Abstract is missing.
- Hilt'12 tutorial overview / design of multitask software: the entity-life modeling approachBo I. Sandén. 1-2 [doi]
- Leading-edge Ada verification technologies: highly automated Ada contract checking using bakar kiasanJason Belt, Patrice Chalin, John Hatcliff, Robby. 3-4 [doi]
- Leading-edge ada verification technologies: combining testing and verification with GNATTest and GNATProve - the hi-lite projectJohannes Kanig. 5-6 [doi]
- Safety of embedded softwareNancy Leveson, Cody Harrison Fleming, John Thomas. 7-8 [doi]
- Developing verified programs with DafnyK. Rustan M. Leino. 9-10 [doi]
- Service-oriented architecture (SOA) concepts and implementationsRicky E. Sward, Jeff Boleng. 11-12 [doi]
- Tutorial: multicore programming using divide-and-conquer and work stealingS. Tucker Taft. 13-14 [doi]
- Tutorial overview: understanding dynamic memory management in safety critical javaKelvin Nilsen. 15-22 [doi]
- Keynote presentation: Programming the turing machineBarbara Liskov. 23-24 [doi]
- Program proving using intermediate verification languages (IVLs) like boogie and why3K. Rustan M. Leino. 25-26 [doi]
- Hi-Lite: the convergence of compiler technology and program verificationJohannes Kanig, Edmond Schonberg, Claire Dross. 27-34 [doi]
- Implementation of a simple dimensionality checking system in Ada 2012Edmond Schonberg, Vincent Pucci. 35-42 [doi]
- A new robust and efficient implementation of controlled types in the GNAT compilerHristian Hristov Kirtchev. 43-50 [doi]
- HACMS: high assurance cyber military systemsKathleen Fisher. 51-52 [doi]
- A DSL for cross-domain securityDavid S. Hardin, Konrad Slind, Michael W. Whalen, Tuan-Hung Pham. 53-62 [doi]
- Real-time Java in modernization of the aegis weapon systemKelvin Nilsen. 63-70 [doi]
- FAA's controller pilot automatic data communication (data comm) system software developmentJeffrey O'Leary, Alok Srivastava. 71-72 [doi]
- Synchronization cannot be implemented as a libraryGeert Bosch. 73-80 [doi]
- Applicability of real-time schedulability analysis on a software radio protocolShuai Li, Frank Singhoff, Stéphane Rubini, Michel Bourdellès. 81-94 [doi]
- Programming language life cyclesGuy L. Steele Jr.. 95-96 [doi]
- Adapting ACATS for use with run-time checks suppressedDan Eilers, Tero Koskinen. 97-102 [doi]
- Panel on compiler certification: should we trust our compiler?Lennart Beringer, Randall Brukardt, Thomas Plum, S. Tucker Taft. 103-104 [doi]