


default search action
13th TASE 2019: Guilin, China
- Dominique Méry, Shengchao Qin:

2019 International Symposium on Theoretical Aspects of Software Engineering, TASE 2019, Guilin, China, July 29-31, 2019. IEEE 2019, ISBN 978-1-7281-3342-3
Refinement and Semantics for Real Time
- Chenyang Zhu, Michael J. Butler, Corina Cîrstea:

Towards Refinement Semantics of Real-Time Trigger-Response Properties in Event-B. 1-8 - Guillaume Dupont, Yamine Aït Ameur, Marc Pantel, Neeraj Kumar Singh:

Handling Refinement of Continuous Behaviors: A Proof Based Approach with Event-B. 9-16 - Yi Li, Meng Sun:

Distributed Mediator. 17-24 - Yuanrui Zhang, Frédéric Mallet

, Huibiao Zhu, Yixiang Chen:
A Logical Approach for the Schedulability Analysis of CCSL. 25-32
Security
- Jim J. Longstaff, Mengda He:

ABAC Requirements Engineering for Database Applications. 33-40 - Yilin Xu, Weimin Ge, Xiaohong Li, Zhiyong Feng, Xiaofei Xie

, Yude Bai:
A Co-Occurrence Recommendation Model of Software Security Requirement. 41-48 - Zhiwu Xu, Kerong Ren, Fu Song:

Android Malware Family Classification and Characterization Using CFG and DFG. 49-56 - Yufei Zhao, Longtao He, Zhoujun Li

, Liqun Yang, Hao Dong, Chao Li, Yu Wang:
Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China. 57-64
Applications/Case Study
- Gaojian Hao, Feng Li, Wei Huo, Qing Sun, Wei Wang, Xinhua Li, Wei Zou:

Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools. 65-72 - Zhenbing Zeng, Jianlin Wang, Zhengfeng Yang:

Multi-Agent Automated Reasoning Toward Machine Self-Awareness: A Case Study. 73-80 - Junxiu Liu, Zhewei Liang, Yuling Luo, Jiadong Huang, Su Yang:

Hardware Tripartite Synapse Architecture based on Stochastic Computing. 81-85 - Faustin Ahishakiye

, Svetlana Jaksic, Felix Dino Lange, Malte Schmitz, Volker Stolz
, Daniel Thoma:
Non-Intrusive MC/DC Measurement Based on Traces. 86-92
Mechanized Verification
- Zuxi Chen, Huixing Fang

, Xiangyu Luo:
Optimized Step Semantics Encoding for Bounded Model Checking of Timed Automata. 93-98 - Sheng Chen, Baijun Wu:

Efficient Counter-factual Type Error Debugging. 99-106 - Xiyue Zhang

, Yi Li, Weijiang Hong, Meng Sun:
Using Recurrent Neural Network to Predict Tactics for Proving Component Connector Properties in Coq. 107-112 - Xiaozhen Zhang, Weiqiang Kong, Jianguo Jiang, Gang Hou, Akira Fukuda:

Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration. 113-120 - Yuhan Nie, Zhiping Shi, Aixuan Wu, Ximeng Li, Guohui Wang, Yong Guan:

A HOL Theory of the Differential for Matrix Functions. 121-127 - Bingqing Xu, Qin Li, Tong Guo, Yi Ao, Dehui Du:

A Quantitative Safety Verification Approach for the Decision-making Process of Autonomous Driving. 128-135
Semantics and Temporal Logic
- Diego Marmsoler:

A Denotational Semantics for Dynamic Architectures. 136-143 - Arpit Sharma:

Stuttering for Markov Automata. 144-151
Modeling and Verification
- Xin Bai, Chenghao Xu, Yi Ao, Biao Chen, Dehui Du:

Learning-based Probabilistic Modeling and Verifying Driver Behavior using MDP. 152-159 - Rongjie Yan, Anyu Cai, Hongyu Gao, Feifei Ma, Jun Yan:

SMT-based Multi-objective Optimization for Scheduling of MPSoC Applications. 160-167 - Alexandra Halchin, Yamine Aït Ameur, Neeraj Kumar Singh, Abderrahmane Feliachi, Julien Ordioni:

Certified Embedding of B Models in an Integrated Verification Framework. 168-175 - Étienne André:

Formalizing Time4sys using parametric timed automata. 176-183
Logics, Complexity, Quantum
- Yu Zhang

, Haowei Deng, Quanxi Li, Haoze Song, Leihai Nie:
Optimizing Quantum Programs Against Decoherence: Delaying Qubits into Quantum Superposition. 184-191 - Patrick Gardy:

Low complexity and large interactions are possible in Strategy logic. 192-199
Software Engineering
- Li Hao, Jianqi Shi, Ting Su, Yanhong Huang:

Automated Test Generation for IEC 61131-3 ST Programs via Dynamic Symbolic Execution. 200-207 - Siteng Cao, Yongxin Zhao, Ling Shi:

Software Complexity Reduction by Automated Refactoring Schema. 208-215 - Zuxing Gu, Min Zhou, Jiecheng Wu, Yu Jiang, Jiaxiang Liu

, Ming Gu:
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs. 216-223 - Lihui Tang, Lulu Wang, Bixin Li:

Identify Blackboard Pattern Based on Ontology. 224-231
Verification, Concurrency, Memory Models
- Yucheng Fang, Huibiao Zhu, Jiaqi Yin:

Verifying Opacity of a Modified PSTM. 232-239 - Chao Xu, Xi Wu, Huibiao Zhu, Miroslav Popovic

:
Modeling and Verifying Transaction Scheduling for Software Transactional Memory using CSP. 240-247 - Xiaohong Chen, Xi Wu, Mengyao Zhao, Haiying Sun:

Verifying the Relationship Among Three Descriptions in Problem Frames Using CSP. 248-255
Applications/Case Studies
- Xinhua Zhu, Qingting Xu, Lanfang Zhang, Han Deng, Hongchao Chen:

A Common Semantic Scoring Method for Chinese Subjective Questions. 256-263 - Ping Wang, Jiwei Yan

, Xi Deng, Jun Yan, Jian Zhang:
Understanding Ineffective Events and Reducing Test Sequences for Android Applications. 264-272 - Dehui Du, Yao Wang, Yi Ao, Biao Chen:

An Optimized Partial Rollback Co-simulation Approach for Heterogeneous FMUs. 273-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














