default search action
10th NFM 2018: Newport News, VA, USA
- Aaron Dutle, César A. Muñoz, Anthony Narkawicz:
NASA Formal Methods - 10th International Symposium, NFM 2018, Newport News, VA, USA, April 17-19, 2018, Proceedings. Lecture Notes in Computer Science 10811, Springer 2018, ISBN 978-3-319-77934-8 - Sarah Benyagoub, Meriem Ouederni, Yamine Aït Ameur, Atif Mashkoor:
Incremental Construction of Realizable Choreographies. 1-19 - Siddhartha Bhattacharyya, Thomas C. Eskridge, Natasha A. Neogi, Marco M. Carvalho, Milton Stafford:
Formal Assurance for Cooperative Intelligent Autonomous Agents. 20-36 - Allan Blanchard, Nikolai Kosmatov, Frédéric Loulergue:
Ghosts for Lists: A Critical Module of Contiki Verified in Frama-C. 37-53 - Giovanna Broccia, Paolo Milazzo, Peter Csaba Ölveczky:
An Executable Formal Framework for Safety-Critical Human Multitasking. 54-69 - Saksham Chand, Yanhong A. Liu:
Simpler Specifications and Easier Proofs of Distributed Algorithms Using History Variables. 70-86 - Charles Zhuo Chen, Werner Dietl:
Don't Miss the End: Preventing Unsafe End-of-File Comparisons. 87-94 - Flavio M. de Paula, Arvind Haran, Brad Bingham:
An Efficient Rewriting Framework for Trace Coverage of Symmetric Systems. 95-112 - Bruno Dutertre, Dejan Jovanovic, Jorge A. Navas:
Verification of Fault-Tolerant Protocols with Sally. 113-120 - Souradeep Dutta, Susmit Jha, Sriram Sankaranarayanan, Ashish Tiwari:
Output Range Analysis for Deep Feedforward Neural Networks. 121-138 - Yassmeen Elderhalli, Osman Hasan, Waqar Ahmad, Sofiène Tahar:
Formal Dynamic Fault Trees Analysis Using an Integration of Theorem Proving and Model Checking. 139-156 - Ansgar Fehnker, Kaylash Chaudhary:
Twenty Percent and a Few Days - Optimising a Bitcoin Majority Attack. 157-163 - Ansgar Fehnker, Kaylash Chaudhary, Vinay Mehta:
An Even Better Approach - Improving the B.A.T.M.A.N. Protocol Through Formal Modelling and Analysis. 164-178 - Marco A. Feliú, Mariano M. Moscato:
Towards a Formal Safety Framework for Trajectories. 179-184 - Aymeric Fromherz, Abdelraouf Ouadjaout, Antoine Miné:
Static Value Analysis of Python Programs by Abstract Interpretation. 185-202 - Marcus Gerhold, Arnd Hartmanns, Mariëlle Stoelinga:
Model-Based Testing for General Stochastic Time. 203-219 - Ruben Giaquinta, Ruth Hoffmann, Murray L. Ireland, Alice Miller, Gethin Norman:
Strategy Synthesis for Autonomous Agents Using PRISM. 220-236 - Andrew Ireland, Maria Teresa Llano, Simon Colton:
The Use of Automated Theory Formation in Support of Hazard Analysis. 237-243 - Philipp Körner, Jens Bendisposto:
Distributed Model Checking Using ProB. 244-260 - Alfons Laarman:
Optimal Storage of Combinatorial State Spaces. 261-279 - Alfons Laarman:
Stubborn Transaction Reduction. 280-298 - Hendrik Maarand, Tarmo Uustalu:
Certified Foata Normalization for Generalized Traces. 299-314 - Francesco Marconi, Giovanni Quattrocchi, Luciano Baresi, Marcello M. Bersani, Matteo Rossi:
On the Timed Analysis of Big-Data Applications. 315-332 - Lola Masson, Jérémie Guiochet, Hélène Waeselynck, Kalou Cabrera, Sofia Cassel, Martin Törngren:
Tuning Permissiveness of Active Safety Monitors for Autonomous Systems. 333-348 - Jeroen Meijer, Jaco van de Pol:
Sound Black-Box Checking in the LearnLib. 349-366 - Radha Nakade, Eric Mercer, Peter Aldous, Jay McCarthy:
Model-Checking Task Parallel Programs for Data-Race. 367-382 - Massimo Narizzano, Luca Pulina, Armando Tacchella, Simone Vuotto:
Consistency of Property Specification Patterns with Boolean and Constrained Numerical Signals. 383-398 - César Ochoa Escudero, Rémi Delmas, Thomas Bochot, Matthieu David, Virginie Wiels:
Automatic Generation of DO-178 Test Procedures. 399-415 - Rui Qiu, Sarfraz Khurshid, Corina S. Pasareanu, Junye Wen, Guowei Yang:
Using Test Ranges to Improve Symbolic Execution. 416-434 - Miguel Romero, Camilo Rocha:
Symbolic Execution and Reachability Analysis Using Rewriting Modulo SMT for Spatial Concurrent Constraint Systems with Extrusion. 435-451 - Cumhur Erkan Tuncali, Bardh Hoxha, Guohui Ding, Georgios Fainekos, Sriram Sankaranarayanan:
Experience Report: Application of Falsification Methods on the UxAS System. 452-459 - András Vörös, Márton Búr, István Ráth, Ákos Horváth, Zoltán Micskei, László Balogh, Bálint Hegyi, Benedek Horváth, Zsolt Mázló, Dániel Varró:
MoDeS3: Model-Based Demonstrator for Smart and Safe Cyber-Physical Systems. 460-467
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.