Accepted Papers

*Listed in no particular order

  • Using Relational Verification for Program Slicing
    Bernhard Beckert, Thorsten Bormer, Stephan Gocht, Mihai Herda, Daniel Lentzsch and Mattias Ulbrich
  • SAT Encodings of the At-Most-k Constraint – A Case Study on Configuring University Courses
    Paul Maximilian Bittner, Thomas Thüm and Ina Schaefer
  • Test Model Coverage Analysis under Uncertainty
    Wishnu Prasetya and Rick Klomp
  • Mutation Testing with Hyperproperties
    Andreas Fellner, Mitra Tabaei and Georg Weissenbacher
  • Multi-objective search for effective testing of Cyber-Physical Systems
    Hugo Araujo, Gustavo Carvalho, Mohammadreza Mousavi and Augusto Sampaio
  • Incorporating Data into EFSM Inference
    Michael Foster, Achim D. Brucker, Ramsay Taylor, Siobhán North and John Derrick
  • Towards Integrating Formal Verification of Autonomous Robots with Battery Prognostics and Health Management
    Xingyu Zhao, Matt Osborne, Jenny Lantair, Valentin Robu, David Flynn, Xiaowei Huang, Michael Fisher, Fabio Papacchini and Angelo Ferrando
  • Asynchronous Cooperative Contracts for Cooperative Scheduling
    Eduard KamburjanCrystal Chang DinReiner Hähnle and Einar Broch Johnsen
  • Automatic Failure Explanation in CPS Models
    Ezio Bartocci, Niveditha Manjunath, Leonardo Mariani, Cristinel Mateis and Dejan Ničković
  • Learning Minimal DFA: Taking Inspiration from RPNI to Improve SAT Approach
    Florent Avellaneda and Alexandre Petrenko
  • Isabelle/DOF: Design and Implementation
    Achim D. Brucker and Burkhart Wolff
  • Software Evolution with a Typeful Version Control System
    Luís Carvalho and João Costa Seco
  • Partially Bounded Context-Aware Verification
    Luka Le Roux and Ciprian Teodorov
  • An implementation relation for cyclic systems that uses refusals and discrete time
    Raluca Lefticaru, Rob Hierons and Manuel Núñez
  • Local Nontermination Detection for Parallel C++ Programs
    Vladimír Štill and Jiří Barnat
  • Towards Detecting Trigger-based Behavior In Binaries: Uncovering the Correct Environment
    Dorottya PappThorsten Tarrach and Levente Buttyan
  • Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages
    Marie Farrell, Matthew Bradbury, Hu Yuan, Michael Fisher, Louise Dennis, Clare Dixon and Carsten Maple
  • Let’s Prove it Later – Verification at Different Points in Time
    Martin Ring and Christoph Lüth
  • Evolution of Formal Model Based Assurance Cases for Autonomous Robots
    Mario Gleirscher, Simon Foster and Yakoub Nemouchi
  • Modular Indirect Push-button Formal Verification of Multi-threaded Code Generators
    Anton Wijs and Maciej Wilkowski
  • Reproducible Execution of POSIX Programs with DiOS
    Zuzana Baranová, Jiri Barnat, Katarína Kejstová, Jan Mrázek and Petr Ročkai
  • Compositional Feature-oriented Systems
    Clemens Dubslaff
  • Relating Session Types and Behavioural Contracts: the Asynchronous Case
    Mario Bravetti and Gianluigi Zavattaro
  • Formal Verification of Rewriting Rules for Dynamic Fault Trees
    Yassmeen Elderhalli, Matthias Volk, Osman Hasan, Joost-Pieter Katoen and Sofiene Tahar
  • An Operational Guide to Monitorability
    Luca AcetoAntonis AchilleosAdrian Francalanza, Anna Ingolfsdottir and Karoliina Lehtinen
  • Efficient Formal Verification for the Linux Kernel
    Daniel Bristot de OliveiraTommaso Cucinotta and Rômulo Silva de Oliveira
  • Towards Logical Specification of Statistical Machine Learning
    Yusuke Kawamoto

Comments are closed.