Abstract is missing.
- Practical Theory of Computation on StructuresKlaus-Dieter Schewe. 1-14 [doi]
- Complexity of Distributed Petri Net SynthesisRaymond R. Devillers, Ronny Tredup. 15-28 [doi]
- Repairing Adversarial Texts Through PerturbationGuoliang Dong, Jingyi Wang 0004, Jun Sun 0001, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong. 29-48 [doi]
- Formal Verification of a KeystoreJaap Boender, Goran Badevic. 49-64 [doi]
- A Case Study in the Automated Translation of BSV Hardware to PVS Formal Logic with Subsequent VerificationNicholas Moore, Mark Lawford. 65-72 [doi]
- Sound Static Analysis of Regular Expressions for Vulnerabilities to Denial of Service AttacksFrancesco Parolini, Antoine Miné. 73-91 [doi]
- On Verification of Smart Contracts via Model CheckingYulong Bao, Xue-Yang Zhu, Wenhui Zhang, Wuwei Shen, Pengfei Sun, Yingqi Zhao. 92-112 [doi]
- Equivalence of Denotational and Operational Semantics for Interaction LanguagesErwan Mahe, Christophe Gaston, Pascale Le Gall. 113-130 [doi]
- Automatic Classification of Bug Reports Based on Multiple Text Information and Reports' IntentionFanqi Meng, Xuesong Wang, Jingdong Wang, Peifang Wang. 131-147 [doi]
- Collaborative Verification of Uninterpreted ProgramsYide Du, Weijiang Hong, Zhenbang Chen, Ji Wang. 148-154 [doi]
- MSDetector: A Static PHP Webshell Detection System Based on Deep-LearningBaijun Cheng, Yanhui Guo, Yan Ren, Gang Yang, Guosheng Xu. 155-172 [doi]
- Extending Process Algebra with an Undefined ActionS. Arun-Kumar. 173-179 [doi]
- Machine-Assisted Proofs for Institutions in CoqConor Reynolds, Rosemary Monahan. 180-196 [doi]
- Optimizing Trans-Compilers in Runtime Verification Makes Sense - SometimesHannes Kallwies, Martin Leucker, Meiko Prilop, Malte Schmitz 0001. 197-204 [doi]
- Testing Vehicle-Mounted Systems: A Stepwise Symbolic Execution Approach for OSEK/VDX ProgramsHaitao Zhang, Bowen Pu. 205-219 [doi]
- Dynamic Specification Mining Based on TransformerYing Gao, Meng Wang, Bin Yu. 220-237 [doi]
- Dynamic Environment Simulation for Database Performance EvaluationChunxi Zhang, Rong Zhang, Kai Liu. 238-255 [doi]
- Extending SysML with Refinement and Decomposition Mechanisms to Generate Event-B SpecificationsRacem Bougacha, Régine Laleau, Simon Collart Dutilleul, Rahma Ben Ayed. 256-273 [doi]
- Development of Monitoring Systems for Anomaly Detection Using ASTD SpecificationsChaymae El Jabri, Marc Frappier, Thibaud Ecarot, Pierre-Martin Tardif. 274-289 [doi]
- A Language-Based Causal Model for SafetyMarcello M. Bonsangue, Georgiana Caltais, Hui Feng, Hünkar Can Tunç. 290-307 [doi]
- Consistency of Heterogeneously Typed Behavioural Models: A Coalgebraic ApproachHarald König, Uwe Wolter. 308-325 [doi]
- Improving Adversarial Robustness of Deep Neural Networks via Linear ProgrammingXiaochao Tang, Zhengfeng Yang, Xuanming Fu, Jianlin Wang, Zhenbing Zeng. 326-343 [doi]
- AllSynth: Transiently Correct Network Update Synthesis Accounting for Operator PreferencesKim Guldstrand Larsen, Anders Mariegaard, Stefan Schmid 0001, Jirí Srba. 344-362 [doi]
- End-to-End Heat-Pump Control Using Continuous Time Stochastic Modelling and Uppaal StrategoImran Riaz Hasrat, Peter Gjøl Jensen, Kim Guldstrand Larsen, Jirí Srba. 363-380 [doi]
- Security Vulnerabilities Detection Through Assertion-Based ApproachSalim Yahia Kissi, Rabéa Ameur-Boulifa, Yassamine Seladji. 381-387 [doi]
- The Complexity of Evaluating NferSean Kauffman, Martin Zimmermann 0002. 388-405 [doi]
- Supporting Algorithm Analysis with Symbolic Execution in AlkLungu Alexandru-Ioan, Dorel Lucanu. 406-423 [doi]