1 | -- | 2 | Maurizio Proietti, Hirohisa Seki, Jim Woodcock. Editorial |
3 | -- | 31 | Roberto Giacobazzi, Isabella Mastroeni, Mila Dalla Preda. Maximal incompleteness as obfuscation potency |
33 | -- | 55 | Aziem Chawdhary, Ranjeet Singh, Andy King. Partial evaluation of string obfuscations for Java malware detection |
57 | -- | 95 | Henning Christiansen, Maja H. Kirkeby. On proving confluence modulo equivalence for Constraint Handling Rules |
97 | -- | 124 | Emilio Jesús Gallego Arias, James Lipton, Julio Mariño. Constraint logic programming with a relational machine |
125 | -- | 153 | Vincent Nys, Danny De Schreye. Abstract conjunctive partial deduction for the analysis and compilation of coroutines |
155 | -- | 172 | Wlodzimierz Drabent. Proving completeness of logic programs with the cut |