default search action
16th TASE 2022: Cluj-Napoca, Romania
- Yamine Aït Ameur, Florin Craciun:
Theoretical Aspects of Software Engineering - 16th International Symposium, TASE 2022, Cluj-Napoca, Romania, July 8-10, 2022, Proceedings. Lecture Notes in Computer Science 13299, Springer 2022, ISBN 978-3-031-10362-9 - Klaus-Dieter Schewe:
Practical Theory of Computation on Structures. 1-14 - Raymond R. Devillers, Ronny Tredup:
Complexity of Distributed Petri Net Synthesis. 15-28 - Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts Through Perturbation. 29-48 - Jaap Boender, Goran Badevic:
Formal Verification of a Keystore. 49-64 - Nicholas Moore, Mark Lawford:
A Case Study in the Automated Translation of BSV Hardware to PVS Formal Logic with Subsequent Verification. 65-72 - Francesco Parolini, Antoine Miné:
Sound Static Analysis of Regular Expressions for Vulnerabilities to Denial of Service Attacks. 73-91 - Yulong Bao, Xue-Yang Zhu, Wenhui Zhang, Wuwei Shen, Pengfei Sun, Yingqi Zhao:
On Verification of Smart Contracts via Model Checking. 92-112 - Erwan Mahe, Christophe Gaston, Pascale Le Gall:
Equivalence of Denotational and Operational Semantics for Interaction Languages. 113-130 - Fanqi Meng, Xuesong Wang, Jingdong Wang, Peifang Wang:
Automatic Classification of Bug Reports Based on Multiple Text Information and Reports' Intention. 131-147 - Yide Du, Weijiang Hong, Zhenbang Chen, Ji Wang:
Collaborative Verification of Uninterpreted Programs. 148-154 - Baijun Cheng, Yanhui Guo, Yan Ren, Gang Yang, Guosheng Xu:
MSDetector: A Static PHP Webshell Detection System Based on Deep-Learning. 155-172 - S. Arun-Kumar:
Extending Process Algebra with an Undefined Action. 173-179 - Conor Reynolds, Rosemary Monahan:
Machine-Assisted Proofs for Institutions in Coq. 180-196 - Hannes Kallwies, Martin Leucker, Meiko Prilop, Malte Schmitz:
Optimizing Trans-Compilers in Runtime Verification Makes Sense - Sometimes. 197-204 - Haitao Zhang, Bowen Pu:
Testing Vehicle-Mounted Systems: A Stepwise Symbolic Execution Approach for OSEK/VDX Programs. 205-219 - Ying Gao, Meng Wang, Bin Yu:
Dynamic Specification Mining Based on Transformer. 220-237 - Chunxi Zhang, Rong Zhang, Kai Liu:
Dynamic Environment Simulation for Database Performance Evaluation. 238-255 - Racem Bougacha, Régine Laleau, Simon Collart Dutilleul, Rahma Ben Ayed:
Extending SysML with Refinement and Decomposition Mechanisms to Generate Event-B Specifications. 256-273 - Chaymae El Jabri, Marc Frappier, Thibaud Ecarot, Pierre-Martin Tardif:
Development of Monitoring Systems for Anomaly Detection Using ASTD Specifications. 274-289 - Marcello M. Bonsangue, Georgiana Caltais, Hui Feng, Hünkar Can Tunç:
A Language-Based Causal Model for Safety. 290-307 - Harald König, Uwe Wolter:
Consistency of Heterogeneously Typed Behavioural Models: A Coalgebraic Approach. 308-325 - Xiaochao Tang, Zhengfeng Yang, Xuanming Fu, Jianlin Wang, Zhenbing Zeng:
Improving Adversarial Robustness of Deep Neural Networks via Linear Programming. 326-343 - Kim Guldstrand Larsen, Anders Mariegaard, Stefan Schmid, Jirí Srba:
AllSynth: Transiently Correct Network Update Synthesis Accounting for Operator Preferences. 344-362 - Imran Riaz Hasrat, Peter Gjøl Jensen, Kim Guldstrand Larsen, Jirí Srba:
End-to-End Heat-Pump Control Using Continuous Time Stochastic Modelling and Uppaal Stratego. 363-380 - Salim Yahia Kissi, Rabéa Ameur-Boulifa, Yassamine Seladji:
Security Vulnerabilities Detection Through Assertion-Based Approach. 381-387 - Sean Kauffman, Martin Zimmermann:
The Complexity of Evaluating Nfer. 388-405 - Alexandru-Ioan Lungu, Dorel Lucanu:
Supporting Algorithm Analysis with Symbolic Execution in Alk. 406-423
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.