Author(s) | Title |
Luis Aguirre, Narciso Marti-Oliet, Miguel Palomino, and Isabel Pita | Sentence Normalized Conditional Narrowing Modulo in Rewriting Logic and Maude |
Maria Alpuente, Demis Ballis, Francisco Frechina, and Julia Sapina | Combining Runtime Checking and Slicing to improve Maude Error Diagnosis |
Thomas Anastasio | Computer Modeling in Neuroscience: From Imperative to Declarative Programming |
Andrei Arusoaie, Dorel Lucanu, David Nowak, and Vlad Rusu | Verifying Reachability-Logic Properties on Rewriting-Logic Specifications |
Kyungmin Bae and Peter Csaba Ölveczky | Hybrid Multirate PALS |
Massimo Bartoletti, Pierpaolo Degano, Paolo Di Gianberardino, and Roberto Zunino | Debits and credits in Petri nets and linear logic |
David Basin, Michel Keller, Sasa Radomirovic, and Ralf Sasse | Alice and Bob Meet Equational Theories |
Maria Paola Bonacina, Ulrich Furbach, and Viorica Sofronie-Stokkermans | On First-Order Model-Based Reasoning |
Roberto Bruni, Hernan Melgratti, and Ugo Montanari | A normal form for stateful connectors |
Shuo Chen | Enlightening Ph.D. Students with the Elegance of Logic — my personal memory about Prof. Jose Meseguer |
Manuel Clavel, Francisco Duran, Steven Eker, Santiago Escobar, Patrick Lincoln, Narciso Marti-Oliet, and Carolyn Talcott | Two decades of Maude |
Erwin Engeler | Formal Universes |
Stephan Falke and Deepak Kapur | When is a formula a Loop Invariant? |
Kokichi Futatsugi | Generic Proof Scores for Generate & Check Method in CafeOBJ |
Raul Gutierrez and Salvador Lucas | Function Calls at Frozen Positions in Termination of Context-Sensitive Rewriting |
Rolf Hennicker, Annabelle Klarl, and Martin Wirsing | Model-Checking Helena Ensemble Specifications with Spin |
Yazmin Ibanez, Till Mossakowski, Don Sannella, and Andrzej Tarlecki | Modularity of Ontologies in an Arbitrary Institution |
Helene Kirchner | Rewriting Strategies and Strategic Rewrite Programs |
Michael Lemay and Carl A. Gunter | Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware |
Alberto Lluch Lafuente, Flemming Nielson, and Hanne Riis Nielson | Discretionary Information Flow Control for Interaction-Oriented Specifications |
Catherine Meadows | Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later |
Jayadev Misra | A denotational semantic theory of concurrent systems |
Peter Mosses and Ferdinand Vesely | Weak bisimulation as a congruence in MSOS |
Marisa Navarro, Fernando Orejas, and Elvira Pino | Satisfiability of Constraint Specifications on XML Documents |
Stefanie Neubert, Lenz Belzner, and Martin Wirsing | Algebraic Reinforcement Learning |
Camilo Rocha | The Formal System of Dijkstra and Scholten |
Grigore Rosu | From Rewriting Logic, to Programming Language Semantics, to Program Verification |
Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-Aceves | ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge |