Abstract is missing.
- New Challenges in the Development of Critical Embedded Systems - An aeromotive PerspectiveVisar Januzaj, Stefan Kugele, Boris Langer, Christian Schallhart, Helmut Veith. 1-2 [doi]
- Certification of Embedded Software - Impact of ISO DIS 26262 in the Automotive DomainBernhard Schätz. 3 [doi]
- Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-PatternsAlain Plantec, Frank Singhoff, Pierre Dissaux, Jérôme Legrand. 4-17 [doi]
- Seamless Model-Driven Development Put into PracticeWolfgang Haberl, Markus Herrmannsdörfer, Stefan Kugele, Michael Tautschnig, Martin Wechs. 18-32 [doi]
- Timely Time EstimatesAndreas Holzer, Visar Januzaj, Stefan Kugele, Michael Tautschnig. 33-46 [doi]
- Compiler-Support for Robust Multi-core ComputingRaimund Kirner, Stephan Herhut, Sven-Bodo Scholz. 47-57 [doi]
- Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded SystemsYamine Aït Ameur, Frédéric Boniol, Dominique Méry, Virginie Wiels. 58-59 [doi]
- Analyzing the Security in the GSM Radio Network Using Attack JunglesParosh Aziz Abdulla, Jonathan Cederberg, Lisa Kaati. 60-74 [doi]
- Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ MethodIakovos Ouranos, Petros S. Stefaneas, Kazuhiro Ogata. 75-89 [doi]
- Model-Driven Design-Space Exploration for Embedded Systems: The Octopus ToolsetTwan Basten, Emiel van Benthum, Marc Geilen, Martijn Hendriks, Fred Houben, Georgeta Igna, Frans Reckers, Sebastian de Smet, Lou J. Somers, Egbert Teeselink. 90-105 [doi]
- Contract-Based SlicingDaniela Carneiro da Cruz, Pedro Rangel Henriques, Jorge Sousa Pinto. 106-120 [doi]
- Special Track on Worst Case Traversal Time (WCTT)Anne Bouillard, Marc Boyer, Samarjit Chakraborty, Steven Martin, Jean-Luc Scharbarg, Giovanni Stea, Eric Thierry. 121 [doi]
- The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network CalculusMarc Boyer, Nicolas Navet, Xavier Olive, Eric Thierry. 122-136 [doi]
- NC-Maude: A Rewriting Tool to Play with Network CalculusMarc Boyer. 137-151 [doi]
- DEBORAH: A Tool for Worst-Case Analysis of FIFO TandemsLuca Bisti, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea. 152-168 [doi]
- A Self-adversarial Approach to Delay Analysis under Arbitrary SchedulingJens B. Schmitt, Hao Wang, Ivan Martinovic. 169-183 [doi]
- Flow Control with (Min, +) AlgebraEuriell Le Corronc, Bertrand Cottenceau, Laurent Hardouin. 184-197 [doi]
- An Interface Algebra for Estimating Worst-Case Traversal Times in Component NetworksNikolay Stoimenov, Samarjit Chakraborty, Lothar Thiele. 198-213 [doi]
- Towards Resource-Optimal Routing Plans for Real-Time TrafficAlessandro Lori, Giovanni Stea, Gigliola Vaglini. 214-227 [doi]
- Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched EthernetXiaoting Li, Jean-Luc Scharbarg, Christian Fraboul. 228-242 [doi]
- Analyzing End-to-End Functional Delays on an IMA PlatformMichaël Lauer, Jérôme Ermont, Claire Pagetti, Frédéric Boniol. 243-257 [doi]
- Tools in Scientific Workflow CompositionJoost N. Kok, Anna-Lena Lamprecht, Mark D. Wilkinson. 258-260 [doi]
- Workflows for Metabolic Flux Analysis: Data Integration and Human InteractionTolga Dalman, Peter Droste, Michael Weitzel, Wolfgang Wiechert, Katharina Nöh. 261-275 [doi]
- Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQLCarlos Soares, Miguel Calejo. 276-284 [doi]
- Combining Subgroup Discovery and Permutation Testing to Reduce ReduncancyJeroen S. de Bruin, Joost N. Kok. 285-300 [doi]
- Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-InsDavid Withers, Edward A. Kawas, E. Luke McCarthy, Benjamin P. Vandervalk, Mark D. Wilkinson. 301-312 [doi]
- Workflow Construction for Service-Oriented Knowledge DiscoveryVid Podpecan, Monika Záková, Nada Lavrac. 313-327 [doi]
