Abstract is missing.
- Message from the General Chairs [doi]
- Organizing Committee [doi]
- Additional Reviewers [doi]
- Welcome from the Program Chairs [doi]
- Software Engineering Approaches to Semantic WebJin Song Dong, D. Dan. 2 [doi]
- Multimedia Content Distribution and ProtectionPaolo Nesi. 3 [doi]
- An Introduction to Self-Healing Web ServicesLuciano Baresi, Sam Guinea. 4 [doi]
- A Framework for SOFL-Based Program ReviewYuting Chen, Shaoying Liu, Fumiko Nagoya. 6-7 [doi]
- An Introduction to Three Perspectives on Formal Specification ReviewJianping Yao. 8-9 [doi]
- Design of a Tool for Specification-Based Program ReviewFumiko Nagoya, Shaoying Liu, Yuting Chen. 10-11 [doi]
- A Formal Specification Constructing Tool for SOFLXiang Xue. 12-13 [doi]
- Extending SOFL Features for AOP ModelingYao Shen, Haopeng Chen. 14-15 [doi]
- Extended SOFL Features for the Modeling of Middleware-Based Transaction ManagementHaopeng Chen, Yao Shen, Jian-wei Jiang. 16-17 [doi]
- Tools for an Extended Object Modelling EnvironmentCesar Gonzalez-Perez. 20-23 [doi]
- Grammar-Specified Model-Driven ArchitecturesJun Kong, Kang Zhang, Jing Dong. 24-25 [doi]
- A Strategy for Component-Based Modeling and RefinementJing Liu, Huaikou Miao. 26-27 [doi]
- Principles, Standards and Tools for Model EngineeringJean Bézivin, Frédéric Jouault, David Touzet. 28-29 [doi]
- Evaluating Conformance of UML Models to Design PatternsDae-Kyoo Kim. 30-31 [doi]
- Modeling Diverse and Complex Interactions Enabled by Middleware as Connectors in Software ArchitecturesYali Zhu. 37-46 [doi]
- Secure Software Architectures Design by Aspect OrientationHuiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Gao. 47-55 [doi]
- Modeling Architecture Based Development in UMLYali Zhu, Gang Huang, Hong Mei. 56-65 [doi]
- Analysis and Verification of the Interaction Model in Software DesignGuido Menkhaus, Urs Frei, Jorg Wuthrich. 67-75 [doi]
- Formal Verification of Concurrent and Distributed Constraint-Based Java ProgramsRafael Ramirez, Andrew E. Santosa. 76-84 [doi]
- Detecting Malicious JavaScript Code in MozillaOystein Hallaraker, Giovanni Vigna. 85-94 [doi]
- Extracting FSMs from Object-Z Specifications with History InvariantsJun Sun 0001, Jin Song Dong. 96-105 [doi]
- Formal Methods to Generate Parallel Iterative Codes for PDE-Based ApplicationsPeiyi Tang. 106-115 [doi]
- Formal Requirements-Based Programming for Complex SystemsJames L. Rash, Michael G. Hinchey, Christopher Rouff, Denis Gracanin. 116-125 [doi]
- Ringed Petersen Spheres Connected Hypercube Interconnection NetworksLei Wang, Zhiping P. Chen, Xinhua H. Jiang. 127-131 [doi]
- A General Model for Non-Markovian Stochastic Decision Discrete-Event SystemsWen Chen, Feiyu Lei, Weinong Wang. 132-137 [doi]
- A Slice Monad Transformer and Its Applications in Program SlicingYingzhou Zhang, Baowen Xu. 147-154 [doi]
- Slicing Component-Based SystemsYajuan Pan, Dai Pan, Mei-Hwa Chen. 155-164 [doi]
- A Cost-Efficient Server Architecture for Real-Time Credit-ControlPiotr Tomaszewski, Lars Lundberg, Jim Håkansson, Daniel Häggander. 166-175 [doi]
- A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time SystemsJun Li, Fumin Yang, Yansheng Lu. 176-183 [doi]
- From chi-t to µCRL: Combining Performance and Functional AnalysisAnton Wijs, Wan Fokkink. 184-193 [doi]
- Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven DevelopmentSiv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens. 195-204 [doi]
- Comparing Fault-Proneness Estimation ModelsPierfrancesco Bellini, Ivan Bruno, Paolo Nesi, Davide Rogai. 205-214 [doi]
- Evolving Messaging Systems for Secure Role Based MessagingGansen Zhao, David W. Chadwick. 216-223 [doi]
- Model-Based Design and Analysis of Permission-Based SecurityJan Jürjens, Markus Lehrhuber, Guido Wimmel. 224-233 [doi]
- Exploiting OS-Level Mechanisms to Implement Mobile Code SecurityViktoria Felmetsger, Giovanni Vigna. 234-243 [doi]
- An Internet-Based System for Setup Planning in Machining OperationsGaoliang Peng, Wenjian Liu, Xutang Zhang. 245-251 [doi]
- A B2B Conversational Architecture for Semantic Web Services Based on BPIMS-WSJuan Miguel Gómez, Giner Alor-Hernández, José Oscar Olmedo-Aguirre, Christoph Bussler. 252-259 [doi]
