default search action
18th ICFEM 2016: Tokyo, Japan
- Kazuhiro Ogata, Mark Lawford, Shaoying Liu:
Formal Methods and Software Engineering - 18th International Conference on Formal Engineering Methods, ICFEM 2016, Tokyo, Japan, November 14-18, 2016, Proceedings. Lecture Notes in Computer Science 10009, 2016, ISBN 978-3-319-47845-6 - Valentin Cassano, Thomas Stephen Edward Maibaum, Silviya Grigorova:
A (Proto) Logical Basis for the Notion of a Structured Argument in a Safety Case. 1-17 - Keijiro Araki, Taro Kurita:
Promotion of Formal Approaches in Japanese Software Industry and a Best Practice of FeliCa's Case (Extended Abstract). 18-25 - Weikai Miao, Geguang Pu, Yinbo Yao, Ting Su, Danzhu Bao, Yang Liu, Shuohao Chen, Kunpeng Xiong:
Automated Requirements Validation for ATP Software via Specification Review and Testing. 26-40 - Takaya Saeki, Fuyuki Ishikawa, Shinichi Honiden:
Automatic Generation of Potentially Pathological Instances for Validating Alloy Models. 41-56 - Dominic Scheurer, Reiner Hähnle, Richard Bubel:
A General Lattice Model for Merging Symbolic Execution Branches. 57-73 - Ryo Yanase, Tatsunori Sakai, Makoto Sakai, Satoshi Yamane:
A Case Study of Formal Approach to Dynamically Reconfigurable Systems by Using Dynamic Linear Hybrid Automata. 74-89 - Richard Banach, Michael J. Butler:
Modelling Hybrid Systems in Event-B and Hybrid Event-B: A Comparison of Water Tanks. 90-105 - Guillaume Babin, Yamine Aït Ameur, Neeraj Kumar Singh, Marc Pantel:
A System Substitution Mechanism for Hybrid Systems in Event-B. 106-121 - Manman Chen, Tian Huat Tan, Jun Sun, Jingyi Wang, Yang Liu, Jing Sun, Jin Song Dong:
Service Adaptation with Probabilistic Partial Models. 122-140 - Linas Laibinis, Elena Troubitsyna, Inna Pereverzeva, Ian Oliver, Silke Holtmanns:
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks. 141-158 - Minh Hai Nguyen, Quan Thanh Tho, Le Duc Anh:
Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction. 159-174 - Marco Rocchetto, Nils Ole Tippenhauer:
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. 175-192 - Francesco Marconi, Marcello M. Bersani, Madalina Erascu, Matteo Rossi:
Towards the Formal Verification of Data-Intensive Applications Through Metric Temporal Logic. 193-209 - Alexei Iliasov, Paulius Stankaitis, Alexander B. Romanovsky:
Proving Event-B Models with Reusable Generic Lemmas. 210-225 - Waqar Ahmad, Osman Hasan:
Formal Availability Analysis Using Theorem Proving. 226-242 - Akira Tanaka, Reynald Affeldt, Jacques Garrigue:
Formal Verification of the rank Algorithm for Succinct Data Structures. 243-260 - Brijesh Dongol, Lindsay Groves:
Contextual Trace Refinement for Concurrent Objects: Safety and Progress. 261-278 - Madiel S. Conserva Filho, Marcel Vinícius Medeiros Oliveira, Augusto Sampaio, Ana Cavalcanti:
Local Livelock Analysis of Component-Based Models. 279-295 - Eduard Kamburjan, Crystal Chang Din, Tzu-Chun Chen:
Session-Based Compositional Analysis for Actor-Based Languages Using Futures. 296-312 - Badr Siala, Mohamed Tahar Bhiri, Jean-Paul Bodeveix, Mamoun Filali:
An Event-B Development Process for the Distributed BIP Framework. 313-328 - Shuanglong Kan, Zhiqiu Huang, Zhe Chen:
Partial Order Reduction for State/Event Systems. 329-345 - Peizun Liu, Thomas Wahl:
Concolic Unbounded-Thread Reachability via Loop Summaries. 346-362 - Truong Khanh Nguyen, Tian Huat Tan, Jun Sun, Jiaying Li, Yang Liu, Manman Chen, Jin Song Dong:
Scaling BDD-based Timed Verification with Simulation Reduction. 363-382 - Mohammed Foughali, Bernard Berthomieu, Silvano Dal-Zilio, Félix Ingrand, Anthony Mallet:
Model Checking Real-Time Properties on the Functional Layer of Autonomous Robots. 383-399 - Étienne André, Didier Lime, Olivier H. Roux:
Decision Problems for Parametric Timed Automata. 400-416 - Saurabh Gadia, Cyrille Artho, Gedare Bloom:
Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder. 417-432 - Min Zhang, Frédéric Mallet, Huibiao Zhu:
An SMT-Based Approach to the Formal Analysis of MARTE/CCSL. 433-449 - Nuno Amálio, Richard John Payne, Ana Cavalcanti, Jim Woodcock:
Checking SysML Models for Co-simulation. 450-465 - Manuel Töws, Heike Wehrheim:
A CEGAR Scheme for Information Flow Analysis. 466-483
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.