Journal: Science of Computer Programming

Volume 74, Issue 9

669 -- 670Ernesto Pimentel, Jean-Marie Jacquet. Special issue on the 5th international workshop on foundations of coordination languages and software architectures (FOCLASA 06)
671 -- 687Marco Antonio Barbosa, Luís Soares Barbosa. A perspective on service orchestration
688 -- 701Sascha Klüppelholz, Christel Baier. Symbolic model checking for channel-based component connectors
702 -- 722Matteo Casadei, Mirko Viroli, Luca Gardelli. On the collective sort problem for distributed tuple spaces
723 -- 753Benoît Fraikin, Marc Frappier. Efficient symbolic computation of process expressions
754 -- 776Ana I. Molina, Miguel A. Redondo, Manuel Ortega. A methodological approach for user interface development of collaborative applications: A case study

Volume 74, Issue 8

497 -- 0Tarmo Uustalu. Preface
498 -- 533J. Robin B. Cockett, Craig Pastro. The logic of message-passing
534 -- 549Olivier Danvy, Kevin Millikin. Refunctionalization at work
550 -- 567Andreas Abel. Type-based termination of generic programs
568 -- 589Philippe Audebaud, Christine Paulin-Mohring. Proofs of randomized algorithms in Coq
590 -- 628Ralf Hinze, Andres Löh. Generic programming in 3D
629 -- 653Carroll Morgan. The Shadow Knows: Refinement and security in sequential programs
654 -- 668Kim Solin, Joakim von Wright. Enabledness and termination in refinement algebra

Volume 74, Issue 7

397 -- 398René L. Krikhaar, Ralf Lämmel. Guest editors introduction
399 -- 413László Vidács, Árpád Beszédes, Tibor Gyimóthy. Combining preprocessor slicing with C/C++ language slicing
414 -- 429Abram Hindle, Michael W. Godfrey, Richard C. Holt. Reading beside the lines: Using indentation to rank revisions by complexity
430 -- 445David W. Binkley, Dawn Lawrie, Steve Maex, Christopher Morrell. Identifier length and limited programmer memory
446 -- 469Andrew R. Dalton, Sally K. Wahba, Sravanthi Dandamudi, Jason O. Hallstrom. Visualizing the runtime behavior of embedded network systems: A toolkit for TinyOS
470 -- 495Chanchal Kumar Roy, James R. Cordy, Rainer Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

Volume 74, Issue 5-6

259 -- 260Markus Aleksy, Vasco Amaral, Ralf Gitzel, James F. Power, John Waldron. PPPJ special issue-Foreword
261 -- 278Lorenzo Bettini, Sara Capecchi, Betti Venneri. Featherweight Java with dynamic and static overloading
279 -- 295Thomas Würthinger, Christian Wimmer, Hanspeter Mössenböck. Array bounds check elimination in the context of deoptimization
296 -- 313Borys J. Bradel, Tarek S. Abdelrahman. A study of potential parallelism among traces in Java programs
314 -- 332Lingli Zhang, Chandra Krintz. As-if-serial exception handling semantics for Java futures
333 -- 354Kevin J. Hoffman, Patrick Th. Eugster. Cooperative aspect-oriented programming
355 -- 378Sami Mäkelä, Ville Leppänen. Client-based cohesion metrics for Java programs
379 -- 396Arno Puder, Sascha Häberling. Byte code level cross-compilation for developing web applications

Volume 74, Issue 4

167 -- 0Jin Song Dong, Jing Sun. SCP special issue on the grand challenge - Preface
168 -- 196Zhenbang Chen, Zhiming Liu, Anders P. Ravn, Volker Stolz, Naijun Zhan. Refinement and verification in component-based model-driven design
197 -- 218Leo Freitas, Jim Woodcock, Yichi Zhang. Verifying the CICS File Control API with Z/Eves: An experiment in the verified software repository
219 -- 237Andrew Butterfield, Leo Freitas, Jim Woodcock. Mechanising a formal model of flash memory
238 -- 257Leo Freitas, Jim Woodcock, Zheng Fu. POSIX file store in Z/Eves: An experiment in the verified software repository

Volume 74, Issue 3

65 -- 99Rik Eshuis. Reconciling statechart semantics
100 -- 127Hubert Garavel, Gwen Salaün, Wendelin Serwe. On the semantics of communicating hardware processes and their translation into LOTOS for the verification of asynchronous circuits with CADP
128 -- 142Derrick G. Kourie, Sergei A. Obiedkov, Bruce W. Watson, Dean van der Merwe. An incremental algorithm to construct a lattice of set intersections
143 -- 165Robert Colvin, Brijesh Dongol. A general technique for proving lock-freedom

Volume 74, Issue 11-12

879 -- 899Thai Son Hoang, Hironobu Kuruma, David A. Basin, Jean-Raymond Abrial. Developing topology discovery in Event-B
900 -- 933G. P. Kulk, R. J. Peters, Chris Verhoef. Quantifying IT estimation risks
934 -- 988J. L. Eveleens, Chris Verhoef. Quantifying IT forecast quality
989 -- 1020Ali Mili, Shir Aharon, Chaitanya Nadkarni. Mathematics for reasoning about loop functions

Volume 74, Issue 10

777 -- 811Samuele Carpineti, Cosimo Laneve, Luca Padovani. PiDuce - A project for experimenting Web services technologies
812 -- 835Manuel Roldán, Francisco Durán, Antonio Vallecillo. Invariant-driven specifications in Maude
836 -- 860Francisco Ortin, Jose Manuel Redondo, J. Baltasar García Perez-Schofield. Efficient virtual machine support of runtime structural reflection
861 -- 878Otávio Augusto Lazzarini Lemos, Ivan Gustavo Franchin, Paulo Cesar Masiero. Integration testing of Object-Oriented and Aspect-Oriented programs: A structural pairwise approach for Java

Volume 74, Issue 1-2

1 -- 0Fabio Massacci, Frank Piessens, Sjouke Mauw. Preface
2 -- 12Irem Aktug, Katsiaryna Naliuka. ConSpec - A formal language for policy specification
13 -- 22Dries Schellekens, Brecht Wyseur, Bart Preneel. Remote attestation on legacy operating systems with trusted platform modules
23 -- 33Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, F. S. Proto, Simone Teofili. The SPARTA pseudonym and authorization system
34 -- 42Atle Refsdal, Ketil Stølen. Extending UML sequence diagrams to model trust-dependent behavior with the aim to support risk analysis
43 -- 51Julien Bringer, Hervé Chabanne, Bruno Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics
52 -- 63Jerry den Hartog. Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic