Abstract is missing.
- Verifying Autonomous SystemsLouise A. Dennis. 3-17 [doi]
- Empowering the Event-B Method Using External TheoriesYamine Aït Ameur, Guillaume Dupont, Ismaïl Mendil, Dominique Méry, Marc Pantel, Peter Riviere, Neeraj Kumar Singh. 18-35 [doi]
- Journal-First: Formal Modelling and Runtime Verification of Autonomous Grasping for Active Debris RemovalMarie Farrell, Nikos Mavrakis, Angelo Ferrando 0001, Clare Dixon, Yang Gao. 39-44 [doi]
- Formal Specification and Verification of JDK's Identity Hash Map ImplementationMartin de Boer, Stijn de Gouw, Jonas Klamroth, Christian Jung, Mattias Ulbrich, Alexander Weigl. 45-62 [doi]
- Reusing Predicate Precision in Value AnalysisMarie-Christine Jakobs. 63-85 [doi]
- Certified Verification of Relational PropertiesLionel Blatter, Nikolai Kosmatov, Virgile Prevosto, Pascale Le Gall. 86-105 [doi]
- Reachability Analysis and Simulation for Hybridised Event-B ModelsYamine Aït Ameur, Sergiy Bogomolov, Guillaume Dupont, Neeraj Kumar Singh, Paulius Stankaitis. 109-128 [doi]
- Operation Caching and State Compression for Model Checking of High-Level Models - How to Have Your Cake and Eat ItMichael Leuschel. 129-145 [doi]
- Conservative Time Discretization: A Comparative StudyMarcelo Forets, Christian Schilling 0001. 149-167 [doi]
- Untangling the Graphs of Timed Automata to Decrease the Number of ClocksNeda Saeedloei, Feliks Kluzniak. 168-187 [doi]
- Probabilistic Model Checking of BPMN Processes at RuntimeYliès Falcone, Gwen Salaün, Ahang Zuo. 191-208 [doi]
- HyperPCTL Model Checking by Probabilistic DecompositionEshita Zaman, Gianfranco Ciardo, Erika Ábrahám, Borzoo Bonakdarpour. 209-226 [doi]
- Learning Finite State Models fromRecurrent Neural NetworksEdi Muskardin, Bernhard K. Aichernig, Ingo Pill, Martin Tappler. 229-248 [doi]
- Kaki: Concurrent Update Synthesis for Regular Policies via Petri GamesNicklas S. Johansen, Lasse B. Kær, Andreas L. Madsen, Kristian Ø. Nielsen, Jirí Srba, Rasmus G. Tollund. 249-267 [doi]
- Verified Password Generation from Password Composition PoliciesMiguel Grilo, João Campos, João F. Ferreira 0001, José Bacelar Almeida, Alexandra Mendes. 271-288 [doi]
- A Policy Language to Capture Compliance of Data Protection RequirementsChinmayi Prabhu Baramashetru, Silvia Lizeth Tapia Tarifa, Olaf Owe, Nils Gruschka. 289-309 [doi]
- Extending Data Flow Coverage to Test Constraint RefinementsAlexander Kolchin, Stepan Potiyenko. 313-321 [doi]
- Scalable Typestate Analysis for Low-Latency EnvironmentsAlen Arslanagic, Pavle Subotic, Jorge A. Pérez 0001. 322-340 [doi]
- Studying Users' Willingness to Use a Formally Verified Password ManagerCarolina Carreira. 343-346 [doi]
- Modeling Explanations in Autonomous VehiclesAkhila Bairy. 347-351 [doi]
- A Requirements-Driven Methodology: Formal Modelling and Verification of an Aircraft Engine ControllerOisín Sheridan, Rosemary Monahan, Matt Luckcuck. 352-356 [doi]
- A Dialogue Interface for Low Code Program EvolutionLuís Carvalho. 357-360 [doi]
- Simple Dependent Types for OSTRICHJoana Parreira. 361-364 [doi]
- SNITCH: A Platform for Information Flow ControlEduardo Geraldo. 365-368 [doi]
- Machine-Assisted Proofs for Institutions in CoqConor Reynolds, Rosemary Monahan. 369-372 [doi]