


default search action
Science of Computer Programming, Volume 74
Volume 74, Numbers 1-2, December 2008
- Fabio Massacci

, Frank Piessens, Sjouke Mauw
:
Preface. 1 - Irem Aktug, Katsiaryna Naliuka:

ConSpec - A formal language for policy specification. 2-12 - Dries Schellekens, Brecht Wyseur, Bart Preneel:

Remote attestation on legacy operating systems with trusted platform modules. 13-22 - Giuseppe Bianchi

, Marco Bonola
, Vincenzo Falletta, Francesco Saverio Proto, Simone Teofili:
The SPARTA pseudonym and authorization system. 23-33 - Atle Refsdal, Ketil Stølen:

Extending UML sequence diagrams to model trust-dependent behavior with the aim to support risk analysis. 34-42 - Julien Bringer, Hervé Chabanne, Bruno Kindarji:

The best of both worlds: Applying secure sketches to cancelable biometrics. 43-51 - Jerry den Hartog:

Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. 52-63
Volume 74, Number 3, January 2009
- Rik Eshuis

:
Reconciling statechart semantics. 65-99 - Hubert Garavel, Gwen Salaün, Wendelin Serwe:

On the semantics of communicating hardware processes and their translation into LOTOS for the verification of asynchronous circuits with CADP. 100-127 - Derrick G. Kourie, Sergei A. Obiedkov

, Bruce W. Watson, Dean van der Merwe:
An incremental algorithm to construct a lattice of set intersections. 128-142 - Robert Colvin

, Brijesh Dongol
:
A general technique for proving lock-freedom. 143-165
Volume 74, Number 4, February 2009
- Jin Song Dong, Jing Sun

:
SCP special issue on the grand challenge - Preface. 167 - Zhenbang Chen, Zhiming Liu, Anders P. Ravn, Volker Stolz, Naijun Zhan:

Refinement and verification in component-based model-driven design. 168-196 - Leo Freitas, Jim Woodcock

, Yichi Zhang:
Verifying the CICS File Control API with Z/Eves: An experiment in the verified software repository. 197-218 - Andrew Butterfield

, Leo Freitas, Jim Woodcock
:
Mechanising a formal model of flash memory. 219-237 - Leo Freitas, Jim Woodcock

, Zheng Fu:
POSIX file store in Z/Eves: An experiment in the verified software repository. 238-257
Volume 74, Numbers 5-6, March 2009
- Markus Aleksy

, Vasco Amaral
, Ralf Gitzel, James F. Power
, John Waldron:
PPPJ special issue-Foreword. 259-260 - Lorenzo Bettini

, Sara Capecchi
, Betti Venneri
:
Featherweight Java with dynamic and static overloading. 261-278 - Thomas Würthinger, Christian Wimmer, Hanspeter Mössenböck

:
Array bounds check elimination in the context of deoptimization. 279-295 - Borys J. Bradel, Tarek S. Abdelrahman:

A study of potential parallelism among traces in Java programs. 296-313 - Lingli Zhang, Chandra Krintz:

As-if-serial exception handling semantics for Java futures. 314-332 - Kevin J. Hoffman, Patrick Th. Eugster:

Cooperative aspect-oriented programming. 333-354 - Sami Mäkelä, Ville Leppänen

:
Client-based cohesion metrics for Java programs. 355-378 - Arno Puder, Sascha Häberling:

Byte code level cross-compilation for developing web applications. 379-396
Volume 74, Number 7, May 2009
- René L. Krikhaar, Ralf Lämmel

:
Guest editors' introduction. 397-398 - László Vidács, Árpád Beszédes

, Tibor Gyimóthy
:
Combining preprocessor slicing with C/C++ language slicing. 399-413 - Abram Hindle, Michael W. Godfrey, Richard C. Holt:

Reading beside the lines: Using indentation to rank revisions by complexity. 414-429 - David W. Binkley, Dawn J. Lawrie

, Steve Maex, Christopher Morrell:
Identifier length and limited programmer memory. 430-445 - Andrew R. Dalton, Sally K. Wahba, Sravanthi Dandamudi, Jason O. Hallstrom:

Visualizing the runtime behavior of embedded network systems: A toolkit for TinyOS. 446-469 - Chanchal Kumar Roy, James R. Cordy, Rainer Koschke:

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. 470-495
Volume 74, Number 8, June 2009
- Tarmo Uustalu

:
Preface. 497 - J. Robin B. Cockett, Craig A. Pastro:

The logic of message-passing. 498-533 - Olivier Danvy

, Kevin Millikin:
Refunctionalization at work. 534-549 - Andreas Abel:

Type-based termination of generic programs. 550-567 - Philippe Audebaud, Christine Paulin-Mohring:

Proofs of randomized algorithms in Coq. 568-589 - Ralf Hinze, Andres Löh

:
Generic programming in 3D. 590-628 - Carroll Morgan:

The Shadow Knows: Refinement and security in sequential programs. 629-653 - Kim Solin, Joakim von Wright:

Enabledness and termination in refinement algebra. 654-668
Volume 74, Number 9, July 2009
- Ernesto Pimentel

, Jean-Marie Jacquet:
Special issue on the 5th international workshop on foundations of coordination languages and software architectures (FOCLASA'06). 669-670 - Marco Antonio Barbosa

, Luís Soares Barbosa
:
A perspective on service orchestration. 671-687 - Sascha Klüppelholz

, Christel Baier
:
Symbolic model checking for channel-based component connectors. 688-701 - Matteo Casadei, Mirko Viroli

, Luca Gardelli:
On the collective sort problem for distributed tuple spaces. 702-722
- Benoît Fraikin, Marc Frappier:

Efficient symbolic computation of process expressions. 723-753 - Ana I. Molina

, Miguel A. Redondo
, Manuel Ortega
:
A methodological approach for user interface development of collaborative applications: A case study. 754-776
Volume 74, Number 10, August 2009
- Samuele Carpineti, Cosimo Laneve

, Luca Padovani
:
PiDuce - A project for experimenting Web services technologies. 777-811 - Manuel Roldán, Francisco Durán

, Antonio Vallecillo
:
Invariant-driven specifications in Maude. 812-835 - Francisco Ortin

, Jose Manuel Redondo
, J. Baltasar García Pérez-Schofield
:
Efficient virtual machine support of runtime structural reflection. 836-860 - Otávio Augusto Lazzarini Lemos

, Ivan Gustavo Franchin, Paulo César Masiero:
Integration testing of Object-Oriented and Aspect-Oriented programs: A structural pairwise approach for Java. 861-878
Volume 74, Numbers 11-12, November 2009
- Thai Son Hoang, Hironobu Kuruma, David A. Basin, Jean-Raymond Abrial:

Developing topology discovery in Event-B. 879-899 - G. P. Kulk, R. J. Peters, Chris Verhoef:

Quantifying IT estimation risks. 900-933 - J. Laurenz Eveleens, Chris Verhoef:

Quantifying IT forecast quality. 934-988 - Ali Mili, Shir Aharon, Chaitanya Nadkarni:

Mathematics for reasoning about loop functions. 989-1020

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














