default search action
17th TASE 2023: Bristol, UK
- Cristina David, Meng Sun:
Theoretical Aspects of Software Engineering - 17th International Symposium, TASE 2023, Bristol, UK, July 4-6, 2023, Proceedings. Lecture Notes in Computer Science 13931, Springer 2023, ISBN 978-3-031-35256-0 - Vivek Nigam, Carolyn L. Talcott:
Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures. 1-19 - Siyu Liu
, Yuting Wang
:
Verified Transformation of Continuation-Passing Style into Static Single Assignment Form. 20-37 - Mengjun Du, Peiyang Li, Lian Song, W. K. Chan, Bo Jiang:
OAT: An Optimized Android Testing Framework Based on Reinforcement Learning. 38-58 - Chenyang Zhu, Jinyu Zhu, Yujie Cai, Fang Wang:
Decomposing Synthesized Strategies for Reactive Multi-agent Reinforcement Learning. 59-76 - Christian Lidström, Dilian Gurov:
Contract Based Embedded Software Design. 77-94 - Anton Hampus
, Mattias Nyberg:
Verifying Refinement of Probabilistic Contracts Using Timed Automata. 95-113 - Puneet Bhateja:
Asynchronous Test Equivalence over Timed Processes. 114-125 - Darius Foo
, Andreea Costea
, Wei-Ngan Chin
:
Protocol Conformance with Choreographic PlusCal. 126-145 - Wu Wang, Nan Zhang, Cong Tian, Zhenhua Duan, Zhijie Xu, Chaofeng Yu:
Verifying Chips Design at RTL Level. 146-163 - Joanna Delicaris
, Stefan Schupp
, Erika Ábrahám
, Anne Remke
:
Maximizing Reachability Probabilities in Rectangular Automata with Random Clocks. 164-182 - Shengyang Yao, Qin Li
:
A Hierarchical Spatial Logic for Knowledge Sharing and Fusion in Intelligent Connected Vehicle Cooperation. 183-201 - Qiaowen Jia, Yi Lv, Peng Wu, Bohua Zhan, Jifeng Hao, Hong Ye, Chao Wang:
VeriLin: A Linearizability Checker for Large-Scale Concurrent Objects. 202-220 - Kenny Ballou
, Elena Sherman
:
Identifying Minimal Changes in the Zone Abstract Domain. 221-239 - Jaime Santos, Daniel Figueiredo
, Alexandre Madeira
:
idDL2DL - Interval Syntax to dℒ. 240-247 - Zhen Liang
, Dejin Ren
, Wanwei Liu
, Ji Wang
, Wenjing Yang
, Bai Xue
:
Safety Verification for Neural Networks Based on Set-Boundary Analysis. 248-267 - Wenjing Chu, Shuo Chen, Marcello M. Bonsangue, Zenglin Shi:
Approximately Learning Quantum Automata. 268-285 - Lara Bargmann
, Heike Wehrheim
:
View-Based Axiomatic Reasoning for PSO. 286-304 - Muhammad Rizwan Ali, Violet Ka I Pun:
A Static Analyser for Resource Sensitive Workflow Models. 305-312 - Fangting Liao, Shun Long, Weiheng Zhu, Wenzhu Chen, Silei Cao, Xinyi Guan:
MTCD: An Efficient Cloning Detection Technique Based on Method Table. 313-326 - Juliana Cunha, Alexandre Madeira
, Luís Soares Barbosa
:
Stepwise Development of Paraconsistent Processes. 327-343 - Yulin Wu, Zhiwu Xu, Shengchao Qin:
Detecting API-Misuse Based on Pattern Mining via API Usage Graph with Parameters. 344-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.