- Workflow Composition and Enactment Using jORCAJohan Karlsson, Victoria Martin-Requena, Javier Ríos, Oswaldo Trelles. 328-339 [doi]
- A Linked Data Approach to Sharing Workflows and Workflow ResultsMarco Roos, Sean Bechhofer, Jun Zhao, Paolo Missier, David R. Newman, David De Roure, M. Scott Marshall. 340-354 [doi]
- Towards More Adaptive Voice ApplicationsJörg Ott. 355-366 [doi]
- Telco Service Delivery Platforms in the Last Decade - A R&D PerspectiveSandford Bessler. 367-374 [doi]
- Ontology-Driven Pervasive Service Composition for Everyday LifeJiehan Zhou, Ekaterina Gilman, Jukka Riekki, Mika Rautiainen, Mika Ylianttila. 375-389 [doi]
- Navigating the Web of Things: Visualizing and Interacting with Web-Enabled ObjectsMathieu Boussard, Pierrick Thébault. 390-398 [doi]
- Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service EvolutionGyu Myoung Lee, Noël Crespi. 399-410 [doi]
- Relay Placement Problem in Smart Grid DeploymentWei-Lun Wang, Quincy Wu. 411-424 [doi]
- Towards a Research Agenda for Enterprise CrowdsourcingMaja Vukovic, Claudio Bartolini. 425-434 [doi]
- Analyzing Collaboration in Software Development Processes through Social NetworksAndréa Magalhães Magdaleno, Cláudia Maria Lima Werner, Renata Mendes de Araujo. 435-446 [doi]
- A Web-Based Framework for Collaborative InnovationDonald D. Cowan, Paulo S. C. Alencar, Fred McGarry, Carlos José Pereira de Lucena, Ingrid Nunes. 447-461 [doi]
- A Distributed Dynamics for WebGraph DecontaminationVanessa C. F. Gonçalves, Priscila M. V. Lima, Nelson Maculan, Felipe M. G. França. 462-472 [doi]
- Increasing Users Trust on Personal Assistance Software Using a Domain-Neutral High-Level User ModelIngrid Nunes, Simone Diniz Junqueira Barbosa, Carlos José Pereira de Lucena. 473-487 [doi]
- Understanding IT OrganizationsClaudio Bartolini, Karin Breitman, Simone Diniz Junqueira Barbosa, Mathias Sallé, Rita Berardi, Glaucia Melissa Campos, Erik Eidt. 488-501 [doi]
- On the 2-Categorical View of ProofsCecilia Englander, Edward Hermann Haeusler. 502-518 [doi]
- WOMM: A Weak Operational Memory ModelArnab De, Abhik Roychoudhury, Deepak D Souza. 519-534 [doi]
- A Memory Model for Static Analysis of C ProgramsZhongxing Xu, Ted Kremenek, Jian Zhang. 535-548 [doi]
- Analysing Message Sequence Graph SpecificationsJoy Chakraborty, Deepak D Souza, K. Narayan Kumar. 549-563 [doi]
- Optimize Context-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-EliminationQian Li, Jianhua Zhao, Xuandong Li. 564-578 [doi]
- A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAALAnders P. Ravn, Jirí Srba, Saleem Vighio. 579-593 [doi]
- SPARDL: A Requirement Modeling Language for Periodic Control SystemZheng Wang, Jianwen Li, Yongxin Zhao, Yanxia Qi, Geguang Pu, Jifeng He, Bin Gu. 594-608 [doi]
- AutoPA: Automatic Prototyping from RequirementsXiaoshan Li, Zhiming Liu, Martin Schäf, Ling Yin. 609-624 [doi]
- Systematic Model-Based Safety Assessment Via Probabilistic Model CheckingAdriano Gomes, Alexandre Mota, Augusto Sampaio, Felipe Ferri, Julio Buzzi. 625-639 [doi]
- Learning Techniques for Software Verification and Validation - Special Track at ISoLA 2010Dimitra Giannakopoulou, Corina S. Pasareanu. 640-642 [doi]
- Comparing Learning Algorithms in Automated Assume-Guarantee ReasoningYu-Fang Chen, Edmund M. Clarke, Azadeh Farzan, Fei He, Ming-Hsien Tsai, Yih-Kuen Tsay, Bow-Yaw Wang, Lei Zhu. 643-657 [doi]
- Inferring Compact Models of Communication Protocol EntitiesTherese Bohlin, Bengt Jonsson, Siavash Soleimanifard. 658-672 [doi]
- Inference and Abstraction of the Biometric PassportFides Aarts, Julien Schmaltz, Frits W. Vaandrager. 673-686 [doi]
- From ZULU to RERS - Lessons Learned in the ZULU ChallengeFalk Howar, Bernhard Steffen, Maik Merten. 687-704 [doi]