ed-Oliet y R. Caballero<br \/>\n<b>T\u00edtulo:<\/b> Declarative debugging of rewriting logic specifications<br \/>\n<b>Libro:<\/b> Informe t\u00e9cnico SIC-02-10, Dpto. Sistemas Inform\u00e1ticos y Computaci\u00f3n, Universidad Complutense de Madrid, 2010<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Depth boundedness in multiset rewriting systems with binding<br \/>\n<b>Libro:<\/b> Proceedings of the 4th International Workshop on Reachability Problems,RP 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6227<br \/>\n<b>P\u00e1ginas:<\/b> 161-175<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Multiset rewriting: a semantic framework for concurrency with name binding<br \/>\n<b>Libro:<\/b> Proceedings of the 8th International Workshop on Rewriting Logic and its Applications, WRLA 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6381<br \/>\n<b>P\u00e1ginas:<\/b> 191-207<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo y G. Delzanno<br \/>\n<b>T\u00edtulo:<\/b> A language-based comparison of nets with black tokens, pure names and ordered data<br \/>\n<b>Libro:<\/b> 4th International Conference on Language and Automata Theory and Applications, LATA 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6031<br \/>\n<b>P\u00e1ginas:<\/b> 524-535<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Decidability problems for Petri nets with names and replication<br \/>\n<b>Libro:<\/b> Fundamenta Informaticae<br \/>\n<b>Volumen:<\/b> 105(3)<br \/>\n<b>P\u00e1ginas:<\/b> 291-317<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Forward analysis for Petri nets with name creation<br \/>\n<b>Libro:<\/b> 31st International Conference on Applications and Theory of Petri Nets, Petri Nets 2010<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 6128<br \/>\n<b>P\u00e1ginas:<\/b> 185-205<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> L. S\u00e1nchez-Gil, M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> Call-by-need, call-by-name, and natural semantics<br \/>\n<b>Libro:<\/b> Actas de las X Jornadas sobre Programaci\u00f3n y Lenguajes, PROLE 2010, Valencia, 8-10 septiembre 2010<br \/>\n<b>P\u00e1ginas:<\/b> 83-92<br \/>\n<b>Editorial:<\/b> Garceta grupo editorial<\/p>\n<p><b>Autores:<\/b> L. S\u00e1nchez-Gil, M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> On the relation of call-by-need and call-by-name in a natural semantics setting<br \/>\n<b>Libro:<\/b> 22nd symposium on Implementation and Application of Functional Languages, IFL&#8217;10. Utrech University<\/p>\n<h3 id=\"2009\">2009<\/h3>\n<p>&nbsp;<\/p>\n<p><b>Autores:<\/b> D. Basin, M. Clavel, J. Doser y M. Egea<br \/>\n<b>T\u00edtulo:<\/b> Automated analysis of security-design models<br \/>\n<b>Revista:<\/b> Information and Software Technology, Special issue on Model Based Development for Secure Information Systems<br \/>\n<b>Volumen:<\/b> 51(5)<br \/>\n<b>P\u00e1ginas:<\/b> 815-831<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> C. Braga<br \/>\n<b>T\u00edtulo:<\/b> From Access Control Policies to an Aspect-based Infrastructure: A Metamodel-based Approach<br \/>\n<b>Libro:<\/b> Proceedings of MODELS 2008 Workshops and Symposia.<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5421<br \/>\n<b>P\u00e1ginas:<\/b> 243-256<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> C. Braga, F. Chalub y A. Sztajnberg<br \/>\n<b>T\u00edtulo:<\/b> A formal semantics for a qualitity of service contract language<br \/>\n<b>Libro:<\/b> Proceedings of Formal Foundations of Embedded Software and Component-Based Software Architectures FESCA&#8217;07, Satellite workshop of ETAPS&#8217;07, Braga, Portugal<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b>203(7)<br \/>\n<b>P\u00e1ginas:<\/b>103-120<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> R. Caballero, N. Mart\u00ed-Oliet, A. Riesco y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> A declarative debugger for Maude functional modules<br \/>\n<b>Libro:<\/b> Proceedings of the Seventh International Workshop on Rewriting Logic and its Applications, WRLA 2008<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 238(3)<br \/>\n<b>P\u00e1ginas:<\/b> 63-81<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> M. Clavel, F. Dur\u00e1n, S. Eker, S. Escobar, P. Lincoln, N. Marti-Oliet, J. Meseguer y C. Talcott<br \/>\n<b>T\u00edtulo:<\/b> Unification and narrowing in Maude 2.4<br \/>\n<b>Libro:<\/b> Rewriting Techniques and Applications, RTA 2009, Brasilia, Brazil, Treinen, R. (ed.)<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5595<br \/>\n<b>P\u00e1ginas:<\/b> 380-390<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Clavel, M. Egea, M.A. Garc\u00eda-de Dios<br \/>\n<b>T\u00edtulo:<\/b> Building and Efficient Component for OCL Evaluation<br \/>\n<b>Libro:<\/b> 8th OCL Workshop at the UML\/MoDELS Conference: OCL Concepts and Tools: From Implementation to Evaluation and Comparison<br \/>\n<b>Volumen:<\/b><br \/>\n<b>P\u00e1ginas:<\/b><br \/>\n<b>Editorial:<\/b><\/p>\n<p><b>Autores:<\/b> I. F\u00e1bregas, D. de Frutos-Escrig y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Non-strongly stable orders also define interesting simulation relations<br \/>\n<b>Libro:<\/b> Algebra and Coalgebra in Computer Science. 1st Int.Conference, CALCO 2009. A. Kurz y A.Tarlecki (ed.)