Abstract is missing.
- Expressiveness of Notations for Reasoning about ConcurrencyCliff Jones. 1 [doi]
- Hybrid Relation CalculusJifeng He. 2 [doi]
- Goal Model Elaboration for Software EvolutionShinichi Honiden. 3 [doi]
- Modeling and Verification of Component-Based Systems with Data Passing Using BIPChen Su, Min Zhou, Liangze Yin, Hai Wan, Ming Gu. 4-13 [doi]
- Modeling and Verifying Real-Time Properties of Reactive SystemsFenglin Han, Peter Herrmann, Hien Le. 14-23 [doi]
- Knowledge-Based Verification of Service Compositions - An SMT ApproachSven Walther, Heike Wehrheim. 24-32 [doi]
- CosyVerif: An Open Source Extensible Verification EnvironmentÉtienne André, Yousra Lembachar, Laure Petrucci, Francis Hulin-Hubard, Alban Linard, Lom Hillah, Fabrice Kordon. 33-36 [doi]
- Measurements for Adaptation Level and Efficiency of Adaptive Software SystemsWenpin Jiao. 37-45 [doi]
- Network Performance Evaluation for Distributed Embedded Systems Using Feature ModelsMartin Manderscheid, Christian Prehofer. 46-55 [doi]
- A Model-Driven Approach for Evaluating System of SystemsXiaokai Xia, Ji Wu, Chao Liu, Luo Xu. 56-64 [doi]
- An Adequate Logic for Heterogeneous SystemsMarc Aiguier, Boris Golden, Daniel Krob. 65-74 [doi]
- A Refinement Calculus for PromelaAsankhaya Sharma. 75-84 [doi]
- Reusing Search Tree for Incremental SAT Solving of Temporal InductionLiangze Yin, Fei He, Min Zhou, Ming Gu. 85-92 [doi]
- Formal Modelling and Analysis of AODVXiaofeng Wu, Jeff W. Sanders, Huibiao Zhu. 93-100 [doi]
- Spatio-temporal Properties Analysis for Cyber-physical SystemsZhucheng Shao, Jing Liu, Zuohua Ding, Mingsong Chen, Ningkang Jiang. 101-110 [doi]
- Using Bounded Fairness to Specify and Verify Ordered Asynchronous Multi-agent SystemsQin Li, Graeme Smith. 111-120 [doi]
- Automatic Analysis of TiMo Systems in PATGabriel Ciobanu, Manchun Zheng. 121-124 [doi]
- Observer Patterns for Real-Time SystemsÉtienne André. 125-134 [doi]
- Model-Based Verification of Energy-Aware Real-Time Automotive SystemsEun-Young Kang, Gilles Perrouin, Pierre-Yves Schobbens. 135-144 [doi]
- Tool Support for the Analysis of TADL2 Timing Constraints Using TimeSquareArda Goknil, Julien DeAntoni, Marie-Agnès Peraldi-Frati, Frédéric Mallet. 145-154 [doi]
- Model-Driven Performance Prediction of Distributed Real-Time Embedded Defense SystemsKatrina Falkner, Vanea Chiprianov, Nickolas J. G. Falkner, Claudia Szabo, James Hill, Gavin Puddy, Dan Fraser, Adrian Johnston, Marianne Rieckmann, Andrew Wallis. 155-158 [doi]
- Web Services Testing via Goal and MutationM. Shaban Jokhio, Gillian Dobbie, Jing Sun 0002, Tianming Hu. 159-162 [doi]
- GUI Ferret: GUI Test Tool to Analyze Complex Behavior of Multi-window ApplicationsHajime Nakajima, Takeshi Masuda, Ikuya Takahashi. 163-166 [doi]
- Merging Test ModelsMohamed Mussa, Ferhat Khendek. 167-170 [doi]
- History-Based Test Case Prioritization with Software Version AwarenessChu-Ti Lin, Cheng-Ding Chen, Chang-Shi Tsai, Gregory M. Kapfhammer. 171-172 [doi]
- Exploiting Concurrency for the ESB ArchitectureRidha Benosman, Kamel Barkaoui, Yves Albrieux. 173-176 [doi]
- A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax ApplicationsXinshu Dong, Kailas Patil, Jian Mao, Zhenkai Liang. 177-187 [doi]
- Protecting Web Browser Extensions from JavaScript Injection AttacksAnton Barua, Mohammad Zulkernine, Komminist Weldemariam. 188-197 [doi]
- Automated Analysis of Reliability ArchitecturesMarco Bozzano, Alessandro Cimatti, Cristian Mattarei. 198-207 [doi]
- A Software Environment for Confining Malicious Android Applications via Resource VirtualizationXiaolei Li, Guangdong Bai, Zhenkai Liang, Heng Yin. 208-211 [doi]
- How Do Developers Use APIs? A Case Study in ConcurrencyStefan Blom, Joseph Kiniry, Marieke Huisman. 212-221 [doi]
- Software Internationalization and Localization: An Industrial ExperienceXin Xia, David Lo, Feng Zhu, Xinyu Wang, Bo Zhou. 222-231 [doi]
- Runtime Prediction of Failure Modes from System Error LogsAtef Shalan, Mohammad Zulkernine. 232-241 [doi]
- Orion: A Software Project Search Engine with Integrated Diverse Software ArtifactsTegawendé F. Bissyandé, Ferdian Thung, David Lo, Lingxiao Jiang, Laurent Réveillère. 242-245 [doi]
- Rigorous Analysis of Temporal Access Control Properties in Mobile SystemsMustafa Al-Lail, Ramadan Abdunabi, Robert B. France, Indrakshi Ray. 246-251 [doi]
- CARE: A Platform for Reliable Comparison and Analysis of Reverse-Engineering TechniquesSylvain Lamprier, Nicolas Baskiotis, Tewfik Ziadi, Lom-Messan Hillah. 252-255 [doi]
- Resilient Architecture for Complex Computing SystemsIchiro Satoh. 256-259 [doi]
- Linking Algebraic Semantics and Operational Semantics for Web Services Using MaudePeng Liu, Huibiao Zhu, Shengchao Qin, Phillip J. Brooke, Xi Wu. 260-263 [doi]
- Game-Based Monitors for Scenario-Based SpecificationPengcheng Zhang, Jun Yu, Wenrui Li, Hareton Leung. 264-267 [doi]