Abstract is missing.
- Isolating cause-effect chains from computer programsAndreas Zeller. 1-10 [doi]
- Invariant inference for static checkingJeremy W. Nimmer, Michael D. Ernst. 11-20 [doi]
- Egocentric context-aware programming in ad hoc mobile environmentsChristine Julien, Gruia-Catalin Roman. 21-30 [doi]
- A micro-economic approach to conflict resolution in mobile computingLicia Capra, Wolfgang Emmerich, Cecilia Mascolo. 31-40 [doi]
- Architectural primitives for distribution and mobilityAntónia Lopes, José Luiz Fiadeiro, Michel Wermelinger. 41-50 [doi]
- Using redundancies to find errorsYichen Xie, Dawson R. Engler. 51-60 [doi]
- Searching for points-to analysisGlenn Bruns, Satish Chandra. 61-70 [doi]
- Improving program slicing with dynamic points-to dataMarkus Mock, Darren C. Atkinson, Craig Chambers, Susan J. Eggers. 71-80 [doi]
- The logic of bugsGerard J. Holzmann. 81-87 [doi]
- Verifying cross-cutting features as open systemsHarry C. Li, Shriram Krishnamurthi, Kathi Fisler. 89-98 [doi]
- Supporting aggregation in fine grained software configuration managementMark Chu-Carroll, James L. Wright, David Shields. 99-108 [doi]
- Negative scenarios for implied scenario elicitationSebastián Uchitel, Jeff Kramer, Jeff Magee. 109-118 [doi]
- Deriving operational software specifications from system goalsEmmanuel Letier, Axel van Lamsweerde. 119-128 [doi]
- Secure systems development based on the common criteria: the PalME projectMonika Vetterling, Guido Wimmel, Alexander K. Wißpeintner. 129-138 [doi]
- Model exploration with temporal logic query checkingArie Gurfinkel, Benet Devereux, Marsha Chechik. 139-148 [doi]
- Composable semantics for model-based notationsJianwei Niu, Joanne M. Atlee, Nancy A. Day. 149-158 [doi]
- Containment units: a hierarchically composable architecture for adaptive systemsJamieson M. Cobleigh, Leon J. Osterweil, Alexander E. Wise, Barbara Staudt Lerner. 159-165 [doi]
- Triggered message sequence chartsBikram Sengupta, Rance Cleaveland. 167-176 [doi]