- 2009-10-15Unifying Theories of Data Flow
- 2009-09-10Formal Security Proofs for Cryptographic Algorithms and Their Implementations
- 2009-09-01Certification of code-based cryptographic proofs
- 2009-07-27Testing Finitary Probabilistic Processes
- 2009-07-16A Graph-Based Operational Semantics of Object Oriented Programs
- 2009-06-17The Future of Computer Science
- 2009-06-12On Several Untypical Information Retrieval and Web Search Paradigms
- 2009-05-11A resource-aware picalculus
- 2009-04-23Introduction to AIST/CVS & Tree Automata for Non-Linear Arithmetic
- 2009-04-20Modular Concurrency Verification
- 2009-04-14Specifying programs with propositions and with congruences
- 2009-03-09The rCOS Modeler: model-driven development and integrated verification support
- 2009-01-07Decision Algorithms for Probabilistic Simulations
- 2008-12-02Synthesis of Designs from Property Specifications
- 2008-11-05A Pictorial Introduction to Separation Logic
- 2008-09-03A Revival of Data Dependencies for Improving Data Quality
- 2008-08-26From clear specifications to efficient implementations
- 2008-08-26Efficient Policy Analysis for Administrative Role Based Access Control
- 2008-07-08Imperative Programs on Numbers: Mechanization of Loop Invariant Generation and Loop Termination
- 2008-06-30Perspectives in Probabilistic Verification