Guiding Distributed Systems Synthesis with Language-Based Security Policies | p. 1 |
Termination Analysis of Java Bytecode | p. 2 |
Sessions and Pipelines for Structured Service Programming | p. 19 |
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers | p. 39 |
Behavioural Theory at Work: Program Transformations in a Service-Centred Calculus | p. 59 |
Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack | p. 78 |
Symbolic Step Encodings for Object Based Communicating State Machines | p. 96 |
Modeling and Model Checking Software Product Lines | p. 113 |
Semantic Foundations and Inference of Non-null Annotations | p. 132 |
Redesign of the LMST Wireless Sensor Protocol through Formal Modeling and Statistical Model Checking | p. 150 |
A Minimal Set of Refactoring Rules for Object-Z | p. 170 |
Formal Modeling of a Generic Middleware to Ensure Invariant Properties | p. 185 |
CoBoxes: Unifying Active Objects and Structured Heaps | p. 201 |
VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language | p. 220 |
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language | p. 240 |
Author Index | p. 259 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.