Journal: Science of Computer Programming

Volume 77, Issue 9

969 -- 970Marjan Mernik, Barrett R. Bryant. Special issue on the Programming Languages track at the 24th ACM Symposium on Applied Computing
971 -- 989Paul Biggar, Edsko de Vries, David Gregg. A practical solution for achieving language compatibility in scripting language compilers
990 -- 1005Julien Cervelle, Rémi Forax, Gautier Loyauté, Gilles Roussel. Banzai+Tatoo: Using cutting-edge parsers for implementing high-performance servers
1006 -- 1036Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, Shengchao Qin. Automated verification of shape, size and bag properties via user-defined predicates in separation logic

Volume 77, Issue 7-8

777 -- 778Gwen Salaün, Marjan Sirjani. Preface: Special issue on Foundations of Coordination Languages and Software Architectures (selected papers from FOCLASA'09)
779 -- 798S. Kemper. SAT-based verification for timed component connectors
799 -- 822Sun Meng, Farhad Arbab, Bernhard K. Aichernig, Lacramioara Astefanoaei, Frank S. de Boer, Jan J. M. M. Rutten. Connectors as designs: Modeling, refinement and test case generation
823 -- 847Ludovic Henrio, Florian Kammüller, Bianca Lutz. fun : A typed functional active object calculus
848 -- 869Bahman Pourvatan, Marjan Sirjani, Hossein Hojjat, Farhad Arbab. Symbolic execution of Reo circuits using constraint automata
870 -- 886Francisco Durán, Meriem Ouederni, Gwen Salaün. A generic framework for n-protocol compatibility checking
887 -- 888Farhad Arbab, Marjan Sirjani. Fundamentals of software engineering (selected papers of FSEN '09)
889 -- 907Luca Aceto, Arnar Birgisson, Anna Ingólfsdóttir, Mohammad Reza Mousavi, Michel A. Reniers. Rule formats for determinism and idempotence
908 -- 939Viktor Schuppan. Towards a notion of unsatisfiable and unrealizable cores for LTL
940 -- 954Dominik Klein, Frank G. Radmacher, Wolfgang Thomas. Moving in a network under random failures: A complexity analysis
955 -- 967Jetty Kleijn, Maciej Koutny. Step coverability algorithms for communicating systems

Volume 77, Issue 6

661 -- 662John Field, Vasco Thudichum Vasconcelos. Selected Papers from the Eleventh International Conference on Coordination Models and Languages
663 -- 684Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu. Servilla: A flexible service provisioning middleware for heterogeneous sensor networks
685 -- 706Marcello M. Bonsangue, Dave Clarke, Alexandra Silva. A model of context-dependent component connectors
707 -- 726Armand Navabi, Xiangyu Zhang, Suresh Jagannathan. Dependence analysis for safe futures
727 -- 740Carl G. Ritson, Adam T. Sampson, Frederick R. M. Barnes. Multicore scheduling for lightweight communicating processes
741 -- 742Andy Zaidman, Giuliano Antoniol. Preface to the special issue on reverse engineering (featuring selected papers from WCRE 2009)
743 -- 759David Lo, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani. Mining quantified temporal rules: Formalism, algorithms, and evaluation
760 -- 776Nicolas Bettenburg, Weiyi Shang, Walid M. Ibrahim, Bram Adams, Ying Zou, Ahmed E. Hassan. An empirical study on inconsistent changes to code clones at the release level

Volume 77, Issue 5

551 -- 576Uwe van Heesch, Paris Avgeriou, Uwe Zdun, Neil B. Harrison. The supportive effect of patterns in architecture decision recovery - A controlled experiment
577 -- 608José Luiz Fiadeiro, Antónia Lopes, João Abreu. A formal model for service-oriented interactions
609 -- 635Nic Volanschi. Pattern matching for the masses using custom notations
636 -- 643K. Burak Codur, Ali H. Dogru. Regulations and software evolution: An example from the military domain
644 -- 659Hamza Hamza, Steve Counsell. Region-Based RTSJ Memory Management: State of the art

Volume 77, Issue 4

423 -- 0Patrícia D. L. Machado. Preface: Selected papers from the Brazilian Symposium on Formal Methods (SBMF 2008)
424 -- 443Juan Ignacio Perna, Jim Woodcock. Mechanised wire-wise verification of Handel-C synthesis
444 -- 479Frank Zeyda, Ana Cavalcanti. Mechanical reasoning about families of UTP theories
480 -- 504Simone André da Costa, Leila Ribeiro. Verification of graph grammars using a logical approach
505 -- 517Magnus O. Myreen, Michael J. C. Gordon. Function extraction
518 -- 532Diego Caminha B. de Oliveira, David Déharbe, Pascal Fontaine. Combining decision procedures by (model-)equality propagation
533 -- 550Umberto Souza da Costa, Anamaria Martins Moreira, Martin A. Musicante, Plácido A. Souza Neto. JCML: A specification language for the runtime verification of Java Card programs

