default search action
FSEN 2019: Tehran, Iran
- Hossein Hojjat, Mieke Massink:
Fundamentals of Software Engineering - 8th International Conference, FSEN 2019, Tehran, Iran, May 1-3, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11761, Springer 2019, ISBN 978-3-030-31516-0
Agent Based Systems
- Narges Khakpour, Jetty Kleijn, Marjan Sirjani:
A Formal Model to Integrate Behavioral and Structural Adaptations in Self-adaptive Systems. 3-19 - Sanaz Hasanzadeh Fard, Hadi Tabatabaee Malazi:
A Two-Dimensional Self-coordination Mechanism of Agents in a Minority Game. 20-36 - Marco Piangerelli, Luca Tesei, Emanuela Merelli:
A Persistent Entropy Automaton for the Dow Jones Stock Market. 37-42
Theorem Proving
- M. Saqib Nawaz, Meng Sun, Philippe Fournier-Viger:
Proof Guidance in PVS with Sequential Pattern Mining. 45-60 - M. Saqib Nawaz, Meng Sun:
Using PVS for Modeling and Verification of Probabilistic Connectors. 61-76 - Sharmin Moosavi, Hassan Haghighi, Hasti Sahabi, Farzam Vatanzade, Mojtaba Vahidi-Asl:
Greenify: A Game with the Purpose of Test Data Generation for Unit Testing. 77-92
Learning
- Lisette Sanchez, Jan Friso Groote, Ramon R. H. Schiffelers:
Active Learning of Industrial Software with Data. 95-110 - Samad Paydar, Aidin Azamnouri:
An Experimental Study on Flakiness and Fragility of Randoop Regression Test Suites. 111-126
Verification
- Antonio González-Burgueño, Peter Csaba Ölveczky:
Formalizing and Analyzing Security Ceremonies with Heterogeneous Devices in ANP and PDL. 129-144 - Leandro Gomes, Alexandre Madeira, Mario R. F. Benevides:
Logics for Petri Nets with Propagating Failures. 145-157 - Thomas Neele, Marijn Rol, Jan Friso Groote:
Verifying System-Wide Properties of Industrial Component-Based Software. 158-175
Distributed Algorithms
- Samira Akili, Kim Völlinger:
Case Study on Certifying Distributed Algorithms: Reducing Intrusiveness. 179-185 - José Proença, Alexandre Madeira:
Taming Hierarchical Connectors. 186-193 - Behnaz Changizi, Natallia Kokash, Farhad Arbab:
Service Orchestration with Priority Constraints. 194-209
Program Analysis
- Nathan Wasser, Asmae Heydari Tabar, Reiner Hähnle:
Modeling Non-deterministic C Code with Active Objects. 213-227 - Wolfgang Ahrendt, Richard Bubel, Joshua Ellul, Gordon J. Pace, Raúl Pardo, Vincent Rebiscoul, Gerardo Schneider:
Verification of Smart Contract Business Logic - Exploiting a Java Source Code Verifier. 228-243 - Babak Bagheri, Mohammad Rezaalipour, Mojtaba Vahidi-Asl:
An Approach to Generate Effective Fault Localization Methods for Programs. 244-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.