<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5728<br \/>\n<b>P\u00e1ginas:<\/b> 221-235<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, C. Gregorio-Rodr\u00edguez y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Ready to preorder: an algebraic and general proof<br \/>\n<b>Revista:<\/b> Journal of Logic and Algebraic Programming<br \/>\n<b>Volumen:<\/b> 78(7)<br \/>\n<b>P\u00e1ginas:<\/b> 539-551<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, C. Gregorio-Rodr\u00edguez y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> On the unification of semantics for processes: observational semantics<br \/>\n<b>Libro:<\/b> SOFSEM 09: 35th Int. Conference on Current Trends in Theory and Practice of Computer Science<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5404<br \/>\n<b>P\u00e1ginas:<\/b> 279-290<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, C. Gregorio-Rodr\u00edguez y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> On the unification of semantics for processes: equational semantics<br \/>\n<b>Libro:<\/b> Twenty-fifth Conference on the Mathematical Foundations of Programming Semantics<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 249<br \/>\n<b>P\u00e1ginas:<\/b> 243-267<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> N. Mart\u00ed-Oliet, J. Meseguer y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> A Rewriting Semantics for Maude Strategies<br \/>\n<b>Libro:<\/b> Proceedings of the Seventh International Workshop on Rewriting Logic and its Applications, WRLA 2008<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 238(3)<br \/>\n<b>P\u00e1ginas:<\/b> 227-247<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> J. Meseguer, M. Palomino y N. Marti-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Algebraic Simulations<br \/>\n<b>Revista:<\/b> Journal of Logic and Algebraic Programming<br \/>\n<b>Volumen:<\/b>79(2)<br \/>\n<b>P\u00e1ginas:<\/b>103-143<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> M. Montenegro, R. Pe\u00f1a y C. Segura<br \/>\n<b>T\u00edtulo:<\/b> A Resource-Aware Semantics and Abstract Machine for a Functional Language with Explicit Deallocation<br \/>\n<b>Libro:<\/b> 17th International Workshop on Functional and (Constraint) Logic Programming, WFLP 2008<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 246<br \/>\n<b>P\u00e1ginas:<\/b> 167-182<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> A. Riesco y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol<br \/>\n<b>Libro:<\/b> Proceedings of the Seventh International Workshop on Rewriting Logic and its Applications, WRLA 2008. G. Ro\u015fu (ed.)<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 238(3)<br \/>\n<b>P\u00e1ginas:<\/b> 247-266<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> A. Riesco, A. Verdejo, R. Caballero y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Declarative Debugging of Rewriting Logic Specifications<br \/>\n<b>Libro:<\/b> Recent Trends in Algebraic Development Techniques, WADT 2008. Corradini, A. &amp; Montanari, U. (ed.)<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5486<br \/>\n<b>P\u00e1ginas:<\/b> 308-325<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Decidability results for restricted models of Petri nets with name creation and replication<br \/>\n<b>Libro:<\/b> 30th International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency, ICATPN 2007<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5606<br \/>\n<b>P\u00e1ginas:<\/b> 63-82<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<h3 id=\"2008\">2008<\/h3>\n<p><b>Autores:<\/b> R. Caballero, N. Mart\u00ed-Oliet, A. Riesco y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Declarative debugging of membership equational logic specifications<br \/>\n<b>Libro:<\/b> Concurrency, Graphs and Models<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 5065<br \/>\n<b>P\u00e1ginas:<\/b> 174-193<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Clavel, V. Silva, C. Braga y M. Egea<br \/>\n<b>T\u00edtulo:<\/b> Model-Driven Security in Practice: an Industrial Experience<br \/>\n<b>Libro:<\/b> ECMDA-FA &#8217;08: Proceedings of Model Driven Architecture &#8211; Industrial Track<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5095<br \/>\n<b>P\u00e1ginas:<\/b> 327-338<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Duran, V. Silva y C. Lucena<br \/>\n<b>T\u00edtulo:<\/b> Using testimonies to enforce the behavior of agents<br \/>\n<b>Libro:<\/b> Coordination, Organizations, Institutions, and Norms in Agent Systems III<br \/>\n<b>Serie:<\/b> LNAI<br \/>\n<b>Volumen:<\/b> 4870<br \/>\n<b>P\u00e1ginas:<\/b> 218-231<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. de la Encina, M. Hidalgo-Herrero, P. Rabanal, I. Rodr\u00edguez y F. Rubio<br \/>\n<b>T\u00edtulo:<\/b> Testing the Behaviour of Entities in a Cognitive Language<br \/>\n<b>Revista:<\/b> International Journal of Cognitive Informatics and Natural Intelligence<br \/>\n<b>Volumen:<\/b> 2(1)<br \/>\n<b>P\u00e1ginas:<\/b> 29-43<br \/>\n<b>Editorial:<\/b><\/p>\n<p><b>Autores:<\/b> A. de la Encina y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> From Natural Semantics to C: A Formal Derivation of two STG Machines<br \/>\n<b>Revista:<\/b> Journal of Functional Programming<br \/>\n<b>Volumen:<\/b> 19(1)<br \/>\n<b>P\u00e1ginas:<\/b> 47-94<br \/>\n<b>Editorial:<\/b> Cambridge University Press<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, C. Gregorio-Rodr\u00edguez y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Coinductive characterisations reveal nice relations between preorders and equivalences<br \/>\n<b>Libro:<\/b> The First International Conference on Foundations of Informatics, Computing and Software, FICS<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 212<br \/>\n<b>P\u00e1ginas:<\/b> 149-162<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, M. Palomino y I. F\u00e1bregas<br \/>\n<b>T\u00edtulo:<\/b> Multiset Bisimulation as a Common Framework for Ordinary and Probabilistic Bisimulations<br \/>\n<b>Libro:<\/b> Formal Techniques for Networked and Distributed Systems &#8212; FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5048<br \/>\n<b>P\u00e1ginas:<\/b> 283-298<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J. Guedes, V. Silva y C. Lucena<br \/>\n<b>T\u00edtulo:<\/b> A reputation model based on testimonies<br \/>\n<b>Libro:<\/b> Agent Oriented Information Systems IV: Proc. of the 8th International Bi-Conference Workshop<br \/>\n<b>Serie:<\/b> LNAI<br \/>\n<b>Volumen:<\/b> 4898<br \/>\n<b>P\u00e1ginas:<\/b> 37-52<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> I. Hern\u00e1n-Losada, C. Pareja-Flores, J. A. Vel\u00e1zquez-Iturbide<br \/>\n<b>T\u00edtulo:<\/b> Testing Based Automatic Grading: A proposal from the Bloom&#8217;s taxonomy<br \/>\n<b>Libro:<\/b> Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies<br \/>\n<b>P\u00e1ginas:<\/b> 847-849<br \/>\n<b>Editorial:<\/b> IEEE Computer Society (CPS)<\/p>\n<p><b>Autores:<\/b> S. Lucas y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Rewriting Techniques for Analysing Termination and Complexity Bounds of Safe Programs<br \/>\n<b>Libro:<\/b> Pre-proceedings 18th Int. Symposium on Logic-Based Program Synthesis and Transformation, LOPSTR&#8217;08<br \/>\n<b>P\u00e1ginas:<\/b> 43-57<\/p>\n<p><b>Autores:<\/b> J. Meseguer, M. Palomino y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Equational Abstractions<br \/>\n<b>Serie:<\/b> Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 403<br \/>\n<b>P\u00e1ginas:<\/b> 239-264<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> M. Montenegro, R. Pe\u00f1a y C. Segura<br \/>\n<b>T\u00edtulo:<\/b> A Type System for Safe Memory Management and its Proof of Correctness<br \/>\n<b>Libro:<\/b> 10th Int. ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming, PPDP&#8217;08<br \/>\n<b>P\u00e1ginas:<\/b> 152-162<br \/>\n<b>Editorial:<\/b> ACM Press<\/p>\n<p><b>Autores:<\/b> M. Montenegro, R. Pe\u00f1a y C. Segura<br \/>\n<b>T\u00edtulo:<\/b> An inference Algorithm for Guaranteeing Safe Destruction<br \/>\n<b>Libro:<\/b> 18th Int. Symposium on Logic-Based Program Synthesis and Transformation, LOPSTR 2008<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5438<br \/>\n<b>P\u00e1ginas:<\/b> 135-151<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Formal logic<br \/>\n<b>Revista:<\/b> Encyclopedia of Computer Science and Engineering<br \/>\n<b>Editorial:<\/b> Wiley<\/p>\n<p><b>Autores:<\/b> C. Pareja Flores , J. Urquiza Fuentes y J. A. Vel\u00e1zquez Iturbide<br \/>\n<b>T\u00edtulo:<\/b> An Approach to Effortless Construction of Program Animations<br \/>\n<b>Revista:<\/b> Computers and Education Electronic<br \/>\n<b>Volumen:<\/b> 50(1)<br \/>\n<b>P\u00e1ginas:<\/b> 179-192<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> A. Riesco, A. Verdejo, N. Mart\u00ed-Oliet y R. Caballero<br \/>\n<b>T\u00edtulo:<\/b> A declarative debugger for Maude<br \/>\n<b>Libro:<\/b> Algebraic Methodology and Software Technology &#8212; 12th International Conference, AMAST 2008, G. Meseguer y G. Ro\u015fu (ed.)<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5140<br \/>\n<b>P\u00e1ginas:<\/b> 116-121<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Name Creation vs. Replication in Petri Net Systems<br \/>\n<b>Revista:<\/b> Fundamenta Informaticae<br \/>\n<b>Volumen:<\/b> 88<br \/>\n<b>P\u00e1ginas:<\/b> 329-356<br \/>\n<b>Editorial:<\/b> IOS Press<\/p>\n<p><b>Autores:<\/b> M. Rubio-S\u00e1nchez, J. Urquiza-Fuentes y C. Pareja-Flores<br \/>\n<b>T\u00edtulo:<\/b> A gentle introduction to mutual recursion<br \/>\n<b>Libro:<\/b> ITiCSE &#8217;08: Proceedings of the 13th annual conference on Innovation and technology in computer science education<br \/>\n<b>P\u00e1ginas:<\/b> 235-239<br \/>\n<b>Editorial:<\/b> ACM<\/p>\n<p><b>Autores:<\/b> G. Santos-Garc\u00eda, M. Palomino y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Rewriting Logic using Strategies for Neural Networks: an Implementation in Maude<br \/>\n<b>Libro:<\/b> International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2008<br \/>\n<b>Serie:<\/b> Advances in Soft Computing<br \/>\n<b>Volumen:<\/b> 50<br \/>\n<b>P\u00e1ginas:<\/b> 424-433<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> C. Segura, I. Pita, R. del Vado, A.I. Saiz y P. Soler<br \/>\n<b>T\u00edtulo:<\/b> Interactive Learning of Data Structures and Algorithmic Schemes<br \/>\n<b>Libro:<\/b> Computational Science &#8211; ICCS 2008, 8th International Conference<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 5101(1)<br \/>\n<b>P\u00e1ginas:<\/b> 800-809<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> V. Silva, R. Choren y C. Lucena<br \/>\n<b>T\u00edtulo:<\/b> Using MAS-ML dynamic diagrams to model MAS behavioral properties<br \/>\n<b>Libro:<\/b> Agent Oriented Information Systems IV: Proc. of the 8th International Bi-Conference Workshop<br \/>\n<b>Serie:<\/b> LNAI<br \/>\n<b>Volumen:<\/b> 4898<br \/>\n<b>P\u00e1ginas:<\/b> 1-18<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> V. Silva, R. Choren y C. Lucena<br \/>\n<b>T\u00edtulo:<\/b> MAS-ML: A multi-agent system modelling language<br \/>\n<b>Revista<\/b>: International Journal of Agent-Oriented Software Engineering<br \/>\n<b>Volumen:<\/b><br \/>\n<b>P\u00e1ginas:<\/b><br \/>\n<b>Editorial:<\/b> InderScience<\/p>\n<p><b>Autores:<\/b> V. Silva<br \/>\n<b>T\u00edtulo:<\/b> From the specification to the implementation of norms: An automatic approach to generate rules from norms to govern the