


default search action
11th IFM 2014: Bertinoro, Italy
- Elvira Albert, Emil Sekerinski:
Integrated Formal Methods - 11th International Conference, IFM 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings. Lecture Notes in Computer Science 8739, Springer 2014, ISBN 978-3-319-10180-4
Invited Talks
- Diego Calvanese
, Tomer Kotek, Mantas Simkus
, Helmut Veith, Florian Zuleger:
Shape and Content - A Database-Theoretic Perspective on the Analysis of Data Structures. 3-17 - Sophia Drossopoulou, James Noble
:
How to Break the Bank: Semantics of Capability Policies. 18-35
Tool Integration
- Marcel Vinícius Medeiros Oliveira
, Augusto C. A. Sampaio, Madiel S. Conserva Filho:
Model-Checking Circus State-Rich Specifications. 39-54 - Martin Hentschel, Stefan Käsdorf, Reiner Hähnle
, Richard Bubel:
An Interactive Verification Tool Meets an IDE. 55-70 - Stephen Gilmore, Mirco Tribastone, Andrea Vandin
:
An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems. 71-86 - Messaoud Abbas, Choukri-Bey Ben-Yelles, Renaud Rioboo:
Modeling UML Template Classes with FoCaLiZe. 87-102 - Linas Laibinis, Benjamin Byholm, Inna Pereverzeva, Elena Troubitsyna, Kuan Eeik Tan, Ivan Porres
:
Integrating Event-B Modelling and Discrete-Event Simulation to Analyse Resilience of Data Stores in the Cloud. 103-119 - Asieh Salehi Fathabadi, Colin F. Snook
, Michael J. Butler:
Applying an Integrated Modelling Process to Run-time Management of Many-Core Systems. 120-135
Model Verification
- Yael Meller, Orna Grumberg, Karen Yorav:
Verifying Behavioral UML Systems via CEGAR. 139-154 - Alvaro Miyazawa
, Ana Cavalcanti
:
Formal Refinement in SysML. 155-170 - Hadrien Bride, Olga Kouchnarenko
, Fabien Peureux:
Verifying Modal Workflow Specifications Using Constraint Solving. 171-186
Program Development
- Johannes Eriksson, Masoumeh Parsa, Ralph-Johan Back:
Proofs and Refutations in Invariant-Based Programming. 189-204 - Dipak L. Chaudhari, Om P. Damani:
Automated Theorem Prover Assisted Program Calculations. 205-220 - Steve A. Schneider
, Helen Treharne
, Heike Wehrheim, David M. Williams
:
Managing LTL Properties in Event-B Refinement. 221-237
Security Analysis
- Alessandro Bruni, Michal Sojka
, Flemming Nielson
, Hanne Riis Nielson
:
Formal Security Analysis of the MaCAN Protocol. 241-255 - Barbara Kordy, Marc Pouly
, Patrick Schweitzer:
A Probabilistic Framework for Security Scenarios with Dependent Actions. 256-271 - John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman
, Paul D. Rowe:
A Hybrid Analysis for Security Protocols with State. 272-287
Analysis and Transformation
- Irina Mariuca Asavoae, Mihail Asavoae, Adrián Riesco
:
Towards a Formal Semantics-Based Technique for Interprocedural Slicing. 291-306 - Marie-Christine Jakobs
, Marco Platzner
, Heike Wehrheim, Tobias Wiersema
:
Integrating Software and Hardware Verification. 307-322 - Andreas Fürst, Thai Son Hoang, David A. Basin, Krishnaji Desai, Naoto Sato, Kunihiko Miyazaki:
Code Generation for Event-B. 323-338
Concurrency and Control
- John Derrick
, Graeme Smith
, Brijesh Dongol
:
Verifying Linearizability on TSO Architectures. 341-356 - Bogdan Tofan, Gerhard Schellhorn, Wolfgang Reif
:
A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset. 357-372 - Lucian M. Patcas, Mark Lawford, Tom Maibaum:
A Separation Principle for Embedded System Interfacing. 373-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.