


default search action
ISoLA 2010: Heraklion, Crete, Greece
- Tiziana Margaria

, Bernhard Steffen:
Leveraging Applications of Formal Methods, Verification, and Validation - 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I. Lecture Notes in Computer Science 6415, Springer 2010, ISBN 978-3-642-16557-3
New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective
- Visar Januzaj

, Stefan Kugele, Boris Langer, Christian Schallhart, Helmut Veith:
New Challenges in the Development of Critical Embedded Systems - An "aeromotive" Perspective. 1-2 - Bernhard Schätz:

Certification of Embedded Software - Impact of ISO DIS 26262 in the Automotive Domain. 3 - Alain Plantec, Frank Singhoff, Pierre Dissaux, Jérôme Legrand:

Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns. 4-17 - Wolfgang Haberl, Markus Herrmannsdoerfer, Stefan Kugele, Michael Tautschnig, Martin Wechs:

Seamless Model-Driven Development Put into Practice. 18-32 - Andreas Holzer, Visar Januzaj

, Stefan Kugele, Michael Tautschnig:
Timely Time Estimates. 33-46 - Raimund Kirner

, Stephan Herhut, Sven-Bodo Scholz
:
Compiler-Support for Robust Multi-core Computing. 47-57
Formal Languages and Methods for Designing and Verifying Complex Embedded Systems
- Yamine Aït Ameur, Frédéric Boniol, Dominique Méry, Virginie Wiels:

Thematic Track: Formal Languages and Methods for Designing and Verifying Complex Embedded Systems. 58-59 - Parosh Aziz Abdulla, Jonathan Cederberg, Lisa Kaati:

Analyzing the Security in the GSM Radio Network Using Attack Jungles. 60-74 - Iakovos Ouranos, Petros S. Stefaneas, Kazuhiro Ogata:

Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method. 75-89 - Twan Basten

, Emiel van Benthum, Marc Geilen
, Martijn Hendriks, Fred Houben, Georgeta Igna, Frans Reckers, Sebastian de Smet, Lou J. Somers, Egbert Teeselink:
Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset. 90-105 - Daniela Carneiro da Cruz, Pedro Rangel Henriques

, Jorge Sousa Pinto
:
Contract-Based Slicing. 106-120
Worst-Case Traversal Time (WCTT)
- Anne Bouillard, Marc Boyer

, Samarjit Chakraborty
, Steven Martin, Jean-Luc Scharbarg, Giovanni Stea
, Eric Thierry:
Special Track on Worst Case Traversal Time (WCTT). 121 - Marc Boyer

, Nicolas Navet, Xavier Olive, Eric Thierry:
The PEGASE Project: Precise and Scalable Temporal Analysis for Aerospace Communication Systems with Network Calculus. 122-136 - Marc Boyer

:
NC-Maude: A Rewriting Tool to Play with Network Calculus. 137-151 - Luca Bisti, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea

:
DEBORAH: A Tool for Worst-Case Analysis of FIFO Tandems. 152-168 - Jens B. Schmitt, Hao Wang, Ivan Martinovic:

A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling. 169-183 - Euriell Le Corronc, Bertrand Cottenceau, Laurent Hardouin:

Flow Control with (Min, +) Algebra. 184-197 - Nikolay Stoimenov, Samarjit Chakraborty

, Lothar Thiele:
An Interface Algebra for Estimating Worst-Case Traversal Times in Component Networks. 198-213 - Alessandro Lori, Giovanni Stea

, Gigliola Vaglini:
Towards Resource-Optimal Routing Plans for Real-Time Traffic. 214-227 - Xiaoting Li, Jean-Luc Scharbarg, Christian Fraboul:

Partially Synchronizing Periodic Flows with Offsets Improves Worst-Case End-to-End Delay Analysis of Switched Ethernet. 228-242 - Michaël Lauer, Jérôme Ermont

, Claire Pagetti, Frédéric Boniol:
Analyzing End-to-End Functional Delays on an IMA Platform. 243-257
Tools in Scientific Workflow Composition
- Joost N. Kok, Anna-Lena Lamprecht, Mark D. Wilkinson:

Tools in Scientific Workflow Composition. 258-260 - Tolga Dalman, Peter Droste, Michael Weitzel, Wolfgang Wiechert

, Katharina Nöh
:
Workflows for Metabolic Flux Analysis: Data Integration and Human Interaction. 261-275 - Carlos Soares

, Miguel Calejo:
Intelligent Document Routing as a First Step towards Workflow Automation: A Case Study Implemented in SQL. 276-284 - Jeroen S. de Bruin, Joost N. Kok:

Combining Subgroup Discovery and Permutation Testing to Reduce Reduncancy. 285-300 - David Withers, Edward A. Kawas, E. Luke McCarthy, Benjamin P. Vandervalk, Mark D. Wilkinson

:
Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins. 301-312 - Vid Podpecan, Monika Záková, Nada Lavrac:

