Fabio Gadducci, Alberto Lluch-Lafuente, and Andrea Vandin. Counterpart Semantics for a Second-Order-Calculus. Fundam. Inform., 118(1-2):177–205, 2012.
Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, and Gianluca Mezzetti. Typing for coordinating Secure Behavioural Variations. In Coordination Models and Languages, volume 7274 of Lecture Notes in Computer Science. Springer, 2012. (doi:10.1007/978-3-642-30829-1_18)
Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, and Gianluca Mezzetti. Typing Context-Dependent Behavioural Variations. In PLACES 2012, volume to appear in EPTCS, 2012.
Pierpaolo Degano, Gian-Luigi Ferrari, and Gianluca Mezzetti. Nominal Automata for Resource Usage Control. In Implementation and Application of Automata - 17th International Conference, volume 7381 of Lecture Notes in Computer Science, pages 125–137. Springer, 2012. (doi:10.1007/978-3-642-31606-7_11)
Dhaminda Abeywickrama, Franco Zambonelli, and Nicklas Hoch. Towards Simulating Architectural Patterns for Self-Aware and Self-Adaptive Systems. In 2nd SASO Workshop on Awareness in Autonomic Systems, Lyon (F), September 2012. IEEE CS Press.
Liliana D'Errico and Michele Loreti. Context Aware Specification and Verification of Distributed Systems. In R. Bruni and Vladimiro Sassone, editors, Trustworthy Global Computing - 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers., volume 7173 of Lecture Notes in Computer Science, pages 142–159. Springer, 2012. (doi:10.1007/978-3-642-30065-3_9)
Marco Dorigo. Swarm Intelligence research at IRIDIA, Université Libre de Bruxelles. Mathware & Soft Computing, 19(2):19–22, 2012.
Jonas Eckhardt, Tobias Mühlbauer, Musab AlTurki, José Meseguer, and Martin Wirsing. Stable Availability under Denial of Service Attacks through FormalPatterns. In 15th International Conference on Fundamentals of Software Engineering(FASE'12), volume 7212 of LNCS, pages 78–93. Springer, 2012. (doi:10.1007/978-3-642-28872-2_6)
Emil Vassev and Mike Hinchey. Efficient Space Exploration through Laziness. In Proceedings of the International Conference on Context-Aware Systems and Applications (ICCASA 2012), Lecture Notes of ICST (LNICST). Springer, 2012.
Massimiliano Masi, Rosario Pugliese, and Francesco Tiezzi. Formalisation and Implementation of the XACML Access Control Mechanism. In G. Barthe, B. Livshits, and R. Scandariato, editors, Proc. of the 4th International Symposium on Engineering Secure Softwareand Systems (ESSoS'12), volume 7159 of LNCS, pages 60–74. Springer, 2012. (doi:10.1007/978-3-642-28166-2_7)