Logic, Rewriting, and Concurrency
Festschrift Symposium in Honor of José Meseguer

Urbana, Illinois, USA, September 23-25, 2015


Author(s)Title
Luis Aguirre, Narciso Marti-Oliet, Miguel Palomino, and Isabel PitaSentence Normalized Conditional Narrowing Modulo in Rewriting Logic and Maude
Maria Alpuente, Demis Ballis, Francisco Frechina, and Julia SapinaCombining Runtime Checking and Slicing to improve Maude Error Diagnosis
Thomas AnastasioComputer Modeling in Neuroscience: From Imperative to Declarative Programming
Andrei Arusoaie, Dorel Lucanu, David Nowak, and Vlad RusuVerifying Reachability-Logic Properties on Rewriting-Logic Specifications
Kyungmin Bae and Peter Csaba ÖlveczkyHybrid Multirate PALS
Massimo Bartoletti, Pierpaolo Degano, Paolo Di Gianberardino, and Roberto ZuninoDebits and credits in Petri nets and linear logic
David Basin, Michel Keller, Sasa Radomirovic, and Ralf SasseAlice and Bob Meet Equational Theories
Maria Paola Bonacina, Ulrich Furbach, and Viorica Sofronie-StokkermansOn First-Order Model-Based Reasoning
Roberto Bruni, Hernan Melgratti, and Ugo MontanariA normal form for stateful connectors
Shuo ChenEnlightening Ph.D. Students with the Elegance of Logic my personal memory about Prof. Jose Meseguer
Manuel Clavel, Francisco Duran, Steven Eker, Santiago Escobar, Patrick Lincoln, Narciso Marti-Oliet, and Carolyn TalcottTwo decades of Maude
Erwin EngelerFormal Universes
Stephan Falke and Deepak KapurWhen is a formula a Loop Invariant?
Kokichi FutatsugiGeneric Proof Scores for Generate & Check Method in CafeOBJ
Raul Gutierrez and Salvador LucasFunction Calls at Frozen Positions in Termination of Context-Sensitive Rewriting
Rolf Hennicker, Annabelle Klarl, and Martin WirsingModel-Checking Helena Ensemble Specifications with Spin
Yazmin Ibanez, Till Mossakowski, Don Sannella, and Andrzej TarleckiModularity of Ontologies in an Arbitrary Institution
Helene KirchnerRewriting Strategies and Strategic Rewrite Programs
Michael Lemay and Carl A. GunterNetwork-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware
Alberto Lluch Lafuente, Flemming Nielson, and Hanne Riis NielsonDiscretionary Information Flow Control for Interaction-Oriented Specifications
Catherine MeadowsEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later
Jayadev MisraA denotational semantic theory of concurrent systems
Peter Mosses and Ferdinand VeselyWeak bisimulation as a congruence in MSOS
Marisa Navarro, Fernando Orejas, and Elvira PinoSatisfiability of Constraint Specifications on XML Documents
Stefanie Neubert, Lenz Belzner, and Martin WirsingAlgebraic Reinforcement Learning
Camilo RochaThe Formal System of Dijkstra and Scholten
Grigore RosuFrom Rewriting Logic, to Programming Language Semantics, to Program Verification
Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-AcevesICEMAN: A Practical Architecture for Situational Awareness at the Network Edge