default search action
20th ICFEM 2018: Gold Coast, QLD, Australia
- Jing Sun, Meng Sun:
Formal Methods and Software Engineering - 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Lecture Notes in Computer Science 11232, Springer 2018, ISBN 978-3-030-02449-9
Invited Keynote Paper
- Ian J. Hayes:
Engineering a Theory of Concurrent Programming. 3-18
Formal Models
- Colin F. Snook, Thai Son Hoang, Dana Dghaym, Michael J. Butler, Tomas Fischer, Rupert Schlick, Keming Wang:
Behaviour-Driven Formal Model Development. 21-36 - Naipeng Dong, Tim Muller:
The Foul Adversary: Formal Models. 37-53 - Teck Ping Khoo, Jun Sun:
The Miles Before Formal Methods - A Case Study on Modeling and Analyzing a Passenger Lift System. 54-69 - Jinyun Xue, Yujun Zheng, Qimin Hu, Zhen You, Wuping Xie, Zhuo Cheng:
PAR: A Practicable Formal Method and Its Supporting Platform. 70-86
Verification
- Timm Liebrenz, Paula Herber, Sabine Glesner:
Deductive Verification of Hybrid Control Systems Modeled in Simulink with KeYmaera X. 89-105 - Dileepa Fernando, Naipeng Dong, Cyrille Jégourel, Jin Song Dong:
Verification of Strong Nash-equilibrium for Probabilistic BAR Systems. 106-123 - Vladimír Still, Jiri Barnat:
Model Checking of C++ Programs Under the x86-TSO Memory Model. 124-140
Network Systems
- Yuan Fei, Huibiao Zhu:
Modeling and Verifying NDN Access Control Using CSP. 143-159 - Paul Gainer, Sven Linker, Clare Dixon, Ullrich Hustadt, Michael Fisher:
The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators. 160-176 - Zhiwu Xu, Kerong Ren, Shengchao Qin, Florin Craciun:
CDGDroid: Android Malware Detection Based on Deep Learning Using CFG and DFG. 177-193
Type Theory
- Matthieu Martel:
Strongly Typed Numerical Computations. 197-214 - Xi Wu, Yi Lu, Patrick A. Meiring, Ian J. Hayes, Larissa A. Meinicke:
Type Capabilities for Object-Oriented Programming Languages. 215-230 - Aaron Craig, Alex Potanin, Lindsay Groves, Jonathan Aldrich:
Capabilities: Effects for Free. 231-247
Theorem Proving
- Diego Marmsoler:
A Framework for Interactive Verification of Architectural Design Patterns in Isabelle/HOL. 251-269 - Guohui Wang, Yong Guan, Zhiping Shi, Qianying Zhang, Xiaojuan Li, Yongdong Li:
Formalization of Symplectic Geometry in HOL-Light. 270-283 - Bernhard Beckert, Simon Bischof, Mihai Herda, Michael Kirsten, Marko Kleine Büning:
Using Theorem Provers to Increase the Precision of Dependence Analysis for Information Flow Control. 284-300
Logic and Semantics
- Nils Berg, Thomas Göthel, Armin Danziger, Sabine Glesner:
Preserving Liveness Guarantees from Synchronous Communication to Asynchronous Unstructured Low-Level Languages. 303-319 - Inna Vistbakka, Amin Majd, Elena Troubitsyna:
Deriving Mode Logic for Autonomous Resilient Systems. 320-336 - Wanling Xie, Huibiao Zhu, Shengchao Qin:
UTP Semantics for BigrTiMo. 337-353
Refinement and Transition Systems
- Tsutomu Kobayashi, Fuyuki Ishikawa:
Analysis on Strategies of Superposition Refinement of Event-B Specifications. 357-372 - Michael Foster, Ramsay G. Taylor, Achim D. Brucker, John Derrick:
Formalising Extended Finite State Machine Transition Merging. 373-387 - Cunjing Ge, Jiwei Yan, Jun Yan, Jian Zhang:
Checking Activity Transition Systems with Back Transitions Against Assertions. 388-403
Emerging Applications of Formal Methods
- Hadrien Bride, Jin Song Dong, Zhé Hóu, Brendan P. Mahony, Martin Oxenham:
Towards Trustworthy AI for Autonomous Systems. 407-411 - Hadrien Bride, Jie Dong, Jin Song Dong, Zhé Hóu:
Towards Dependable and Explainable Machine Learning Using Automated Reasoning. 412-416
Doctoral Symposium
- Xiyue Zhang:
Modeling and Verification of Component Connectors. 419-422 - Teck Ping Khoo:
Model Based Testing of Cyber-Physical Systems. 423-426 - Timm Liebrenz:
Service-Oriented Design and Verification of Hybrid Control Systems. 427-431 - Yi Li:
Developing Reliable Component-Based Software in Mediator. 432-435 - Dileepa Fernando:
Model Checking Nash-Equilibrium - Automatic Verification of Robustness in Distributed Systems. 436-440 - Kailong Wang:
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols. 441-445 - Kan Jiang:
Combining Deep Learning and Probabilistic Model Checking in Sports Analytics. 446-449 - Kulani Mahadewa:
Security Analysis of Smart Home Implementations. 450-454 - Yuekang Li:
Principled Greybox Fuzzing. 455-458 - Milad K. Ghale:
Engineering Software for Modular Formalisation and Verification of STV Algorithms. 459-463 - Xiaoning Du:
Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed Fuzzing. 464-468 - Amanda Mahony:
Formalising Performance Guarantees in Meta-Reinforcement Learning. 469-472
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.