Abstract is missing.
- Erroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their ReductionJohn C. Knight. 3-4
- Keynote SpeakerArnold W. Pittler. 4
- Why Testing under Expected Operational Scenarios is Not SufficientJeffrey M. Voas. 5
- Software Dependability in Distributed and Mobile Computing EnvironmentsAllen P. Nikora, Raphael R. Some, Jeffrey M. Voas, Victor L. Winter, Jie Xu. 7-10
- A Formal Testing Framework for UML Statechart Diagrams Behaviours: From Theory to Automatic VerificationDiego Latella, Mieke Massink. 11-22
- Test-Sequence Generation from Formal Requirement ModelsSanjai Rayadurgam, Mats Per Erik Heimdahl. 23-31
- Model-Checking for Validation of a Fault Protection SystemMartin S. Feather, Stephen Fickas, N.-A. Razermera-Mamy. 32-41
- Finite-State Analysis of the CAN Bus ProtocolM. J. P. van Osch, Scott A. Smolka. 42
- A Survey: Applying Formal Methods to a Software Intensive SystemAdriaan de Groot, Jozef Hooman, Fabrice Kordon, Emmanuel Paviot-Adet, Isabelle Vernier-Mounier, Michel Lemoine, Gervais Gaudiére, Victor L. Winter, Deepak Kapur. 55-64
- Highly Reliable Relational Control Programs for Robust Rapid Transit SystemsFarokh B. Bastani, I-Ling Yen, Sung Kim. 65-74
- Mechanisms for a Reliable Cooperation of VehiclesEdgar Nett, Martin Gergeleit, Michael Mock. 75-81
- Verification of Assurance of Space On-Board Distributed Computer SystemHiroyuki Yashiro, Yoshirou Takahashi, Teruo Fujiwara. 82
- Framework for Testing the Fault-Tolerance of Systems Including OS and Network AspectsKerstin Buchacker, Volkmar Sieh. 95-105
- A Test Management and Software Visualization Framework for Heterogeneous Distributed ApplicationsSudipto Ghosh, Nishant Bawa, Gerald Craig, Ketaki Kalgaonkar. 106-116
- Automating Techniques for Inspecting High Assurance SystemsM. S. Fisher, Bojan Cukic. 117-126
- Genetic Programming Model for Software Quality ClassificationYi Liu, Taghi M. Khoshgoftaar. 127
- An Unavailability Analysis of Firewall Sandwich ConfigurationsSteve Goddard, Roger M. Kieckhafer, Y. Zhang. 139-148
- Analyzing Internet Security ProtocolsAlec Yasinsac, Justin Childs. 149-162
- The SASHA Architecture for Network-Clustered Web ServersSteve Goddard, Trevor Schroeder. 163-172
- On Simplifying Modular Specification and Verification of Distributed ProtocolsPurnendu Sinha, Neeraj Suri. 173-181
- Explicit Representation of Exception Handling in the Development of Dependable Component-Based SystemsGisele Rodrigues Mesquita Ferreira, Cecília M. F. Rubira, Rogério de Lemos. 182-193
- Systems Engineering of Communication Protocols for Command and Control SystemsDavid J. Thuente, John K. Whiteman. 194
- Integrating Automatic Verification of Safety Requirements in Railway Interlocking System DesignGiovanni Dipoppa, G. D Alessandro, R. Semprini, Enrico Tronci. 209
- High Assurance Technologies for Autonomous Decentralized Train Control SystemMasayuki Matsumoto, Satoru Kitamura, M. Sato. 220-219
- Adaptive Step-by-Step Construction Technique Achieving High Assurance for Tokyo Metropolitan Railway NetworkKazuo Kera, Keisuke Bekki, Keiji Kamijyo, Kinji Mori. 228