Stop the war!
Остановите войну!
for scientists:
default search action
2. FMCO 2003: Leiden, The Netherlands
- Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, Willem P. de Roever:
Formal Methods for Components and Objects, Second International Symposium, FMCO 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures. Lecture Notes in Computer Science 3188, Springer 2004, ISBN 3-540-22942-6 - Albert Benveniste, Benoît Caillaud, Luca P. Carloni, Paul Caspi, Alberto L. Sangiovanni-Vincentelli:
Causality and Scheduling Constraints in Heterogeneous Reactive Systems Modeling. 1-16 - Jan A. Bergstra:
Machine Function Based Control Code Algebras. 17-41 - Egon Börger, Robert F. Stärk:
Exploiting Abstraction for Specification Reuse. The Java/C# Case Study. 42-76 - Werner Damm, Hardi Hungar, Ernst-Rüdiger Olderog:
On the Verification of Cooperating Traffic Agents. 77-110 - Frank S. de Boer, Cees Pierik:
How to Cook a Complete Hoare Logic for Your Pet OO Language. 111-133 - Razvan Diaconescu:
Behavioural Specification for Hierarchical Object Composition. 134-156 - Jochen Malte Küster, Gregor Engels:
Consistency Management Within Model-Based Object-Oriented Development of Components. 157-176 - José Luiz Fiadeiro, Antónia Lopes:
CommUnity on the Move: Architectures for Distribution and Mobility. 177-196 - Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella:
TulaFale: A Security Tool for Web Services. 197-222 - Jan Friso Groote, Tim A. C. Willemse:
A Checker for Modal Formulae for Processes with Data. 223-239 - Yuri Gurevich, Benjamin Rossman, Wolfram Schulte:
Semantic Essence of AsmL. 240-259 - Jean-Marc Jézéquel, Olivier Defour, Noël Plouzeau:
An MDA Approach to Tame Component Based Software Development. 260-275 - Jan J. M. M. Rutten:
An Application of Stream Calculus to Signal Flow Graphs. 276-291 - Natalia Ioustinova, Natalia Sidorova, Martin Steffen:
Synchronous Closing and Flow Analysis for Model Checking Timed Systems. 292-313 - Gregor Gößler, Joseph Sifakis:
Priority Systems. 314-329 - Heike Wehrheim:
Preserving Properties Under Change. 330-343 - Oleg Sheyner, Jeannette M. Wing:
Tools for Generating and Analyzing Attack Graphs. 344-372
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.