1 | -- | 3 | John Derrick, Eerke Boiten. Preface |
5 | -- | 22 | Diyaa-Addein Atiya, Steve King, Jim Woodcock. Simpler Reasoning About System Properties: a Proof-by-Refinement Technique |
23 | -- | 44 | Christie Bolton. Using the Alloy Analyzer to Verify Data Refinement in Z |
45 | -- | 66 | Ana Cavalcanti, Jim Woodcock. Angelic Nondeterminism and Unifying Theories of Programming |
67 | -- | 92 | Moshe Deutsch, Martin C. Henson. An Analysis of Operation-Refinement in an Abortive Paradigm |
93 | -- | 110 | Robert Colvin, Simon Doherty, Lindsay Groves. Verifying Concurrent Data Structures by Simulation |
111 | -- | 129 | Martin C. Henson, Besnik Kajtazi. The Specification Logic vZ |
131 | -- | 149 | Kevin Lano, Kelly Androutsopoulos, David Clark. Refinement Patterns for UML |
151 | -- | 161 | Richard F. Paige, Dimitris Kolovos, Fiona A. C. Polack. Refinement via Consistency Checking in MDA |
163 | -- | 181 | Fiona A. C. Polack, Susan Stepney. Emergent Properties Do Not Refine |
183 | -- | 204 | Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne. Tank Monitoring: A pAMN Case Study |
205 | -- | 224 | Graeme Smith, John Derrick. Model Checking Downward Simulations |
225 | -- | 242 | John A. Clark, Susan Stepney, Howard Chivers. Breaking the Model: Finalisation and a Taxonomy of Security Attacks |