Volume 77, Issue 3

129 -- 130Sven Apel, Christian Lengauer, Julia L. Lawall. Preface to the special issue on feature-oriented software development (FOSD 2009)
131 -- 151Andrzej Olszak, Bo Nørregaard Jørgensen. Remodularizing Java programs for improved locality of feature implementations in source code
152 -- 173Sebastian Günther, Sagar Sunkle. rbFeatures: Feature-oriented programming with Ruby
174 -- 187Sven Apel, Sergiy S. Kolesnikov, Jörg Liebig, Christian Kästner, Martin Kuhlemann, Thomas Leich. Access control in feature-oriented programming
189 -- 213Alessandro Lapadula, Rosario Pugliese, Francesco Tiezzi. Using formal methods to develop WS-BPEL applications
214 -- 246Leila Ribeiro, Osmar Marchi dos Santos, Fernando Luís Dotti, Luciana Foss. Correct transformation: From object-based graph grammars to PROMELA
247 -- 269Rubén Fuentes-Fernández, Juan Pavón, Francisco J. Garijo. A model-driven process for the modernization of component-based systems
270 -- 289Thomas Ruhroth, Heike Wehrheim. Model evolution and refinement
290 -- 313Valentín Valero Ruiz, Hermenegilda Macià, Juan José Pardo, María-Emilia Cambronero, Gregorio Díaz. Transforming Web Services Choreographies with priorities and time constraints into prioritized-time colored Petri nets
314 -- 354J. Laurenz Eveleens, M. van der Pas, Chris Verhoef. Quantifying forecast quality of IT business value
355 -- 374Chen Wu. WSDL term tokenization methods for IR-style Web services discovery
375 -- 392María-del-Mar Gallardo, Christophe Joubert, Pedro Merino, David Sanán. A model-extraction approach to verifying concurrent C programs with CADP
393 -- 422Simplice Djoko Djoko, Rémi Douence, Pascal Fradet. Aspects preserving properties

Volume 77, Issue 2

81 -- 82Kevin Hammond, Paul H. J. Kelly. Introduction to the Special Issue on Automatic Program Generation for Embedded Systems
83 -- 95Uwe Ryssel, Joern Ploennigs, Klaus Kabitzsch. Automatic library migration for the generation of hardware-in-the-loop models
96 -- 112Arkadeb Ghosal, Daniel T. Iercan, Christoph M. Kirsch, Thomas A. Henzinger, Alberto L. Sangiovanni-Vincentelli. Separate compilation of hierarchical real-time programs into linear-bounded Embedded Machine code
113 -- 128Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, Loïc Besnard, Paul Le Guernic. Compositional design of isochronous systems

Volume 77, Issue 12

1211 -- 0Ana Cavalcanti. Special issue: International Conference on Formal Engineering Methods - ICFEM 2009
1212 -- 1234Nathalie Bertrand, Axel Legay, Sophie Pinchinat, Jean-Baptiste Raclet. Modal event-clock specifications for timed component-based design
1235 -- 1271Kyungmin Bae, Peter Csaba Ölveczky, Thomas Huining Feng, Edward A. Lee, Stavros Tripakis. Verifying hierarchical Ptolemy II discrete-event models using Real-Time Maude
1272 -- 1288Jiri Barnat, Lubos Brim, Petr Rockai. On-the-fly parallel model checking algorithm that is optimal for verification of weak LTL properties
1289 -- 1309Wolfgang Ahrendt, Maximilian Dylla. A system for compositional verification of asynchronous objects

Volume 77, Issue 10-11

1037 -- 1038Markus Roggenbach. Preface
1039 -- 1057Anthony Narkawicz, César A. Muñoz, Gilles Dowek. Provably correct conflict prevention bands algorithms
1058 -- 1074Reynald Affeldt, David Nowak, Kiyoshi Yamada. Certifying assembly with formal security proofs: The case of BBS
1075 -- 1094Radu Mateescu, Anton Wijs. Sequential and distributed on-the-fly computation of weak tau-confluence
1095 -- 1121Jori Dubrovin, Tommi A. Junttila, Keijo Heljanko. Exploiting step semantics for efficient bounded model checking of asynchronous systems
1122 -- 1150Werner Damm, Henning Dierks, Stefan Disch, Willem Hagemann, Florian Pigorsch, Christoph Scholl, Uwe Waldmann, Boris Wirtz. Exact and fully symbolic verification of linear hybrid automata with large discrete state spaces
1151 -- 1177Alvaro Miyazawa, Ana Cavalcanti. Refinement-oriented models of Stateflow charts
1178 -- 1197Hristina Palikareva, Joël Ouaknine, A. W. Roscoe. SAT-solving in CSP trace refinement
1198 -- 1209Nikolaos Papanikolaou, Sadie Creese, Michael Goldsmith. Refinement checking for privacy policies

Volume 77, Issue 1

1 -- 3Lawrence Chung, Manuel Noguera, Nary Subramanian, José Luis Garrido. System and software solution-oriented architectures
4 -- 28Manuel Resinas, Pablo Fernandez, Rafael Corchuelo. A bargaining-specific architecture for supporting automated service agreement negotiation systems
29 -- 45Rafael Duque, María Luisa Rodríguez, María Visitación Hurtado, Crescencio Bravo, Carlos Rodríguez-Domínguez. Integration of collaboration and interaction analysis mechanisms in a concern-based architecture for groupware systems
46 -- 65Marcela D. Rodríguez, Jesús Favela. Assessing the SALSA architecture for developing agent-based ambient computing applications
66 -- 80Claudia López, Víctor Codocedo, Hernán Astudillo, Luiz Marcio Cysneiros. Bridging the gap between software architecture rationale formalisms and actual architecture documents: An ontology-driven approach