Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-030-62822-2guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Dependable Software Engineering. Theories, Tools, and Applications: 6th International Symposium, SETTA 2020, Guangzhou, China, November 24–27, 2020, Proceedings
2020 Proceeding
  • Editors:
  • Jun Pang,
  • Lijun Zhang
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Symposium on Dependable Software Engineering: Theories, Tools, and ApplicationsGuangzhou, China24 November 2020
ISBN:
978-3-030-62821-5
Published:
24 November 2020

Reflects downloads up to 08 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
front-matter
Front Matter
Pages i–xiii
back-matter
Back Matter
Article
The Road Ahead for Supervisor Synthesis
Abstract

This paper reports on recent research advances in supervisor synthesis, as well as industrial applications and future research challenges, especially in the context of a research project funded by Rijkswaterstaat, responsible for the construction ...

Article
Reentrancy? Yes. Reentrancy Bug? No.
Abstract

In this paper, we address the reentrancy vulnerability in smart contracts using two program logics. We first propose a coarse-grained logic that extends the standard Hoare logic by a proof rule for reentry trigger commands. We prove this logic ...

Article
Graph Transformation Systems: A Semantics Based on (Stochastic) Symmetric Nets
Abstract

Graph transformation systems (GTS) and Petri nets (PN) are central formal models for concurrent/distributed systems. PN are usually considered as instances of GTS, due to the lack of ability to dynamically adapt their structure. Reversing this ...

Article
Modelling and Implementation of Unmanned Aircraft Collision Avoidance
Abstract

With the increasing application of unmanned aircraft in civil airspace, collision avoidance systems for unmanned aircraft are becoming more and more important and valuable. An ideal collision avoidance system gives the aircraft an optimal strategy ...

Article
Randomized Refinement Checking of Timed I/O Automata
Abstract

To combat the state-space explosion problem and ease system development, we present a new refinement checking (falsification) method for Timed I/O Automata based on random walks. Our memory-less heuristics Random Enabled Transition (RET) and ...

Article
Computing Linear Arithmetic Representation of Reachability Relation of One-Counter Automata
Abstract

One-counter automata (OCA) are a well-studied automata model that extends finite-state automata with one counter. The reachability problem of OCA was shown to be NP-complete when the integers in the OCA are encoded in binary. In this paper, we ...

Article
Compiling FL on Finite Words
Abstract

Interpreting temporal logics on finite traces has specific use in many fields, and it attracts more and more attention in recent years. Foundation formulas (FL for short) is the core part of PSL, which has once been an industrial standard of ...

Article
Symbolic Model Checking with Sentential Decision Diagrams
Abstract

We demonstrate the viability of symbolic model checking using Sentential Decision Diagrams (SDD), in lieu of the more common Binary Decision Diagram (BDD). The SDD data structure can be up to exponentially more succinct than BDDs, using a ...

Article
Probably Approximately Correct Interpolants Generation
Abstract

In this paper we propose a linear programming based method to generate interpolants for two Boolean formulas in the framework of probably approximately correct (PAC) learning. The computed interpolant is termed as a PAC interpolant with respect to ...

Article
Symbolic Verification of MPI Programs with Non-deterministic Synchronizations
Abstract

Message Passing Interface (MPI) is the current de-facto standard for developing applications in high-performance computing. MPI allows flexible implementations of message passing operations, which introduces non-deterministic synchronizations that ...

Article
Learning Safe Neural Network Controllers with Barrier Certificates
Abstract

We provide a novel approach to synthesize controllers for nonlinear continuous dynamical systems with control against safety properties. The controllers are based on neural networks (NNs). To certify the safety property we utilize barrier ...

Article
Software Defect-Proneness Prediction with Package Cohesion and Coupling Metrics Based on Complex Network Theory
Abstract

Driven by functionality requirements, software codes are increasingly inflated, and invocations between codes are frequent and random. This makes it difficult for programmers to be thoughtful when modifying code, increasing the risk of defects. In ...

Contributors
  • University of Luxembourg
  • Institute of Software Chinese Academy of Sciences
Index terms have been assigned to the content through auto-classification.

Recommendations