


default search action
17th MEMOCODE 2019: La Jolla, CA, USA
- Partha S. Roop, Naijun Zhan, Sicun Gao, Pierluigi Nuzzo:
Proceedings of the 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2019, La Jolla, CA, USA, October 9-11, 2019. ACM 2019, ISBN 978-1-4503-6997-8 - Jin Woo Ro, Avinash Malik, Partha S. Roop:
A compositional semantics of Simulink/Stateflow based on quantized state hybrid automata. 1:1-1:11 - David J. Greaves:
Further sub-cycle and multi-cycle schedulling support for Bluespec Verilog. 2:1-2:11 - Hammond A. Pearce
, Matthew M. Y. Kuo, Partha S. Roop, Srinivas Pinisetty:
Securing implantable medical devices with runtime enforcement hardware. 3:1-3:9 - Maryam Dabaghchian, Zvonimir Rakamaric:
A timeless model for the verification of quasi-periodic distributed systems. 4:1-4:11 - Vighnesh Iyer
, Donggyu Kim, Borivoje Nikolic
, Sanjit A. Seshia:
RTL bug localization through LTL specification mining (WIP). 5:1-5:5 - Mohammad Hekmatnejad, Shakiba Yaghoubi, Adel Dokhanchi, Heni Ben Amor, Aviral Shrivastava
, Lina J. Karam
, Georgios Fainekos
:
Encoding and monitoring responsibility sensitive safety rules for automated vehicles in signal temporal logic. 6:1-6:11 - Nathan Allen
, Yash Raje, Jin Woo Ro, Partha S. Roop:
A compositional approach for real-time machine learning. 7:1-7:5 - Michael Witterauf, Frank Hannig
, Jürgen Teich:
Polyhedral fragments: an efficient representation for symbolically generating code for processor arrays. 8:1-8:10 - Yinghua Hu
, Vivek V. Menon, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Pierluigi Nuzzo:
Security-driven metrics and models for efficient evaluation of logic encryption schemes. 9:1-9:5 - Cody Kinneer, Ryan Wagner
, Fei Fang
, Claire Le Goues
, David Garlan:
Modeling observability in adaptive systems to defend against advanced persistent threats. 10:1-10:11 - Bernard Nongpoh, Rajarshi Ray, Ansuman Banerjee:
Approximate computing for multithreaded programs in shared memory architectures. 11:1-11:9 - Ratan Lal
, Pavithra Prabhakar:
Compositional construction of bounded error over-approximations of acyclic interconnected continuous dynamical systems. 12:1-12:5 - Peter W. V. Tran-Jørgensen, Tomas Kulik, Jalil Boudjadar, Peter Gorm Larsen
:
Security analysis of cloud-connected industrial control systems using combinatorial testing. 13:1-13:11 - Luan Viet Nguyen
, Gautam Mohan, James Weimer, Oleg Sokolsky
, Insup Lee, Rajeev Alur:
Detecting security leaks in hybrid systems with information flow analysis. 14:1-14:11 - Paritosh K. Pandya, Amol Wakankar:
Logical specification and uniform synthesis of robust controllers. 15:1-15:11 - Karine Even-Mendoza
, Antti E. J. Hyvärinen, Hana Chockler
, Natasha Sharygina
:
Lattice-based SMT for program verification. 16:1-16:11 - Freek Verbeek, Joshua A. Bockenek
, Abhijith Bharadwaj, Binoy Ravindran
, Ian Roessle
:
Establishing a refinement relation between binaries and abstract code. 17:1-17:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.