Default Cover Image

2008 Sixth IEEE International Conference on Software Engineering and Formal Methods

Nov. 10 2008 to Nov. 14 2008

Cape Town

Table of Contents

Papers
Table of contentsFreely available from IEEE.pp. v-viii
Papers
list-reviewerFreely available from IEEE.pp. xii
Papers
[Roster]Freely available from IEEE.pp. 394
[Title page i]Freely available from IEEE.pp. i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Title page iv]Freely available from IEEE.pp. iv
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Title Page ivFreely available from IEEE.pp. iv
A Generalized Model-Based Test Generation MethodFull-text access may be available. Sign in or learn about subscription options.pp. 139-148
Papers
PrefaceFreely available from IEEE.pp. ix
Papers
CommitteesFreely available from IEEE.pp. x-xi
Papers
Abstract Interpretation in Code SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 3
Papers
Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and WatermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 7-18
Papers
Nullness Analysis in Boolean FormFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Papers
Widening Operators for Abstract InterpretationFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Papers
Static Analysis of the Determinism of Multithreaded ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Papers
Cheap and Small CounterexamplesFull-text access may be available. Sign in or learn about subscription options.pp. 53-62
Papers
Efficient Model Checking for Duration Calculus Based on Branching-Time ApproximationsFull-text access may be available. Sign in or learn about subscription options.pp. 63-72
Papers
Flash-Efficient LTL Model Checking with Minimal CounterexamplesFull-text access may be available. Sign in or learn about subscription options.pp. 73-82
Papers
Algebraic View ReconciliationFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
Papers
Compositional Reasoning in Model-Based Verification of Adaptive Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 95-104
Papers
Extracting Conditional Confidentiality PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 107-116
Papers
Testing Privacy Policies Using ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 117-126
Papers
Preservation of Proof Pbligations for Hybrid Verification MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
Papers
Speci?cation-Based Testing for Software Product LinesFull-text access may be available. Sign in or learn about subscription options.pp. 149-158
Papers
Verification-Based Test Case Generation for Full Feasible Branch CoverageFull-text access may be available. Sign in or learn about subscription options.pp. 159-168
Papers
Tagging Make Local Testing of Message-Passing Systems FeasibleFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Papers
Using Formal Verification to Reduce Test Space of Fault-Tolerant ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Papers
Behaviour Directed Testing of Auto-code GeneratorsFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Papers
Extending Stream X-Machines to Specify and Test Systems with TimeoutsFull-text access may be available. Sign in or learn about subscription options.pp. 201-210
Papers
Tools for CSPFull-text access may be available. Sign in or learn about subscription options.pp. 213-214
Papers
Laws of Object-Orientation with Reference SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 217-226
Papers
Specialized Aspect Languages Preserving Classes of PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 227-236
Papers
Tableau-Based Decision Procedure for the Multi-agent Epistemic Logic with Operators of Common and Distributed KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 237-246
Papers
Object Models with Temporal ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 249-258
Papers
A Fast Algorithm to Compute Heap Memory Bounds of Java Card AppletsFull-text access may be available. Sign in or learn about subscription options.pp. 259-267
Papers
PED: Proof-Guided Error Diagnosis by Triangulation of Program Error CausesFull-text access may be available. Sign in or learn about subscription options.pp. 268-278
Papers
CRefine: Support for the Circus Refinement CalculusFull-text access may be available. Sign in or learn about subscription options.pp. 281-290
Papers
An Environment for Measuring and Scheduling Time-Critical Embedded Systems with Energy ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 291-300
Papers
Modeling Component Connectors: Synchronisation and Context-DependencyFull-text access may be available. Sign in or learn about subscription options.pp. 303-312
Papers
Generation of Service Wrapper Protocols from Choreography SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 313-322
Papers
Bridging the Gap between Interaction- and Process-Oriented ChoreographiesFull-text access may be available. Sign in or learn about subscription options.pp. 323-332
Papers
Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem ProverFull-text access may be available. Sign in or learn about subscription options.pp. 335-344
Papers
Restricted Broadcast Process TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 345-354
Papers
Modelling Rational User Behaviour as Games between an Angel and a DemonFull-text access may be available. Sign in or learn about subscription options.pp. 355-364
Papers
Formal Methods and Innovation Economy: Facing New ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 367-371
Papers
Behavioral Compatibility of Active ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 372-376
Papers
Contract-Based Verification of Hierarchical Systems of ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 377-381
Papers
Ontology-Based Automatic Model TransformationsFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
Papers
Author indexFreely available from IEEE.pp. 393
Showing 52 out of 52