default search action
Constance L. Heitmeyer
Person information
- affiliation: Naval Research Laboratory, Washington, DC, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j20]Stefania Gnesi, Ana Cavalcanti, John S. Fitzgerald, Constance L. Heitmeyer:
Editorial. Formal Aspects Comput. 31(2): 131-132 (2019) - 2017
- [c60]Elizabeth I. Leonard, Myla M. Archer, Constance L. Heitmeyer:
Property templates for checking source code security. MEMOCODE 2017: 87-90 - [p2]Constance L. Heitmeyer, Elizabeth I. Leonard, Myla M. Archer:
Computing the Next-State Function of a Requirements Model. Dependable Software Systems Engineering 2017: 44-59 - 2016
- [e1]John S. Fitzgerald, Constance L. Heitmeyer, Stefania Gnesi, Anna Philippou:
FM 2016: Formal Methods - 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings. Lecture Notes in Computer Science 9995, 2016, ISBN 978-3-319-48988-9 [contents] - 2015
- [j19]Constance L. Heitmeyer, Marc Pickett, Elizabeth I. Leonard, Myla M. Archer, Indrakshi Ray, David W. Aha, J. Gregory Trafton:
Building high assurance human-centric decision systems. Autom. Softw. Eng. 22(2): 159-197 (2015) - [c59]Constance L. Heitmeyer, Elizabeth I. Leonard:
Obtaining Trust in Autonomous Systems: Tools for Formal Model Synthesis and Validation. FormaliSE@ICSE 2015: 54-60 - 2014
- [i1]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [c58]Constance L. Heitmeyer, Sandeep K. Shukla, Myla M. Archer, Elizabeth I. Leonard:
On Model-Based Software Development. Perspectives on the Future of Software Engineering 2013: 49-60 - [c57]Myla Archer, Elizabeth I. Leonard, Constance L. Heitmeyer:
Idea: Writing Secure C Programs with SecProve. ESSoS 2013: 171-180 - [c56]Constance L. Heitmeyer, Marc Pickett, Len Breslow, David W. Aha, J. Greg Trafton, Elizabeth I. Leonard:
High assurance human-centric decision systems. RAISE@ICSE 2013: 35-41 - 2012
- [c55]Elizabeth I. Leonard, Myla Archer, Constance L. Heitmeyer, Ralph D. Jeffords:
Direct generation of invariants for reactive models. MEMOCODE 2012: 119-130 - 2011
- [p1]Constance L. Heitmeyer:
Requirements Models for Critical Systems. Software and Systems Safety - Specification and Verification 2011: 158-181 - 2010
- [j18]Ralph D. Jeffords, Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard:
Model-based construction and verification of critical systems using composition and partial refinement. Formal Methods Syst. Des. 37(2-3): 265-294 (2010) - [c54]Constance L. Heitmeyer:
A Model-Based Approach to Testing Software for Critical Behavior and Properties. ICTSS 2010: 15
2000 – 2009
- 2009
- [c53]Ralph D. Jeffords, Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard:
A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition. FM 2009: 173-189 - 2008
- [j17]Tevfik Bultan, Constance L. Heitmeyer:
Applying infinite state model checking and other analysis techniques to tabular requirements specifications of safety-critical systems. Des. Autom. Embed. Syst. 12(1-2): 97-137 (2008) - [j16]Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John McLean:
Applying Formal Methods to a Certifiably Secure Software System. IEEE Trans. Software Eng. 34(1): 82-98 (2008) - [c52]Constance L. Heitmeyer:
On the Role of Formal Methods in Software Certification: An Experience Report. SafeCert@ETAPS 2008: 3-9 - 2007
- [j15]Constance L. Heitmeyer, Jean-Pierre Talpin:
Guest editorial. Formal Methods Syst. Des. 30(1): 1-3 (2007) - [j14]Constance L. Heitmeyer:
