


default search action
10th SETTA 2024: Hong Kong, China
- Timothy Bourke

, Liqian Chen
, Amir Kafshdar Goharshady
:
Dependable Software Engineering. Theories, Tools, and Applications - 10th International Symposium, SETTA 2024, Hong Kong, China, November 26-28, 2024, Proceedings. Lecture Notes in Computer Science 15469, Springer 2025, ISBN 978-981-96-0601-6
Invited Talks
- Jean-François Raskin, Yun Chen Tsai:

Synthesis from LTL with Reward Optimization in Sampled Oblivious Environments. 3-21
Regular Papers
- Huiling Wu, Anran Cui, Yuxin Deng:

An Assertion-Based Logic for Local Reasoning about Probabilistic Programs. 25-45 - Jiyang Wu, Qinxiang Cao:

Extending Symbolic Heap to Support Shared Ownership. 46-63 - Yuchen Li

, Hongfei Fu
, Haowen Long
, Guoqiang Li
:
Constraint Based Invariant Generation with Modular Operations. 64-84 - Juxin Niu

, Yunlong Yu, Wei Zhang, Nan Guan
:
Data-Dependent WAR Analysis for Efficient Task-Based Intermittent Computing. 85-101 - Minyu Chen

, Guoqiang Li
, Ling-I Wu
, Ruibang Liu
, Yuxin Su
, Xi Chang
, Jianxin Xue
:
Can Language Models Pretend Solvers? Logic Code Simulation with LLMs. 102-121 - Zipan Tang, Yixuan Yan, Rongchen Li, Hanze Dong, Haiming Chen, Hongyu Gao:

Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-expressions. 122-141 - Shidong Shen

, Yicheng Liu
, Lijun Zhang
, Fu Song
, Zhilin Wu
:
Formal Verification of RISC-V Processor Chisel Designs. 142-160 - Zhongyun Zhang

, Kundu Chen
, Weiqi Guo, Wenbo Zhang
:
The Principle of Staking: Formal Verification of Staking Smart Contract. 161-179 - Xu Lu, Cong Tian, Bin Gu, Bin Yu, Chen Chen, Zhenhua Duan:

A Contract-Based Framework for Formal Verification of Embedded Software. 180-196 - Jiayi Lu

, Shenghao Yuan
, David Sanán
, Yongwang Zhao
:
Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness. 197-216 - Yihao Yin, Hao Wu, Shuling Wang, Xiong Xu, Fanjiang Xu, Naijun Zhan:

The Design of Intelligent Temperature Control System of Smart House with MARS. 217-235 - Chao Wang, Peng Wu, Gustavo Petri, Qiaowen Jia, Youlin He, Yi Lv, Zhiming Liu:

Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects. 236-255 - Shangshang Xiao, Mengxia Sun, Wei Zhang, Naijun Zhan, Lei Ju:

Cache Behavior Analysis with SP-Relative Addressing for WCET Estimation. 256-274 - Xiantong Luo, Haochun Liang, Yue Tang, Xu Jiang, Nan Guan

, Wang Yi:
Timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals. 275-292 - Shaojun Deng, Wanwei Liu, Miaomiao Zhang:

Runtime Verification of Neural-Symbolic Systems. 293-309 - Hanwei Zhang, Luo Cheng, Qisong He, Wei Huang, Renjue Li, Ronan Sicre, Xiaowei Huang, Holger Hermanns, Lijun Zhang:

Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds. 310-326 - Zeming Wei, Yihao Zhang, Meng Sun:

MILE: A Mutation Testing Framework of In-Context Learning Systems. 327-343 - Mengxi Wang, Chunmei Dong, Weihao Su, Chengyao Peng, Haiming Chen:

A Derivative-Based Membership Algorithm for Enhanced Regular Expressions. 344-362 - Quan Hong

, Jiaqi Li
, Wen Zhang, Lidong Zhai
:
NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive. 363-381 - Xuran Cai, Amir Kafshdar Goharshady:

Faster Lifetime-Optimal Speculative Partial Redundancy Elimination for Goto-Free Programs. 382-398 - Feng Liang, Jing Liu

:
EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning. 399-415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














