Abstract is missing.
- Security, Protocols, and TrustJoshua D. Guttman. 1 [doi]
- Security Types Preserving Compilation: (Extended Abstract)Gilles Barthe, Amitabh Basu, Tamara Rezk. 2-15 [doi]
- History-Dependent Scheduling for Cryptographic ProcessesVincent Vanackère. 16-29 [doi]
- Construction of a Semantic Model for a Typed Assembly LanguageGang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao Wu. 30-43 [doi]
- Rule-Based Runtime VerificationHoward Barringer, Allen Goldberg, Klaus Havelund, Koushik Sen. 44-57 [doi]
- On the Expressive Power of Canonical AbstractionShmuel Sagiv. 58 [doi]
- Boolean Algebra of Shape Analysis ConstraintsViktor Kuncak, Martin C. Rinard. 59-72 [doi]
- Approximate Probabilistic Model CheckingThomas Hérault, Richard Lassaigne, Frédéric Magniette, Sylvain Peyronnet. 73-84 [doi]
- Completeness and Complexity of Bounded Model CheckingEdmund M. Clarke, Daniel Kroening, Joël Ouaknine, Ofer Strichman. 85-96 [doi]
- Model Checking for Object Specifications in Hidden AlgebraDorel Lucanu, Gabriel Ciobanu. 97-109 [doi]
- Model Checking Polygonal Differential Inclusions Using Invariance KernelsGordon J. Pace, Gerardo Schneider. 110-121 [doi]
- Checking Interval Based Properties for Reactive SystemsPei Yu, Qiwen Xu. 122-134 [doi]
- Widening Operators for Powerset DomainsRoberto Bagnara, Patricia M. Hill, Enea Zaffanella. 135-148 [doi]
- Type Inference for Parameterized Race-Free JavaRahul Agarwal, Scott D. Stoller. 149-160 [doi]
- Certifying Temporal Properties for Compiled C ProgramsSongtao Xia, James Hook. 161-174 [doi]
- Verifying Atomicity Specifications for Concurrent Object-Oriented Software Using Model-CheckingJohn Hatcliff, Robby, Matthew B. Dwyer. 175-190 [doi]
- Static Analysis versus Software Model Checking for Bug FindingDawson R. Engler, Madanlal Musuvathi. 191-210 [doi]
- Automatic Inference of Class InvariantsFrancesco Logozzo. 211-222 [doi]
- Liveness with Invisible RankingYi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck. 223-238 [doi]
- A Complete Method for the Synthesis of Linear Ranking FunctionsAndreas Podelski, Andrey Rybalchenko. 239-251 [doi]
- Symbolic Implementation of the Best TransformerThomas W. Reps, Shmuel Sagiv, Greta Yorsh. 252-266 [doi]
- Constructing Quantified Invariants via Predicate AbstractionShuvendu K. Lahiri, Randal E. Bryant. 267-281 [doi]
- Analysis of Recursive Game Graphs Using Data Flow EquationsKousha Etessami. 282-296 [doi]
- Applying Jlint to Space Exploration SoftwareCyrille Artho, Klaus Havelund. 297-308 [doi]
- Why AI + ILP Is Good for WCET, but MC Is Not, Nor ILP AloneReinhard Wilhelm. 309-322 [doi]
- A Grand Challenge for Computing: Towards Full Reactive Modeling of a Multi-cellular AnimalDavid Harel. 323-324 [doi]