default search action
34th FORTE 2014: Berlin, Germany
- Erika Ábrahám, Catuscia Palamidessi:
Formal Techniques for Distributed Objects, Components, and Systems - 34th IFIP WG 6.1 International Conference, FORTE 2014, Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014. Proceedings. Lecture Notes in Computer Science 8461, Springer 2014, ISBN 978-3-662-43612-7
Specification Languages and Type Systems
- Søren Debois, Thomas T. Hildebrandt, Tijs Slaats, Nobuko Yoshida:
Type Checking Liveness for Collaborative Processes with Bounded and Unbounded Recursion. 1-16 - Daniela Remenska, Tim A. C. Willemse, Jeff Templon, Kees Verstoep, Henri E. Bal:
Property Specification Made Easy: Harnessing the Power of Model Checking in UML Designs. 17-32 - Peter Zeller, Annette Bieniusa, Arnd Poetzsch-Heffter:
Formal Specification and Verification of CRDTs. 33-48
Monitoring and Testing
- Elvira Albert, Puri Arenas, Miguel Gómez-Zamalloa:
Actor- and Task-Selection Strategies for Pruning Redundant State-Exploration in Testing. 49-65 - Yliès Falcone, Tom Cornebize, Jean-Claude Fernandez:
Efficient and Generalized Decentralized Monitoring of Regular Languages. 66-83 - Alexander Graf-Brill, Holger Hermanns, Hubert Garavel:
A Model-Based Certification Framework for the EnergyBus Standard. 84-99 - Carlos Gregorio-Rodríguez, Luis Llana, Rafael Martínez-Torres:
Effectiveness for Input Output Conformance Simulation iocos̱. 100-116
Security Analysis
- Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo:
A Program Logic for Verifying Secure Routing Protocols. 117-132 - Cornelius Diekmann, Stephan-Alexander Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, Georg Carle:
Verifying Security Policies Using Host Attributes. 133-148 - Shuling Wang, Flemming Nielson, Hanne Riis Nielson:
Denial-of-Service Security Attack in the Continuous-Time World. 149-165 - Michele Boreale, Francesca Pampaloni:
Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries. 166-181 - Roberto Vigo, Flemming Nielson, Hanne Riis Nielson:
Uniform Protection for Multi-exposed Targets. 182-198 - Lili Xu, Konstantinos Chatzikokolakis, Huimin Lin:
Metrics for Differential Privacy in Concurrent Systems. 199-215
Bisimulation, Abstraction and Reduction
- Rocco De Nicola, Giulio Iacobelli, Mirco Tribastone:
Dimming Relations for the Efficient Analysis of Concurrent Systems via Action Abstraction. 216-231 - Stephan Mennicke, Jens-Wolfhard Schicke-Uffmann, Ursula Goltz:
On the Step Branching Time Closure of Free-Choice Petri Nets. 232-248 - David Romero-Hernández, David de Frutos-Escrig:
Coinductive Definition of Distances between Processes: Beyond Bisimulation Distances. 249-265 - Souheib Baarir, Alexandre Duret-Lutz:
Mechanizing the Minimization of Deterministic Generalized Büchi Automata. 266-283 - Dániel Darvas, Borja Fernandez Adiego, András Vörös, Tamás Bartha, Enrique Blanco Viñuela, Víctor M. González Suárez:
Formal Verification of Complex Properties on PLC Programs. 284-299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.