behaviour of agents<br \/>\n<b>Revista<\/b>: International Journal of Autonomous Agents and Multi-Agent Systems, Special Issue on Norms<br \/>\n<b>Volumen:<\/b><br \/>\n<b>P\u00e1ginas:<\/b><br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> V. Silva<br \/>\n<b>T\u00edtulo:<\/b> Implementing norms that govern non-dialogical actions<br \/>\n<b>Libro:<\/b> Coordination, Organizations, Institutions, and Norms in Agent Systems III<br \/>\n<b>Serie:<\/b> LNAI<br \/>\n<b>Volumen:<\/b> 4870<br \/>\n<b>P\u00e1ginas:<\/b> 234-244<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J. A. Vel\u00e1zquez Iturbide, C. Pareja Flores y J. Urquiza Fuentes<br \/>\n<b>T\u00edtulo:<\/b> An Instructors&#8217; Guide to Design Web-Based Algorithm Animations<br \/>\n<b>Libro:<\/b> Advances in Web Based Learning &#8211; ICWL 2007<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 4823<br \/>\n<b>P\u00e1ginas:<\/b> 440-451<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<h3 id=\"2007\">2007<\/h3>\n<p><b>Autores:<\/b> D. Basin, M. Clavel, J. Doser y M. Egea<br \/>\n<b>T\u00edtulo:<\/b> A Metamodel-Based Approach for Analyzing Security-Design Models<br \/>\n<b>Libro:<\/b> Model Driven Engineering Languages and systems<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4735<br \/>\n<b>P\u00e1ginas:<\/b> 420-435<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Brandao, V. Silva y C. Lucena<br \/>\n<b>T\u00edtulo:<\/b> Observed-MAS: an Ontology-based Method for Analyzing Multi-Agent Systems Design Models<br \/>\n<b>Libro:<\/b> Agent-Oriented Software Engineering<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4405<br \/>\n<b>P\u00e1ginas:<\/b> 122-139<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Clavel, F. Dur\u00e1n, S. Eker, P. Lincoln, N. Mart\u00ed-Oliet, J. Meseguer y C. Talcott<br \/>\n<b>Libro:<\/b> All About Maude: A High-Performance Logical Framework<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Clavel, F. Dur\u00e1n, J. Hendrix, S. Lucas, J. Meseguer y P. Olveczky<br \/>\n<b>T\u00edtulo:<\/b> The Maude formal tool environment<br \/>\n<b>Libro:<\/b> Algebra and Coalgebra in Computer Science. Second International Conference, CALCO 2007, Proceedings<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4624<br \/>\n<b>P\u00e1ginas:<\/b> 173-178<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Clavel, J. Meseguer y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Reflection in membership equational logic, many-sorted equational logic, Horn logic with equality, and rewriting logic<br \/>\n<b>Revista:<\/b> Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 373(1-2)<br \/>\n<b>P\u00e1ginas:<\/b> 70-91<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> F. Dur\u00e1n, A. Riesco y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> A distributed implementation of Mobile Maude<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 176(4)<br \/>\n<b>P\u00e1ginas:<\/b> 113-131<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> S. Eker, N. Mart\u00ed-Oliet, J. Meseguer y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Deduction, strategies, and rewriting<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 174(11)<br \/>\n<b>P\u00e1ginas:<\/b> 3-25<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> I. F\u00e1bregas, M. Palomino y D. de Frutos Escrig<br \/>\n<b>T\u00edtulo:<\/b> Reflection and preservation of properties in coalgebraic (bi)simulations<br \/>\n<b>Libro:<\/b> ICTAC 2007 &#8211; Int. Coll. on Theoretical Aspects of Computing<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4711<br \/>\n<b>P\u00e1ginas:<\/b> 231-245<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, F. Rosa Velardo, C. Gregorio-Rodr\u00edguez<br \/>\n<b>T\u00edtulo:<\/b> New Bisimulation Semantics for Distributed Systems<br \/>\n<b>Libro:<\/b> FORTE 2007 &#8211; Formal Techniques for Networked and Distributed Systems<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4574<br \/>\n<b>P\u00e1ginas:<\/b> 143-159<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M.Hidalgo-Herrero, Alberto Verdejo, Y.Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> Using Maude and its strategies for defining a framework for analyzing Eden semantics<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 174(10)<br \/>\n<b>P\u00e1ginas:<\/b> 119-137<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> M. Hidalgo-Herrero, Y.Ortega-Mall\u00e9 y F.Rubio<br \/>\n<b>T\u00edtulo:<\/b> Comparing alternative evaluation strategies for stream-based parallel functional languages<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4449<br \/>\n<b>P\u00e1ginas:<\/b> 55-72<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> L. F. Llana-D\u00edaz, D. de Frutos-Escrig y M. N\u00fa\u00f1ez<br \/>\n<b>T\u00edtulo:<\/b> Testing Semantics for Urgent Timed Process Algebras<br \/>\n<b>Libro:<\/b> Real-Time Systems. Modeling, Design and Applications<br \/>\n<b>Serie:<\/b> Amast Series in Computing<br \/>\n<b>Volumen:<\/b> 8<br \/>\n<b>P\u00e1ginas:<\/b> 231-235<br \/>\n<b>Editorial:<\/b> World Scientific<\/p>\n<p><b>Autores:<\/b> N. Mart\u00ed-Oliet, M. Palomino y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Strategies and simulations in a semantic framework<br \/>\n<b>Revista:<\/b> Journal of Algorithms<br \/>\n<b>Volumen:<\/b> 62(3-4)<br \/>\n<b>P\u00e1ginas:<\/b> 95-116<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> C. Pareja Flores, J. Urquiza Fuentes y J. A. Vel\u00e1zquez Iturbide<br \/>\n<b>T\u00edtulo:<\/b> WinHIPE: An IDE for Functional Programming Based on Rewriting and Visualization<br \/>\n<b>Revista:<\/b> ACM SIGPLAN Notices<br \/>\n<b>Volumen:<\/b> 42,3<br \/>\n<b>P\u00e1ginas:<\/b> 14-23<br \/>\n<b>Editorial:<\/b> ACM Press<\/p>\n<p><b>Autores:<\/b> A. Riesco y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Distributed Applications Implemented in Maude with Parameterized Skeletons<br \/>\n<b>Libro:<\/b> FMOODS 2007 Proceedings<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4468<br \/>\n<b>P\u00e1ginas:<\/b> 91-106<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo<br \/>\n<b>T\u00edtulo:<\/b> Coding mobile synchronizing Petri nets into rewriting logic<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 174(1)<br \/>\n<b>P\u00e1ginas:<\/b> 83-98<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> F. Rosa Velardo<br \/>\n<b>T\u00edtulo:<\/b> Petri nets for the verification of ubiquitous systems with transient secure association<br \/>\n<b>Libro:<\/b> Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4611<br \/>\n<b>P\u00e1ginas:<\/b> 1148-1158<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa Velardo y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Name Creation vs. Replication in Petri Net Systems<br \/>\n<b>Libro:<\/b> ICATPN 2007 &#8211; 28th International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4546<br \/>\n<b>P\u00e1ginas:<\/b> 402-422<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo, D. de Frutos-Escrig y O. Marroqu\u00edn-Alonso<br \/>\n<b>T\u00edtulo:<\/b> On the Expressiveness of Mobile Synchronizing Petri Nets<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 180(1)<br \/>\n<b>P\u00e1ginas:<\/b> 77-94<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> J.-R. S\u00e1nchez-Couso y M.-I. Fern\u00e1ndez-Camacho<br \/>\n<b>T\u00edtulo:<\/b> Binary search trees, recurrent properties and wave equations<br \/>\n<b>Revista:<\/b> Fundamenta Informaticae<br \/>\n<b>Volumen:<\/b> 81(4)<br \/>\n<b>P\u00e1ginas:<\/b> 409-439<br \/>\n<b>Editorial:<\/b> IOS Press<\/p>\n<p><b>Autores:<\/b> C. Segura y C. Torrano<br \/>\n<b>T\u00edtulo:<\/b> Using Template Haskell for Abstract Interpretation<br \/>\n<b>Libro:<\/b> Proceedings of the 15th Workshop on Functional and (Constraint) Logic Programming (WFLP 2006)<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 177<br \/>\n<b>P\u00e1ginas:<\/b> 201-217<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> V. Silva y C. Lucena<br \/>\n<b>T\u00edtulo:<\/b> Modeling Multi-Agent Systems<br \/>\n<b>Revista:<\/b> Communications of the ACM<br \/>\n<b>Volumen:<\/b> 50(5)<br \/>\n<b>P\u00e1ginas:<\/b> 103-108<br \/>\n<b>Editorial:<\/b> ACM<\/p>\n<p><b>Autores:<\/b> G. Santos-Garc\u00eda y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Solving sudoku puzzles with rewriting rules<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 176(4)<br \/>\n<b>P\u00e1ginas:<\/b> 79-93<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<h3 id=\"2006\">2006<\/h3>\n<p><b>Autores:<\/b> C. Braga y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Modular SOS with Strategies<br \/>\n<b>Libro:<\/b> Proceedings of Structural Operational Semantics 2006, SOS 2006<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 175(1)<br \/>\n<b>P\u00e1ginas:<\/b> 3-17<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> F. Chalub y C. Braga<br \/>\n<b>T\u00edtulo:<\/b> Maude MSOS Tool<br \/>\n<b>Libro:<\/b> Proceedings of 6th International Workshop on Rewriting Logic and its Applications, WRLA 2006<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 176(4)<br \/>\n<b>P\u00e1ginas:<\/b> 133-146<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> M. Clavel, M. Palomino y A. Riesco<br \/>\n<b>T\u00edtulo:<\/b> Introducing the ITP Tool: a Tutorial<br \/>\n<b>Revista:<\/b> Journal of Universal Computer Science<br \/>\n<b>Volumen:<\/b> 12(11)<br \/>\n<b>P\u00e1ginas:<\/b> 1618-1650<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J.M. Cleva y I. Pita<br \/>\n<b>T\u00edtulo:<\/b> An approach to the verification of CRWL programs with rewriting logic<br \/>\n<b>Revista:<\/b> Journal of Universal Computer Science<br \/>\n<b>Volumen:<\/b> 12(11)<br \/>\n<b>P\u00e1ginas:<\/b> 1594-1617<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Egea y M. Clavel<br \/>\n<b>T\u00edtulo:<\/b> ITP\/OCL: A Rewriting-Based-Validation Tool Tool for UML+OCL Static Class Diagrams<br \/>\n<b>Libro:<\/b> Proceedings of 11th International Conference, AMAST2006<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 4019<br \/>\n<b>P\u00e1ginas:<\/b> 368-373<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. de Frutos Escrig, C.Gregorio Rodr\u00edguez<br \/>\n<b>T\u00edtulo:<\/b> Process Equivalences as Global Bisimulations<br \/>\n<b>Revista:<\/b> Journal of Universal Computer Science<br \/>\n<b>Volumen:<\/b> 12(11)<br \/>\n<b>P\u00e1ginas:<\/b> 1521-1550<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Hidalgo-Herrero, Y. Ortega-Mall\u00e9n y F. Rubio<br \/>\n<b>T\u00edtulo:<\/b> Analyzing the Influence of Mixed Evaluation on the Performance of Eden Skeletons<br \/>\n<b>Revista:<\/b> Parallel Computing<br \/>\n<b>Volumen:<\/b> 32(7-8)<br \/>\n<b>P\u00e1ginas:<\/b> 523-538<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> A comparison between two logical formalisms for rewriting<br \/>\n<b>Revista:<\/b> Theory and Practice of Logic Programming<br \/>\n<b>Volumen:<\/b> 7(1)<br \/>\n<b>Editorial:<\/b> Cambridge University Press<\/p>\n<p><b>Autores:<\/b> F. Rosa Velardo, O. Marroqu\u00edn Alonso y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems<br \/>\n<b>Revista:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 150 (1)<br \/>\n<b>P\u00e1ginas:<\/b> 103-126<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> F. Rosa