Default Cover Image

2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering

July 29 2009 to July 31 2009

Tianjin, China

ISBN: 978-0-7695-3757-3

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-ix
Papers
TASE 2009 Committee ListsFreely available from IEEE.pp. xi-xii
Papers
TASE 2009 Additional ReviewersFreely available from IEEE.pp. xiii
Towards Expressive Specification and Efficient Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 9-9
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the ChairsFreely available from IEEE.pp. x
Papers
Verification and Performance Analysis for Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 3-4
Papers
Modular Development of Certified System SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 5
Papers
Improving Responsiveness of Hard Real-Time Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Papers
Environmental Simulation of Real-Time Systems with Nested InterruptsFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
Papers
Semantics for Communicating Actors with Interdependent Real-Time DeadlinesFull-text access may be available. Sign in or learn about subscription options.pp. 29-35
Papers
An Efficient Algorithm for Finding Empty Space for Reconfigurable SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 36-43
Papers
State Visibility and Communication in Unifying Theories of ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 47-54
Papers
Semantics of Metamodels in UMLFull-text access may be available. Sign in or learn about subscription options.pp. 55-62
Papers
Refinement Algebra with Explicit ProbabilismFull-text access may be available. Sign in or learn about subscription options.pp. 63-70
Papers
Environment Abstraction with State Clustering and Parameter TruncatingFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Papers
Verification of Population Ring Protocols in PATFull-text access may be available. Sign in or learn about subscription options.pp. 81-89
Papers
Bounded Model Checking of ACTL FormulaeFull-text access may be available. Sign in or learn about subscription options.pp. 90-99
Papers
Coarse Grained Retrenchment and the Mondex Denial of Service AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 103-110
Papers
Enforcing Constraints on Life Cycles of Business ArtifactsFull-text access may be available. Sign in or learn about subscription options.pp. 111-118
Papers
Consistency Checking for LSC SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
Papers
Integrating Specification and Programs for System Modeling and VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 127-135
Papers
A Framework and Language Support for Automatic Dynamic Testing of Workflow Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 139-146
Papers
Fault-Based Test Case Generation for Component ConnectorsFull-text access may be available. Sign in or learn about subscription options.pp. 147-154
Papers
Test Data Generation for Derived Types in C ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 155-162
A Tool for Estimating Memory UsageFull-text access may be available. Sign in or learn about subscription options.pp. 287-288
Papers
Program Repair as Sound Optimization of Broken ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 165-173
Papers
Modeling Web Applications and Generating Tests: A Combination and Interactions-guided ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 174-181
Papers
Merging of Use Case Models: Semantic FoundationsFull-text access may be available. Sign in or learn about subscription options.pp. 182-189
Papers
Verifying Semistructured Data Normalization Using SWRLFull-text access may be available. Sign in or learn about subscription options.pp. 193-200
Papers
Verifying Self-stabilizing Population Protocols with CoqFull-text access may be available. Sign in or learn about subscription options.pp. 201-208
Papers
The Logical Approach to Low-Level Stack ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 209-216
Papers
Constructing Program Invariants via Solving QBFFull-text access may be available. Sign in or learn about subscription options.pp. 217-221
Papers
Using Architectural Constraints for Deadlock-Freedom of Component Systems with Multiway CooperationFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
Papers
Formal Reasoning about Concurrent Assembly Code with Reentrant LocksFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
Papers
Algorithms for Computing Weak Bisimulation EquivalenceFull-text access may be available. Sign in or learn about subscription options.pp. 241-248
Papers
Interpreting a Successful Testing Process: Risk and Actual CoverageFull-text access may be available. Sign in or learn about subscription options.pp. 251-258
Papers
Automated Test Case Generation Based on Coverage AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 259-266
Papers
Exploring Topological Structure of Boolean Expressions for Test Data SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 267-274
Papers
On Testing 1-Safe Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 275-281
Papers
Verifying the Implementation of an Operating System SchedulerFull-text access may be available. Sign in or learn about subscription options.pp. 285-286
Papers
A Framework for Dependency Evaluation of the Agent Oriented Methodologies Work FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 289-290
Papers
Spontaneous Detection of Infinite Loops and Livelocks in Dynamic Testing of Concurrent ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 291-292
Papers
Specifying and Verifying PLC Systems with TLA+Full-text access may be available. Sign in or learn about subscription options.pp. 293-294
Papers
Domain Hierarchies: A Basic Theoretical Framework for Integrating Software DomainsFull-text access may be available. Sign in or learn about subscription options.pp. 295-296
Papers
Improve Semantic Web Services Discovery through Similarity Search in Metric SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 297-298
Papers
Parameterized Bisimulation Infinite Evolution MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 299-300
Papers
Modeling MapReduce with CSPFull-text access may be available. Sign in or learn about subscription options.pp. 301-302
[Roster]Freely available from IEEE.pp. 334-334
Papers
Formal Specification and Experiments of an Expressive Human-Computer Ensemble System with RehearsalFull-text access may be available. Sign in or learn about subscription options.pp. 303-304
Papers
Towards Automated Software Verification Using Model Checking TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 305-306
Papers
Data Structure Shape Inference and Verification for OO ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 307-308
Papers
DUMS: A Dynamical Updatable Monitoring System for Desktop PCs Used for Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 309-310
Papers
Formal Representation and Analysis of a Near Miss Accident in N Sigma-labeled CalculusFull-text access may be available. Sign in or learn about subscription options.pp. 311-312
Papers
Representing Aspects in DesignFull-text access may be available. Sign in or learn about subscription options.pp. 313-314
Papers
Probabilistic Coordination Language for Component Dynamic CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 317-318
Papers
Modeling Fault Tolerant Services in Service-Oriented ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 319-320
Papers
Heap Memory Requirements Analysis via Separation LogicFull-text access may be available. Sign in or learn about subscription options.pp. 321-322
Papers
Automated Verification Using Unified Control FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 323-324
Papers
MARS: Metamodel Recovery from Multi-tiered Models Using Grammar InferenceFull-text access may be available. Sign in or learn about subscription options.pp. 325-326
Papers
Formal Approaches to Deadlock Analysis in Competitions of Shared Web ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 327-328
Papers
Measuring the Survivability of Object-Oriented SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 329-330
Papers
Author IndexFreely available from IEEE.pp. 331-333
Showing 66 out of 66