A Unifying Approach for Control-Flow-Based Loop Abstraction
|
2022 |
Beyer, Dirk |
Strategy Switching: Smart Fault-Tolerance for Weakly-Hard Resource-Constrained Real-Time Applications
|
2022 |
Miedema, Lukas |
A Program Slicer for Java (Tool Paper)
|
2022 |
Galindo, Carlos |
Constrained Training of Recurrent Neural Networks for Automata Leaming
|
2022 |
Aichernig, Bernhard K. |
Safety Controller Synthesis for a Mobile Manufacturing Cobot
|
2022 |
Stefanakos, Toannis |
Timely Specification Repair for Alloy 6
|
2022 |
Cerqueira, Jorge |
Weighted Games for User Journeys
|
2022 |
Kobialka, Paul |
Runtime Verification with Imperfect Information Through [ndistinguishability Relations
|
2022 |
Ferrando, Angelo |
BehaVerify: Verifying Temporal Logic Specifications for Behavior Trees
|
2022 |
Serbinowski, Bernard |
Information Exchange Between Over- and Underapproximating Software Analyses
|
2022 |
Haltermann, Jan |
Neural Network Verification Using Residual Reasoning
|
2022 |
Elboher, Yizhak Yisrael |
Training Agents to Satisfy Timed and Untimed Signal Temporal Logic Specifications with Reinforcement Leaming
|
2022 |
Hamilton, Nathaniel |
Specification is Law: Safe Creation and Upgrade of Ethereum Smart Contracts
|
2022 |
Antonino, Pedro |
SKLEE: A Dynamic Symbolic Analysis Tool for Ethereum Smart Contracts (Tool andPaper)
|
2022 |
Jain, Namrata |
Auto-Active Verification of Floating-Point Programs via Nonlinear Real Provers
|
2022 |
Rasheed, Junaid |
A Query Language for Language Analysis
|
2022 |
Cimini, Matteo |
Field-Sensitive Program Slicing
|
2022 |
Galindo, Carlos |
Cooperation Between Automatic and Interactive Software Verifiers
|
2022 |
Beyer, Dirk |
Information Flow Control-by-Construction for an Object-Oriented Language
|
2022 |
Runge, Tobias |
Runtime Enforcement for IEC 61499 Applications
|
2022 |
Falcone, Yliès |