Abstract is missing.
- The State of Fault Injection Vulnerability DetectionThomas Given-Wilson, Nisrine Jafri, Axel Legay. 3-21 [doi]
- Replacing Store Buffers by Load Buffers in TSOParosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmed Bouajjani, Tuan Phong Ngo. 22-28 [doi]
- Orchestration Synthesis for Real-Time Service ContractsDavide Basile, Maurice H. ter Beek, Axel Legay, Louis-Marie Traonouez. 31-47 [doi]
- Modelling and Verification of Dynamic Role-Based Access ControlInna Vistbakka, Elena Troubitsyna. 48-63 [doi]
- Performance Evaluation of Dynamic Load Balancing Protocols Based on Formal Models in Cloud EnvironmentsRoua Ben Hamouda, Sabrine Boussema, Imene Ben Hafaiedh, Riadh Robbana. 64-79 [doi]
- A Protocol for Constraint Automata Execution in a Synchronous Network of ProcessorsAlireza Farhadi, Mohammad Izadi, Jafar Habibi. 80-94 [doi]
- MBT/CPN: A Tool for Model-Based Software Testing of Distributed Systems Protocols Using Coloured Petri NetsRui Wang, Lars Michael Kristensen, Volker Stolz. 97-113 [doi]
- How to Be Sure a Faulty System Does Not Always Appear Healthy?Lina Ye, Philippe Dague, Delphine Longuet, Laura Brandán Briones, Agnes Madalinski. 114-129 [doi]
- Improving Parallel State-Space Exploration Using Genetic AlgorithmsEtienne Renault. 133-149 [doi]
- LTL Model-Checking for Communicating Concurrent ProgramsAdrien Pommellet, Tayssir Touili. 150-165 [doi]
- Exploiting Local Persistency for Reduced State Space GenerationKamel Barkaoui, Hanifa Boucheneb, Zhiwu Li. 166-181 [doi]
- Analysis of a Road/Tramway Intersection by the ORIS ToolLaura Carnevali, Alessandro Fantechi, Gloria Gori, Enrico Vicario. 185-199 [doi]
- Toward Implicit Learning for the Compositional Verification of Markov Decision ProcessesRedouane Bouchekir, Mohand Cherif Boukala. 200-217 [doi]