Formal Methods for Specifying, Validating, and Verifying Requirements. J. Univers. Comput. Sci. 13(5): 607-618 (2007) - [c51]Constance L. Heitmeyer, Ralph D. Jeffords, Ramesh Bharadwaj, Myla Archer:
RE Theory Meets Software Practice: Lessons from the Software Development Trenches. RE 2007: 265-268 - [c50]Constance L. Heitmeyer:
On the Utility of Formal Methods in the Development and Certification of Software. TPHOLs 2007: 1-2 - 2006
- [c49]Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean:
Formal specification and verification of data separation in a separation kernel for an embedded system. CCS 2006: 346-355 - [c48]Tom Rothamel, Yanhong A. Liu, Constance L. Heitmeyer, Elizabeth I. Leonard:
Generating optimized code from SCR specifications. LCTES 2006: 135-144 - [c47]Tevfik Bultan, Constance L. Heitmeyer:
Analyzing tabular requirements specifications using infinite state model checking. MEMOCODE 2006: 7-16 - 2005
- [j13]Constance L. Heitmeyer, Myla Archer, Ramesh Bharadwaj, Ralph D. Jeffords:
Tools for constructing requirements specifications: the SCR Toolset at the age of nine. Comput. Syst. Sci. Eng. 20(1) (2005) - [j12]James Robertson, Connie Heitmeyer:
Point/Counterpoint. IEEE Softw. 22(1): 48-51 (2005) - [c46]Constance L. Heitmeyer:
Developing High Quality Software with Formal Methods: What Else Is Needed? FORTE 2005: 13-19 - [c45]Constance L. Heitmeyer:
A Panacea or Academic Poppycock: Formal Methods Revisited. HASE 2005: 3-7 - [c44]Constance L. Heitmeyer, Klaus Pohl:
Introduction to the experience reports track. ICSE 2005: 480 - [c43]Tevfik Bultan, Constance L. Heitmeyer, John O'Leary:
Panel on design for verification. MEMOCODE 2005: 232-235 - 2004
- [c42]Sandeep K. Shukla, Tevfik Bultan, Constance L. Heitmeyer:
Panel: given that hardware verification has been an uphill battle, what is the future of software verification? MEMOCODE 2004: 157-158 - [c41]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84 - [c40]Constance L. Heitmeyer:
Managing Complexity in Software Development with Formally Based Tools. FESCA@ETAPS 2004: 11-19 - 2003
- [j11]Elizabeth I. Leonard, Constance L. Heitmeyer:
Program Synthesis from Formal Requirements Specifications Using APTS. High. Order Symb. Comput. 16(1-2): 63-92 (2003) - [c39]Martin S. Feather, Allen P. Nikora, Constance L. Heitmeyer, Nancy R. Mead:
ICSE 2003 Workshop on Software Engineering for High Assurance Systems: Synergies between Process, Product, and Profiling (SEHAS 2003). ICSE 2003: 787-788 - [c38]Constance L. Heitmeyer:
Developing High Assurance Systems: On the Role of Software Tools. SAFECOMP 2003: 159-164 - [c37]Ralph D. Jeffords, Constance L. Heitmeyer:
A strategy for efficiently verifying requirements. ESEC / SIGSOFT FSE 2003: 28-37 - 2002
- [j10]Myla Archer, Constance L. Heitmeyer, Elvinia Riccobene:
Proving Invariants of I/O Automata with TAME. Autom. Softw. Eng. 9(3): 201-232 (2002) - [j9]Hermann Kaindl, Sjaak Brinkkemper, Janis A. Bubenko Jr., Barbara Farbey, Sol J. Greenspan, Constance L. Heitmeyer, Julio César Sampaio do Prado Leite, Nancy R. Mead, John Mylopoulos, Jawed I. A. Siddiqi:
Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda. Requir. Eng. 7(3): 113-123 (2002) - 2001
- [c36]Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:
A Security Model for Military Message Systems: Retrospective. ACSAC 2001: 174-190 - [c35]Constance L. Heitmeyer:
