Stop the war!
Остановите войну!
for scientists:
default search action
17th TASE 2023: Bristol, UK
- Cristina David, Meng Sun:
Theoretical Aspects of Software Engineering - 17th International Symposium, TASE 2023, Bristol, UK, July 4-6, 2023, Proceedings. Lecture Notes in Computer Science 13931, Springer 2023, ISBN 978-3-031-35256-0 - Vivek Nigam, Carolyn L. Talcott:
Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures. 1-19 - Siyu Liu, Yuting Wang:
Verified Transformation of Continuation-Passing Style into Static Single Assignment Form. 20-37 - Mengjun Du, Peiyang Li, Lian Song, W. K. Chan, Bo Jiang:
OAT: An Optimized Android Testing Framework Based on Reinforcement Learning. 38-58 - Chenyang Zhu, Jinyu Zhu, Yujie Cai, Fang Wang:
Decomposing Synthesized Strategies for Reactive Multi-agent Reinforcement Learning. 59-76 - Christian Lidström, Dilian Gurov:
Contract Based Embedded Software Design. 77-94 - Anton Hampus, Mattias Nyberg:
Verifying Refinement of Probabilistic Contracts Using Timed Automata. 95-113 - Puneet Bhateja:
Asynchronous Test Equivalence over Timed Processes. 114-125 - Darius Foo, Andreea Costea, Wei-Ngan Chin:
Protocol Conformance with Choreographic PlusCal. 126-145 - Wu Wang, Nan Zhang, Cong Tian, Zhenhua Duan, Zhijie Xu, Chaofeng Yu:
Verifying Chips Design at RTL Level. 146-163 - Joanna Delicaris, Stefan Schupp, Erika Ábrahám, Anne Remke:
Maximizing Reachability Probabilities in Rectangular Automata with Random Clocks. 164-182 - Shengyang Yao, Qin Li:
A Hierarchical Spatial Logic for Knowledge Sharing and Fusion in Intelligent Connected Vehicle Cooperation. 183-201 - Qiaowen Jia, Yi Lv, Peng Wu, Bohua Zhan, Jifeng Hao, Hong Ye, Chao Wang:
VeriLin: A Linearizability Checker for Large-Scale Concurrent Objects. 202-220 - Kenny Ballou, Elena Sherman:
Identifying Minimal Changes in the Zone Abstract Domain. 221-239 - Jaime Santos, Daniel Figueiredo, Alexandre Madeira:
idDL2DL - Interval Syntax to dℒ. 240-247 - Zhen Liang, Dejin Ren, Wanwei Liu, Ji Wang, Wenjing Yang, Bai Xue:
Safety Verification for Neural Networks Based on Set-Boundary Analysis. 248-267 - Wenjing Chu, Shuo Chen, Marcello M. Bonsangue, Zenglin Shi:
Approximately Learning Quantum Automata. 268-285 - Lara Bargmann, Heike Wehrheim:
View-Based Axiomatic Reasoning for PSO. 286-304 - Muhammad Rizwan Ali, Violet Ka I Pun:
A Static Analyser for Resource Sensitive Workflow Models. 305-312 - Fangting Liao, Shun Long, Weiheng Zhu, Wenzhu Chen, Silei Cao, Xinyi Guan:
MTCD: An Efficient Cloning Detection Technique Based on Method Table. 313-326 - Juliana Cunha, Alexandre Madeira, Luís Soares Barbosa:
Stepwise Development of Paraconsistent Processes. 327-343 - Yulin Wu, Zhiwu Xu, Shengchao Qin:
Detecting API-Misuse Based on Pattern Mining via API Usage Graph with Parameters. 344-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.