Abstract is missing.
- Model Generation for Horn Logic with Stratified NegationEthan K. Jackson, Wolfram Schulte. 1-20 [doi]
- Counterexample Guided Spotlight Abstraction RefinementTobe Toben. 21-36 [doi]
- An Experimental Evaluation of Probabilistic SimulationJonathan Bogdoll, Holger Hermanns, Lijun Zhang. 37-52 [doi]
- An SMT Approach to Bounded Reachability Analysis of Model ProgramsMargus Veanes, Nikolaj Bjørner, Alexander Raschke. 53-68 [doi]
- Parameterized Tree SystemsParosh Aziz Abdulla, Noomene Ben Henda, Giorgio Delzanno, Frédéric Haziza, Ahmed Rezine. 69-83 [doi]
- Adapting Petri Nets Reductions to Promela SpecificationsChristophe Pajault, Jean-François Pradat-Peyre, Pierre Rousseau. 84-98 [doi]
- Verification of a Hierarchical Generic Mutual Exclusion AlgorithmSouheib Baarir, Julien Sopena, Fabrice Legond-Aubry. 99-115 [doi]
- Distributed Semantics and Implementation for Systems with Interaction and PriorityAnanda Basu, Philippe Bidinger, Marius Bozga, Joseph Sifakis. 116-133 [doi]
- Checking Correctness of Transactional BehaviorsVincenzo Ciancia, Gian Luigi Ferrari, Roberto Guanciale, Daniele Strollo. 134-148 [doi]
- Specifying and Verifying Web TransactionsJing Li, Huibiao Zhu, Jifeng He. 149-168 [doi]
- Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri NetsJonathan Billington, Amar Kumar Gupta, Guy Edward Gallasch. 169-184 [doi]
- Program Repair Suggestions from Graphical State-Transition SpecificationsFarn Wang, Chih-Hong Cheng. 185-200 [doi]
- Verifying Erlang Telecommunication Systems with the Process Algebra µCRLQiang Guo, John Derrick, Csaba Hoch. 201-217 [doi]
- NQSL - Formal Language and Tool Support for Network Quality-of-Service RequirementsChristian Webel, Reinhard Gotzhein, Joachim Nicolay. 218-233 [doi]
- Timed Mobile Ambients for Network ProtocolsBogdan Aman, Gabriel Ciobanu. 234-250 [doi]
- A Specification Framework for Earth-Friendly LogisticsIchiro Satoh. 251-266 [doi]
- A Hierarchy of Equivalences for Probabilistic ProcessesManuel Núñez, Luis Fernando Llana Díaz. 267-282 [doi]
- Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic BisimulationsDavid de Frutos-Escrig, Miguel Palomino, Ignacio Fábregas. 283-298 [doi]
- Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine LearningGuoqiang Shu, Yating Hsu, David Lee. 299-304 [doi]
- Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication ProtocolWei Wang, Dongyao Ji. 305-323 [doi]
- Protocol Modeling with Model Program CompositionMargus Veanes, Wolfram Schulte. 324-339 [doi]