default search action
Formal Aspects of Computing, Volume 26
Volume 26, Number 1, January 2014
- Eerke A. Boiten, Steve A. Schneider:
Editorial. 1-2 - Giampaolo Bella:
Inductive study of confidentiality: for everyone. 3-36 - James Heather, Steve A. Schneider, Vanessa Teague:
Cryptographic protocols with everyday objects. 37-62 - Murat Moran, James Heather, Steve A. Schneider:
Verifying anonymity in voting systems using CSP. 63-98 - Matteo Avalle, Alfredo Pironti, Riccardo Sisto:
Formal verification of security protocol implementations: a survey. 99-123 - Alfredo Pironti, Riccardo Sisto:
Safe abstractions of data encodings in formal security protocol models. 125-167 - Thai Son Hoang, A. K. McIver, Larissa Meinicke, Carroll C. Morgan, Anthony Sloane, E. Susatyo:
Abstractions of non-interference security: probabilistic versus possibilistic. 169-194
Volume 26, Number 2, March 2014
- Eerke A. Boiten, John Derrick, Steve Reeves:
Editorial. 195 - Luigia Petre, Elena Troubitsyna, Marina Waldén:
Kaisa Sere: In Memoriam. 197-201 - Maria Teresa Llano, Andrew Ireland, Alison Pease:
Discovery of invariants through automated theory formation. 203-249 - Steve A. Schneider, Helen Treharne, Heike Wehrheim:
The behavioural semantics of Event-B refinement. 251-280 - Pontus Boström, Fredrik Degerlund, Kaisa Sere, Marina Waldén:
Derivation of concurrent programs by stepwise scheduling of Event-B models. 281-303 - Eerke A. Boiten:
Introducing extra operations in refinement. 305-317 - Richard Banach, Huibiao Zhu, Wen Su, Runlei Huang:
Continuous KAOS, ASM, and formal control system design across the continuous/discrete modeling interface: a simple train stopping application. 319-366 - Alvaro Miyazawa, Ana Cavalcanti:
Refinement-based verification of implementations of Stateflow charts. 367-405 - John Derrick, Eerke A. Boiten:
Relational concurrent refinement part III: traces, partial relations and automata. 407-432
Volume 26, Number 3, May 2014
- Cliff B. Jones:
Editorial. 433 - Stephen Brookes, Peter W. O'Hearn, Uday S. Reddy:
The Essence of Reynolds. 435-439 - Sidney C. Nogueira, Augusto Sampaio, Alexandre Mota:
Test generation from state based use case models. 441-490 - Robert Colvin:
An operational semantics for object-oriented concepts based on the class hierarchy. 491-535 - Muffy Calder, Michele Sevegnani:
Modelling IEEE 802.11 CSMA/CA RTS/CTS with stochastic bigraphs with sharing. 537-561 - Brijesh Dongol, Ian J. Hayes, Peter J. Robinson:
Reasoning about goal-directed real-time teleo-reactive programs. 563-589 - Manoj G. Dixit, S. Ramesh, Pallab Dasgupta:
Time-budgeting: a component based development methodology for real-time embedded systems. 591-621
Volume 26, Number 4, July 2014
- Xi Liu, Shaofa Yang, Jeff W. Sanders:
Compensation by design. 623-676 - Savas Konur, Michael Fisher, Simon Dobson, Stephen Knox:
Formal verification of a pervasive messaging system. 677-694 - Prahladavaradan Sampath:
An elementary theory of product-line variations. 695-727 - Jin Song Dong, Yang Liu, Jun Sun, Xian Zhang:
Towards verification of computation orchestration. 729-759 - Ferruccio Damiani, Johan Dovland, Einar Broch Johnsen, Ina Schaefer:
Verifying traits: an incremental proof system for fine-grained reuse. 761-793 - Ana Cavalcanti, Steve King, Colin O'Halloran, Jim Woodcock:
Test-data generation for control coverage by proof. 795-823 - Krishnendu Chatterjee, Vishwanath Raman:
Assume-guarantee synthesis for digital contract signing. 825-859
Volume 26, Number 5, September 2014
- Cliff B. Jones:
Editorial. 861 - Andrzej Tarlecki:
Władysław Marek Turski (1938-2013). 863-864 - Luís Cruz-Filipe, Ivan Lanese, Francisco Martins, António Ravara, Vasco Thudichum Vasconcelos:
The stream-based service-centred calculus: a foundation for service-oriented programming. 865-918 - Marc Frappier, Frédéric Gervais, Régine Laleau, Jérémy Milhau:
Refinement patterns for ASTDs. 919-941 - Yoriyuki Yamagata, Weiqiang Kong, Akira Fukuda, Nguyen Van Tang, Hitoshi Ohsaki, Kenji Taguchi:
A formal semantics of extended hierarchical state transition matrices using CSP#. 943-962 - Michael J. Banks, Jeremy L. Jacob:
On integrating confidentiality and functionality in a formal method. 963-992 - Martin P. Ward, Hussein Zedan:
Provably correct derivation of algorithms using FermaT. 993-1031 - Rimvydas Ruksenas, Paul Curzon, Ann Blandford, Jonathan Back:
Combining human error verification and timing analysis: a case study on an infusion pump. 1033-1076
Volume 26, Number 6, November 2014
- Elvinia Riccobene, Patrizia Scandurra:
A formal framework for service modeling and prototyping. 1077-1113 - Alessandro Rossini, Juan de Lara, Esther Guerra, Adrian Rutle, Uwe Wolter:
A formalisation of deep metamodelling. 1115-1152 - Canan Güniçen, Kemal Inan, Uraz Cengiz Türker, Hüsnü Yenigün:
The relation between preset distinguishing sequences and synchronizing sequences. 1153-1167 - Li Su, Rodolfo Gómez, Howard Bowman:
Analysing neurobiological models using communicating automata. 1169-1204 - Matthias Daum, Nelson Billing, Gerwin Klein:
Concerned with the unprivileged: user programs in kernel refinement. 1205-1229 - Nicolas Wu, Andrew C. Simpson:
Formal relational database design: an exercise in extending the formal template language. 1231-1269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.