Abstract is missing.
- Stealthy Protocols: Metrics and Open ProblemsOlga Chen, Catherine A. Meadows, Gautam Trivedi. 1-17 [doi]
- A Specification Theory of Real-Time ProcessesChris Chilton, Marta Z. Kwiatkowska, Faron Moller, Xu Wang. 18-38 [doi]
- Towards Verification of Cyber-Physical Systems with UTP and Isabelle/HOLSimon Foster, Jim Woodcock. 39-64 [doi]
- FDR: From Theory to Industrial ApplicationThomas Gibson-Robinson, Guy H. Broadfoot, Gustavo Carvalho, Philippa J. Hopcroft, Gavin Lowe, Sidney Nogueira, Colin O'Halloran, Augusto Sampaio. 65-87 [doi]
- Information Flow, Distributed Systems, and Refinement, by ExampleJoshua D. Guttman. 88-103 [doi]
- Abstractions for Transition Systems with Applications to Stubborn SetsHenri Hansen. 104-123 [doi]
- A Hybrid Relational Modelling LanguageJifeng He, Qin Li. 124-143 [doi]
- What Makes Petri Nets Harder to Verify: Stack or Data?Ranko Lazic, Patrick Totzke. 144-161 [doi]
- Analysing Lock-Free Linearizable Datatypes Using CSPGavin Lowe. 162-184 [doi]
- Discrete Random Variables Over Domains, RevisitedMichael W. Mislove. 185-202 [doi]
- A Demonic Lattice of InformationCarroll Morgan. 203-222 [doi]
- A Brief History of Security ProtocolsPeter Y. A. Ryan. 223-245 [doi]
- More Stubborn Set Methods for Process AlgebrasAntti Valmari. 246-271 [doi]
- A Branching Time Model of CSPRob J. van Glabbeek. 272-293 [doi]
- Virtualization Based DevelopmentJay Yantchev, Atanas N. Parashkevov. 294-318 [doi]