Abstract is missing.
- The quest for average response timeThomas A. Henzinger. 4 [doi]
- Stochastic contracts for cyber-physical system design under probabilistic requirementsJiwei Li, Pierluigi Nuzzo, Alberto L. Sangiovanni-Vincentelli, Yugeng Xi, Dewei Li. 5-14 [doi]
- On improving rare event simulation for probabilistic safety analysisTim Gonschorek, Ben Rabeler, Frank Ortmeier, Dirk Schomburg. 15-24 [doi]
- Quantifying the information leak in cache attacks via symbolic executionSudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller. 25-35 [doi]
- Efficient realization of logical execution times in legacy embedded softwareStefan Resmerita, Andreas Naderlinger, Stefan Lukesch. 36-45 [doi]
- Model-based availability analysis for automated production systems: a case studyJakob Mund, Maximilian Junker, Safa Bougouffa, Suhyun Cha, Birgit Vogel-Heuser. 46-55 [doi]
- Model-based, mutation-driven test case generation via heuristic-guided branching searchAndreas Fellner, Willibald Krenn, Rupert Schlick, Thorsten Tarrach, Georg Weissenbacher. 56-66 [doi]
- Automatic evaluation of complex design decisions in component-based software architecturesMax Scheerer, Axel Busch, Anne Koziolek. 67-76 [doi]
- More than true or false: native support of irregular values in the automatic validation & verification of UML/OCL modelsNils Przigoda, Philipp Niemann, Judith Peters, Frank Hilken, Robert Wille, Rolf Drechsler. 77-86 [doi]
- Property templates for checking source code securityElizabeth I. Leonard, Myla M. Archer, Constance L. Heitmeyer. 87-90 [doi]
- Formal verification of complex systems: model-based and data-driven methodsAlessandro Abate. 91-93 [doi]
- Extraction of missing formal assumptions in under-constrained designsGuillaume Plassan, Katell Morin-Allory, Dominique Borrione. 94-103 [doi]
- Hyperproperties of real-valued signalsLuan Viet Nguyen, James Kapinski, Xiaoqing Jin, Jyotirmoy V. Deshmukh, Taylor T. Johnson. 104-113 [doi]
- Yise - a novel framework for boolean networks using y-inverter graphsArun Chandrasekharan, Daniel Große, Rolf Drechsler. 114-117 [doi]
- Using the coq theorem prover to verify complex data structure invariantsKenneth Roe, Scott F. Smith. 118-121 [doi]
- A core calculus for secure hardware: its formal semantics and proof systemThomas N. Reynolds, Adam M. Procter, William L. Harrison, Gerard Allwein. 122-131 [doi]
- Releasing VDM proof obligations with SMT solversHsin-hung Lin, Bow-Yaw Wang. 132-135 [doi]
- Simulation of cyber-physical systems using IEC61499Hammond A. Pearce, Matthew M. Y. Kuo, Nathan Allen, Partha S. Roop, Avinash Malik. 136-145 [doi]
- Monitoring mobile and spatially distributed cyber-physical systemsEzio Bartocci, Luca Bortolussi, Michele Loreti, Laura Nenzi. 146-155 [doi]
- Elevate embedded real-time programming with a synchronous languageFranz-Josef Grosch. 156 [doi]
- Concurrent execution system for action languagesAntti Jääskeläinen, Hannu-Matti Järvinen, Mikko Tiusanen. 157-160 [doi]
- A reactive specification formalism for enhancing system development, analysis and adaptivityAssaf Marron. 161-164 [doi]
- A refinement-based compiler development for synchronous languagesJean-Paul Bodeveix, Mamoun Filali-Amine, Shuanglong Kan. 165-174 [doi]
- Compositional dataflow circuitsStephen A. Edwards, Richard Townsend, Martha A. Kim. 175-184 [doi]
- Liam: an actor based programming model for HDLsHaven Skinner, Rafael Trapani Possignolo, Jose Renau. 185-188 [doi]