


default search action
1st SETTA 2015: Nanjing, China
- Xuandong Li, Zhiming Liu, Wang Yi:

Dependable Software Engineering: Theories, Tools, and Applications - First International Symposium, SETTA 2015, Nanjing, China, November 4-6, 2015, Proceedings. Lecture Notes in Computer Science 9409, Springer 2015, ISBN 978-3-319-25941-3
Probabilistic Systems
- Sebastian Junges, Dennis Guck, Joost-Pieter Katoen

, Arend Rensink
, Mariëlle Stoelinga
:
Fault Trees on a Diet - - Automated Reduction by Graph Rewriting -. 3-18 - Hassan Hatefi, Bettina Braitling, Ralf Wimmer

, Luis María Ferrer Fioriti, Holger Hermanns, Bernd Becker
:
Cost vs. Time in Stochastic Games and Markov Automata. 19-34 - Tom van Dijk

, Ernst Moritz Hahn, David N. Jansen
, Yong Li
, Thomas Neele
, Mariëlle Stoelinga
, Andrea Turrini, Lijun Zhang:
A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking. 35-51
Hybrid and Cyber-Physical Systems
- Guillaume Babin

, Yamine Aït Ameur, Shin Nakajima, Marc Pantel:
Refinement and Proof Based Development of Systems Characterized by Continuous Functions. 55-70 - Gregor von Bochmann, Martin Hilscher, Sven Linker

, Ernst-Rüdiger Olderog:
Synthesizing Controllers for Multi-lane Traffic Maneuvers. 71-86 - Yu Peng, Shuling Wang, Naijun Zhan, Lijun Zhang:

Extending Hybrid CSP with Probability and Stochasticity. 87-102
Testing, Simulation and Inference
- Vania Joloboff, Jean-François Monin, Xiaomu Shi:

Towards Verified Faithful Simulation. 105-119 - Franz Weitl, Nazim Sebih, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Yoriyuki Yamagata

, Mitsuharu Yamamoto:
Cardinality of UDP Transmission Outcomes. 120-134 - Chen Luo, Fei He, Carlo Ghezzi:

Inferring Software Behavioral Models with MapReduce. 135-149
Bisimulation and Correctness
- Ben C. Moszkowski, Dimitar P. Guelev:

An Application of Temporal Projection to Interleaving Concurrency. 153-167 - Adriaan Larmuseau, Marco Patrignani

, Dave Clarke:
A High-Level Model for an Assembly Language Attacker by Means of Reflection. 168-182
Design and Implementation
- David Faitelson, Shmuel S. Tyszberowicz:

Improving Design Decomposition. 185-200 - Linas Laibinis, Elena Troubitsyna, Yuliya Prokhorova, Alexei Iliasov, Alexander B. Romanovsky

:
From Requirements Engineering to Safety Assurance: Refinement Approach. 201-216 - Yu-Lei Gu, Xueyang Zhu

, Guangquan Zhang:
Pareto Optimal Scheduling of Synchronous Data Flow Graphs via Parallel Methods. 217-223
Symbolic Execution and Invariants
- Junxian Zhang, Zhoujun Li, Xianchen Zheng:

PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation. 227-242 - Nathan Wasser:

Generating Specifications for Recursive Methods by Abstracting Program States. 243-257 - Juan Zhai, Hanfei Wang, Jianhua Zhao:

Assertion-Directed Precondition Synthesis for Loops over Data Structures. 258-274
Verification and Case Studies
- Qiang Wang, Yan Lei, Simon Bliudze, Xiaoguang Mao:

Automatic Fault Localization for BIP. 277-283 - Tianxiang Lu:

Formal Verification of the Pastry Protocol Using \mathrmTLA^+. 284-299 - Sandeep Patil

, Victor Dubinin
, Valeriy Vyatkin:
Formal Modelling and Verification of IEC61499 Function Blocks with Abstract State Machines and SMV - Execution Semantics. 300-315

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














