Abstract is missing.
- An Automatic Approach to Model Checking UML State MachinesShao Jie Zhang, Yang Liu. 1-6 [doi]
- An Automatic Approach to Verify Sensor Network SystemsMan Chun Zheng. 7-12 [doi]
- An Approach to Achieving the Reliability in TV Embedded SystemDusica Marijan, Nikola Teslic, Vukota Pekovic, Tarkan Tekcan. 13-17 [doi]
- Modeling and Analysis of Advanced Automotive ECU Architectures at Early Design Stages Using EMF and Model TransformationChristoph Lauer, Reinhard German, Jens Pollmer. 18-23 [doi]
- An Efficient Method of Probabilistic Model CheckingSongzheng Song. 24-25 [doi]
- Constraint Checking for XML-Based Language Specification by SAT SolverHao Xiao, Zheng Wang, Geguang Pu, Bin Gu. 26-27 [doi]
- Parallel Lexical Analyzer on the Cell ProcessorG. Umarani Srikanth. 28-29 [doi]
- Model Checking C# Code: A Translation ApproachHuiquan Zhu. 30-31 [doi]
- Structured Assurance Case Methodology for Assessing Software TrustworthinessElizabeth Fong, Michael Kass, Thomas Rhodes, Frederick Boland. 32-33 [doi]
- The Problem of Usable Binary AuthenticationYongzheng Wu, Roland H. C. Yap. 34-35 [doi]
- Towards Verification of a Service Orchestration LanguageTian Huat Tan. 36-37 [doi]
- Design Patterns for Integrating Variability in Timed AutomataRalf Mitsching, Carsten Weise, Stefan Kowalewski. 38-45 [doi]
- Towards Test Case Generation for Synthesizable VHDL Programs Using Model CheckerT. Ayav, Tugkan Tuglular, Fevzi Belli. 46-53 [doi]
- Modeling Efficient Multi-chained Stream Signature Protocol Using Communicating Sequential ProcessesAhmet Koltuksuz, Murat Ozkan, Burcu Kulahcioglu. 54-61 [doi]
- Event- and Coverage-Based Testing of Web ServicesAndré Takeshi Endo, Michael Linschulte, Adenilso da Silva Simão, Simone do Rocio Senger de Souza. 62-69 [doi]
- Generalized Partial Test Case Generation MethodLehilton Lelis Chaves Pedrosa, Arnaldo Vieira Moura. 70-77 [doi]
- Are Longer Test Sequences Always Better? - A Reliability Theoretical AnalysisFevzi Belli, Nevin Güler, Michael Linschulte. 78-85 [doi]
- Utilization of Timed Automata as a Verification Tool for Security ProtocolsAhmet Koltuksuz, Burcu Kulahcioglu, Murat Ozkan. 86-93 [doi]
- Classification of Static Analysis-Based Buffer Overflow DetectorsHossain Shahriar, Mohammad Zulkernine. 94-101 [doi]
- Formal Analysis for Stateflow DiagramsChunqing Chen. 102-109 [doi]
- Job-Shop Scheduling Problems Using Timed PlanningXian Zhang. 110-117 [doi]
- Quantitative Evaluation of Related Web-Based VulnerabilitiesDeepak Subramanian, Ha-Thanh Le, Peter Kok Keong Loh, Annamalai Benjamin Premkumar. 118-125 [doi]
- Using Multi Decision Diagram in Model CheckingNguyen Truong Khanh, Quan Thanh Tho. 126-129 [doi]
- Analysing System Failure Behaviours with PRISMXiaocheng Ge, Richard F. Paige, John A. McDermid. 130-136 [doi]
- Yet Another Model Checker for PROMELA - The Transformation ApproachWenDi Zhao. 137-142 [doi]
- Modeling and Verification of Transmission Protocols: A Case Study on CSMA/CD ProtocolLing Shi, Yan Liu 0012. 143-149 [doi]
- MAFSE: A Model-Based Framework for Software VerificationTho T. Quan, Duc L. N. Hoang, B. Tam T. Nguyen, An N. Nguyen, Quan D. Tran, Phung H. Nguyen, Thang H. Bui, Anh T. Do, Linh V. Huynh, Nam T. Doan, Nguyen T. Huynh, Thien D. Nguyen, Binh T. T. Nguyen, Vu H. Nguyen. 150-156 [doi]
- Modeling and Verifying Security Protocols Using PAT ApproachAnh Tuan Luu. 157-164 [doi]