ACM Transactions on Software Engineering and Methodology (TOSEM)
, Volume 9
Volume 9, Number 1, January 2000
Tevfik Bultan
,
Richard Gerber
,
Christopher League
:
Composite model-checking: verification with type-specific symbolic representations.
3-50
Electronic Edition
(
ACM DL
)
BibTeX
James C. Corbett
:
Using shape analysis to reduce finite-state models of concurrent Java programs.
51-93
Electronic Edition
(
ACM DL
)
BibTeX
Carl A. Gunter
:
Abstracting dependencies between software configuration items.
94-131
Electronic Edition
(
ACM DL
)
BibTeX
Volume 9, Number 2, April 2000
A. Prasad Sistla
,
Viktor Gyuris
,
E. Allen Emerson
:
SMC: a symmetry-based model checker for verification of safety and liveness properties.
133-166
Electronic Edition
(
ACM DL
)
BibTeX
Paolo Ciancarini
,
Francesco Franzé
,
Cecilia Mascolo
:
Using a coordination language to specify and analyze systems containing mobile components.
167-198
Electronic Edition
(
ACM DL
)
BibTeX
Panagiotis Louridas
,
Pericles Loucopoulos
:
A generic model for reflective design.
199-237
Electronic Edition
(
ACM DL
)
BibTeX
Volume 9, Number 3, July 2000
Paola Inverardi
,
Alexander L. Wolf
,
Daniel Yankelevich
:
Static checking of system behaviors using derived component assumptions.
239-272
Electronic Edition
(
ACM DL
)
BibTeX
Naftaly H. Minsky
,
Victoria Ungureanu
:
Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems.
273-305
Electronic Edition
(
ACM DL
)
BibTeX
Kevin L. Mills
,
Hassan Gomaa
:
A knowledge-based method for inferring semantic concepts from visual models of system behavior.
306-337
Electronic Edition
(
ACM DL
)
BibTeX
Volume 9, Number 4, October 2000
Dan S. Wallach
,
Andrew W. Appel
,
Edward W. Felten
:
SAFKASI: a security mechanism for language-based systems.
341-378
Electronic Edition
(
ACM DL
)
BibTeX
Philip W. L. Fong
,
Robert D. Cameron
:
Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking.
379-409
Electronic Edition
(
ACM DL
)
BibTeX
Andrew C. Myers
,
Barbara Liskov
:
Protecting privacy using the decentralized label model.
410-442
Electronic Edition
(
ACM DL
)
BibTeX
Edmund M. Clarke
,
Somesh Jha
,
Wilfredo R. Marrero
:
Verifying security protocols with Brutus.
443-487
Electronic Edition
(
ACM DL
)
BibTeX
Antonio Durante
,
Riccardo Focardi
,
Roberto Gorrieri
:
A compiler for analyzing cryptographic protocols using noninterference.
488-528
Electronic Edition
(
ACM DL
)
BibTeX
Copyright ©
Sun May 17 00:30:26 2009 by
Michael Ley
(
ley@uni-trier.de
)