![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 9
Volume 9, Number 1, January 2000
- Tevfik Bultan, Richard Gerber, Christopher League
:
Composite model-checking: verification with type-specific symbolic representations. 3-50 - James C. Corbett:
Using shape analysis to reduce finite-state models of concurrent Java programs. 51-93 - Carl A. Gunter:
Abstracting dependencies between software configuration items. 94-131
Volume 9, Number 2, April 2000
- A. Prasad Sistla, Viktor Gyuris, E. Allen Emerson:
SMC: a symmetry-based model checker for verification of safety and liveness properties. 133-166 - Paolo Ciancarini, Francesco Franzè, Cecilia Mascolo:
Using a coordination language to specify and analyze systems containing mobile components. 167-198 - Panagiotis Louridas, Pericles Loucopoulos:
A generic model for reflective design. 199-237
Volume 9, Number 3, July 2000
- Paola Inverardi, Alexander L. Wolf, Daniel Yankelevich:
Static checking of system behaviors using derived component assumptions. 239-272 - Naftaly H. Minsky, Victoria Ungureanu:
Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. 273-305 - Kevin L. Mills, Hassan Gomaa:
A knowledge-based method for inferring semantic concepts from visual models of system behavior. 306-337
Volume 9, Number 4, October 2000
- Dan S. Wallach, Andrew W. Appel
, Edward W. Felten:
SAFKASI: a security mechanism for language-based systems. 341-378 - Philip W. L. Fong, Robert D. Cameron:
Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking. 379-409 - Andrew C. Myers, Barbara Liskov:
Protecting privacy using the decentralized label model. 410-442 - Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero:
Verifying security protocols with Brutus. 443-487 - Antonio Durante, Riccardo Focardi
, Roberto Gorrieri:
A compiler for analyzing cryptographic protocols using noninterference. 488-528
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.