The SCEAS System
Navigation Menu

Journals in DBLP

Electr. Notes Theor. Comput. Sci.
2005, volume: 137, number: 2

  1. John Derrick, Eerke A. Boiten
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:1-3 [Journal]
  2. Diyaa-Addein Atiya, Steve King, Jim Woodcock
    Simpler Reasoning About System Properties: a Proof-by-Refinement Technique. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:5-22 [Journal]
  3. Christie Bolton
    Using the Alloy Analyzer to Verify Data Refinement in Z. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:23-44 [Journal]
  4. Ana Cavalcanti, Jim Woodcock
    Angelic Nondeterminism and Unifying Theories of Programming. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:45-66 [Journal]
  5. Moshe Deutsch, Martin C. Henson
    An Analysis of Operation-Refinement in an Abortive Paradigm. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:67-92 [Journal]
  6. Robert Colvin, Simon Doherty, Lindsay Groves
    Verifying Concurrent Data Structures by Simulation. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:93-110 [Journal]
  7. Martin C. Henson, Besnik Kajtazi
    The Specification Logic vZ. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:111-129 [Journal]
  8. Kevin Lano, Kelly Androutsopoulos, David Clark
    Refinement Patterns for UML. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:131-149 [Journal]
  9. Richard F. Paige, Dimitrios S. Kolovos, Fiona Polack
    Refinement via Consistency Checking in MDA. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:151-161 [Journal]
  10. Fiona Polack, Susan Stepney
    Emergent Properties Do Not Refine. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:163-181 [Journal]
  11. Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
    Tank Monitoring: A pAMN Case Study. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:183-204 [Journal]
  12. Graeme Smith, John Derrick
    Model Checking Downward Simulations. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:205-224 [Journal]
  13. John A. Clark, Susan Stepney, Howard Chivers
    Breaking the Model: Finalisation and a Taxonomy of Security Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:225-242 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002