


default search action
11th IFM 2014: Bertinoro, Italy
- Elvira Albert, Emil Sekerinski:

Integrated Formal Methods - 11th International Conference, IFM 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings. Lecture Notes in Computer Science 8739, Springer 2014, ISBN 978-3-319-10180-4
Invited Talks
- Diego Calvanese

, Tomer Kotek, Mantas Simkus
, Helmut Veith, Florian Zuleger:
Shape and Content - A Database-Theoretic Perspective on the Analysis of Data Structures. 3-17 - Sophia Drossopoulou, James Noble

:
How to Break the Bank: Semantics of Capability Policies. 18-35
Tool Integration
- Marcel Vinícius Medeiros Oliveira

, Augusto C. A. Sampaio, Madiel S. Conserva Filho:
Model-Checking Circus State-Rich Specifications. 39-54 - Martin Hentschel, Stefan Käsdorf, Reiner Hähnle

, Richard Bubel:
An Interactive Verification Tool Meets an IDE. 55-70 - Stephen Gilmore, Mirco Tribastone, Andrea Vandin

:
An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems. 71-86 - Messaoud Abbas, Choukri-Bey Ben-Yelles, Renaud Rioboo:

Modeling UML Template Classes with FoCaLiZe. 87-102 - Linas Laibinis, Benjamin Byholm, Inna Pereverzeva, Elena Troubitsyna, Kuan Eeik Tan, Ivan Porres

:
Integrating Event-B Modelling and Discrete-Event Simulation to Analyse Resilience of Data Stores in the Cloud. 103-119 - Asieh Salehi Fathabadi, Colin F. Snook

, Michael J. Butler:
Applying an Integrated Modelling Process to Run-time Management of Many-Core Systems. 120-135
Model Verification
- Yael Meller, Orna Grumberg, Karen Yorav:

Verifying Behavioral UML Systems via CEGAR. 139-154 - Alvaro Miyazawa

, Ana Cavalcanti
:
Formal Refinement in SysML. 155-170 - Hadrien Bride, Olga Kouchnarenko

, Fabien Peureux:
Verifying Modal Workflow Specifications Using Constraint Solving. 171-186
Program Development
- Johannes Eriksson, Masoumeh Parsa, Ralph-Johan Back:

Proofs and Refutations in Invariant-Based Programming. 189-204 - Dipak L. Chaudhari, Om P. Damani:

Automated Theorem Prover Assisted Program Calculations. 205-220 - Steve A. Schneider

, Helen Treharne
, Heike Wehrheim, David M. Williams
:
Managing LTL Properties in Event-B Refinement. 221-237
Security Analysis
- Alessandro Bruni, Michal Sojka

, Flemming Nielson
, Hanne Riis Nielson
:
Formal Security Analysis of the MaCAN Protocol. 241-255 - Barbara Kordy, Marc Pouly

, Patrick Schweitzer:
A Probabilistic Framework for Security Scenarios with Dependent Actions. 256-271 - John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman

, Paul D. Rowe:
A Hybrid Analysis for Security Protocols with State. 272-287
Analysis and Transformation
- Irina Mariuca Asavoae, Mihail Asavoae, Adrián Riesco

:
Towards a Formal Semantics-Based Technique for Interprocedural Slicing. 291-306 - Marie-Christine Jakobs

, Marco Platzner
, Heike Wehrheim, Tobias Wiersema
:
Integrating Software and Hardware Verification. 307-322 - Andreas Fürst, Thai Son Hoang, David A. Basin, Krishnaji Desai, Naoto Sato, Kunihiko Miyazaki:

Code Generation for Event-B. 323-338
Concurrency and Control
- John Derrick

, Graeme Smith
, Brijesh Dongol
:
Verifying Linearizability on TSO Architectures. 341-356 - Bogdan Tofan, Gerhard Schellhorn, Wolfgang Reif

:
A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset. 357-372 - Lucian M. Patcas, Mark Lawford, Tom Maibaum:

A Separation Principle for Embedded System Interfacing. 373-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














