331 | -- | 343 | Lan Lin, Jesse H. Poore. Pushing requirements changes through to changes in specifications |
344 | -- | 356 | Chenguang Luo, Shengchao Qin, Zongyan Qiu. Verifying BPEL-like programs with Hoare logic |
357 | -- | 367 | Jun Pang, Zhengqin Luo, Yuxin Deng. On automatic verification of self-stabilizing population protocols |
368 | -- | 379 | Jun Sun 0001, Yang Liu, Jin Song Dong, Jing Sun. Compositional encoding for bounded model checking |
380 | -- | 397 | Zhifang Wang, Yiyun Chen, Zhenming Wang, Baojian Hua. Automated verification of pointer programs in pointer logic |
398 | -- | 412 | Antonio Brogi, Razvan Popescu. Workflow-based semantics for peer-to-peer specifications |
413 | -- | 423 | Lianwei Guan, Xingyu Li, Hao Hu, Jian Lu. A Petri net-based approach for supporting aspect-oriented modeling |
424 | -- | 430 | Yue Hu, Xiaoyu Gao, Li Li, Qingshi Gao. Style transformation in natural languages |
431 | -- | 437 | Yunping Zheng, Chuanbo Chen, Mudar Sarem. An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectangles |
438 | -- | 450 | Xin Li, Bei Hua, Yi Shang, Yan Xiong. A robust localization algorithm in wireless sensor networks |
451 | -- | 459 | Xiaoru Zhang, Zaiyue Zhang, Yuefei Sui. Types, structures and theories in NKI |