Abstract is missing.
- Engineering a Theory of Concurrent ProgrammingIan J. Hayes. 3-18 [doi]
- Behaviour-Driven Formal Model DevelopmentColin F. Snook, Thai Son Hoang, Dana Dghaym, Michael J. Butler, Tomas Fischer, Rupert Schlick, Keming Wang. 21-36 [doi]
- The Foul Adversary: Formal ModelsNaipeng Dong, Tim Muller. 37-53 [doi]
- The Miles Before Formal Methods - A Case Study on Modeling and Analyzing a Passenger Lift SystemTeck Ping Khoo, Jun Sun. 54-69 [doi]
- PAR: A Practicable Formal Method and Its Supporting PlatformJinyun Xue, Yujun Zheng, Qimin Hu, Zhen You, Wuping Xie, Zhuo Cheng. 70-86 [doi]
- Deductive Verification of Hybrid Control Systems Modeled in Simulink with KeYmaera XTimm Liebrenz, Paula Herber, Sabine Glesner. 89-105 [doi]
- Verification of Strong Nash-equilibrium for Probabilistic BAR SystemsDileepa Fernando, Naipeng Dong, Cyrille Jégourel, Jin Song Dong. 106-123 [doi]
- Model Checking of C++ Programs Under the x86-TSO Memory ModelVladimír Still, Jiri Barnat. 124-140 [doi]
- Modeling and Verifying NDN Access Control Using CSPYuan-fei, Huibiao Zhu. 143-159 [doi]
- The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled OscillatorsPaul Gainer, Sven Linker, Clare Dixon, Ullrich Hustadt, Michael Fisher 0001. 160-176 [doi]
- CDGDroid: Android Malware Detection Based on Deep Learning Using CFG and DFGZhiwu Xu, Kerong Ren, Shengchao Qin, Florin Craciun. 177-193 [doi]
- Strongly Typed Numerical ComputationsMatthieu Martel. 197-214 [doi]
- Type Capabilities for Object-Oriented Programming LanguagesXi Wu, Yi Lu, Patrick A. Meiring, Ian J. Hayes, Larissa A. Meinicke. 215-230 [doi]
- Capabilities: Effects for FreeAaron Craig, Alex Potanin, Lindsay Groves, Jonathan Aldrich. 231-247 [doi]
- A Framework for Interactive Verification of Architectural Design Patterns in Isabelle/HOLDiego Marmsoler. 251-269 [doi]
- Formalization of Symplectic Geometry in HOL-LightGuohui Wang, Yong Guan, Zhiping Shi, Qianying Zhang, Xiaojuan Li, Yongdong Li. 270-283 [doi]
- Using Theorem Provers to Increase the Precision of Dependence Analysis for Information Flow ControlBernhard Beckert, Simon Bischof, Mihai Herda, Michael Kirsten, Marko Kleine Büning. 284-300 [doi]
- Preserving Liveness Guarantees from Synchronous Communication to Asynchronous Unstructured Low-Level LanguagesNils Berg, Thomas Göthel, Armin Danziger, Sabine Glesner. 303-319 [doi]
- Deriving Mode Logic for Autonomous Resilient SystemsInna Vistbakka, Amin Majd, Elena Troubitsyna. 320-336 [doi]
- UTP Semantics for BigrTiMoWanling Xie, Huibiao Zhu, Shengchao Qin. 337-353 [doi]
- Analysis on Strategies of Superposition Refinement of Event-B SpecificationsTsutomu Kobayashi, Fuyuki Ishikawa. 357-372 [doi]
- Formalising Extended Finite State Machine Transition MergingMichael Foster, Ramsay G. Taylor, Achim D. Brucker, John Derrick. 373-387 [doi]
- Checking Activity Transition Systems with Back Transitions Against AssertionsCunjing Ge, Jiwei Yan, Jun Yan, Jian Zhang. 388-403 [doi]
- Towards Trustworthy AI for Autonomous SystemsHadrien Bride, Jin Song Dong, Zhé Hóu, Brendan P. Mahony, Martin Oxenham. 407-411 [doi]
- Towards Dependable and Explainable Machine Learning Using Automated ReasoningHadrien Bride, Jie Dong, Jin Song Dong, Zhé Hóu. 412-416 [doi]
- Modeling and Verification of Component ConnectorsXiyue Zhang. 419-422 [doi]
- Model Based Testing of Cyber-Physical SystemsTeck Ping Khoo. 423-426 [doi]
- Service-Oriented Design and Verification of Hybrid Control SystemsTimm Liebrenz. 427-431 [doi]
- Developing Reliable Component-Based Software in MediatorYi Li. 432-435 [doi]
- Model Checking Nash-Equilibrium - Automatic Verification of Robustness in Distributed SystemsDileepa Fernando. 436-440 [doi]
- Analyzing Security and Privacy in Design and Implementation of Web Authentication ProtocolsKailong Wang. 441-445 [doi]
- Combining Deep Learning and Probabilistic Model Checking in Sports AnalyticsKan Jiang. 446-449 [doi]
- Security Analysis of Smart Home ImplementationsKulani Mahadewa. 450-454 [doi]
- Principled Greybox FuzzingYuekang Li. 455-458 [doi]
- Engineering Software for Modular Formalisation and Verification of STV AlgorithmsMilad K. Ghale. 459-463 [doi]
- Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed FuzzingXiaoning Du. 464-468 [doi]
- Formalising Performance Guarantees in Meta-Reinforcement LearningAmanda Mahony. 469-472 [doi]