


default search action
18th ICFEM 2016: Tokyo, Japan
- Kazuhiro Ogata, Mark Lawford, Shaoying Liu:

Formal Methods and Software Engineering - 18th International Conference on Formal Engineering Methods, ICFEM 2016, Tokyo, Japan, November 14-18, 2016, Proceedings. Lecture Notes in Computer Science 10009, 2016, ISBN 978-3-319-47845-6 - Valentin Cassano, Thomas Stephen Edward Maibaum, Silviya Grigorova:

A (Proto) Logical Basis for the Notion of a Structured Argument in a Safety Case. 1-17 - Keijiro Araki, Taro Kurita:

Promotion of Formal Approaches in Japanese Software Industry and a Best Practice of FeliCa's Case (Extended Abstract). 18-25 - Weikai Miao, Geguang Pu, Yinbo Yao, Ting Su, Danzhu Bao, Yang Liu

, Shuohao Chen, Kunpeng Xiong:
Automated Requirements Validation for ATP Software via Specification Review and Testing. 26-40 - Takaya Saeki, Fuyuki Ishikawa, Shinichi Honiden:

Automatic Generation of Potentially Pathological Instances for Validating Alloy Models. 41-56 - Dominic Scheurer

, Reiner Hähnle
, Richard Bubel:
A General Lattice Model for Merging Symbolic Execution Branches. 57-73 - Ryo Yanase, Tatsunori Sakai, Makoto Sakai, Satoshi Yamane:

A Case Study of Formal Approach to Dynamically Reconfigurable Systems by Using Dynamic Linear Hybrid Automata. 74-89 - Richard Banach

, Michael J. Butler
:
Modelling Hybrid Systems in Event-B and Hybrid Event-B: A Comparison of Water Tanks. 90-105 - Guillaume Babin

, Yamine Aït Ameur, Neeraj Kumar Singh, Marc Pantel:
A System Substitution Mechanism for Hybrid Systems in Event-B. 106-121 - Manman Chen, Tian Huat Tan, Jun Sun

, Jingyi Wang, Yang Liu
, Jing Sun, Jin Song Dong:
Service Adaptation with Probabilistic Partial Models. 122-140 - Linas Laibinis, Elena Troubitsyna, Inna Pereverzeva, Ian Oliver, Silke Holtmanns:

A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks. 141-158 - Minh Hai Nguyen, Quan Thanh Tho, Le Duc Anh:

Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction. 159-174 - Marco Rocchetto, Nils Ole Tippenhauer

:
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. 175-192 - Francesco Marconi, Marcello M. Bersani, Madalina Erascu

, Matteo Rossi:
Towards the Formal Verification of Data-Intensive Applications Through Metric Temporal Logic. 193-209 - Alexei Iliasov, Paulius Stankaitis, Alexander B. Romanovsky

:
Proving Event-B Models with Reusable Generic Lemmas. 210-225 - Waqar Ahmad, Osman Hasan

:
Formal Availability Analysis Using Theorem Proving. 226-242 - Akira Tanaka, Reynald Affeldt

, Jacques Garrigue:
Formal Verification of the rank Algorithm for Succinct Data Structures. 243-260 - Brijesh Dongol

, Lindsay Groves:
Contextual Trace Refinement for Concurrent Objects: Safety and Progress. 261-278 - Madiel S. Conserva Filho, Marcel Vinícius Medeiros Oliveira

, Augusto Sampaio, Ana Cavalcanti:
Local Livelock Analysis of Component-Based Models. 279-295 - Eduard Kamburjan, Crystal Chang Din

, Tzu-Chun Chen
:
Session-Based Compositional Analysis for Actor-Based Languages Using Futures. 296-312 - Badr Siala, Mohamed Tahar Bhiri, Jean-Paul Bodeveix, Mamoun Filali:

An Event-B Development Process for the Distributed BIP Framework. 313-328 - Shuanglong Kan, Zhiqiu Huang, Zhe Chen:

Partial Order Reduction for State/Event Systems. 329-345 - Peizun Liu, Thomas Wahl:

Concolic Unbounded-Thread Reachability via Loop Summaries. 346-362 - Truong Khanh Nguyen, Tian Huat Tan, Jun Sun

, Jiaying Li, Yang Liu
, Manman Chen, Jin Song Dong:
Scaling BDD-based Timed Verification with Simulation Reduction. 363-382 - Mohammed Foughali, Bernard Berthomieu, Silvano Dal-Zilio

, Félix Ingrand, Anthony Mallet:
Model Checking Real-Time Properties on the Functional Layer of Autonomous Robots. 383-399 - Étienne André

, Didier Lime
, Olivier H. Roux
:
Decision Problems for Parametric Timed Automata. 400-416 - Saurabh Gadia, Cyrille Artho, Gedare Bloom:

Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder. 417-432 - Min Zhang

, Frédéric Mallet
, Huibiao Zhu:
An SMT-Based Approach to the Formal Analysis of MARTE/CCSL. 433-449 - Nuno Amálio, Richard John Payne, Ana Cavalcanti, Jim Woodcock

:
Checking SysML Models for Co-simulation. 450-465 - Manuel Töws, Heike Wehrheim:

A CEGAR Scheme for Information Flow Analysis. 466-483

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














