default search action
Formal Aspects of Computing, Volume 20
Volume 20, Number 1, January 2008
- Cliff B. Jones, Jim Woodcock:
Editorial. 1-3 - Jim Woodcock, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob:
The certification of the Mondex electronic purse to ITSEC Level E6. 5-19 - Tahina Ramananandro:
Mondex , an electronic purse: specification and refinement checks with the Alloy model-finding method. 21-39 - Dominik Haneberg, Gerhard Schellhorn, Holger Grandy, Wolfgang Reif:
Verification of Mondex electronic purses with KIV: from transactions to a security protocol. 41-59 - Michael J. Butler, Divakar Yadav:
An incremental development of the Mondex system in Event-B. 61-77 - Mirco Kuhlmann, Martin Gogolla:
Modeling and validating Mondex scenarios described in UML and OCL with USE. 79-100 - Chris George, Anne E. Haxthausen:
Specification, proof, and model checking of the Mondex electronic purse using RAISE. 101-116 - Leo Freitas, Jim Woodcock:
Mechanising Mondex with Z/Eves. 117-139
Volume 20, Number 2, March 2008
- Brijesh Dongol, Arjan J. Mooij:
Streamlining progress-based derivations of concurrent programs. 141-160 - Michael Möller, Ernst-Rüdiger Olderog, Holger Rasch, Heike Wehrheim:
Integrating a formal method into a software engineering process with UML and Java. 161-204 - Purandar Bhaduri, S. Ramesh:
Interface synthesis and protocol conversion. 205-224 - Hanifa Boucheneb:
Interval timed coloured Petri net: efficient construction of its state class space preserving linear properties. 225-238
Volume 20, Number 3, May 2008
- Dines Bjørner:
John Warner Backus: 3 Dec 1924-17 March 2007. 239-240 - Julien Schmaltz, Dominique Borrione:
A functional formalization of on chip communications. 241-258 - Florian Kammüller:
Formalizing non-interference for a simple bytecode language in Coq. 259-275 - Gavin Lowe:
Specification of communicating processes: temporal logic versus refusals-based refinement. 277-294 - Steve Reeves, David Streader:
Data refinement and singleton failures refinement are not equivalent. 295-301 - Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Efficient representation of the attacker's knowledge in cryptographic protocols analysis. 303-348
Volume 20, Numbers 4-5, July 2008
- Kamel Barkaoui, Manfred Broy, Ana Cavalcanti, Antonio Cerone:
Guest Editorial. 349-350 - Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo, Angelo Troina:
Bisimulations in calculi modelling membranes. 351-377 - Aaron R. Bradley, Zohar Manna:
Property-directed incremental invariant generation. 379-405 - Giorgio Delzanno, Roberto Montagna:
Reachability analysis of fragments of mobile ambients in AC term rewriting. 407-428 - Raymond R. Devillers, Hanna Klaudel, Maciej Koutny:
A compositional Petri net translation of general pi -calculus terms. 429-450 - Murdoch James Gabbay, Aad Mathijssen:
Capture-avoiding substitution as a nominal algebra. 451-479 - Roland Meyer, Johannes Faber, Jochen Hoenicke, Andrey Rybalchenko:
Model checking Duration Calculus: a practical approach. 481-505 - Matteo Slanina, Henny B. Sipma, Zohar Manna:
Deductive verification of alternating systems. 507-560
Volume 20, Number 6, December 2008
- Cliff B. Jones:
Valediction. 561 - Sébastien Labbé, Jean-Pierre Gallois:
Slicing communicating automata specifications: polynomial algorithms for model reduction. 563-595 - Robert M. Hierons, Florentin Ipate:
Testing a deterministic implementation against a non-controllable non-deterministic stream X-machine. 597-617 - Olga Grinchtein, Martin Leucker:
Network invariants for real-time systems. 619-635 - Jewgenij Botaschanjan, Manfred Broy, Alexander Gruler, Alexander Harhurin, Steffen Knapp, Leonid Kof, Wolfgang J. Paul, Maria Spichkova:
On the correctness of upper layers of automotive systems. 637-662
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.