Velardo, D. de Frutos-Escrig y O. Marroqu\u00edn Alonso<br \/>\n<b>T\u00edtulo:<\/b> Replicated Ubiquitous Nets<br \/>\n<b>Libro:<\/b> Computational Science and Its Applications &#8211; ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV ICCSA (4)<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 3983<br \/>\n<b>P\u00e1ginas:<\/b> 158-168<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa Velardo y D. de Frutos-Escrig<br \/>\n<b>T\u00edtulo:<\/b> Symbolic semantics for the verification of security properties of mobile Petri nets<br \/>\n<b>Libro:<\/b> Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis, ATVA&#8217;06<br \/>\n<b>Serie:<\/b> LNCS<br \/>\n<b>Volumen:<\/b> 4218<br \/>\n<b>P\u00e1ginas:<\/b> 461-476<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Rosa-Velardo, C. Segura y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Typed Mobile Ambients in Maude<br \/>\n<b>Libro:<\/b> Proceedings of the 6th International Workshop on Rule-Based Programming (RULE 2005)<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 147(1)<br \/>\n<b>P\u00e1ginas:<\/b> 135-161<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> J. R. S\u00e1nchez Couso y M. I. Fern\u00e1ndez Camacho<br \/>\n<b>T\u00edtulo:<\/b> Reductions in binary search trees<br \/>\n<b>Revista:<\/b> Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 355(3)<br \/>\n<b>P\u00e1ginas:<\/b> 327-353<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> J. Sardinha, R. Choren, V.Silva, R. Milidiu, y C. Lucena<br \/>\n<b>T\u00edtulo:<\/b> A Combined Specification Language and Development Framework for Agent-based Application Engineering<br \/>\n<b>Revista:<\/b> Journal of System and Software<br \/>\n<b>Volumen:<\/b> 79\/11<br \/>\n<b>P\u00e1ginas:<\/b> 1565-1577<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> A. Verdejo y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Executable structural operational semantics in Maude<br \/>\n<b>Revista:<\/b> Journal of Logic and Algebraic Programming<br \/>\n<b>Volumen:<\/b> 67<br \/>\n<b>P\u00e1ginas:<\/b> 226-293<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<h3 id=\"2005\">2005<\/h3>\n<p><b>Autores:<\/b> C. Braga y J. Meseguer<br \/>\n<b>T\u00edtulo:<\/b> Modular Rewriting Semantics in Practice<br \/>\n<b>Libro:<\/b> Proceedings of 5th International Workshop on Rewriting Logic and its Applications, WRLA 2004<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 117<br \/>\n<b>P\u00e1ginas:<\/b> 393-416<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, C. Gregorio Rodr\u00edguez<br \/>\n<b>T\u00edtulo:<\/b> Preserving Contexts for Soft Conformance Relation<br \/>\n<b>Libro:<\/b> Formal Approaches to Software Testing (FATES 2004)<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3395<br \/>\n<b>P\u00e1ginas:<\/b> 33\u201348<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, C. Gregorio Rodr\u00edguez<br \/>\n<b>T\u00edtulo:<\/b> Bisimulation Up-to for the Linear Time-Branching Time Spectrum<br \/>\n<b>Libro:<\/b> CONCUR 2005 &#8211; Concurrency Theory<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3653<br \/>\n<b>P\u00e1ginas:<\/b> 278-292<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> D. de Frutos-Escrig, O. Marroqu\u00edn Alonso, F. Rosa Velardo<br \/>\n<b>T\u00edtulo:<\/b> Ubiquitous Systems and Petri Nets<br \/>\n<b>Libro:<\/b> Computational Science and Applications &#8211; ICCSA 2005<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3481<br \/>\n<b>P\u00e1ginas:<\/b> 1156-1166<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> Dealing denotationally with streams-based communication<br \/>\n<b>Libro:<\/b> IV Jornadas sobre Programaci\u00f3n y Lenguajes, PROLE 2004<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 137<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> R. Loogen, Y. Ortega-Mall\u00e9n y R. Pe\u00f1a-Mar\u00ed<br \/>\n<b>T\u00edtulo:<\/b> Parallel Functional Programming in Eden<br \/>\n<b>Revista:<\/b> Journal of Functional Programming<br \/>\n<b>Volumen:<\/b> 15(3)<br \/>\n<b>P\u00e1ginas:<\/b> 431-475<br \/>\n<b>Editorial:<\/b> Cambridge University Press<\/p>\n<p><b>Autores:<\/b> N. Mart\u00ed-Oliet, J. Meseguer y A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Towards a strategy language for Maude<br \/>\n<b>Libro:<\/b> Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 117<br \/>\n<b>P\u00e1ginas:<\/b> 417-441<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> N. Mart\u00ed-Oliet, M. Palomino, and A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> A Tutorial on Specifying Data Structures in Maude<br \/>\n<b>Libro:<\/b> IV Jornadas sobre Programacion y Lenguajes, PROLE 2004<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 137<br \/>\n<b>P\u00e1ginas:<\/b> 105-132<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> N. Mart\u00ed-Oliet, I. Pita, J.L. Fiadeiro,J. Meseguer y T. Maibaum<br \/>\n<b>T\u00edtulo:<\/b> A Verification Logic for Rewriting Logic<br \/>\n<b>Revista:<\/b> Journal of Logic and Computation<br \/>\n<b>Volumen:<\/b> 15(3)<br \/>\n<b>P\u00e1ginas:<\/b> 317-352<br \/>\n<b>Editorial:<\/b> Oxford University Press<\/p>\n<p><b>Autores:<\/b> M. Palomino, N. Mart\u00ed-Oliet, and A. Verdejo<br \/>\n<b>T\u00edtulo:<\/b> Playing with Maude<br \/>\n<b>Libro:<\/b> Proceedings Fifth International Workshop on Rule-Based Programming. Proceedings<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 124(1)<br \/>\n<b>P\u00e1ginas:<\/b> 3-23<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> M. Palomino, J. Meseguer y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> A categorical approach