Abstract is missing.
- José Meseguer: Scientist and Friend ExtraordinaireNarciso Martí-Oliet, Peter Csaba Ölveczky, Carolyn L. Talcott. 1-47 [doi]
- Sentence-Normalized Conditional Narrowing Modulo in Rewriting Logic and MaudeLuis Aguirre, Narciso Martí-Oliet, Miguel Palomino, Isabel Pita. 48-71 [doi]
- Combining Runtime Checking and Slicing to Improve Maude Error DiagnosisMaría Alpuente, Demis Ballis, Francisco Frechina, Julia Sapiña. 72-96 [doi]
- Computer Modeling in Neuroscience: From Imperative to Declarative Programming - Maude Modeling in NeuroscienceThomas J. Anastasio. 97-113 [doi]
- Hybrid Multirate PALSKyungmin Bae, Peter Csaba Ölveczky. 114-134 [doi]
- Debits and Credits in Petri Nets and Linear LogicMassimo Bartoletti, Pierpaolo Degano, Paolo Di Giamberardino, Roberto Zunino. 135-159 [doi]
- Alice and Bob Meet Equational TheoriesDavid A. Basin, Michel Keller, Sasa Radomirovic, Ralf Sasse. 160-180 [doi]
- On First-Order Model-Based ReasoningMaria Paola Bonacina, Ulrich Furbach, Viorica Sofronie-Stokkermans. 181-204 [doi]
- A Normal Form for Stateful ConnectorsRoberto Bruni, Hernán C. Melgratti, Ugo Montanari. 205-227 [doi]
- Enlightening Ph.D. Students with the Elegance of Logic - My Personal Memory About Prof. José MeseguerShuo Chen. 228-231 [doi]
- Two Decades of MaudeManuel Clavel, Francisco Durán, Steven Eker, Santiago Escobar, Patrick Lincoln, Narciso Martí-Oliet, Carolyn L. Talcott. 232-254 [doi]
- Formal UniversesErwin Engeler. 255-263 [doi]
- When Is a Formula a Loop Invariant?Stephan Falke 0001, Deepak Kapur. 264-286 [doi]
- Generic Proof Scores for Generate & Check Method in CafeOBJKokichi Futatsugi. 287-310 [doi]
- Function Calls at Frozen Positions in Termination of Context-Sensitive RewritingRaúl Gutiérrez, Salvador Lucas. 311-330 [doi]
- Model-Checking Helena Ensembles with SpinRolf Hennicker, Annabelle Klarl, Martin Wirsing. 331-360 [doi]
- Modularity of Ontologies in an Arbitrary InstitutionYazmin Angélica Ibáñez-García, Till Mossakowski, Donald Sannella, Andrzej Tarlecki. 361-379 [doi]
- Rewriting Strategies and Strategic Rewrite ProgramsHélène Kirchner. 380-403 [doi]
- Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip HardwareMichael LeMay, Carl A. Gunter. 404-426 [doi]
- Discretionary Information Flow Control for Interaction-Oriented SpecificationsAlberto Lluch-Lafuente, Flemming Nielson, Hanne Riis Nielson. 427-450 [doi]
- Verifying Reachability-Logic Properties on Rewriting-Logic SpecificationsDorel Lucanu, Vlad Rusu, Andrei Arusoaie, David Nowak. 451-474 [doi]
- Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterCatherine Meadows. 475-492 [doi]
- A Denotational Semantic Theory of Concurrent SystemsJayadev Misra. 493-518 [doi]
- Weak Bisimulation as a Congruence in MSOSPeter D. Mosses, Ferdinand Vesely. 519-538 [doi]
- Satisfiability of Constraint Specifications on XML DocumentsMarisa Navarro, Fernando Orejas, Elvira Pino. 539-561 [doi]
- Algebraic Reinforcement Learning - Hypothesis Induction for Relational Reinforcement Learning Using Term GeneralizationStefanie Neubert, Lenz Belzner, Martin Wirsing. 562-579 [doi]
- The Formal System of Dijkstra and ScholtenCamilo Rocha. 580-597 [doi]
- From Rewriting Logic, to Programming Language Semantics, to Program VerificationGrigore Rosu. 598-616 [doi]
- ICEMAN: A Practical Architecture for Situational Awareness at the Network EdgeSamuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves. 617-631 [doi]