Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
TASE
TASE 2011
Generate Citations
2011 Fifth International Conference on Theoretical Aspects of Software Engineering
Aug. 29 2011 to Aug. 31 2011
Xi'an, Shaanxi China
ISBN: 978-0-7695-4506-6
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-viii
Papers
Foreword
Freely available from IEEE.
pp. ix
Papers
Programme Committee
Freely available from IEEE.
pp. x
Papers
Reviewers
Freely available from IEEE.
pp. xi
Papers
Making Program Logics Intelligible
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-4
by
John C. Reynolds
Papers
Automatic Specification-Based Testing: Challenges and Possibilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-8
by
Shaoying Liu
Papers
A Tagging Protocol for Asynchronous Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-18
by
Puneet Bhateja
Papers
Inheritance and Modularity in Specification and Verification of OO Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Liu Yijing
,
Hong Ali
,
Qiu Zongyan
Papers
Formalizing Application Programming Interfaces of the OSEK/VDX Operating System Specification
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-34
by
Longfei Zhu
,
Min Zhang
,
Yanhong Huang
,
Jianqi Shi
,
Huibiao Zhu
Papers
Refactoring Object-Oriented Specifications with Inheritance-Based Polymorphism
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-41
by
Graeme Smith
,
Steffen Helke
Papers
Focus Game for Projection Temporal Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-51
by
Cong Tian
,
Zhenhua Duan
Papers
An Automatic Reasoning Mechanism for NFR Goal Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-59
by
Bo Wei
,
Zhi Jin
,
Didar Zowghi
Papers
An Efficient Resolution Based Algorithm for SAT
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-67
by
Min Zhou
,
Fei He
,
Ming Gu
Papers
A Symbolic Algorithm for Shortest EG Witness Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-75
by
Yang Zhao
,
Xiaoqing Jin
,
Gianfranco Ciardo
Papers
A Generative Approach to Searching Algorithmic Programs Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Haihe Shi
,
Jinyun Xue
Papers
A Categorical Modeling Approach of Aspect-Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-92
by
Arsène Sabas
,
Subash Shankar
,
Virginie Wiels
,
Michel Boyer
Papers
Model Checking Multirate Hybrid Systems with Restricted Convex Polyhedron
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-99
by
Haibin Zhang
Papers
Behaviour Recognition Using Chronicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-107
by
Patrice Carle
,
Christine Choppy
,
Romain Kervarc
Papers
Approximate Bisimulation for Metric Doubly Labeled Transition System
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-114
by
Haiyu Pan
,
Min Zhang
,
Yixiang Chen
,
Hengyang Wu
Papers
Java Goes TLA+
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
Hannes Lau
,
Uwe Nestmann
Papers
A Simple Model for Certifying Assembly Programs with First-Class Function Pointers
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-132
by
Wei Wang
,
Zhong Shao
,
Xinyu Jiang
,
Yu Guo
Papers
Towards an Axiomatic Verification System for JavaScript
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-141
by
Shengchao Qin
,
Aziem Chawdhary
,
Wei Xiong
,
Malcolm Munro
,
Zongyan Qiu
,
Huibiao Zhu
Papers
Modeling and Verifying the Code-Level OSEK/VDX Operating System with CSP
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-149
by
Yanhong Huang
,
Yongxin Zhao
,
Longfei Zhu
,
Qin Li
,
Huibiao Zhu
,
Jianqi Shi
Papers
An Approach to Handling Failure Recovery in Service Composition and Its Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-160
by
Guisheng Fan
,
Huiqun Yu
,
Liqiong Chen
,
Chunhua Gu
Papers
Research on Web Service Composition Using Probabilistic Abstraction Refinement
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-168
by
Honghao Gao
,
Huaikou Miao
,
Hongwei Zeng
Papers
Modeling and Prototyping Business Processes in AutoPA
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-176
by
Ling Yin
,
Jing Liu
,
Zuohua Ding
Papers
Modeling and Verifying for Frameset-Based Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-184
by
Shengbo Chen
,
Huaikou Miao
Papers
A Stochastic-Petri-Net-Based Model for Ontology-Based Service Compositions
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-190
by
Yunni Xia
,
Gang Dai
,
Fangfang Tang
,
Qingsheng Zhu
Papers
Program Slicing Stored XSS Bugs in Web Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-194
by
Yi Wang
,
Zhoujun Li
,
Tao Guo
Papers
Towards a Probabilistic Calculus for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-198
by
Si Liu
,
Yongxin Zhao
,
Huibiao Zhu
,
Qin Li
Papers
Analysis of WS-BPEL Processes in PRISM
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-202
by
Chen Deng
,
Hongli Yang
,
Husheng Liao
,
Meng Sun
,
Zongyan Qiu
Papers
Generating Probabilistic Temporal Logic Formulas from Probabilistic Scenario-Based Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-208
by
Wenrui Li
,
Pengcheng Zhang
,
Zhijian Wang
,
Zhongxue Yang
Papers
Formal Specification of Domain-Specific ECA Policy Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Raphael Romeikat
,
Bernhard Bauer
Papers
Formal Specification for Real Time Cyber Physical Systems Using Aspect-Oriented Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-216
by
Lichen Zhang
Papers
An Approach to Regression Test Selection of Adaptive EFSM Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-220
by
Bo Guo
,
Mahadevan Subramaniam
,
Hai-Feng Guo
Papers
Test Case Generation Using PDA
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-224
by
Puneet Bhateja
Papers
Undesirable Aspect Interactions: A Prevention Policy
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-228
by
Arsène Sabas
,
Subash Shankar
,
Virginie Wiels
,
Michel Boyer
Papers
Model Checking for Protocols Using Verds
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-234
by
Ming Ma
Papers
Model Checking: A Coalgebraic Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-238
by
Jianhua Gao
,
Ying Jiang
Papers
A Method to Generate Verification Condition Generator
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-242
by
Zhaopeng Li
,
Yang Zhang
,
Yiyun Chen
Papers
A Game Theoretic Model and Tree Analysis Method for Fair Exchange Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-246
by
Guoqiang Li
,
Yonggen Gu
,
Xiuting Tao
,
Jie Tao
Papers
Modeling and Analyzing the (mu)TESLA Protocol Using CSP
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-250
by
Mengying Wang
,
Huibiao Zhu
,
Yongxin Zhao
,
Si Liu
Papers
Proving Computational Geometry Algorithms in TLA+2
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-254
by
Hui Kong
,
Hehua Zhang
,
Xiaoyu Song
,
Ming Gu
,
Jiaguang Sun
Papers
Author Index
Freely available from IEEE.
pp. 255-256
Papers
[Publishers information]
Freely available from IEEE.
pp. 258
Showing 48 out of 48