Abstract is missing.
- Scalable Analysis of Scalable SystemsAllan Clark, Stephen Gilmore, Mirco Tribastone. 1-17 [doi]
- Rewriting Logic Semantics and Verification of Model TransformationsArtur Boronat, Reiko Heckel, José Meseguer. 18-33 [doi]
- Confluence in Domain-Independent Product Line TransformationsJon Oldevik, Øystein Haugen, Birger Møller-Pedersen. 34-48 [doi]
- Object Flow Definition for Refined Activity DiagramsStefan Jurack, Leen Lambers, Katharina Mehner, Gabriele Taentzer, Gerd Wierse. 49-63 [doi]
- A Category-Theoretical Approach to the Formalisation of Version Control in MDEAdrian Rutle, Alessandro Rossini, Yngve Lamo, Uwe Wolter. 64-78 [doi]
- Controller Synthesis from LSC RequirementsHillel Kugler, Cory Plock, Amir Pnueli. 79-93 [doi]
- Interface Generation and Compositional Verification in JavaPathfinderDimitra Giannakopoulou, Corina S. Pasareanu. 94-108 [doi]
- A Formal Way from Text to Code TemplatesGuido Wachsmuth. 109-123 [doi]
- Context-Aware Adaptive Services: The PLASTIC ApproachMarco Autili, Paolo Di Benedetto, Paola Inverardi. 124-139 [doi]
- Synchronous Modeling and Validation of Priority Inheritance SchedulersErwan Jahier, Nicolas Halbwachs, Pascal Raymond. 140-154 [doi]
- Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)AlloyNazareno Aguirre, Marcelo F. Frias, Mariano M. Moscato, T. S. E. Maibaum, Alan Wassyng. 155-170 [doi]
- Reducing the Costs of Bounded-Exhaustive TestingVilas Jagannath, Yun Young Lee, Brett Daniel, Darko Marinov. 171-185 [doi]
- Logical TestingKathryn E. Gray, Alan Mycroft. 186-200 [doi]
- Cross-Entropy-Based Replay of Concurrent ProgramsHana Chockler, Eitan Farchi, Benny Godlin, Sergey Novikov. 201-215 [doi]
- Control Dependence for Extended Finite State MachinesKelly Androutsopoulos, David Clark, Mark Harman, Zheng Li, Laurence Tratt. 216-230 [doi]
- Proving Consistency of Pure Methods and Model FieldsK. Rustan M. Leino, Ronald Middelkoop. 231-245 [doi]
- On the Implementation of @prePiotr Kosiuczenko. 246-261 [doi]
- Formal Specification and Analysis of Timing Properties in Software SystemsMusab AlTurki, Dinakar Dhurjati, Dachuan Yu, Ajay Chander, Hiroshi Inamura. 262-277 [doi]
- Formal Foundation for Pattern-Based ModellingPaolo Bottoni, Esther Guerra, Juan de Lara. 278-293 [doi]
- Problem-Oriented Documentation of Design PatternsAlexander Fülleborn, Klaus Meffert, Maritta Heisel. 294-308 [doi]
- Certification of Smart-Card Applications in Common CriteriaIman Narasamdya, Michaël Périn. 309-324 [doi]
- Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government NetworksFrank Hermann, Hartmut Ehrig, Claudia Ermel. 325-339 [doi]
- A Formal Connection between Security Automata and JML AnnotationsMarieke Huisman, Alejandro Tamalet. 340-354 [doi]
- Algorithms for Automatically Computing the Causal Paths of FailuresWilliam N. Sumner, Xiangyu Zhang. 355-369 [doi]
- Mining API Error-Handling Specifications from Source CodeMithun Acharya, Tao Xie. 370-384 [doi]
- SNIFF: A Search Engine for Java Using Free-Form QueriesShaunak Chatterjee, Sudeep Juvekar, Koushik Sen. 385-400 [doi]
- Inquiry and Introspection for Non-deterministic Queries in Mobile NetworksVasanth Rajamani, Christine Julien, Jamie Payton, Gruia-Catalin Roman. 401-416 [doi]
- hol-TestGenAchim D. Brucker, Burkhart Wolff. 417-420 [doi]
- CADS*: Computer-Aided Development of Self-* SystemsRadu Calinescu, Marta Z. Kwiatkowska. 421-424 [doi]
- HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static AnalysisQichang Chen, Liqiang Wang, Zijiang Yang, Scott D. Stoller. 425-439 [doi]
- Accurate and Efficient Structural Characteristic Feature Extraction for Clone DetectionHoan Anh Nguyen, Tung Thanh Nguyen, Nam H. Pham, Jafar M. Al-Kofahi, Tien N. Nguyen. 440-455 [doi]
- Enhanced Property Specification and Verification in BLASTOndrej Sery. 456-469 [doi]
- Finding Loop Invariants for Programs over Arrays Using a Theorem ProverLaura Kovács, Andrei Voronkov. 470-485 [doi]