_id,doi,title
13143,10.1007/978-3-031-31368-4_19,Certifying giant nonprimes
13236,10.1007/978-3-031-32726-1_32,"Multiplicative auction algorithm for approximate maximum weight bipartite matching"
13238,10.1007/978-3-031-32733-9_26,"Weighted packet selection for rechargeable links in cryptocurrency networks: Complexity and approximation"
13310,10.1007/978-3-031-37703-7_17,Monitoring algorithmic fairness
14259,10.1007/978-3-031-37706-8_20,"Guessing winning policies in LTL synthesis by semantic learning"
14260,10.1007/978-3-031-37706-8_8,"Lincheck: A practical framework for testing concurrent data structures on JVM"
12467,10.1007/978-3-031-30829-1_17,Quantitative safety and liveness
12854,10.1007/978-3-031-30820-8_32,Bubaak: Runtime monitoring of program verifiers
12856,10.1007/978-3-031-30826-0_15,Vamos: Middleware for best-effort third-party monitoring
10891,10.1007/978-3-030-95561-8_1,Quantitative monitoring of software
11185,10.1007/978-3-030-96731-4_31,Approximating the bundled crossing number
11355,10.1007/978-3-030-99429-7_1,Information-flow interfaces
11429,10.1007/978-3-031-06245-2,Web and Wireless Geographical Information Systems
11476,10.1007/978-3-031-07085-3_28,CoCoA: Concurrent continuous group key agreement
11707,10.1007/978-3-031-09993-9_1,Local mending
11775,10.1007/978-3-031-17196-3_11,Abstract monitors for quantitative specifications
12000,10.1007/978-3-031-13185-1_4,"Sound and complete certificates for auantitative termination analysis of probabilistic programs"
12167,10.1007/978-3-031-18283-9_17,"Hide & Seek: Privacy-preserving rebalancing on payment channel networks"
12168,10.1007/978-3-031-18283-9_13,"Be aware of your leaders"
12170,10.1007/978-3-031-19992-9_20,"PET – A partial exploration tool for probabilistic verification"