to simulations<br \/>\n<b>Libro:<\/b> First International Conference, CALCO 2005, Swansea, UK, September 2005. Proceedings<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3629<br \/>\n<b>P\u00e1ginas:<\/b> 313-330<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> R. Pe\u00f1a y C. Segura<br \/>\n<b>T\u00edtulo:<\/b> Non-determinism analyses in a parallel-functional language<br \/>\n<b>Revista:<\/b> Journal of Functional Programming<br \/>\n<b>Volumen:<\/b> 15(1)<br \/>\n<b>P\u00e1ginas:<\/b> 67-100<br \/>\n<b>Editorial:<\/b> Cambridge University Press<\/p>\n<p><b>Autores:<\/b> I. Pita y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Proving modal properties of rewrite theories using Maude&#8217;s metalevel<br \/>\n<b>Libro:<\/b> IV Jornadas sobre Programaci\\&#8217;on y Lenguajes, PROLE 2004<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 137<br \/>\n<b>P\u00e1ginas:<\/b> 133-150<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> F. Rosa Velardo, D. de Frutos-Escrig, C. Segura D\u00edaz<br \/>\n<b>T\u00edtulo:<\/b> Tagged systems: a framework for the specification of history-dependent properties<br \/>\n<b>Libro:<\/b> Proc. Fourth Spanish Conference on Programming and Computer Languages (PROLE 2004)<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 137(1)<br \/>\n<b>P\u00e1ginas:<\/b> 151-174<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> V. Silva, R. Choren, y C. Lucena.<br \/>\n<b>T\u00edtulo:<\/b> Using the UML 2.0 Activity Diagram to Model Agent Plans and Actions<br \/>\n<b>Libro:<\/b> Proceeding of the fourth International Conference on Autonomous Agents and Multi-Agents Systems (AAMAS 2005)<br \/>\n<b>P\u00e1ginas:<\/b> 594-600<br \/>\n<b>Editorial:<\/b> ACM Press<\/p>\n<p><b>Autores:<\/b> A. Verdejo, N. Mart\u00ed-Oliet, T. Robles, J. Salvach\u00faa, L. Llana y M. Bradley<br \/>\n<b>T\u00edtulo:<\/b> Transforming information in RDF to rewriting logic<br \/>\n<b>Libro:<\/b> Formal Methods for Open Object-Based Distributed Systems: 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005. Proceedings<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3535<br \/>\n<b>P\u00e1ginas:<\/b> 227-242<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Verdejo y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Two case studies of semantics execution in Maude: CCS and LOTOS<br \/>\n<b>Revista:<\/b> Formal Methods in System Design<br \/>\n<b>Volumen:<\/b> 27<br \/>\n<b>P\u00e1ginas:<\/b> 113-172<br \/>\n<b>Editorial:<\/b> Kluwer (Springer)<\/p>\n<h3 id=\"2004\">2004<\/h3>\n<p><b>Autores:<\/b> D. Basin, M. Clavel y J. Meseguer<br \/>\n<b>T\u00edtulo:<\/b> Reflective metalogical frameworks<br \/>\n<b>Revista:<\/b> ACM Transactions on Computational Logic<br \/>\n<b>Volumen:<\/b> 5(3)<br \/>\n<b>Editorial:<\/b> ACM Press<\/p>\n<p><b>Autores:<\/b> M. Clavel, N. Mart\u00ed-Oliet y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Formalizing and proving semantic relations between specifications by reflection<br \/>\n<b>Libro:<\/b> Algebraic Methods and Software Technology, AMAST 2004, Stirling, UK<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3116<br \/>\n<b>P\u00e1ginas:<\/b> 72\u201386<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> F. Chalub y C. Braga<br \/>\n<b>T\u00edtulo:<\/b> A Modular Rewriting Semantics for CML<br \/>\n<b>Libro:<\/b> Proceedings of 8o. Simp\u00f3sio Brasileiro de Linguagens de Programa\u00e7\u00e3o, SBLP 2004<br \/>\n<b>Serie:<\/b> Journal of Universal Computer Science<br \/>\n<b>Volumen:<\/b> 10(7)<br \/>\n<b>P\u00e1ginas:<\/b> 789-807<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Garcia, C. Sant&#8217;anna, C. Chavez, V. Silva, A. Staa y C. Lucena.<br \/>\n<b>T\u00edtulo:<\/b> Separation of Concerns in Multi-Agent Systems: An Empirical Study<br \/>\n<b>Libro:<\/b> Software Engineering for Multi-Agent Systems II<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2940<br \/>\n<b>P\u00e1ginas:<\/b> 49-72<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> N. Mart\u00ed-Oliet, J. Meseguer y M. Palomino<br \/>\n<b>T\u00edtulo:<\/b> Theoroidal maps as algebraic simulations<br \/>\n<b>Libro:<\/b> Recent Trends in Algebraic Development Techniques, WADT&#8217;04, Barcelona, Spain<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3423<br \/>\n<b>P\u00e1ginas:<\/b> 126-143<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> R. Mart\u00ednez y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Building an interface between Eden and Maple: Towards a way of parallelizing computer algebra algorithms<br \/>\n<b>Libro:<\/b> Implementation of Functional Languages, IFL 2003<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> J. Meseguer y C. Braga<br \/>\n<b>T\u00edtulo:<\/b> Modular Rewriting Semantics of Programming Languages<br \/>\n<b>Libro:<\/b> Proceedings of the 10th International Conference of Algebraic Methodology and Software Technology, AMAST 2004<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 3116<br \/>\n<b>P\u00e1ginas:<\/b> 364-378<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> C. Segura y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Correctness of non-determininsm analyses in a parallel functional language<br \/>\n<b>Libro:<\/b> Implementation of Functional Languages, IFL 2003<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> V. Silva, R. Choren y C. Lucena.<br \/>\n<b>T\u00edtulo:<\/b> Using the MAS-ML to Model a Multi-Agent System<br \/>\n<b>Libro:<\/b> Software Engineering for Multi-Agent Systems II<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2940<br \/>\n<b>P\u00e1ginas:<\/b> 129-148<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> V. Silva, R. Choren y C. Lucena.