Abstract is missing.
- Modelling for Mere MortalsJeff Kramer, Jeff Magee. 1-18 [doi]
- Scheduling System VerificationPao-Ann Hsiung, Farn Wang, Yue-Sun Kuo. 19-33 [doi]
- A Period Assignment Algorithm for Real-Time System DesignMinsoo Ryu, Seongsoo Hong. 34-43 [doi]
- Analyzing Stochastic Fixed-Priority Real-Time SystemsMark K. Gardner, Jane W.-S. Liu. 44-58 [doi]
- Timed Diagnostics for Reachability PropertiesStavros Tripakis. 59-73 [doi]
- Fighting Livelock in the i-Protocol: A Comparative Study of Verification ToolsYifei Dong, Xiaoqun Du, Y. S. Ramakrishna, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka, Oleg Sokolsky, Eugene W. Stark, David Scott Warren. 74-88 [doi]
- Proving the Soundness of a Java Bytecode Verifier Specification in Isabelle/HOLCornelia Pusch. 89-103 [doi]
- Automated Fast-Track Reconfiguration of Group Communication SystemsChristoph Kreitz. 104-118 [doi]
- Specifications and Proofs for Ensemble LayersJason Hickey, Nancy A. Lynch, Robbert van Renesse. 119-133 [doi]
- An Automated Analysis of Ping-Pong Interactions in E-mail ServicesAnne Bergeron, Jean-Christophe Manzoni. 134-147 [doi]
- Automatic Verification of Cryptographic Protocols through Compositional Analysis TechniquesDavide Marchignoli, Fabio Martinelli. 148-162 [doi]
- Verification of Hierarchical State/Event Systems Using Reusability and CompositionalityGerd Behrmann, Kim Guldstrand Larsen, Henrik Reif Andersen, Henrik Hulgaard, Jørn Lind-Nielsen. 163-177 [doi]
- On Proving Safety Properties by Integrating Static Analysis, Theorem Proving and AbstractionVlad Rusu, Eli Singerman. 178-192 [doi]
- Symbolic Model Checking without BDDsArmin Biere, Alessandro Cimatti, Edmund M. Clarke, Yunshan Zhu. 193-207 [doi]
- Symbolic Verification of Lossy Channel Systems: Application to the Bounded Retransmission ProtocolParosh Aziz Abdulla, Aurore Annichini, Ahmed Bouajjani. 208-222 [doi]
- Model Checking in CLPGiorgio Delzanno, Andreas Podelski. 223-239 [doi]
- Using Logic Programs with Stable Model Semantics to Solve Deadlock and Reachability Problems for 1-Safe Petri NetsKeijo Heljanko. 240-254 [doi]
- Finite State Verification for the Asynchronous pi-CalculusUgo Montanari, Marco Pistore. 255-269 [doi]
- Process Algebra in PVSTwan Basten, Jozef Hooman. 270-284 [doi]
- On the Benefits of Using the Up-To Techniques for Bisimulation VerificationDaniel Hirschkoff. 285-299 [doi]
- Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing ProcessesZhoujun Li, Huowang Chen. 300-314 [doi]
- Hardware Testing Using a Communication Protocol Conformance Testing ToolHakim Kahlouche, César Viho, Massimo Zendri. 315-329 [doi]
- A Light-Weight Framework for Hardware VerificationChristoph Kern, Tarik Ono-Tesfaye, Mark R. Greenstreet. 330-344 [doi]
- An Easily Extensible Toolset for Tabular Mathematical ExpressionsDavid Lorge Parnas, Dennis K. Peters. 345-359 [doi]
- From DFA-Frameworks to DFA-Generators: A Unifying Multiparadigm ApproachJens Knoop. 360-374 [doi]
- A Theorem Prover-Based Analysis Tool for Object-Oriented DatabasesDavid Spelt, Susan Even. 375-389 [doi]
- DYANA: An Environment for Embedded System Design and AnalysisA. G. Bakhmurov, A. P. Kapitonova, R. L. Smeliansky. 390-404 [doi]
- Path Exploration ToolElsa L. Gunter, Doron Peled. 405-419 [doi]
- Modular State Level Analysis of Distributed Systems Techniques and Tool SupportPeter Buchholz, Peter Kemper. 420-434 [doi]
- Some Issues in the Software Engineering of Verification ToolsPerdita Stevens. 435-438 [doi]
- The ETI Online Service in ActionVolker Braun, Jürgen Kreileder, Tiziana Margaria, Bernhard Steffen. 439-443 [doi]