Workflow Construction for Service-Oriented Knowledge Discovery. 313-327 - Tor Johan Mikael Karlsson, Victoria Martin-Requena, Javier Ríos, Oswaldo Trelles

:
Workflow Composition and Enactment Using jORCA. 328-339 - Marco Roos

, Sean Bechhofer
, Jun Zhao, Paolo Missier
, David R. Newman, David De Roure
, M. Scott Marshall:
A Linked Data Approach to Sharing Workflows and Workflow Results. 340-354
Emerging Services and Technologies for a Converging Telecommunications / Web World in Smart Environments of the Internet of Things
- Jörg Ott:

Towards More Adaptive Voice Applications. 355-366 - Sandford Bessler:

Telco Service Delivery Platforms in the Last Decade - A R&D Perspective. 367-374 - Jiehan Zhou

, Ekaterina Gilman
, Jukka Riekki
, Mika Rautiainen, Mika Ylianttila
:
Ontology-Driven Pervasive Service Composition for Everyday Life. 375-389 - Mathieu Boussard, Pierrick Thébault:

Navigating the Web of Things: Visualizing and Interacting with Web-Enabled Objects. 390-398 - Gyu Myoung Lee, Noël Crespi:

Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution. 399-410 - Wei-Lun Wang, Quincy Wu:

Relay Placement Problem in Smart Grid Deployment. 411-424
Web Science
- Maja Vukovic, Claudio Bartolini:

Towards a Research Agenda for Enterprise Crowdsourcing. 425-434 - Andréa Magalhães Magdaleno, Cláudia Maria Lima Werner

, Renata Mendes de Araujo
:
Analyzing Collaboration in Software Development Processes through Social Networks. 435-446 - Donald D. Cowan, Paulo S. C. Alencar, Fred McGarry, Carlos José Pereira de Lucena, Ingrid Nunes

:
A Web-Based Framework for Collaborative Innovation. 447-461 - Vanessa C. F. Gonçalves, Priscila M. V. Lima

, Nelson Maculan, Felipe M. G. França
:
A Distributed Dynamics for WebGraph Decontamination. 462-472 - Ingrid Nunes

, Simone Diniz Junqueira Barbosa
, Carlos José Pereira de Lucena:
Increasing Users' Trust on Personal Assistance Software Using a Domain-Neutral High-Level User Model. 473-487 - Claudio Bartolini, Karin K. Breitman

, Simone Diniz Junqueira Barbosa
, Mathias Sallé, Rita Berardi, Glaucia Melissa Campos, Erik Eidt:
Understanding IT Organizations. 488-501 - Cécilia Englander, Edward Hermann Haeusler:

On the 2-Categorical View of Proofs. 502-518
Model Transformation and Analysis for Industrial Scale Validation
- Arnab De, Abhik Roychoudhury

, Deepak D'Souza:
WOMM: A Weak Operational Memory Model. 519-534 - Zhongxing Xu, Ted Kremenek, Jian Zhang:

A Memory Model for Static Analysis of C Programs. 535-548 - Joy Chakraborty, Deepak D'Souza, K. Narayan Kumar:

Analysing Message Sequence Graph Specifications. 549-563 - Qian Li, Jianhua Zhao, Xuandong Li:

Optimize Context-Sensitive Andersen-Style Points-To Analysis by Method Summarization and Cycle-Elimination. 564-578 - Anders P. Ravn, Jirí Srba

, Muhammad Saleem Vighio
:
A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL. 579-593 - Zheng Wang, Jianwen Li, Yongxin Zhao, Yanxia Qi, Geguang Pu, Jifeng He, Bin Gu:

SPARDL: A Requirement Modeling Language for Periodic Control System. 594-608 - Xiaoshan Li, Zhiming Liu, Martin Schäf, Ling Yin:

AutoPA: Automatic Prototyping from Requirements. 609-624 - Adriano Gomes

, Alexandre Mota, Augusto Sampaio, Felipe A. S. Ferri, Julio Buzzi:
Systematic Model-Based Safety Assessment Via Probabilistic Model Checking. 625-639
Learning Techniques for Software Verification and Validation
- Dimitra Giannakopoulou, Corina S. Pasareanu:

Learning Techniques for Software Verification and Validation - Special Track at ISoLA 2010. 640-642 - Yu-Fang Chen

, Edmund M. Clarke, Azadeh Farzan, Fei He, Ming-Hsien Tsai, Yih-Kuen Tsay
, Bow-Yaw Wang, Lei Zhu:
Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning. 643-657 - Therese Bohlin, Bengt Jonsson, Siavash Soleimanifard:

Inferring Compact Models of Communication Protocol Entities. 658-672 - Fides Aarts, Julien Schmaltz, Frits W. Vaandrager:

Inference and Abstraction of the Biometric Passport. 673-686 - Falk Howar

, Bernhard Steffen, Maik Merten:
From ZULU to RERS - Lessons Learned in the ZULU Challenge. 687-704

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