<br \/>\n<b>T\u00edtulo:<\/b> A UML Based Approach for Modeling and Implementing Multi-Agent Systems<br \/>\n<b>Libro:<\/b> Proceeding of the Third International Conference on Autonomous Agents and Multi-Agents Systems (AAMAS 2004)<br \/>\n<b>P\u00e1ginas:<\/b> 914-921<br \/>\n<b>Editorial:<\/b> IEEE Computer Society<\/p>\n<p><b>Autores:<\/b> V. Silva y C. Lucena.<br \/>\n<b>T\u00edtulo:<\/b> From a Conceptual Framework for Agents and Objects to a Multi-Agent System Modeling Language<br \/>\n<b>Revista:<\/b> Journal of Autonomous Agents and Multi-Agent Systems<br \/>\n<b>Volumen:<\/b> 9 (1-2)<br \/>\n<b>P\u00e1ginas:<\/b> 145-189<br \/>\n<b>Editorial:<\/b> Kluwer Academic Publishers<\/p>\n<h3 id=\"2003\">2003<\/h3>\n<p><b>Autores:<\/b> C. Braga, E. Hermann Haeusler, J. Meseguer y P. D. Mosses<br \/>\n<b>T\u00edtulo:<\/b> Modular SOS to Rewriting Logic<br \/>\n<b>Libro:<\/b> Proceedings of 12th International Workshop on Logic Based Program Synthesis and Transformation, LOPSTR 2002<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2664<br \/>\n<b>P\u00e1ginas:<\/b> 262-277<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Clavel, F. Dur\u00e1n, S. Eker, P. Lincoln, N. Mart\u00ed-Oliet, J. Meseguer y C. Talcott<br \/>\n<b>T\u00edtulo:<\/b> The Maude 2.0 system<br \/>\n<b>Libro:<\/b> Rewriting Techniques and Applications, RTA 2003<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2706<br \/>\n<b>P\u00e1ginas:<\/b> 76\u201387<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. de la Encina y R. Pe\u00f1a<br \/>\n<b>T\u00edtulo:<\/b> Formally Deriving an STG Machine<br \/>\n<b>Libro:<\/b> Principles and Practice of Declarative Programming, PPDP&#8217;03<br \/>\n<b>P\u00e1ginas:<\/b> 102\u2013112<br \/>\n<b>Editorial:<\/b> ACM Press<\/p>\n<p><b>Autores:<\/b> D. de Frutos Escrig y O. Marroqu\u00edn Alonso<br \/>\n<b>T\u00edtulo:<\/b> Ambient Petri Nets<br \/>\n<b>Libro:<\/b> Foundations of Global Computing<br \/>\n<b>Serie:<\/b> Electronic Notes in Theoretical Computer Science<br \/>\n<b>Volumen:<\/b> 85.1<br \/>\n<b>P\u00e1ginas:<\/b> 27 p\u00e1ginas<br \/>\n<b>Editorial:<\/b> Elsevier<\/p>\n<p><b>Autores:<\/b> D. de Frutos Escrig y O. Marroqu\u00edn Alonso<br \/>\n<b>T\u00edtulo:<\/b> Replicated Ambient Petri Nets<br \/>\n<b>Libro:<\/b> Computational Science \u2013 ICCS 2003, Part II<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2658<br \/>\n<b>P\u00e1ginas:<\/b> 774\u2013783<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> M. Hidalgo-Herrero y Y. Ortega-Mall\u00e9n<br \/>\n<b>T\u00edtulo:<\/b> Continuation semantics for parallel Haskell dialects<br \/>\n<b>Libro:<\/b> Programming Languages and Systems, APLAS 2003<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2895<br \/>\n<b>P\u00e1ginas:<\/b> 303\u2013321<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> H,-W. Loidl, F. Rubio, N. Scaife, K. Hammond, S. Horiguchi, U. Klusik, R. Loogen, G. J. Michaelson, R. Pe\u00f1a, A. J. Reb\u00f3n Portillo, S. Priebe, P. Trinder<br \/>\n<b>T\u00edtulo:<\/b> Comparing Parallel Functional Languages: Programming and Performance<br \/>\n<b>Revista:<\/b> Higher-Order and Symbolic Computation<br \/>\n<b>Volumen:<\/b> 16(3)<br \/>\n<b>P\u00e1ginas:<\/b> 203\u00ac\u2013251<br \/>\n<b>Editorial:<\/b> Kluwer<\/p>\n<p><b>Autores:<\/b> J. Meseguer, M. Palomino y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Equational abstractions<br \/>\n<b>Libro:<\/b> Automated Deduction &#8211; CADE-19<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2741<br \/>\n<b>P\u00e1ginas:<\/b> 2\u201316<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> V. Silva, A. Garcia, A. Brandao, C. Chavez, C. Lucena y P. Alencar.<br \/>\n<b>T\u00edtulo:<\/b> Taming Agents and Objects in Software Engineering<br \/>\n<b>Libro:<\/b> Software Engineering for Multi-Agent Systems<br \/>\n<b>Serie:<\/b> Lecture Notes in Computer Science<br \/>\n<b>Volumen:<\/b> 2603<br \/>\n<b>P\u00e1ginas:<\/b> 1-26<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n<p><b>Autores:<\/b> A. Verdejo, I. Pita y N. Mart\u00ed-Oliet<br \/>\n<b>T\u00edtulo:<\/b> Specification and verification of the tree identify protocol of IEEE 1394 in rewriting logic<br \/>\n<b>Revista:<\/b> Formal Aspects of Computing<br \/>\n<b>Volumen:<\/b> 14(3)<br \/>\n<b>P\u00e1ginas:<\/b> 228\u2013246<br \/>\n<b>Editorial:<\/b> Springer<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Publicaciones del a\u00f1o: M\u00e1s recientes &#8211; 2013 &#8211; 2012 &#8211; 2011 &#8211; 2010 &#8211; 2009 &#8211; 2008 &#8211; 2007 &#8211; 2006 &#8211; 2005 &#8211; 2004 &#8211; 2003 2013 Autores: L. Aceto, D. de Frutos-Escrig, C. Gregorio-Rodriguez y A. Ing\u00f3lfsd\u00f3ttir T\u00edtulo: Axiomatizing weak simulations semantics over BCCSP Revista: Theoretical Computer Science Volumen: 537 P\u00e1ginas: 42-71 Editorial: &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/maude.ucm.es\/fadoss\/seleccion-de-publicaciones\/\" class=\"more-link\">Continuar leyendo<span class=\"screen-reader-text\"> \u00abSelecci\u00f3n de publicaciones\u00bb<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-55","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/pages\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":5,"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/pages\/55\/revisions"}],"predecessor-version":[{"id":205,"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/pages\/55\/revisions\/205"}],"wp:attachment":[{"href":"https:\/\/maude.ucm.es\/fadoss\/wp-json\/wp\/v2\/media?parent=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}