


default search action
10th NFM 2018: Newport News, VA, USA
- Aaron Dutle, César A. Muñoz, Anthony Narkawicz:

NASA Formal Methods - 10th International Symposium, NFM 2018, Newport News, VA, USA, April 17-19, 2018, Proceedings. Lecture Notes in Computer Science 10811, Springer 2018, ISBN 978-3-319-77934-8 - Sarah Benyagoub, Meriem Ouederni, Yamine Aït Ameur, Atif Mashkoor:

Incremental Construction of Realizable Choreographies. 1-19 - Siddhartha Bhattacharyya, Thomas C. Eskridge

, Natasha A. Neogi, Marco M. Carvalho, Milton Stafford:
Formal Assurance for Cooperative Intelligent Autonomous Agents. 20-36 - Allan Blanchard, Nikolai Kosmatov

, Frédéric Loulergue
:
Ghosts for Lists: A Critical Module of Contiki Verified in Frama-C. 37-53 - Giovanna Broccia

, Paolo Milazzo
, Peter Csaba Ölveczky:
An Executable Formal Framework for Safety-Critical Human Multitasking. 54-69 - Saksham Chand, Yanhong A. Liu:

Simpler Specifications and Easier Proofs of Distributed Algorithms Using History Variables. 70-86 - Charles Zhuo Chen, Werner Dietl:

Don't Miss the End: Preventing Unsafe End-of-File Comparisons. 87-94 - Flavio M. de Paula, Arvind Haran, Brad Bingham:

An Efficient Rewriting Framework for Trace Coverage of Symmetric Systems. 95-112 - Bruno Dutertre, Dejan Jovanovic, Jorge A. Navas:

Verification of Fault-Tolerant Protocols with Sally. 113-120 - Souradeep Dutta

, Susmit Jha
, Sriram Sankaranarayanan
, Ashish Tiwari
:
Output Range Analysis for Deep Feedforward Neural Networks. 121-138 - Yassmeen Elderhalli

, Osman Hasan
, Waqar Ahmad
, Sofiène Tahar
:
Formal Dynamic Fault Trees Analysis Using an Integration of Theorem Proving and Model Checking. 139-156 - Ansgar Fehnker

, Kaylash Chaudhary
:
Twenty Percent and a Few Days - Optimising a Bitcoin Majority Attack. 157-163 - Ansgar Fehnker

, Kaylash Chaudhary
, Vinay Mehta:
An Even Better Approach - Improving the B.A.T.M.A.N. Protocol Through Formal Modelling and Analysis. 164-178 - Marco A. Feliú, Mariano M. Moscato:

Towards a Formal Safety Framework for Trajectories. 179-184 - Aymeric Fromherz, Abdelraouf Ouadjaout

, Antoine Miné:
Static Value Analysis of Python Programs by Abstract Interpretation. 185-202 - Marcus Gerhold

, Arnd Hartmanns
, Mariëlle Stoelinga
:
Model-Based Testing for General Stochastic Time. 203-219 - Ruben Giaquinta, Ruth Hoffmann

, Murray L. Ireland, Alice Miller
, Gethin Norman
:
Strategy Synthesis for Autonomous Agents Using PRISM. 220-236 - Andrew Ireland, Maria Teresa Llano, Simon Colton:

The Use of Automated Theory Formation in Support of Hazard Analysis. 237-243 - Philipp Körner

, Jens Bendisposto:
Distributed Model Checking Using ProB. 244-260 - Alfons Laarman

:
Optimal Storage of Combinatorial State Spaces. 261-279 - Alfons Laarman

:
Stubborn Transaction Reduction. 280-298 - Hendrik Maarand

, Tarmo Uustalu
:
Certified Foata Normalization for Generalized Traces. 299-314 - Francesco Marconi

, Giovanni Quattrocchi, Luciano Baresi
, Marcello M. Bersani, Matteo Rossi
:
On the Timed Analysis of Big-Data Applications. 315-332 - Lola Masson, Jérémie Guiochet, Hélène Waeselynck

, Kalou Cabrera, Sofia Cassel, Martin Törngren
:
Tuning Permissiveness of Active Safety Monitors for Autonomous Systems. 333-348 - Jeroen Meijer

, Jaco van de Pol
:
Sound Black-Box Checking in the LearnLib. 349-366 - Radha Nakade, Eric Mercer

, Peter Aldous
, Jay McCarthy:
Model-Checking Task Parallel Programs for Data-Race. 367-382 - Massimo Narizzano

, Luca Pulina
, Armando Tacchella
, Simone Vuotto
:
Consistency of Property Specification Patterns with Boolean and Constrained Numerical Signals. 383-398 - César Ochoa Escudero, Rémi Delmas, Thomas Bochot, Matthieu David, Virginie Wiels:

Automatic Generation of DO-178 Test Procedures. 399-415 - Rui Qiu, Sarfraz Khurshid, Corina S. Pasareanu, Junye Wen, Guowei Yang

:
Using Test Ranges to Improve Symbolic Execution. 416-434 - Miguel Romero, Camilo Rocha

:
Symbolic Execution and Reachability Analysis Using Rewriting Modulo SMT for Spatial Concurrent Constraint Systems with Extrusion. 435-451 - Cumhur Erkan Tuncali

, Bardh Hoxha
, Guohui Ding, Georgios Fainekos
, Sriram Sankaranarayanan
:
Experience Report: Application of Falsification Methods on the UxAS System. 452-459 - András Vörös, Márton Búr, István Ráth, Ákos Horváth, Zoltán Micskei, László Balogh, Bálint Hegyi, Benedek Horváth

, Zsolt Mázló, Dániel Varró
:
MoDeS3: Model-Based Demonstrator for Smart and Safe Cyber-Physical Systems. 460-467

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














