A.W. Andrews and R.J. Cole: Simulated data experiment to test a software reliability growth model based on exercise frequencies; J.P. Bowen, H. Jifeng, R.W.S. Hale and J.M.J. Herbert: Towards verified systems: the SAFEMOS project; S.K. Das: Formalizing safety in decision support systems; R. de Lemos, A. Saeed and T. Anderson: Formal techniques for requirements analysis for safety-critical systems; D. Gollmann: Proving authentication protocols - what do authentication protocols prove?; M. Ingleby: A Galois theory of local reasoning in control systems with compositionality; Z. Liu and M. Joseph: A formal framework for fault-tolerant programs; Z. Liu, J. Nordahl and E.V. Sorensen: Composition and refinement of probabilistic real-time systems; J. May et al; Fault prediction for software development processes; P. Mukerjee and B.A. Wichmann: single transferable vote: a case study of the use of VDM-SL; D.L. Parnas: Mathematics of computation for (software and other) engineers; F.J. Pavey and L.A. Winsborrow: Formal demonstration of equivalence of source code and PROM contents: an industrial example; C.P. Pfleeger: Uses and misuses of formal methods in computer security; C. Pulley and G.V. Coroy: Logical methods in the formal verification of safety-critical software; H. Zhu, P.A.V. Hall and J.H.R. May: Understanding software test adequacy - an axiomatic and measurement theory approach.