default search action
1st SETTA 2015: Nanjing, China
- Xuandong Li, Zhiming Liu, Wang Yi:
Dependable Software Engineering: Theories, Tools, and Applications - First International Symposium, SETTA 2015, Nanjing, China, November 4-6, 2015, Proceedings. Lecture Notes in Computer Science 9409, Springer 2015, ISBN 978-3-319-25941-3
Probabilistic Systems
- Sebastian Junges, Dennis Guck, Joost-Pieter Katoen, Arend Rensink, Mariëlle Stoelinga:
Fault Trees on a Diet - - Automated Reduction by Graph Rewriting -. 3-18 - Hassan Hatefi, Bettina Braitling, Ralf Wimmer, Luis María Ferrer Fioriti, Holger Hermanns, Bernd Becker:
Cost vs. Time in Stochastic Games and Markov Automata. 19-34 - Tom van Dijk, Ernst Moritz Hahn, David N. Jansen, Yong Li, Thomas Neele, Mariëlle Stoelinga, Andrea Turrini, Lijun Zhang:
A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking. 35-51
Hybrid and Cyber-Physical Systems
- Guillaume Babin, Yamine Aït Ameur, Shin Nakajima, Marc Pantel:
Refinement and Proof Based Development of Systems Characterized by Continuous Functions. 55-70 - Gregor von Bochmann, Martin Hilscher, Sven Linker, Ernst-Rüdiger Olderog:
Synthesizing Controllers for Multi-lane Traffic Maneuvers. 71-86 - Yu Peng, Shuling Wang, Naijun Zhan, Lijun Zhang:
Extending Hybrid CSP with Probability and Stochasticity. 87-102
Testing, Simulation and Inference
- Vania Joloboff, Jean-François Monin, Xiaomu Shi:
Towards Verified Faithful Simulation. 105-119 - Franz Weitl, Nazim Sebih, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Yoriyuki Yamagata, Mitsuharu Yamamoto:
Cardinality of UDP Transmission Outcomes. 120-134 - Chen Luo, Fei He, Carlo Ghezzi:
Inferring Software Behavioral Models with MapReduce. 135-149
Bisimulation and Correctness
- Ben C. Moszkowski, Dimitar P. Guelev:
An Application of Temporal Projection to Interleaving Concurrency. 153-167 - Adriaan Larmuseau, Marco Patrignani, Dave Clarke:
A High-Level Model for an Assembly Language Attacker by Means of Reflection. 168-182
Design and Implementation
- David Faitelson, Shmuel S. Tyszberowicz:
Improving Design Decomposition. 185-200 - Linas Laibinis, Elena Troubitsyna, Yuliya Prokhorova, Alexei Iliasov, Alexander B. Romanovsky:
From Requirements Engineering to Safety Assurance: Refinement Approach. 201-216 - Yu-Lei Gu, Xueyang Zhu, Guangquan Zhang:
Pareto Optimal Scheduling of Synchronous Data Flow Graphs via Parallel Methods. 217-223
Symbolic Execution and Invariants
- Junxian Zhang, Zhoujun Li, Xianchen Zheng:
PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation. 227-242 - Nathan Wasser:
Generating Specifications for Recursive Methods by Abstracting Program States. 243-257 - Juan Zhai, Hanfei Wang, Jianhua Zhao:
Assertion-Directed Precondition Synthesis for Loops over Data Structures. 258-274
Verification and Case Studies
- Qiang Wang, Yan Lei, Simon Bliudze, Xiaoguang Mao:
Automatic Fault Localization for BIP. 277-283 - Tianxiang Lu:
Formal Verification of the Pastry Protocol Using \mathrmTLA^+. 284-299 - Sandeep Patil, Victor Dubinin, Valeriy Vyatkin:
Formal Modelling and Verification of IEC61499 Function Blocks with Abstract State Machines and SMV - Execution Semantics. 300-315
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.