Abstract is missing.
- Protocol Conformance of Collaborative SPARQL Using Multiparty Session TypesAri Hernawan, Nobuko Yoshida. 1-18 [doi]
- Composition Machines: Programming Self-organising Software Models for the Emergence of Sequential Program SpacesDamian Arellanes. 19-37 [doi]
- Slicing Assisted Program Verification: An Empirical StudyWenjian Chai, Rongjie Yan, Wenhui Zhang, Jian Zhang. 38-57 [doi]
- An Approach to Improving Reliability of Parallel Graph ComputationJin Cui, Zhenhua Duan. 58-72 [doi]
- Safe and Infinite Resource Scheduling Using Energy Timed AutomataPieter J. L. Cuijpers, Jonas Hansen, Kim G. Larsen. 73-90 [doi]
- Intrathread Method Orders Based Adaptive Testing of Concurrent ObjectsYibo Dai, Peng Wu, Shecheng Cui, Linhai Ma. 91-108 [doi]
- An Abstract Interpretation-Based Data Leakage Static AnalysisFilip Drobnjakovic, Pavle Subotic, Caterina Urban. 109-126 [doi]
- On the Decidability of Disassembling BinariesDaniel Engel, Freek Verbeek, Binoy Ravindran. 127-145 [doi]
- Finding Deep-Hidden Bugs in Android Apps via Functional Semantics Guided ExplorationSiyi Gu, Xiaoqiang Liu, Hui Guo, Bochun Cao, Baiyan Li, Lizhi Cai, Hu Yun. 146-164 [doi]
- Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Features on Program SlicesHaoyu Guo, Xiaodong Zhang, Zhiwei Zhang, Yulong Shen. 165-185 [doi]
- Fuzzing for Stateful Protocol Implementations: Are We There Yet?Kunpeng Jian, Yanyan Zou, Yeting Li, Jialun Cao, Menghao Li, Jian Sun, Jingyi Shi, Wei Huo. 186-204 [doi]
- CtxFuzz: Discovering Heap-Based Memory Vulnerabilities Through Context Heap Operation Sequence Guided FuzzingJiacheng Jiang, Cheng Wen, Shengchao Qin. 205-223 [doi]
- An Adaptive Real-Time Garbage Collection Method Based on File Write PredictionJingjing Jiang, Mengfei Yang, Lei Qiao, Tingyu Wang, Zhi Ma, Shaofeng Li, Shenghui Zhu. 224-241 [doi]
- Tree-Based Synthesis of Web Test Sequences from Manual ActionsPengkun Jiang, Sinan Wang, Yepang Liu 0001. 242-260 [doi]
- Gradual Typing Performance, Micro Configurations and Macro PerspectivesMohammad Wahiduzzaman Khan, Sheng Chen. 261-278 [doi]
- ISS-Scenario: Scenario-Based Testing in CARLARenjue Li, Tianhang Qin, Cas Widdershoven. 279-286 [doi]
- Verified Validation for Affine Scheduling in Polyhedral CompilationXuyang Li, Hongjin Liang, Xinyu Feng. 287-305 [doi]
- A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand SpaceYongjian Li, Hongjian Jiang, Yongxin Zhao. 306-323 [doi]
- Empirically Scalable Invariant Generation Leveraging Divide-and-Conquer with PruningHongming Liu, Guoqiang Li 0001. 324-342 [doi]
- DeepCDCL: A CDCL-based Neural Network Verification FrameworkZongxin Liu, Pengfei Yang, Lijun Zhang 0001, Xiaowei Huang 0001. 343-355 [doi]
- Energy-Efficient Motion Planning for Autonomous Vehicles Using Uppaal StrategoMuhammad Naeem, Rong Gu, Cristina Seceleanu, Kim Guldstrand Larsen, Brian Nielsen, Michele Albano. 356-373 [doi]
- CFStra: Enhancing Configurable Program Analysis Through LLM-Driven Strategy Selection Based on Code FeaturesJie Su, Liansai Deng, Cheng Wen, Shengchao Qin, Cong Tian. 374-391 [doi]
- Improved Incremental Verification for Neural NetworksXuezhou Tang. 392-409 [doi]
- Automatic Construction of HD Maps for Simulation-Based Testing of Autonomous Driving SystemsSiqi Wang, Changwen Li, Tiantian Sun, Fuqi Jia, Rongjie Yan, Jun Yan. 410-427 [doi]
- Managing Traceability for Software Life Cycle ProcessesHao Wen 0008, Jinzhao Wu, Jianmin Jiang, Jianqing Li, Zhong Hong. 428-445 [doi]
- A Natural Formalized Proof LanguageLihan Xie, Zhicheng Hui, Qinxiang Cao. 446-464 [doi]
- Strong Forgetting in Hennessy-Milner LogicXin Zhou, Yisong Wang, Renyan Feng, Songhang Xu. 465-472 [doi]