Narrow Search
Last searches

Results for *

Displaying results 1 to 1 of 1.

  1. Formal methods and software engineering
    24th international conference on formal engineering methods, ICFEM 2023, Brisbane, QLD, Australia, November 21-24, 2023 : proceedings
    Contributor: Li, Yi (HerausgeberIn); Tahar, Sofiène (HerausgeberIn)
    Published: [2023]; © 2023
    Publisher:  Springer, Singapore

    This book constitutes the proceedings of the 24th International Conference on Formal Methods and Software Engineering, ICFEM 2023, held in Brisbane, QLD, Australia, during November 21-24, 2023. The 13 full papers presented together with 8 doctoral... more

    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    RN 2835(14308)
    No loan of volumes, only paper copies will be sent
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Bibliothek
    No inter-library loan

     

    This book constitutes the proceedings of the 24th International Conference on Formal Methods and Software Engineering, ICFEM 2023, held in Brisbane, QLD, Australia, during November 21-24, 2023. The 13 full papers presented together with 8 doctoral symposium papers in this volume were carefully reviewed and selected from 34 submissions, the volume also contains one invited paper. The conference focuses on applying formal methods to practical applications and presents papers for research in all areas related to formal engineering methods

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Cover (lizenzpflichtig)
    Source: Union catalogues
    Contributor: Li, Yi (HerausgeberIn); Tahar, Sofiène (HerausgeberIn)
    Language: English
    Media type: Conference proceedings
    Format: Print
    ISBN: 9789819975839
    Corporations / Congresses: International Conference on Formal Engineering Methods, 24. (2023, Brisbane)
    Series: Lecture notes in computer science ; 14308
    Subjects: Angewandte Informatik; COMPUTERS / Computer Science; COMPUTERS / Data Processing / General; COMPUTERS / Data Processing / Speech & Audio Processing; COMPUTERS / Programming / General; COMPUTERS / Programming / Software Development; COMPUTERS / Programming Languages / General; Compiler und Übersetzer; Computer programming / software development; Computer science; Computerprogrammierung und Softwareentwicklung; Information technology: general issues; Natural language & machine translation; Natürliche Sprachen und maschinelle Übersetzung; Programming & scripting languages: general; Software Engineering; Software Engineering; Theoretische Informatik
    Scope: xxviii, 300 Seiten, Diagramme
    Notes:

    Literaturangaben

    Invited Talk: Verifying Compiler Optimisations.- Regular Papers: An Idealist's Approach for Smart Contract Correctness.- Active Inference of EFSMs Without Reset.- Learning Mealy Machines with Local Timers.- Compositional Vulnerability Detection with Insecurity Separation Logic.- Dynamic Extrapolation in Extended Timed Automata.- Formalizing Robustness against Character-level Perturbations for Neural Network Language Models.- Trace models of concurrent valuation algebras.- Branch and Bound for Sigmoid-like Neural Network Verification.- Certifying Sequential Consistency of Machine Learning Accelerators.- Guided Integration of Formal Verification in Assurance Cases.- Validation-Driven Development.- Incremental Property Directed Reachability.- Proving Local Invariants in ASTDs.- Doctoral Symposium Papers: Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol.- Early and systematic validation of formal models.- Verifying Neural Networks by Approximating Convex Hulls.- Eager to Stop: Efficient Falsification of Deep Neural Networks.- A Runtime Verification Framework For Cyber-physical Systems Based On Data Analytics And LTL Formula Learning.- Unified Verification of Neural Networks' Robustness and Privacy in Computer Vision.- IoT Software Vulnerability Detection Techniques through Large Language Model.- Vulnerability Detection via Typestate-Guided Code Representation Learning.