default search action
13th TASE 2019: Guilin, China
- Dominique Méry, Shengchao Qin:
2019 International Symposium on Theoretical Aspects of Software Engineering, TASE 2019, Guilin, China, July 29-31, 2019. IEEE 2019, ISBN 978-1-7281-3342-3
Refinement and Semantics for Real Time
- Chenyang Zhu, Michael J. Butler, Corina Cîrstea:
Towards Refinement Semantics of Real-Time Trigger-Response Properties in Event-B. 1-8 - Guillaume Dupont, Yamine Aït Ameur, Marc Pantel, Neeraj Kumar Singh:
Handling Refinement of Continuous Behaviors: A Proof Based Approach with Event-B. 9-16 - Yi Li, Meng Sun:
Distributed Mediator. 17-24 - Yuanrui Zhang, Frédéric Mallet, Huibiao Zhu, Yixiang Chen:
A Logical Approach for the Schedulability Analysis of CCSL. 25-32
Security
- Jim J. Longstaff, Mengda He:
ABAC Requirements Engineering for Database Applications. 33-40 - Yilin Xu, Weimin Ge, Xiaohong Li, Zhiyong Feng, Xiaofei Xie, Yude Bai:
A Co-Occurrence Recommendation Model of Software Security Requirement. 41-48 - Zhiwu Xu, Kerong Ren, Fu Song:
Android Malware Family Classification and Characterization Using CFG and DFG. 49-56 - Yufei Zhao, Longtao He, Zhoujun Li, Liqun Yang, Hao Dong, Chao Li, Yu Wang:
Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China. 57-64
Applications/Case Study
- Gaojian Hao, Feng Li, Wei Huo, Qing Sun, Wei Wang, Xinhua Li, Wei Zou:
Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools. 65-72 - Zhenbing Zeng, Jianlin Wang, Zhengfeng Yang:
Multi-Agent Automated Reasoning Toward Machine Self-Awareness: A Case Study. 73-80 - Junxiu Liu, Zhewei Liang, Yuling Luo, Jiadong Huang, Su Yang:
Hardware Tripartite Synapse Architecture based on Stochastic Computing. 81-85 - Faustin Ahishakiye, Svetlana Jaksic, Felix Dino Lange, Malte Schmitz, Volker Stolz, Daniel Thoma:
Non-Intrusive MC/DC Measurement Based on Traces. 86-92
Mechanized Verification
- Zuxi Chen, Huixing Fang, Xiangyu Luo:
Optimized Step Semantics Encoding for Bounded Model Checking of Timed Automata. 93-98 - Sheng Chen, Baijun Wu:
Efficient Counter-factual Type Error Debugging. 99-106 - Xiyue Zhang, Yi Li, Weijiang Hong, Meng Sun:
Using Recurrent Neural Network to Predict Tactics for Proving Component Connector Properties in Coq. 107-112 - Xiaozhen Zhang, Weiqiang Kong, Jianguo Jiang, Gang Hou, Akira Fukuda:
Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration. 113-120 - Yuhan Nie, Zhiping Shi, Aixuan Wu, Ximeng Li, Guohui Wang, Yong Guan:
A HOL Theory of the Differential for Matrix Functions. 121-127 - Bingqing Xu, Qin Li, Tong Guo, Yi Ao, Dehui Du:
A Quantitative Safety Verification Approach for the Decision-making Process of Autonomous Driving. 128-135
Semantics and Temporal Logic
- Diego Marmsoler:
A Denotational Semantics for Dynamic Architectures. 136-143 - Arpit Sharma:
Stuttering for Markov Automata. 144-151
Modeling and Verification
- Xin Bai, Chenghao Xu, Yi Ao, Biao Chen, Dehui Du:
Learning-based Probabilistic Modeling and Verifying Driver Behavior using MDP. 152-159 - Rongjie Yan, Anyu Cai, Hongyu Gao, Feifei Ma, Jun Yan:
SMT-based Multi-objective Optimization for Scheduling of MPSoC Applications. 160-167 - Alexandra Halchin, Yamine Aït Ameur, Neeraj Kumar Singh, Abderrahmane Feliachi, Julien Ordioni:
Certified Embedding of B Models in an Integrated Verification Framework. 168-175 - Étienne André:
Formalizing Time4sys using parametric timed automata. 176-183
Logics, Complexity, Quantum
- Yu Zhang, Haowei Deng, Quanxi Li, Haoze Song, Leihai Nie:
Optimizing Quantum Programs Against Decoherence: Delaying Qubits into Quantum Superposition. 184-191 - Patrick Gardy:
Low complexity and large interactions are possible in Strategy logic. 192-199
Software Engineering
- Li Hao, Jianqi Shi, Ting Su, Yanhong Huang:
Automated Test Generation for IEC 61131-3 ST Programs via Dynamic Symbolic Execution. 200-207 - Siteng Cao, Yongxin Zhao, Ling Shi:
Software Complexity Reduction by Automated Refactoring Schema. 208-215 - Zuxing Gu, Min Zhou, Jiecheng Wu, Yu Jiang, Jiaxiang Liu, Ming Gu:
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs. 216-223 - Lihui Tang, Lulu Wang, Bixin Li:
Identify Blackboard Pattern Based on Ontology. 224-231
Verification, Concurrency, Memory Models
- Yucheng Fang, Huibiao Zhu, Jiaqi Yin:
Verifying Opacity of a Modified PSTM. 232-239 - Chao Xu, Xi Wu, Huibiao Zhu, Miroslav Popovic:
Modeling and Verifying Transaction Scheduling for Software Transactional Memory using CSP. 240-247 - Xiaohong Chen, Xi Wu, Mengyao Zhao, Haiying Sun:
Verifying the Relationship Among Three Descriptions in Problem Frames Using CSP. 248-255
Applications/Case Studies
- Xinhua Zhu, Qingting Xu, Lanfang Zhang, Han Deng, Hongchao Chen:
A Common Semantic Scoring Method for Chinese Subjective Questions. 256-263 - Ping Wang, Jiwei Yan, Xi Deng, Jun Yan, Jian Zhang:
Understanding Ineffective Events and Reducing Test Sequences for Android Applications. 264-272 - Dehui Du, Yao Wang, Yi Ao, Biao Chen:
An Optimized Partial Rollback Co-simulation Approach for Heterogeneous FMUs. 273-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.