Applying Practical Formal Methods to the Specification and Analysis of Security Properties. MMM-ACNS 2001: 84-89 - [c34]Ralph D. Jeffords, Constance L. Heitmeyer:
An Algorithm for Strengthening State Invariants Generated from Requirements Specifications. RE 2001: 182-193 - 2000
- [j8]Constance L. Heitmeyer, Ramesh Bharadwaj:
Applying the SCR Requirements Method to the Light Control Case Study. J. Univers. Comput. Sci. 6(7): 650-678 (2000) - [j7]Monica Brockmeyer, Farnam Jahanian, Constance L. Heitmeyer, Elly Winner:
A Flexible, Extensible Simulation Environment for Testing Real-Time Specifications. IEEE Trans. Computers 49(11): 1184-1201 (2000) - [c33]Michael G. Hinchey, James A. Hendler, Charles Pecheur, Constance L. Heitmeyer, Diana F. Gordon, Michael Luck, Walt Truszkowski:
Panel Discussion: Future Directions. FAABS 2000: 354-368 - [c32]Myla Archer, Constance L. Heitmeyer, Elvinia Riccobene:
Using TAME to prove invariants of automata models: Two case studies. FMSP 2000: 25-36 - [c31]Constance L. Heitmeyer:
Transferring Research Results in Requirements to Practice: Obstacles and Incentives. ICRE 2000: 71-72
1990 – 1999
- 1999
- [j6]Ramesh Bharadwaj, Constance L. Heitmeyer:
Model Checking Complete Requirements Specifications Using Abstraction. Autom. Softw. Eng. 6(1): 37-68 (1999) - [c30]James Kirby, Myla Archer, Constance L. Heitmeyer:
SCR: A Practical Approach to Building a High Assurance COMSEC System. ACSAC 1999: 109-118 - [c29]Angelo Gargantini, Constance L. Heitmeyer:
Using Model Checking to Generate Tests from Requirements Specifications. ESEC / SIGSOFT FSE 1999: 146-162 - [c28]James Kirby Jr., Myla Archer, Constance L. Heitmeyer:
Applying Formal Methods to an Information Security Device: An Experience Report. HASE 1999: 81-88 - [c27]Constance L. Heitmeyer:
Formal Methods for Developing Software Specifications: Paths to Wider Usage. PDPTA 1999: 1047-1053 - [c26]Constance L. Heitmeyer, Philip Morris:
Increasing the Role of RE in the Development of Dependable Systems. RE 1999: 191- - 1998
- [j5]Constance L. Heitmeyer, James Kirby, Bruce G. Labaw, Myla Archer, Ramesh Bharadwaj:
Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications. IEEE Trans. Software Eng. 24(11): 927-948 (1998) - [c25]Constance L. Heitmeyer, James Kirby, Bruce G. Labaw, Ramesh Bharadwaj:
SCR*: A Toolset for Specifying and Analyzing Software Requirements. CAV 1998: 526-531 - [c24]Constance L. Heitmeyer, James Kirby, Bruce G. Labaw:
Applying the SCR requirements method to a weapons control panel: an experience report. FMSP 1998: 92-102 - [c23]Constance L. Heitmeyer:
On the Need for Practical Formal Methods. FTRTFT 1998: 18-26 - [c22]Ralph D. Jeffords, Constance L. Heitmeyer:
Automatic Generation of State Invariants from Requirements Specifications. SIGSOFT FSE 1998: 56-69 - [c21]Constance L. Heitmeyer:
Using the SCR* Toolset to Specify Software Requirements. WIFT 1998: 12- - [c20]Mats Per Erik Heimdahl, Constance L. Heitmeyer:
Formal Methods For Developing High Assurance Computer Systems: Working Group Report. WIFT 1998: 60- - 1997
- [c19]Monica Brockmeyer, Farnam Jahanian, Elly Winner, Constance L. Heitmeyer, Bruce G. Labaw:
A. Software Environment for Custom Simulation and Monitoring of Real-Time Specifications. HASE 1997: 78-84 - [c18]Myla Archer, Constance L. Heitmeyer:
Verifying Hybrid Systems Modeled as Timed Automata: A Case Study. HART 1997: 171-185 - [c17]Constance L. Heitmeyer, James Kirby, Bruce G. Labaw:
The SCR Method for Formally Specifying, Verifying, and Validating Requirements: Tool Support. ICSE 1997: 610-611 - [c16]Stuart R. Faulk, Constance L. Heitmeyer:
Rigorous Requirements for Real-Time Systems: Evolution and Application of the SCR Method (Tutorial). ICSE 1997: 637-638 - [c15]Stuart R. Faulk, Constance L. Heitmeyer:
The SCR Approach to Requirements Specification and Analysis. RE 1997: 263 - [c14]Monica Brockmeyer, Farnam Jahanian, Constance L. Heitmeyer, Bruce G. Labaw:
A Flexible, Extensible Simulation Environment for Testing Real-Time Specifications. IEEE Real Time Technology and Applications Symposium 1997: 125-135 - [c13]Myla Archer, Constance L. Heitmeyer:
Human-Style Theorem Proving Using PVS. TPHOLs 1997: 33-48 - [c12]Constance L. Heitmeyer:
Formal Methods: A Panacea or Academic Poppycock? ZUM 1997: 3-9 - 1996
- [j4]Constance L. Heitmeyer, Ralph D. Jeffords, Bruce G. Labaw:
Automated Consistency Checking of Requirements Specifications. ACM Trans. Softw. Eng. Methodol. 5(3): 231-261 (1996) - [c11]Myla Archer, Constance L. Heitmeyer:
Mechanical verification of timed automata: a case study. IEEE Real Time Technology and Applications Symposium 1996: 192-203 - 1995
- [c10]Constance L. Heitmeyer:
Requirements Specifications for Hybrid Systems. Hybrid Systems 1995: 304-314 - [c9]Aloysius K. Mok, Constance L. Heitmeyer, Kevin Jeffay, Michael B. Jones, C. Douglass Locke, Ragunathan Rajkumar:
Future Distributed Embedded and Real-Time Applications Will Be Adaptive: Meanings, Challenges and Research Paradigms (Panel). ICDCS 1995: 182-184 - [c8]Constance L. Heitmeyer, Bruce G. Labaw, Daniel L. Kiskis:
Consistency checking of SCR-style requirements specifications. RE 1995: 56-65 - 1994
- [c7]Constance L. Heitmeyer, Nancy A. Lynch:
The Generalized Railroad Crossing: A Case Study in Formal Verification of Real-Time Systems. RTSS 1994: 120-131 - 1993
- [c6]Paul C. Clements, Constance L. Heitmeyer, Bruce G. Labaw, A. T. Rose:
MT: A Toolset for Specifying and Analyzing Real-Time Systems. RTSS 1993: 12-22 - 1992
- [c5]James A. Ballas, Constance L. Heitmeyer, Manuel A. Pérez-Quiñones:
Evaluating Two Aspects of Direct Manipulation in Advanced Cockpits. CHI 1992: 127-134 - [c4]Constance L. Heitmeyer:
A Toolset for Developing Real-Time Systems. NATO ASI RTC 1992: 517-518 - [c3]Constance L. Heitmeyer:
What is the Right Specification/Design/Implementation Paradigm for Real-Time Applications? NATO ASI RTC 1992: 608-609
1980 – 1989
- 1984
- [j3]Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:
A Security Model for Military Message Systems. ACM Trans. Comput. Syst. 2(3): 198-222 (1984) - [c2]John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model. S&P 1984: 188-194 - 1983
- [j2]Constance L. Heitmeyer, John D. McLean:
Abstract Requirements Specification: A New Approach and Its Application. IEEE Trans. Software Eng. 9(5): 580-589 (1983) - 1982
- [c1]Connie Heitmeyer, Carl E. Landwehr, M. Cornwell:
The use of quick prototypes in the secure military message systems project. Rapid Prototyping 1982: 85-87 - 1980
- [j1]Constance L. Heitmeyer, Stanley H. Wilson:
Military Message Systems: Current Status and Future Directions. IEEE Trans. Commun. 28(9): 1645-1654 (1980)
Coauthor Index
aka: Myla M. Archer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint