


default search action
20th ICFEM 2018: Gold Coast, QLD, Australia
- Jing Sun, Meng Sun:

Formal Methods and Software Engineering - 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Lecture Notes in Computer Science 11232, Springer 2018, ISBN 978-3-030-02449-9
Invited Keynote Paper
- Ian J. Hayes:

Engineering a Theory of Concurrent Programming. 3-18
Formal Models
- Colin F. Snook

, Thai Son Hoang
, Dana Dghaym
, Michael J. Butler
, Tomas Fischer, Rupert Schlick
, Keming Wang
:
Behaviour-Driven Formal Model Development. 21-36 - Naipeng Dong

, Tim Muller:
The Foul Adversary: Formal Models. 37-53 - Teck Ping Khoo, Jun Sun:

The Miles Before Formal Methods - A Case Study on Modeling and Analyzing a Passenger Lift System. 54-69 - Jinyun Xue, Yujun Zheng, Qimin Hu, Zhen You, Wuping Xie, Zhuo Cheng:

PAR: A Practicable Formal Method and Its Supporting Platform. 70-86
Verification
- Timm Liebrenz, Paula Herber, Sabine Glesner:

Deductive Verification of Hybrid Control Systems Modeled in Simulink with KeYmaera X. 89-105 - Dileepa Fernando, Naipeng Dong

, Cyrille Jégourel, Jin Song Dong:
Verification of Strong Nash-equilibrium for Probabilistic BAR Systems. 106-123 - Vladimír Still, Jiri Barnat:

Model Checking of C++ Programs Under the x86-TSO Memory Model. 124-140
Network Systems
- Yuan Fei, Huibiao Zhu:

Modeling and Verifying NDN Access Control Using CSP. 143-159 - Paul Gainer

, Sven Linker
, Clare Dixon
, Ullrich Hustadt
, Michael Fisher
:
The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators. 160-176 - Zhiwu Xu, Kerong Ren, Shengchao Qin, Florin Craciun:

CDGDroid: Android Malware Detection Based on Deep Learning Using CFG and DFG. 177-193
Type Theory
- Matthieu Martel:

Strongly Typed Numerical Computations. 197-214 - Xi Wu

, Yi Lu
, Patrick A. Meiring
, Ian J. Hayes
, Larissa A. Meinicke
:
Type Capabilities for Object-Oriented Programming Languages. 215-230 - Aaron Craig, Alex Potanin

, Lindsay Groves, Jonathan Aldrich
:
Capabilities: Effects for Free. 231-247
Theorem Proving
- Diego Marmsoler

:
A Framework for Interactive Verification of Architectural Design Patterns in Isabelle/HOL. 251-269 - Guohui Wang, Yong Guan, Zhiping Shi, Qianying Zhang, Xiaojuan Li, Yongdong Li:

Formalization of Symplectic Geometry in HOL-Light. 270-283 - Bernhard Beckert

, Simon Bischof, Mihai Herda
, Michael Kirsten
, Marko Kleine Büning:
Using Theorem Provers to Increase the Precision of Dependence Analysis for Information Flow Control. 284-300
Logic and Semantics
- Nils Berg, Thomas Göthel, Armin Danziger, Sabine Glesner:

Preserving Liveness Guarantees from Synchronous Communication to Asynchronous Unstructured Low-Level Languages. 303-319 - Inna Vistbakka, Amin Majd, Elena Troubitsyna:

Deriving Mode Logic for Autonomous Resilient Systems. 320-336 - Wanling Xie, Huibiao Zhu, Shengchao Qin:

UTP Semantics for BigrTiMo. 337-353
Refinement and Transition Systems
- Tsutomu Kobayashi, Fuyuki Ishikawa:

Analysis on Strategies of Superposition Refinement of Event-B Specifications. 357-372 - Michael Foster

, Ramsay G. Taylor
, Achim D. Brucker
, John Derrick
:
Formalising Extended Finite State Machine Transition Merging. 373-387 - Cunjing Ge, Jiwei Yan, Jun Yan, Jian Zhang:

Checking Activity Transition Systems with Back Transitions Against Assertions. 388-403
Emerging Applications of Formal Methods
- Hadrien Bride, Jin Song Dong, Zhé Hóu

, Brendan P. Mahony, Martin Oxenham:
Towards Trustworthy AI for Autonomous Systems. 407-411 - Hadrien Bride, Jie Dong, Jin Song Dong, Zhé Hóu

:
Towards Dependable and Explainable Machine Learning Using Automated Reasoning. 412-416
Doctoral Symposium
- Xiyue Zhang

:
Modeling and Verification of Component Connectors. 419-422 - Teck Ping Khoo:

Model Based Testing of Cyber-Physical Systems. 423-426 - Timm Liebrenz:

Service-Oriented Design and Verification of Hybrid Control Systems. 427-431 - Yi Li:

Developing Reliable Component-Based Software in Mediator. 432-435 - Dileepa Fernando:

Model Checking Nash-Equilibrium - Automatic Verification of Robustness in Distributed Systems. 436-440 - Kailong Wang

:
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols. 441-445 - Kan Jiang

:
Combining Deep Learning and Probabilistic Model Checking in Sports Analytics. 446-449 - Kulani Mahadewa

:
Security Analysis of Smart Home Implementations. 450-454 - Yuekang Li

:
Principled Greybox Fuzzing. 455-458 - Milad K. Ghale:

Engineering Software for Modular Formalisation and Verification of STV Algorithms. 459-463 - Xiaoning Du:

Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed Fuzzing. 464-468 - Amanda Mahony:

Formalising Performance Guarantees in Meta-Reinforcement Learning. 469-472

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