- Conquering the Eight-Tailed Dragon - An Attempt to Deal with Structural and Behavioral ComplexitiesTetsuo Tamai. 261-272 [doi]
- A Component-Based Approach for JavaCard Runtime System DevelopmentChing-Cheng Lee, Sudeshna Ghosh. 274-282 [doi]
- Customizable Framework for Managing Trusted Components Deployed on MiddlewareMinghui Zhou, Wenpin Jiao, Hong Mei. 283-291 [doi]
- Behavior Capture and Test: Automated Analysis of Component IntegrationLeonardo Mariani, Mauro Pezzè. 292-301 [doi]
- Formal Semantics and Verification for Feature ModelingJing Sun, Hongyu Zhang, Yuan-Fang Li, Hai H. Wang. 303-312 [doi]
- Verifying Parameterized RefinementMaty Sylla, Frank A. Stomp, Willem P. de Roever. 313-321 [doi]
- Mediation Systems Modeling and VerificationLi Yang, Raimund K. Ege, Huiqun Yu. 322-331 [doi]
- Robust H-infinity Filter Design for Networked Control System with Random Time DelaysZhihong Huo, Huajing Fang. 333-340 [doi]
- Fluid-Based Stability Analysis of Mixed TCP and UDP Traffic under REDLi Wang, Zeng-zhi Li, Yanping Chen, Ke Xue. 341-348 [doi]
- A Formal General Framework and Service Access Model for Service GridDeqing Zou, Weizhong Qiang, Xuanhua Shi. 349-356 [doi]
- An Intrusion Detection System for AODVBaolin Sun, Hua Chen, Layuan Li. 358-365 [doi]
- Rapid Prototyping of Complex Interactive Simulation SystemsZhiming Zhao, G. Dick van Albada, Peter M. A. Sloot. 366-375 [doi]
- A Study of Secure Communications between Mobile ObjectsZhi-gang Liao, Zeng-zhi Li, Yan Chen, Tao Zhan. 377-383 [doi]
- Recovery Method Based on Communicating Extended Finite State Machine (CEFSM) for Mobile CommunicationsMohammad Zib Beiroumi, Villy Bæk Iversen. 384-393 [doi]
- Identification of Faulty Links in LEO/MEO Satellite Communication NetworksZhigang Zhao, Changqing Gong, Guangxing Wang. 394-400 [doi]
- Inconsistency Measurement of Software Requirements Specifications: An Ontology-Based ApproachXuefeng Zhu, Zhi Jin. 402-410 [doi]
- Consistency Checking of UML RequirementsXiaoshan Li, Zhiming Liu, Jifeng He. 411-420 [doi]
- Using the Metamodel Mechanism to Support Class RefinementWuwei Shen, Weng Liong Low. 421-430 [doi]
- Improving the Robustness and Reliability of Object-Oriented Programs through Exception Analysis and TestingCheng-Ying Mao, Yan-Sheng Lu. 432-439 [doi]
- An Optimized Method for Automatic Test Oracle Generation from Real-Time SpecificationXin Wang, Zhi-Chang Qi, Shuhao Li. 440-449 [doi]
- Regression Testing of Classes Based on TCOZ SpecificationHui Liang. 450-457 [doi]
- Derivation of Implementation Constraints - Implementation Simulation and Treatment of Multiple Design ChoicesP. Mattias Weckstén, Magnus Jonsson, Jonas Vasell. 459-466 [doi]
- Design Patterns for Software Health MonitoringAlexander Lau, Rudolph E. Seviora. 467-476 [doi]
- Dynamic Architectural Connectors in Cooperative Software SystemsWenpin Jiao, Hong Mei. 477-486 [doi]
- Integrating Object-Z with Timed AutomataJin Song Dong, Roger Duke, Ping Hao. 488-497 [doi]
- Mutation Operators for Object-Z SpecificationLing Liu, Huaikou Miao. 498-506 [doi]
- Formal Verification of an Array-Based Nonblocking QueueRobert Colvin, Lindsay Groves. 507-516 [doi]
- A Tool-Supported Approach to Testing UML Design ModelsTrung T. Dinh-Trong, Nilesh Kawane, Sudipto Ghosh, Robert B. France, Anneliese Amschler Andrews. 519-528 [doi]
- Model Checking Live Sequence ChartsJun Sun 0001, Jin Song Dong. 529-538 [doi]
- Effective Generation of Test Sequences for Structural Testing of Concurrent ProgramsW. Eric Wong, Yu Lei, Xiao Ma. 539-548 [doi]
- Evaluating Software Quality Attributes of Communication Components in an Automated Guided Vehicle SystemFrans Mårtensson, Håkan Grahn, Michael Mattsson. 550-558 [doi]
- Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis ToolsAbdelwahab Hamou-Lhadj, Timothy C. Lethbridge. 559-568 [doi]
- Scavenging Complex Genomic Information Using Mobile Code: An EvaluationMauro Pezzè, Davide Tosi, Gian Pietro Picco. 569-578 [doi]
- The Preservation of Interleaving EquivalencesJianmin Jiang, Jinzhao Wu. 580-589 [doi]
- Preserving Consistency of Runtime Monitors across Protocol ChangesMahadevan Subramaniam. 590-599 [doi]
- Coping with Legacy System Migration ComplexityLei Wu, Houari A. Sahraoui, Petko Valtchev. 600-609 [doi]