default search action
26th FM 2024: Milan, Italy - Part II
- André Platzer
, Kristin Yvonne Rozier
, Matteo Pradella
, Matteo Rossi
:
Formal Methods - 26th International Symposium, FM 2024, Milan, Italy, September 9-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14934, Springer 2025, ISBN 978-3-031-71176-3
Tools and Case Studies
- Terru Stübinger
, Lars Hupel
:
Extending Isabelle/HOL's Code Generator with Support for the Go Programming Language. 3-19 - Laura Titolo
, Mariano M. Moscato
, Marco A. Feliú
, Paolo Masci
, César A. Muñoz:
Rigorous Floating-Point Round-Off Error Analysis in PRECiSA 4.0. 20-38 - Dirk Beyer
, Henrik Wachowitz
:
FM-Weck: Containerized Execution of Formal-Methods Tools. 39-47 - Daniele Dell'Erba
, Yong Li
, Sven Schewe
:
DFAMiner: Mining Minimal Separating DFAs from Labelled Samples. 48-66 - Raven Beutner
, Bernd Finkbeiner
, Angelina Göbl
:
Visualizing Game-Based Certificates for Hyperproperty Verification. 67-75 - Milla Valnet, Nathanaëlle Courant, Guillaume Bury, Pierre Chambart, Vincent Laviron:
Chamelon : A Delta-Debugger for OCaml. 76-83 - Carlos Gustavo López Pombo
, Agustín Eloy Martinez Suñé
, Emilio Tuosto
:
Automated Static Analysis of Quality of Service Properties of Communicating Systems. 84-103 - Ana Barros, Henrique Neto
, Alcino Cunha
, Nuno Macedo
, Ana C. R. Paiva
:
Alloy Repair Hint Generation Based on Historical Data. 104-121 - Michael Leuschel
:
B2SAT: A Bare-Metal Reduction of B to SAT. 122-139 - Jianqiang Ding
, Taoran Wu
, Zhen Liang
, Bai Xue
:
PyBDR: Set-Boundary Based Reachability Analysis Toolkit in Python. 140-157 - Sung-Shik Jongmans
:
Discourje: Run-Time Verification of Communication Protocols in Clojure - Live at Last. 158-166 - Paul Kobialka
, Andrea Pferscher
, Gunnar R. Bergersen
, Einar Broch Johnsen
, Silvia Lizeth Tapia Tarifa
:
Stochastic Games for User Journeys. 167-186
Embedded Systems Track
- Huiyu Tan, Xi Yang, Fu Song, Taolue Chen, Zhilin Wu:
Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks. 189-207 - Julius Adelt, Robert Mensing, Paula Herber:
Reusable Specification Patterns for Verification of Resilience in Autonomous Hybrid Systems. 208-228 - Han Su
, Shenghua Feng
, Sinong Zhan
, Naijun Zhan
:
Switching Controller Synthesis for Hybrid Systems Against STL Formulas. 229-247 - Hao Wu
, Shenghua Feng
, Ting Gan
, Jie Wang
, Bican Xia
, Naijun Zhan
:
On Completeness of SDP-Based Barrier Certificate Synthesis over Unbounded Domains. 248-266 - Changjian Zhang, Parv Kapoor, Rômulo Meira-Góes, David Garlan, Eunsuk Kang, Akila Ganlath, Shatadal Mishra, Nejib Ammar:
Tolerance of Reinforcement Learning Controllers Against Deviations in Cyber Physical Systems. 267-285 - Zhenya Zhang
, Jie An
, Paolo Arcaini
, Ichiro Hasuo
:
CauMon: An Informative Online Monitor for Signal Temporal Logic. 286-304
Industry Day Track
- Minghua Wang
, Jingling Xue
, Lin Huang
, Yuan Zi, Tao Wei:
UnsafeCop: Towards Memory Safety for Real-World Unsafe Rust Code with Practical Bounded Model Checking. 307-324 - Juntao Ji, Yinyou Gu, Yubao Fu, Qingshan Lin:
Beyond the Bottleneck: Enhancing High-Concurrency Systems with Lock Tuning. 325-337 - Hanfeng Wang, Zhibin Yang
, Yong Zhou, Xilong Wang, Weilin Deng, Wei Li:
AGVTS: Automated Generation and Verification of Temporal Specifications for Aeronautics SCADE Models. 338-355 - Vladislav Nenchev
, Calum Imrie
, Simos Gerasimou
, Radu Calinescu
:
Code-Level Safety Verification for Automated Driving: A Case Study. 356-372 - Gaetano Raia, Gianluca Rigano, David Vincenzoni, Maurizio Martina:
A Case Study on Formal Equivalence Verification Between a C/C++ Model and Its RTL Design. 373-389
Tutorial Papers
- Martin Brain, Elizabeth Polgreen:
A Pyramid Of (Formal) Software Verification. 393-419 - Arend-Jan Quist
, Jingyi Mei
, Tim Coopmans
, Alfons Laarman
:
Advancing Quantum Computing with Formal Methods. 420-446 - Mariëlle Stoelinga
:
No Risk, No Fun - A Tutorial on Risk Management. 447-468 - Ivan Perez, Alwyn E. Goodloe, Frank Dedden:
Runtime Verification in Real-Time with the Copilot Language: A Tutorial. 469-491 - Andrea Bombarda
, Silvia Bonfanti
, Angelo Gargantini
, Elvinia Riccobene
, Patrizia Scandurra
:
ASMETA Tool Set for Rigorous System Design. 492-517 - Mário Pereira
:
Practical Deductive Verification of OCaml Programs. 518-542 - Daniel Baier
, Dirk Beyer
, Po-Chun Chien
, Marie-Christine Jakobs
, Marek Jankola
, Matthias Kettl
, Nian-Ze Lee
, Thomas Lemberger
, Marian Lingsch Rosenfeld
, Henrik Wachowitz
, Philipp Wendler
:
Software Verification with CPAchecker 3.0: Tutorial and User Guide. 543-570 - Clark W. Barrett
, Cesare Tinelli
, Haniel Barbosa
, Aina Niemetz
, Mathias Preiner
, Andrew Reynolds
, Yoni Zohar
:
Satisfiability Modulo Theories: A Beginner's Tutorial. 571-596 - Bernhard Beckert
, Richard Bubel, Daniel Drodt
, Reiner Hähnle
, Florian Lanzinger
, Wolfram Pfeifer
, Mattias Ulbrich
, Alexander Weigl
:
The Java Verification Tool KeY:A Tutorial. 597-623 - Jan Baumeister
, Bernd Finkbeiner
, Florian Kohn
, Frederik Scheerer
:
A Tutorial on Stream-Based Monitoring. 624-648
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.