| 2008 | A Hierarchy of Equivalences for Probabilistic Processes. Manuel Núñez, Luis Fernando Llana Díaz |
| 2008 | A Specification Framework for Earth-Friendly Logistics. Ichiro Satoh |
| 2008 | Adapting Petri Nets Reductions to Promela Specifications. Christophe Pajault, Jean-François Pradat-Peyre, Pierre Rousseau |
| 2008 | An Experimental Evaluation of Probabilistic Simulation. Jonathan Bogdoll, Holger Hermanns, Lijun Zhang |
| 2008 | An SMT Approach to Bounded Reachability Analysis of Model Programs. Margus Veanes, Nikolaj S. Bjørner, Alexander Raschke |
| 2008 | Checking Correctness of Transactional Behaviors. Vincenzo Ciancia, Gian-Luigi Ferrari, Roberto Guanciale, Daniele Strollo |
| 2008 | Counterexample Guided Spotlight Abstraction Refinement. Tobe Toben |
| 2008 | Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. Guoqiang Shu, Yating Hsu, David Lee |
| 2008 | Distributed Semantics and Implementation for Systems with Interaction and Priority. Ananda Basu, Philippe Bidinger, Marius Bozga, Joseph Sifakis |
| 2008 | Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings Kenji Suzuki, Teruo Higashino, Keiichi Yasumoto, Khaled El-Fakih |
| 2008 | Model Generation for Horn Logic with Stratified Negation. Ethan K. Jackson, Wolfram Schulte |
| 2008 | Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets. Jonathan Billington, Amar Kumar Gupta, Guy Edward Gallasch |
| 2008 | Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic Bisimulations. David de Frutos-Escrig, Miguel Palomino, Ignacio Fábregas |
| 2008 | NQSL - Formal Language and Tool Support for Network Quality-of-Service Requirements. Christian Webel, Reinhard Gotzhein, Joachim Nicolay |
| 2008 | Parameterized Tree Systems. Parosh Aziz Abdulla, Noomene Ben Henda, Giorgio Delzanno, Frédéric Haziza, Ahmed Rezine |
| 2008 | Program Repair Suggestions from Graphical State-Transition Specifications. Farn Wang, Chih-Hong Cheng |
| 2008 | Protocol Modeling with Model Program Composition. Margus Veanes, Wolfram Schulte |
| 2008 | Specifying and Verifying Web Transactions. Jing Li, Huibiao Zhu, Jifeng He |
| 2008 | Timed Mobile Ambients for Network Protocols. Bogdan Aman, Gabriel Ciobanu |
| 2008 | Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Wei Wang, Dongyao Ji |
| 2008 | Verification of a Hierarchical Generic Mutual Exclusion Algorithm. Souheib Baarir, Julien Sopena, Fabrice Legond-Aubry |
| 2008 | Verifying Erlang Telecommunication Systems with the Process Algebra µCRL. Qiang Guo, John Derrick, Csaba Hoch |