![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
21st SEFM 2023: Eindhoven, The Netherlands
- Carla Ferreira
, Tim A. C. Willemse
:
Software Engineering and Formal Methods - 21st International Conference, SEFM 2023, Eindhoven, The Netherlands, November 6-10, 2023, Proceedings. Lecture Notes in Computer Science 14323, Springer 2023, ISBN 978-3-031-47114-8
Invited Contribution
- Reiner Hähnle, Marco Scaletta, Eduard Kamburjan:
Herding CATs. 3-8
Regular Papers
- Rabéa Ameur-Boulifa
, Quentin Corradi
, Ludovic Henrio
, Eric Madelaine
:
Refinements for Open Automata. 11-29 - Sylvain Conchon, Alexandrina Korneva:
The Cubicle Fuzzy Loop: A Fuzzing-Based Extension for the Cubicle Model Checker. 30-46 - Theo De Castro Pinto, Antoine Rollet, Grégoire Sutre, Ireneusz Tobor:
Guiding Symbolic Execution with A-Star. 47-65 - Florian Dyck, Cedric Richter
, Heike Wehrheim
:
Robustness Testing of Software Verifiers. 66-84 - Derek Egolf, Stavros Tripakis:
Decoupled Fitness Criteria for Reactive Systems. 85-105 - Mojtaba Eshghie
, Wolfgang Ahrendt
, Cyrille Artho
, Thomas Troels Hildebrandt
, Gerardo Schneider
:
Capturing Smart Contract Design with DCR Graphs. 106-125 - Sandip Ghosal
, Bengt Jonsson, Philipp Rümmer:
An Active Learning Approach to Synthesizing Program Contracts. 126-144 - Jan Haltermann
, Marie-Christine Jakobs
, Cedric Richter
, Heike Wehrheim
:
Ranged Program Analysis via Instrumentation. 145-164 - Milan Lopuhaä-Zwakenberg
, Mariëlle Stoelinga:
Attack Time Analysis in Dynamic Attack Trees via Integer Linear Programming. 165-183 - Diego Marmsoler
, Billy Thornton:
SSCalc: A Calculus for Solidity Smart Contracts. 184-204 - Stefano M. Nicoletti
, Milan Lopuhaä-Zwakenberg
, Ernst Moritz Hahn
, Mariëlle Stoelinga
:
sfATM: A Logic for Quantitative Security Properties on Attack Trees. 205-225 - Quentin Nivon, Gwen Salaün:
Refactoring of Multi-instance BPMN Processes with Time and Resources. 226-245 - Olivia Proust
, Frédéric Loulergue
:
Verified Scalable Parallel Computing with Why3. 246-262 - Rasmus C. Rønneberg, Raúl Pardo, Andrzej Wasowski
:
Exact and Efficient Bayesian Inference for Privacy Risk Quantification. 263-281 - Sarah Sallinger, Georg Weissenbacher, Florian Zuleger:
A Formalization of Heisenbugs and Their Causes. 282-300 - Mikhail Semenyuk
, Mark Batty
, Brijesh Dongol
:
Verifying Read-Copy Update Under RC11. 301-319 - Xidan Song
, Youcheng Sun
, Mustafa A. Mustafa
, Lucas C. Cordeiro
:
QNNRepair: Quantized Neural Network Repair. 320-339 - Nicola Thoben
, Jan Haltermann
, Heike Wehrheim
:
Timeout Prediction for Software Analyses. 340-358
Tool Papers
- Max Korn
, Julián Méndez
, Sascha Klüppelholz
, Ricardo Langner
, Christel Baier
, Raimund Dachselt
:
PMC-VIS: An Interactive Visualization Tool for Probabilistic Model Checking. 361-375
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.