default search action
11th IFM 2014: Bertinoro, Italy
- Elvira Albert, Emil Sekerinski:
Integrated Formal Methods - 11th International Conference, IFM 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings. Lecture Notes in Computer Science 8739, Springer 2014, ISBN 978-3-319-10180-4
Invited Talks
- Diego Calvanese, Tomer Kotek, Mantas Simkus, Helmut Veith, Florian Zuleger:
Shape and Content - A Database-Theoretic Perspective on the Analysis of Data Structures. 3-17 - Sophia Drossopoulou, James Noble:
How to Break the Bank: Semantics of Capability Policies. 18-35
Tool Integration
- Marcel Vinícius Medeiros Oliveira, Augusto C. A. Sampaio, Madiel S. Conserva Filho:
Model-Checking Circus State-Rich Specifications. 39-54 - Martin Hentschel, Stefan Käsdorf, Reiner Hähnle, Richard Bubel:
An Interactive Verification Tool Meets an IDE. 55-70 - Stephen Gilmore, Mirco Tribastone, Andrea Vandin:
An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems. 71-86 - Messaoud Abbas, Choukri-Bey Ben-Yelles, Renaud Rioboo:
Modeling UML Template Classes with FoCaLiZe. 87-102 - Linas Laibinis, Benjamin Byholm, Inna Pereverzeva, Elena Troubitsyna, Kuan Eeik Tan, Ivan Porres:
Integrating Event-B Modelling and Discrete-Event Simulation to Analyse Resilience of Data Stores in the Cloud. 103-119 - Asieh Salehi Fathabadi, Colin F. Snook, Michael J. Butler:
Applying an Integrated Modelling Process to Run-time Management of Many-Core Systems. 120-135
Model Verification
- Yael Meller, Orna Grumberg, Karen Yorav:
Verifying Behavioral UML Systems via CEGAR. 139-154 - Alvaro Miyazawa, Ana Cavalcanti:
Formal Refinement in SysML. 155-170 - Hadrien Bride, Olga Kouchnarenko, Fabien Peureux:
Verifying Modal Workflow Specifications Using Constraint Solving. 171-186
Program Development
- Johannes Eriksson, Masoumeh Parsa, Ralph-Johan Back:
Proofs and Refutations in Invariant-Based Programming. 189-204 - Dipak L. Chaudhari, Om P. Damani:
Automated Theorem Prover Assisted Program Calculations. 205-220 - Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL Properties in Event-B Refinement. 221-237
Security Analysis
- Alessandro Bruni, Michal Sojka, Flemming Nielson, Hanne Riis Nielson:
Formal Security Analysis of the MaCAN Protocol. 241-255 - Barbara Kordy, Marc Pouly, Patrick Schweitzer:
A Probabilistic Framework for Security Scenarios with Dependent Actions. 256-271 - John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe:
A Hybrid Analysis for Security Protocols with State. 272-287
Analysis and Transformation
- Irina Mariuca Asavoae, Mihail Asavoae, Adrián Riesco:
Towards a Formal Semantics-Based Technique for Interprocedural Slicing. 291-306 - Marie-Christine Jakobs, Marco Platzner, Heike Wehrheim, Tobias Wiersema:
Integrating Software and Hardware Verification. 307-322 - Andreas Fürst, Thai Son Hoang, David A. Basin, Krishnaji Desai, Naoto Sato, Kunihiko Miyazaki:
Code Generation for Event-B. 323-338
Concurrency and Control
- John Derrick, Graeme Smith, Brijesh Dongol:
Verifying Linearizability on TSO Architectures. 341-356 - Bogdan Tofan, Gerhard Schellhorn, Wolfgang Reif:
A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset. 357-372 - Lucian M. Patcas, Mark Lawford, Tom Maibaum:
A Separation Principle for Embedded System Interfacing. 373-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.