Abstract is missing.
- LTL Model Checking of Self Modifying CodeTayssir Touili, Xin Ye. 1-10 [doi]
- Formal Verification of Dynamic and Stochastic Behaviors for Automotive SystemsLi Huang, Tian Liang, Eun-Young Kang 0001. 11-20 [doi]
- Checking Multi-Agent Systems Against Temporal-Epistemic SpecificationsRan Chen, Wenhui Zhang. 21-30 [doi]
- Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task LearningXi Gong, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Zhuobing Han. 31-40 [doi]
- Static Detection of Control-Flow-Related Vulnerabilities Using Graph EmbeddingXiao Cheng, Haoyu Wang, Jiayi Hua, Miao Zhang, Guoai Xu, Li Yi, Yulei Sui. 41-50 [doi]
- Industry-Oriented Project-Based Learning of Software EngineeringMaria Spichkova. 51-60 [doi]
- MobiDroid: A Performance-Sensitive Malware Detection System on Mobile PlatformRuitao Feng, Sen Chen, Xiaofei Xie, Lei Ma 0003, Guozhu Meng, Yang Liu 0003, Shang-Wei Lin. 61-70 [doi]
- Squeezing State Spaces of (Attack-Defence) TreesLaure Petrucci, Michal Knapik, Wojciech Penczek, Teofil Sidoruk. 71-80 [doi]
- QuickAdapt: Scalable Adaptation for Big Data Cyber Security AnalyticsFaheem Ullah, Muhammad Ali Babar. 81-86 [doi]
- On the Expressive Power of Invariants in Parametric Timed AutomataÉtienne André, Didier Lime, Mathias Ramparison. 87-96 [doi]
- Behaviour-Driven Formal Model Development of the ETCS Hybrid Level 3Michael J. Butler, Dana Dghaym, Thai Son Hoang, Tope Omitola, Colin F. Snook, Andreas Fellner, Rupert Schlick, Thorsten Tarrach, Tomas Fischer, Peter Tummeltshammer. 97-106 [doi]
- Modelling Hybrid Train Speed Controller using Proof and RefinementPaulius Stankaitis, Guillaume Dupont, Neeraj Kumar Singh, Yamine Aït Ameur, Alexei Iliasov, Alexander B. Romanovsky. 107-113 [doi]
- Efficient Contention-Aware Scheduling of SDF Graphs on Shared Multi-Bank MemoryHai Nam Tran, Alexandre Honorat, Jean-Pierre Talpin, Thierry Gautier, Loïc Besnard. 114-123 [doi]
- Adaptive Randomized Scheduling for Concurrency Bug DetectionZan Wang, Dongdi Zhang, Shuang Liu, Jun Sun 0001, Yingquan Zhao. 124-133 [doi]
- Efficient Retiming of Unfolded Synchronous Dataflow GraphsXue-Yang Zhu. 134-143 [doi]
- A Formally Verified Buddy Memory Allocation ModelKe Jiang, David Sanán, Yongwang Zhao, Shuanglong Kan, Yang Liu 0003. 144-153 [doi]
- EFLightPM: An Efficient and Lightweight Persistent Memory SystemKaixin Huang, Yan Yan, Linpeng Huang. 154-163 [doi]
- Toward New Unit-Testing Techniques for Shared-Memory Concurrent ProgramsSung-Shik Jongmans. 164-169 [doi]
- Automatic Difficulty Management and Testing in Games using a Framework Based on Behavior Trees and Genetic AlgorithmsCiprian Paduraru, Miruna Paduraru. 170-179 [doi]
- Safe Inputs Approximation for Black-Box SystemsBai Xue, Yang Liu 0003, Lei Ma 0003, Xiyue Zhang, Meng Sun 0002, Xiaofei Xie. 180-189 [doi]
- Assessing the Relation Between Hazards and Variability in Automotive SystemsXiao-Yi Zhang, Paolo Arcaini, Fuyuki Ishikawa. 190-199 [doi]
- On the Evolution of Mobile App ComplexityJun Gao, Li Li 0029, Tegawendé F. Bissyandé, Jacques Klein. 200-209 [doi]
- Apla Generic Constraint Matching Detection and VerificationZhengkang Zuo, Zhihao Liu, Changjing Wang, Zhen You, Qimin Hu. 210-219 [doi]
- Bi-Abductive Inference for Shape and Ordering PropertiesChristopher Curry, Quang Loc Le, Shengchao Qin. 220-225 [doi]
- Recovering Software Architecture Product LinesMohamed Lamine Kerdoudi, Tewfik Ziadi, Chouki Tibermacine, Salah Sadou. 226-235 [doi]
- A Formal Methods Approach to Security Requirements Specification and VerificationQuentin Rouland, Brahim Hamid, Jean-Paul Bodeveix, Mamoun Filali. 236-241 [doi]
- Measuring Opacity for Non-Probabilistic DES: a SOG-Based ApproachAmina Bourouis, Kais Klai, Nejib Ben Hadj-Alouane. 242-247 [doi]