


Остановите войну!
for scientists:


default search action
Electronic Notes in Theoretical Computer Science, Volume 253
Volume 253, Number 1, October 2009
- Jens Happe, Barbora Zimmerova:
Preface. 1-2 - Laura Bocchi, José Luiz Fiadeiro, Alessandro Lapadula, Rosario Pugliese
, Francesco Tiezzi:
From Architectural to Behavioural Specification of Services. 3-21 - Heiko Koziolek, Franz Brosch:
Parameter Dependencies for Component Reliability Specifications. 23-38 - Stephen Fenech, Gordon J. Pace
, Joseph C. Okika, Anders P. Ravn, Gerardo Schneider:
On the Specification of Full Contracts. 39-55 - Michael Kuperberg
, Fouad Omri:
Using Heuristics to Automate Parameter Generation for Benchmarking of Java Methods. 57-75 - Anne Martens, Heiko Koziolek:
Automatic, Model-Based Software Performance Improvement for Component-based Software Designs. 77-93 - Simona Motogna
, Ioan Lazar, Bazil Pârv, István Gergely Czibula:
An Agile MDA Approach for Service-Oriented Components. 95-110 - Sebti Mouelhi, Samir Chouali, Hassan Mountassir:
Refinement of Interface Automata Strengthened by Action Semantics. 111-126 - Olaf Owe
, Gerardo Schneider:
Wrap Your Objects Safely. 127-143 - Pavel Parízek
, Jirí Adámek, Tomas Kalibera:
Automated Construction of Reasonable Environment for Java Components. 145-160 - Davor Slutej, John Håkansson, Jagadish Suryadevara, Cristina Cerschi Seceleanu, Paul Pettersson
:
Analyzing a Pattern-Based Model of a Real-Time Turntable System. 161-178 - Yuhong Zhao, Franz-Josef Rammig:
Model-based Runtime Verification Framework. 179-193
Volume 253, Number 2, October 2009
- Bernd Finkbeiner, Yuri Gurevich, Alexander K. Petrenko
:
Preface. 1 - Percy Antonio Pari Salas, Padmanabhan Krishnan:
Automated Software Testing of Asynchronous Systems. 3-19 - Moonzoo Kim, Shin Hong, Changki Hong, Taeho Kim:
Model-based Kernel Testing for Concurrency Bugs through Counter Example Replay. 21-36 - Frédéric Dadeau, Jocelyn Levrey, Pierre-Cyrille Héam:
On the Use of Uniform Random Generation of Automata for Testing. 37-51 - Bernhard K. Aichernig
, Harald Brandl, Franz Wotawa
:
Conformance Testing of Hybrid Systems with Qualitative Reasoning Models. 53-69 - Willibald Krenn, Bernhard K. Aichernig
:
Test Case Generation by Contract Mutation in Spec#. 71-86 - Anika Schumann, Martin Sachenbacher, Jinbo Huang:
Computing Optimal Tests for Non-deterministic Systems Using DNNF Graphs. 87-99 - Leonidas Tsiopoulos
, Manoranjan Satpathy:
Model Based Testing of a Network-on-Chip Component. 101-116 - Frédéric Dadeau, Régis Tissot:
jSynoPSys - A Scenario-Based Testing Tool based on the Symbolic Animation of B Machines. 117-132
Volume 253, Number 3, November 2009
- Christel Baier, Alessandra Di Pierro:
Proceedings of Seventh Workshop on Quantitative Aspects of Programming Languages, QAPL 2009, York, UK, March 28-29, 2009. Electronic Notes in Theoretical Computer Science 253(3), Elsevier 2009 [contents]
Volume 253, Number 4, November 2009
- Andrea Corradini:
Preface. 1-2 - Fabio Gadducci
:
A Note on an Old-Fashioned Algebra for (Disconnected) Graphs. 3-15 - Oana Andrei
, Hélène Kirchner:
A Port Graph Calculus for Autonomic Computing and Invariant Verification. 17-38 - Bahareh Badban:
A Term Rewriting Technique for Decision Graphs. 39-54 - Maribel Fernández, Ian Mackie, Shinya Sato, Matthew Walker:
Recursive Functions with Pattern Matching in Interaction Nets. 55-71 - Abubakar Hassan, Ian Mackie, Shinya Sato:
Compilation of Interaction Nets. 73-90 - Frank Raiser, Thom W. Frühwirth:
Strong Joinability Analysis for Graph Transformation Systems in CHR. 91-111 - Ruben Duarte Viegas, Francisco Azevedo:
Lazy Constraint Imposing for Improving the Path Constraint. 113-128
Volume 253, Number 5, December 2009
- Elvira Albert, Samir Genaim:
Preface. 1-2 - Stefan Brunthaler:
Virtual-Machine Abstraction and Optimization Techniques. 3-14 - Laurent Hubert, David Pichardie:
Soundly Handling Static Fields: Issues, Semantics and Analysis. 15-30 - Xin Li, Mizuhito Ogawa:
An Ahead-of-time Yet Context-Sensitive Points-to Analysis for Java. 31-46 - Phil McGachey, Antony L. Hosking
, J. Eliot B. Moss:
Pervasive Load-Time Transformation for Transparently Distributed Java. 47-64 - Étienne Payet, Fausto Spoto
:
Experiments with Non-Termination Analysis for Java Bytecode. 83-96 - Arno Puder, Jessica Lee:
Towards an XML-based Bytecode Level Transformation Framework. 97-111 - Aleksy Schubert, Daria Walukiewicz-Chrzaszcz:
The Non-Interference Protection in BML. 113-127 - Fausto Spoto
, Lunjin Lu, Fred Mesnard:
Using CLP Simplifications to Improve Java Bytecode Termination Analysis. 129-144 - Massimo Bartoletti
, Gabriele Costa
, Roberto Zunino:
Jalapa: Securing Java with Local Policies: Tool Demonstration. 145-151 - Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Katsiaryna Naliuka, Pieter Philippaerts
, Frank Piessens, Dries Vanoverberghe:
The S3MS.NET Run Time Monitor: Tool Demonstration. 153-159
Volume 253, Number 6, March 2010
- Irek Ulidowski
:
Preface. 1-2 - Tommaso Toffoli:
From Such Simple a Beginning: The Momentous Consequences of Physics' Microscopic Reversibility for Communication and Computation - and Almost Anything Else. 3-16 - Alexis De Vos:
Reversible Computer Hardware. 17-22 - Kenichi Morita
:
Universality Issues in Reversible Computing Systems and Cellular Automata (Extended Abstract). 23-31 - Bill Stoddart, Robert Lynas, Frank Zeyda:
A Virtual Machine for Supporting Reversible Probabilistic Guarded Command Languages. 33-56 - Robert Wille
, Rolf Drechsler
:
Effect of BDD Optimization on Synthesis of Reversible and Quantum Logic. 57-70 - Tetsuo Yokoyama:
Reversible Computation and Reversible Programming Languages. 71-81
Volume 253, Number 7, September 2010
- Torbjörn Ekman, Jurgen J. Vinju:
Proceedings of the Ninth Workshop on Language Descriptions Tools and Applications, LDTA 2009, York, UK, March 27-28, 2009. Electronic Notes in Theoretical Computer Science 253(7), Elsevier 2010 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.