Abstract is missing.
- Analysis of Recursive Probabilistic ModelsMihalis Yannakakis. 1-5 [doi]
- Verification Challenges and Opportunities in the New Era of Microprocessor DesignJin Yang. 6-7 [doi]
- Automated Abstraction of SoftwareThomas Ball. 8 [doi]
- Symmetry Reduction for Probabilistic Model Checking Using Generic RepresentativesAlastair F. Donaldson, Alice Miller. 9-23 [doi]
- Eager Markov ChainsParosh Aziz Abdulla, Noomene Ben Henda, Richard Mayr, Sven Sandberg. 24-38 [doi]
- A Probabilistic Learning Approach for Counterexample Guided Abstraction RefinementFei He, Xiaoyu Song, Ming Gu, Jia-Guang Sun. 39-50 [doi]
- A Fine-Grained Fullness-Guided Chaining Heuristic for Symbolic Reachability AnalysisMing-Ying Chung, Gianfranco Ciardo, Andy Jinqing Yu. 51-66 [doi]
- Model Checking Timed Systems with UrgenciesPao-Ann Hsiung, Shang-Wei Lin, Yean-Ru Chen, Chun-Hsian Huang, Jia-Jen Yeh, Hong-Yu Sun, Chao-Sheng Lin, Hsiao-Win Liao. 67-81 [doi]
- Whodunit? Causal Analysis for CounterexamplesChao Wang, Zijiang Yang, Franjo Ivancic, Aarti Gupta. 82-95 [doi]
- On the Membership Problem for Visibly Pushdown LanguagesSalvatore La Torre, Margherita Napoli, Mimmo Parente. 96-109 [doi]
- On the Construction of Fine Automata for Safety PropertiesOrna Kupferman, Robby Lampert. 110-124 [doi]
- On the Succinctness of NondeterminismBenjamin Aminof, Orna Kupferman. 125-140 [doi]
- Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate ChainsDejvuth Suwimonteerabuth, Stefan Schwoon, Javier Esparza. 141-153 [doi]
- Compositional Reasoning for Hardware/Software Co-verificationFei Xie, Guowu Yang, Xiaoyu Song. 154-169 [doi]
- Learning-Based Symbolic Assume-Guarantee Reasoning with Automatic DecompositionWonhong Nam, Rajeev Alur. 170-185 [doi]
- On the Satisfiability of Modular Arithmetic FormulaeBow-Yaw Wang. 186-199 [doi]
- Selective Approaches for Solving Weak GamesMalte Helmert, Robert Mattmüller, Sven Schewe. 200-214 [doi]
- Controller Synthesis and Ordinal AutomataThierry Cachat. 215-228 [doi]
- Effective Contraction of Timed STGs for Decomposition Based Timed Circuit SynthesisTomohiro Yoneda, Chris J. Myers. 229-244 [doi]
- Synthesis for Probabilistic EnvironmentsSven Schewe. 245-259 [doi]
- Branching-Time Property Preservation Between Real-Time SystemsJinfeng Huang, Marc Geilen, Jeroen Voeten, Henk Corporaal. 260-275 [doi]
- Automatic Verification of Hybrid Systems with Large Discrete State SpaceWerner Damm, Stefan Disch, Hardi Hungar, Jun Pang, Florian Pigorsch, Christoph Scholl, Uwe Waldmann, Boris Wirtz. 276-291 [doi]
- Timed Unfoldings for Networks of Timed AutomataPatricia Bouyer, Serge Haddad, Pierre-Alain Reynier. 292-306 [doi]
- Symbolic Unfoldings for Networks of Timed AutomataFranck Cassez, Thomas Chatain, Claude Jard. 307-321 [doi]
- Ranked Predicate Abstraction for Branching Time: Complete, Incremental, and PreciseHarald Fecher, Michael Huth. 322-336 [doi]
- Timed Temporal Logics for Abstracting Transient StatesHouda Bel Mokadem, Béatrice Bérard, Patricia Bouyer, François Laroussinie. 337-351 [doi]
- Predicate Abstraction of Programs with Non-linear ComputationSongtao Xia, Ben Di Vito, César Muñoz. 352-368 [doi]
- A Fresh Look at Testing for Asynchronous CommunicationPuneet Bhateja, Paul Gastin, Madhavan Mukund. 369-383 [doi]
- Proactive Leader Election in Asynchronous Shared Memory SystemsM. C. Dharmadeep, K. Gopinath. 384-398 [doi]
- A Semantic Framework for Test CoverageLaura Brandán Briones, Ed Brinksma, Mariëlle Stoelinga. 399-414 [doi]
- Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong ProtocolsGiorgio Delzanno, Javier Esparza, Jirí Srba. 415-429 [doi]
- Analyzing Security Protocols in Hierarchical NetworksYe Zhang 0002, Hanne Riis Nielson. 430-445 [doi]
- Functional Analysis of a Real-Time Protocol for Networked Control SystemsColin J. Fidge, Yu-Chu Tian. 446-460 [doi]
- Symbolic Semantics for the Verification of Security Properties of Mobile Petri NetsFernando Rosa Velardo, David de Frutos-Escrig. 461-476 [doi]
- Sigref- A Symbolic Bisimulation Tool BoxRalf Wimmer, Marc Herbstritt, Holger Hermanns, Kelley Strampp, Bernd Becker. 477-492 [doi]
- Towards a Model-Checker for Counter SystemsStéphane Demri, Alain Finkel, Valentin Goranko, Govert van Drimmelen. 493-507 [doi]
- The Implementation of Mazurkiewicz Traces in POEMPeter Niebert, Hongyang Qu. 508-522 [doi]
- Model-Based Tool-Chain Infrastructure for Automated Analysis of Embedded SystemsHang Su, Graham Hemingway, Kai Chen, T. John Koo. 523-537 [doi]