Abstract is missing.
- Abstract Interpretation in Code SecurityRoberto Giacobazzi. 3 [doi]
- Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and WatermarkingRoberto Giacobazzi. 7-18 [doi]
- Nullness Analysis in Boolean FormFausto Spoto. 21-30 [doi]
- Widening Operators for Abstract InterpretationAgostino Cortesi. 31-40 [doi]
- Static Analysis of the Determinism of Multithreaded ProgramsPietro Ferrara. 41-50 [doi]
- Cheap and Small CounterexamplesHenri Hansen, Jaco Geldenhuys. 53-62 [doi]
- Efficient Model Checking for Duration Calculus Based on Branching-Time ApproximationsMartin Fränzle, Michael R. Hansen. 63-72 [doi]
- Flash-Efficient LTL Model Checking with Minimal CounterexamplesStefan Edelkamp, Damian Sulewski. 73-82 [doi]
- Algebraic View ReconciliationPeter Höfner, Ridha Khédri, Bernhard Möller. 85-94 [doi]
- Compositional Reasoning in Model-Based Verification of Adaptive Embedded SystemsIna Schaefer, Arnd Poetzsch-Heffter. 95-104 [doi]
- Extracting Conditional Confidentiality PoliciesMichael Carl Tschantz, Jeannette M. Wing. 107-116 [doi]
- Testing Privacy Policies Using ModelsPercy Antonio Pari Salas, Padmanabhan Krishnan. 117-126 [doi]
- Preservation of Proof Pbligations for Hybrid Verification MethodsGilles Barthe, César Kunz, David Pichardie, Julián Samborski-Forlese. 127-136 [doi]
- A Generalized Model-Based Test Generation MethodAdilson Luiz Bonifácio, Arnaldo Vieira Moura, Adenilso da Silva Simão. 139-148 [doi]
- Specification-Based Testing for Software Product LinesTemesghen Kahsai, Markus Roggenbach, Bernd-Holger Schlingloff. 149-158 [doi]
- Verification-Based Test Case Generation for Full Feasible Branch CoverageChristoph Gladisch. 159-168 [doi]
- Tagging Make Local Testing of Message-Passing Systems FeasiblePuneet Bhateja, Madhavan Mukund. 171-180 [doi]
- Using Formal Verification to Reduce Test Space of Fault-Tolerant ProgramsKleber S. Xavier, Simone Hanazumi, Ana Cristina Vieira de Melo. 181-190 [doi]
- Behaviour Directed Testing of Auto-code GeneratorsPrahladavaradan Sampath, A. C. Rajeev, S. Ramesh, K. C. Shashidhar. 191-200 [doi]
- Extending Stream X-Machines to Specify and Test Systems with TimeoutsMercedes G. Merayo, Robert M. Hierons, Manuel Núñez. 201-210 [doi]
- Tools for CSPMarkus Roggenbach. 213-214 [doi]
- Laws of Object-Orientation with Reference SemanticsLeila Silva, Augusto Sampaio, Zhiming Liu. 217-226 [doi]
- Specialized Aspect Languages Preserving Classes of PropertiesSimplice Djoko Djoko, Rémi Douence, Pascal Fradet. 227-236 [doi]
- Tableau-Based Decision Procedure for the Multi-agent Epistemic Logic with Operators of Common and Distributed KnowledgeValentin Goranko, Dmitry Shkatov. 237-246 [doi]
- Object Models with Temporal ConstraintsAlessandro Cimatti, Marco Roveri, Angelo Susi, Stefano Tonetta. 249-258 [doi]
- A Fast Algorithm to Compute Heap Memory Bounds of Java Card AppletsTuan-Hung Pham, Anh-Hoang Truong, Ninh-Thuan Truong, Wei-Ngan Chin. 259-267 [doi]
- PED: Proof-Guided Error Diagnosis by Triangulation of Program Error CausesGogul Balakrishnan, Malay Ganai. 268-278 [doi]
- CRefine: Support for the Circus Refinement CalculusM. Oliveira, Alessandro Cavalcante Gurgel, Cristiano Gurgel de Castro. 281-290 [doi]
- An Environment for Measuring and Scheduling Time-Critical Embedded Systems with Energy ConstraintsEduardo Tavares, Bruno Silva, Paulo Romero Martins Maciel. 291-300 [doi]
- Modeling Component Connectors: Synchronisation and Context-DependencyMohammad Izadi, Marcello M. Bonsangue, Dave Clarke. 303-312 [doi]
- Generation of Service Wrapper Protocols from Choreography SpecificationsGwen Salaün. 313-322 [doi]
- Bridging the Gap between Interaction- and Process-Oriented ChoreographiesIvan Lanese, Claudio Guidi, Fabrizio Montesi, Gianluigi Zavattaro. 323-332 [doi]
- Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem ProverBo Guo, Mahadevan Subramaniam. 335-344 [doi]
- Restricted Broadcast Process TheoryFatemeh Ghassemi, Wan Fokkink, Ali Movaghar. 345-354 [doi]
- Modelling Rational User Behaviour as Games between an Angel and a DemonRimvydas Ruksenas, Paul Curzon, Ann Blandford. 355-364 [doi]
- Formal Methods and Innovation Economy: Facing New ChallengesAlexander K. Petrenko, Olga L. Petrenko. 367-371 [doi]
- Behavioral Compatibility of Active ComponentsYoucef Hammal. 372-376 [doi]
- Contract-Based Verification of Hierarchical Systems of ComponentsSophie Quinton, Susanne Graf. 377-381 [doi]
- Checking Interface Interaction Protocols Using Aspect-Oriented ProgrammingAnh-Hoang Truong, Thanh-Binh Trinh, Dang Van Hung, Viet Ha Nguyen, Nguyen Thi Thu Trang, Pham Dinh Hung. 382-386 [doi]
- Ontology-Based Automatic Model TransformationsKurt Geihs, Philipp A. Baer, Roland Reichle, Jens Wollenhaupt. 387-391 [doi]