E-Books durchsuchen

FM 2014: Formal Methods [2014]

1
Validity Checking of Putback Transformations in Bidirectional Programming
16
Proof Engineering Considered Essential
22
Engineering <Emphasis FontCategory="SansSerif">UToPiA</Emphasis>
42
40 Years of Formal Methods
62
A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes
78
Algebraic Principles for Rely-Guarantee Style Concurrency Verification Tools
94
Definition, Semantics, and Analysis of Multirate Synchronous AADL
110
<Emphasis Type="SmallCaps">TrustFound</Emphasis>: Towards a Formal Foundation for Model Checking Trusted Computing Platforms
127
The VerCors Tool for Verification of Concurrent Programs
132
Knowledge-Based Automated Repair of Authentication Protocols
148
A Simplified Z Semantics for Presentation Interaction Models
163
Log Analysis for Data Protection Accountability
179
Automatic Compositional Synthesis of Distributed Systems
194
Automated Real Proving in PVS via MetiTarski
200
Quiescent Consistency: Defining and Verifying Relaxed Linearizability
215
Temporal Precedence Checking for Switched Models and Its Application to a Parallel Landing Protocol
230
Contracts in Practice
247
When Equivalence and Bisimulation Join Forces in Probabilistic Automata
263
Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs
279
Proof Patterns for Formal Methods
296
Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating System
312
<Emphasis Type="SmallCaps">iscas</Emphasis>M<Emphasis Type="SmallCaps">c</Emphasis>: A Web-Based Probabilistic Model Checker
318
Invariants, Well-Founded Statements and Real-Time Program Algebra
335
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis
351
A Symbolic Algorithm for the Analysis of Robust Timed Automata
367
Revisiting Compatibility of Input-Output Modal Transition Systems
382
Co-induction Simply
399
Management of Time Requirements in Component-Based Systems
416
Compositional Synthesis of Concurrent Systems through Causal Model Checking and Learning
432
Formal Verification of Operational Transformation
449
Verification of a Transactional Memory Manager under Hardware Failures and Restarts
465
SCJ: Memory-Safety Checking without Annotations
481
Refactoring, Refinement, and Reasoning
497
Object Propositions
514
Flexible Invariants through Semantic Collaboration
531
Efficient Tight Field Bounds Computation Based on Shape Predicates
547
A Graph-Based Transformation Reduction to Reach UPPAAL States Faster
563
Computing Quadratic Invariants with Min- and Max-Policy Iterations: A Practical Comparison
579
Efficient Self-composition for Weakest Precondition Calculi
595
Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections
611
Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic
627
A Modular Theory of Object Orientation in Higher-Order UTP
643
Formalizing and Verifying a Modern Build Language
658
The Wireless Fire Alarm System: Ensuring Conformance to Industrial Standards through Formal Verification
673
Formally Verifying Graphics FPU
688
MDP-Based Reliability Analysis of an Ambient Assisted Living System
703
Diagnosing Industrial Business Processes: Early Experiences
718
Formal Verification of Lunar Rover Control Software Using UPPAAL
733
Formal Verification of a Descent Guidance Control Program of a Lunar Lander
Feedback