Abstract is missing.
- Flow Diagrams, Assertions, and Formal MethodsMark Priestley. 15-34 [doi]
- The School of Squiggol - A History of the Bird-Meertens FormalismJeremy Gibbons. 35-53 [doi]
- Reasoning About Shared-Variable Concurrency: Interactions Between Research ThreadsCliff B. Jones. 54-72 [doi]
- Specification with Class: A Brief History of Object-ZGraeme Smith, David J. Duke. 73-86 [doi]
- Formal Specifications and Software Testing, a Fruitful ConvergenceMarie-Claude Gaudel. 87-94 [doi]
- From Manuscripts to Programming Languages: An Archivist PerspectiveAlexandra Vidal, Ana Sandra Meneses, António Sousa. 95-102 [doi]
- What Have Formal Methods Ever Done for Us? An Audience DiscussionTroy Kaighin Astarte. 103-113 [doi]
- Combination of Boxes and Polyhedra Abstractions for Constraint SolvingGhiles Ziat, Alexandre Maréchal, Marie Pelleau, Antoine Miné, Charlotte Truchet. 119-135 [doi]
- An Abstract Domain for Objects in Dynamic Programming LanguagesVincenzo Arceri, Michele Pasqua, Isabella Mastroeni. 136-151 [doi]
- A Survey of Learning Methods in Open Source SoftwareAidarbek Suleimenov, Assiya Khuzyakhmetova, Antonio Cerone. 157-166 [doi]
- A Calculus of Chaos in Stochastic Compilation - Engineering in the Cause of MathematicsPeter T. Breuer, Simon J. Pickin. 167-184 [doi]
- Runtime Verification of Linux Kernel Security ModuleDenis Efremov, Ilya V. Shchepetkov. 185-199 [doi]
- Open and Interactive Learning Resources for Algorithmic Problem SolvingJoão F. Ferreira, Alexandra Mendes. 200-208 [doi]
- Challenges Faced by Students in an Open Source Software Undergraduate CourseDias Issa. 209-223 [doi]
- Open Source Software as a Learning Tool for Computer Science StudentsAssiya Khuzyakhmetova, Aidarbek Suleimenov. 224-232 [doi]
- Exploring Human Behaviour in Cyber-Physical Systems with Multi-modelling and Co-simulationKen G. Pierce, Carl Gamble, David Golightly, Roberto Palacin. 237-253 [doi]
- Migrating the INTO-CPS Application to the CloudHugo Daniel Macedo, Mikkel Bayard Rasmussen, Casper Thule, Peter Gorm Larsen. 254-271 [doi]
- Towards a Static Check of FMUs in VDM-SLNick Battle, Casper Thule, Cláudio Gomes, Hugo Daniel Macedo, Peter Gorm Larsen. 272-288 [doi]
- ViennaDoc: An Animatable and Testable Specification Documentation ToolTomohiro Oda, Keijiro Araki, Yasuhiro Yamamoto, Kumiyo Nakakoji, Hiroshi Sako, Han-Myung Chang, Peter Gorm Larsen. 289-302 [doi]
- A Map of Asynchronous Communication ModelsFlorent Chevrou, Aurélie Hurault, Shin Nakajima 0001, Philippe Quéinnec. 307-322 [doi]
- An Abstract Semantics of Speculative Execution for Reasoning About Security VulnerabilitiesRobert J. Colvin, Kirsten Winter. 323-341 [doi]
- Weakening Correctness and Linearizability for Concurrent Objects on Multicore ProcessorsGraeme Smith, Lindsay Groves. 342-357 [doi]
- Towards a Method for the Decomposition by Refinement in Event-BKenza Kraibi, Rahma Ben Ayed, Joris Rehm, Simon Collart Dutilleul, Philippe Bon, Dorian Petit. 358-370 [doi]
- Transformations for Generating Type RefinementsDouglas R. Smith, Stephen J. Westfold. 371-387 [doi]
- Comparing Correctness-by-Construction with Post-Hoc Verification - A Qualitative User StudyTobias Runge, Thomas Thüm, Loek Cleophas, Ina Schaefer, Bruce W. Watson. 388-405 [doi]
- Reversible Programs Have Reversible SemanticsRobert Glück, Robin Kaarsgaard, Tetsuo Yokoyama. 413-427 [doi]
- Two-Way Quantum and Classical Automata with Advice for Online Minimization ProblemsKamil Khadiev, Aliya Khadieva. 428-442 [doi]
- Quotients and Atoms of Reversible LanguagesHellis Tamm. 443-455 [doi]
- Bayesian Verification of Chemical Reaction NetworksGareth W. Molyneux, Viraj B. Wijesuriya, Alessandro Abate. 461-479 [doi]
- Nested Event Representation for Automated Assembly of Cell Signaling Network ModelsEvan W. Becker, Kara N. Bocan, Natasa Miskov-Zivanov. 480-499 [doi]
- PrideMM: Second Order Model Checking for Memory Consistency ModelsSimon Cooksey, Sarah Harris, Mark Batty, Radu Grigore, Mikolás Janota. 507-525 [doi]
- Fkcc: The Farkas CalculatorChristophe Alias. 526-536 [doi]
- Handling Heap Data Structures in Backward Symbolic ExecutionRobert Husák, Jan Kofron, Filip Zavoral. 537-556 [doi]
- AuthCheck: Program-State Analysis for Access-Control VulnerabilitiesGoran Piskachev, Tobias Petrasch, Johannes Späth, Eric Bodden. 557-572 [doi]