


default search action
3rd SETTA 2017: Changsha, China
- Kim Guldstrand Larsen, Oleg Sokolsky, Ji Wang:

Dependable Software Engineering. Theories, Tools, and Applications - Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10606, Springer 2017, ISBN 978-3-319-69482-5
Invited Talk
- Cliff B. Jones

, Andrius Velykis, Nisansala Yatapanage
:
General Lessons from a Rely/Guarantee Development. 3-22
Probabilistic and Statistical Analysis
- Vahid Hashemi

, Andrea Turrini
, Ernst Moritz Hahn
, Holger Hermanns, Khaled M. Elbassioni
:
Polynomial-Time Alternating Probabilistic Bisimulation for Interval MDPs. 25-41 - Carlos E. Budde

, Pedro R. D'Argenio
, Arnd Hartmanns
:
Better Automated Importance Splitting for Transient Rare Events. 42-58 - Luca Santinelli, Zhishan Guo

:
On the Criticality of Probabilistic Worst-Case Execution Time Models. 59-74
Timed and Hybrid Systems
- Yuwei Wang, Guoqiang Li, Shoji Yuen:

Nested Timed Automata with Invariants. 77-93 - Calvin Deutschbein

, Tom Fleming, Alan Burns, Sanjoy K. Baruah:
Multi-core Cyclic Executives for Safety-Critical Systems. 94-109 - Dimitar P. Guelev, Shuling Wang, Naijun Zhan:

Compositional Hoare-Style Reasoning About Hybrid CSP in the Duration Calculus. 110-127
Program Analysis
- Yi Li:

Termination of Semi-algebraic Loop Programs. 131-146 - Tianhai Liu

, Shmuel S. Tyszberowicz, Bernhard Beckert
, Mana Taghdiri:
Computing Exact Loop Bounds for Bounded Program Verification. 147-163 - Zipeng Zhang, Xinyu Feng:

AndroidLeaker: A Hybrid Checker for Collusive Leak in Android Applications. 164-180
Modeling and Verification
- Jianxin Xue, Huan Long, Yuxi Fu:

Remark on Some \pi Variants. 183-199 - Wanwei Liu, Fu Song, Ge Zhou:

Reasoning About Periodicity on Infinite Words. 200-215 - Chen Fu

, Yuxin Deng
, David N. Jansen
, Lijun Zhang:
On Equivalence Checking of Nondeterministic Finite Automata. 216-231 - Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:

A New Decomposition Method for Attractor Detection in Large Synchronous Boolean Networks. 232-249 - Daichi Morita, Fuyuki Ishikawa, Shinichi Honiden:

Construction of Abstract State Graphs for Understanding Event-B Models. 250-265 - Maithily Diwan, Meenakshi D'Souza:

A Framework for Modeling and Verifying IoT Communication Protocols. 266-280
Formalization
- Ghassen Helali, Sofiène Tahar, Osman Hasan

, Tsvetan Dunchev:
Formal Analysis of Information Flow in HOL. 283-299 - Jiawei Wang, Ming Fu, Lei Qiao, Xinyu Feng:

Formalizing SPARCv8 Instruction Set Architecture in Coq. 300-316
Tools
- Stefano Schivo

, Bugra M. Yildiz, Enno Ruijters
, Christopher Gerking
, Rajesh Kumar
, Stefan Dziwok, Arend Rensink
, Mariëlle Stoelinga
:
How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. 319-336 - Idress Husien

, Sven Schewe
, Nicolas Berthier
:
PranCS: A Protocol and Discrete Controller Synthesis Tool. 337-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














