Default Cover Image

2011 Fifth International Conference on Theoretical Aspects of Software Engineering

Aug. 29 2011 to Aug. 31 2011

Xi'an, Shaanxi China

ISBN: 978-0-7695-4506-6

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-viii
Papers
ForewordFreely available from IEEE.pp. ix
Papers
Programme CommitteeFreely available from IEEE.pp. x
Papers
ReviewersFreely available from IEEE.pp. xi
Papers
Making Program Logics IntelligibleFull-text access may be available. Sign in or learn about subscription options.pp. 3-4
Papers
Automatic Specification-Based Testing: Challenges and PossibilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 5-8
Papers
A Tagging Protocol for Asynchronous TestingFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Papers
Inheritance and Modularity in Specification and Verification of OO ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Papers
Formalizing Application Programming Interfaces of the OSEK/VDX Operating System SpecificationFull-text access may be available. Sign in or learn about subscription options.pp. 27-34
Papers
Refactoring Object-Oriented Specifications with Inheritance-Based PolymorphismFull-text access may be available. Sign in or learn about subscription options.pp. 35-41
Papers
Focus Game for Projection Temporal LogicFull-text access may be available. Sign in or learn about subscription options.pp. 45-51
Papers
An Automatic Reasoning Mechanism for NFR Goal ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 52-59
Papers
An Efficient Resolution Based Algorithm for SATFull-text access may be available. Sign in or learn about subscription options.pp. 60-67
Papers
A Symbolic Algorithm for Shortest EG Witness GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 68-75
Papers
A Generative Approach to Searching Algorithmic Programs DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
Papers
A Categorical Modeling Approach of Aspect-Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 85-92
Papers
Model Checking Multirate Hybrid Systems with Restricted Convex PolyhedronFull-text access may be available. Sign in or learn about subscription options.pp. 93-99
Papers
Behaviour Recognition Using ChroniclesFull-text access may be available. Sign in or learn about subscription options.pp. 100-107
Papers
Approximate Bisimulation for Metric Doubly Labeled Transition SystemFull-text access may be available. Sign in or learn about subscription options.pp. 108-114
Papers
Java Goes TLA+Full-text access may be available. Sign in or learn about subscription options.pp. 117-124
Papers
A Simple Model for Certifying Assembly Programs with First-Class Function PointersFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
Papers
Towards an Axiomatic Verification System for JavaScriptFull-text access may be available. Sign in or learn about subscription options.pp. 133-141
Papers
Modeling and Verifying the Code-Level OSEK/VDX Operating System with CSPFull-text access may be available. Sign in or learn about subscription options.pp. 142-149
Papers
An Approach to Handling Failure Recovery in Service Composition and Its AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 153-160
Papers
Research on Web Service Composition Using Probabilistic Abstraction RefinementFull-text access may be available. Sign in or learn about subscription options.pp. 161-168
Papers
Modeling and Prototyping Business Processes in AutoPAFull-text access may be available. Sign in or learn about subscription options.pp. 169-176
Papers
Modeling and Verifying for Frameset-Based Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
Papers
A Stochastic-Petri-Net-Based Model for Ontology-Based Service CompositionsFull-text access may be available. Sign in or learn about subscription options.pp. 187-190
Papers
Program Slicing Stored XSS Bugs in Web ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 191-194
Papers
Towards a Probabilistic Calculus for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 195-198
Papers
Analysis of WS-BPEL Processes in PRISMFull-text access may be available. Sign in or learn about subscription options.pp. 199-202
Papers
Generating Probabilistic Temporal Logic Formulas from Probabilistic Scenario-Based SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 205-208
Papers
Formal Specification of Domain-Specific ECA Policy ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
Formal Specification for Real Time Cyber Physical Systems Using Aspect-Oriented ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 213-216
Papers
An Approach to Regression Test Selection of Adaptive EFSM TestsFull-text access may be available. Sign in or learn about subscription options.pp. 217-220
Papers
Test Case Generation Using PDAFull-text access may be available. Sign in or learn about subscription options.pp. 221-224
Papers
Undesirable Aspect Interactions: A Prevention PolicyFull-text access may be available. Sign in or learn about subscription options.pp. 225-228
Papers
Model Checking for Protocols Using VerdsFull-text access may be available. Sign in or learn about subscription options.pp. 231-234
Papers
Model Checking: A Coalgebraic ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 235-238
Papers
A Method to Generate Verification Condition GeneratorFull-text access may be available. Sign in or learn about subscription options.pp. 239-242
Papers
A Game Theoretic Model and Tree Analysis Method for Fair Exchange ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 243-246
Papers
Modeling and Analyzing the (mu)TESLA Protocol Using CSPFull-text access may be available. Sign in or learn about subscription options.pp. 247-250
Papers
Proving Computational Geometry Algorithms in TLA+2Full-text access may be available. Sign in or learn about subscription options.pp. 251-254
Papers
Author IndexFreely available from IEEE.pp. 255-256
Papers
[Publishers information]Freely available from IEEE.pp. 258
Showing 48 out of 48