OASIcs, Volume 3, TrustworthySW 2006
-
Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper
OASIcs, Volume 3, Trustworthy SW'06, Complete Volume
10.4230/OASIcs.TrustworthySW.2006
-
Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper
Preface -- Workshop Trustworthy Software 2006
10.4230/OASIcs.TrustworthySW.2006.693
-
Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper
Abstracts Collection -- Workshop Trustworthy Software 2006
10.4230/OASIcs.TrustworthySW.2006.758
-
Axel Legay, Luca de Alfaro, and Marco Faella
An Introduction to the Tool Ticc
10.4230/OASIcs.TrustworthySW.2006.766
-
Arnaud Lanoix, Dieu-Donné Okalas Ossami, and Jeanine Souquières
An Operator-based Approach to Incremental Development of Conform Protocol State Machines
10.4230/OASIcs.TrustworthySW.2006.695
-
Björn Wachter
Explaining Data Type Reduction in the Shape Analysis Framework
10.4230/OASIcs.TrustworthySW.2006.701
-
Claude Kirchner, Pierre-Etienne Moreau, and Antoine Reilles
Formal Validation of Pattern Matching code
10.4230/OASIcs.TrustworthySW.2006.697
-
Julien Schmaltz and Dominique Borrione
Formalizing On Chip Communications in a Functional Style
10.4230/OASIcs.TrustworthySW.2006.700
-
Stephan Neuhaus
Isolating Intrusions by Automatic Experiments
10.4230/OASIcs.TrustworthySW.2006.696
-
Eugen Zalinescu, Véronique Cortier, and Michaël Rusinowitch
Relating two standard notions of secrecy
10.4230/OASIcs.TrustworthySW.2006.691
-
Michael Hilker and Christoph Schommer
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
10.4230/OASIcs.TrustworthySW.2006.694
-
Jan Reineke
Shape Analysis of Sets
10.4230/OASIcs.TrustworthySW.2006.698
-
Ina Schaefer and Arnd Poetzsch-Heffter
Using Abstraction in Modular Verification of Synchronous Adaptive Systems
10.4230/OASIcs.TrustworthySW.2006.699