Abstract is missing.
- Data Automata in ScalaKlaus Havelund. 1-9 [doi]
- Trace-Based Temporal Verification for Message-Passing ProgramsJinjiang Lei, Zongyan Qiu, Zhong Shao. 10-17 [doi]
- Spotlight Abstraction with Shade Clustering - Automatic Verification of Parameterised SystemsNils Timm. 18-25 [doi]
- Verifying Preemptive Kernel Code with Preemption Control SupportYu Guo, Haozhong Zhang. 26-33 [doi]
- A Three-Dimensional Model for Software Security EvaluationZhuobing Han, Xiaohong Li, Ruitao Feng, Jing Hu, Guangquan Xu, Zhiyong Feng. 34-41 [doi]
- Contemplating the Addition of Stochastic Behaviour to Hybrid Event-BRichard Banach. 42-49 [doi]
- Modeling Social Networking PrivacyCarolina Dania, Manuel Clavel. 50-57 [doi]
- Alleviating the Impact of Coincidental Correctness on the Effectiveness of SFL by Clustering Test CasesWeishi Li, Xiaoguang Mao. 66-69 [doi]
- Choreography Scenario-Based Test Data GenerationKai Ma, Jin Wang, Hongli Yang, Jun Yan, Jian Zhang, Shengchao Qin. 70-73 [doi]
- Formal Verification of Interrupt Injection in a HypervisorHaozhong Zhang, Yu Guo. 74-81 [doi]
- Combining Syntactic and Semantic Encoding for LTL Bounded Model CheckingWanwei Liu, Xiaoguang Mao, Geguang Pu, Rui Wang. 82-89 [doi]
- Modeling and Verifying the TTCAN Protocol Using Timed CSPQinwen Ran, Xi Wu, Xin Li, Jianqi Shi, Jian Guo, Huibiao Zhu. 90-97 [doi]
- Parametrizing Program AnalysisLunjin Lu. 98-105 [doi]
- Behaviour Inference for Deadlock CheckingKa-I Pun, Martin Steffen, Volker Stolz. 106-113 [doi]
- Branch Obfuscation Using "Black Boxes"Nan Zong, Chunfu Jia. 114-121 [doi]
- An Approach to Modelling and Evaluating AGG Based Reliable Software SystemsChen Li, Linpeng Huang, Luxi Chen, Xiwen Wu. 122-125 [doi]
- Degree of Schedulability of Mixed-Criticality Real-Time Systems with Probabilistic Sporadic TasksAbdeldjalil Boudjadar, Alexandre David, Jin Hyun Kim, Kim G. Larsen, Marius Mikucionis, Ulrik Nyman, Arne Skou. 126-130 [doi]
- Application-Specific Architecture Selection for Embedded Systems via Schedulability AnalysisHan Liu, Hehua Zhang, Yu Jiang, Xiaoyu Song, Ming Gu, Jiaguang Sun. 131-134 [doi]
- Energy-Efficient Task Scheduling and Task Energy Consumption Analysis for Real-Time Embedded SystemsYongqi Ge, Yunwei Dong, Hong-bing Zhao. 135-138 [doi]
- On Statistical Model Checking with PLASMAAxel Legay, Sean Sedwards. 139-145 [doi]
- Mixed Simulation of Multi-valued ModelsOu Wei, Juanjuan Chen. 146-153 [doi]
- An Improved Recursive Algorithm for Parity GamesYao Liu, Zhenhua Duan, Cong Tian. 154-161 [doi]
- Towards a Stochastic Occurrence-Based Modeling Approach for Stochastic CPSsBei Cheng, Dehui Du. 162-169 [doi]
- Bayesian Model-Based Prediction of Service Level Agreement Violations for Cloud ServicesBing Tang, Mingdong Tang. 170-176 [doi]
- Configuration of Services Based on VirtualizationJianmin Jiang, Huibiao Zhu, Qin Li, Shi Zhang, Ping Gong, Zhong Hong. 177-184 [doi]
- Data Resources in Dynamic EnvironmentsWen Zeng, Maciej Koutny. 185-192 [doi]
- iDola: Bridge Modeling to Verification and Implementation of Interrupt-Driven SystemsHan Liu, Hehua Zhang, Yu Jiang, Xiaoyu Song, Ming Gu, Jia-Guang Sun. 193-200 [doi]
- Timed Automata Semantics of Spatial-Temporal Consistency Language STeCYuanrui Zhang, Frédéric Mallet, Yixiang Chen. 201-208 [doi]
- A Formal Development Approach for Self-Organising SystemsQin Li, Graeme Smith. 209-212 [doi]
- Normal Bisimulation for Higher Order Pi-Calculus with Unguarded ChoiceZining Cao. 213-220 [doi]