default search action
3rd SETTA 2017: Changsha, China
- Kim Guldstrand Larsen, Oleg Sokolsky, Ji Wang:
Dependable Software Engineering. Theories, Tools, and Applications - Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10606, Springer 2017, ISBN 978-3-319-69482-5
Invited Talk
- Cliff B. Jones, Andrius Velykis, Nisansala Yatapanage:
General Lessons from a Rely/Guarantee Development. 3-22
Probabilistic and Statistical Analysis
- Vahid Hashemi, Andrea Turrini, Ernst Moritz Hahn, Holger Hermanns, Khaled M. Elbassioni:
Polynomial-Time Alternating Probabilistic Bisimulation for Interval MDPs. 25-41 - Carlos E. Budde, Pedro R. D'Argenio, Arnd Hartmanns:
Better Automated Importance Splitting for Transient Rare Events. 42-58 - Luca Santinelli, Zhishan Guo:
On the Criticality of Probabilistic Worst-Case Execution Time Models. 59-74
Timed and Hybrid Systems
- Yuwei Wang, Guoqiang Li, Shoji Yuen:
Nested Timed Automata with Invariants. 77-93 - Calvin Deutschbein, Tom Fleming, Alan Burns, Sanjoy K. Baruah:
Multi-core Cyclic Executives for Safety-Critical Systems. 94-109 - Dimitar P. Guelev, Shuling Wang, Naijun Zhan:
Compositional Hoare-Style Reasoning About Hybrid CSP in the Duration Calculus. 110-127
Program Analysis
- Yi Li:
Termination of Semi-algebraic Loop Programs. 131-146 - Tianhai Liu, Shmuel S. Tyszberowicz, Bernhard Beckert, Mana Taghdiri:
Computing Exact Loop Bounds for Bounded Program Verification. 147-163 - Zipeng Zhang, Xinyu Feng:
AndroidLeaker: A Hybrid Checker for Collusive Leak in Android Applications. 164-180
Modeling and Verification
- Jianxin Xue, Huan Long, Yuxi Fu:
Remark on Some \pi Variants. 183-199 - Wanwei Liu, Fu Song, Ge Zhou:
Reasoning About Periodicity on Infinite Words. 200-215 - Chen Fu, Yuxin Deng, David N. Jansen, Lijun Zhang:
On Equivalence Checking of Nondeterministic Finite Automata. 216-231 - Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
A New Decomposition Method for Attractor Detection in Large Synchronous Boolean Networks. 232-249 - Daichi Morita, Fuyuki Ishikawa, Shinichi Honiden:
Construction of Abstract State Graphs for Understanding Event-B Models. 250-265 - Maithily Diwan, Meenakshi D'Souza:
A Framework for Modeling and Verifying IoT Communication Protocols. 266-280
Formalization
- Ghassen Helali, Sofiène Tahar, Osman Hasan, Tsvetan Dunchev:
Formal Analysis of Information Flow in HOL. 283-299 - Jiawei Wang, Ming Fu, Lei Qiao, Xinyu Feng:
Formalizing SPARCv8 Instruction Set Architecture in Coq. 300-316
Tools
- Stefano Schivo, Bugra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, Mariëlle Stoelinga:
How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. 319-336 - Idress Husien, Sven Schewe, Nicolas Berthier:
PranCS: A Protocol and Discrete Controller Synthesis Tool. 337-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.