default search action
15th MEMOCODE 2017: Vienna, Austria
- Jean-Pierre Talpin, Patricia Derler, Klaus Schneider:
Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2017, Vienna, Austria, September 29 - October 02, 2017. ACM 2017, ISBN 978-1-4503-5093-8 - Thomas A. Henzinger:
The quest for average response time. 4 - Jiwei Li, Pierluigi Nuzzo, Alberto L. Sangiovanni-Vincentelli, Yugeng Xi, Dewei Li:
Stochastic contracts for cyber-physical system design under probabilistic requirements. 5-14 - Tim Gonschorek, Ben Rabeler, Frank Ortmeier, Dirk Schomburg:
On improving rare event simulation for probabilistic safety analysis. 15-24 - Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller:
Quantifying the information leak in cache attacks via symbolic execution. 25-35 - Stefan Resmerita, Andreas Naderlinger, Stefan Lukesch:
Efficient realization of logical execution times in legacy embedded software. 36-45 - Jakob Mund, Maximilian Junker, Safa Bougouffa, Suhyun Cha, Birgit Vogel-Heuser:
Model-based availability analysis for automated production systems: a case study. 46-55 - Andreas Fellner, Willibald Krenn, Rupert Schlick, Thorsten Tarrach, Georg Weissenbacher:
Model-based, mutation-driven test case generation via heuristic-guided branching search. 56-66 - Max Scheerer, Axel Busch, Anne Koziolek:
Automatic evaluation of complex design decisions in component-based software architectures. 67-76 - Nils Przigoda, Philipp Niemann, Judith Peters, Frank Hilken, Robert Wille, Rolf Drechsler:
More than true or false: native support of irregular values in the automatic validation & verification of UML/OCL models. 77-86 - Elizabeth I. Leonard, Myla M. Archer, Constance L. Heitmeyer:
Property templates for checking source code security. 87-90 - Alessandro Abate:
Formal verification of complex systems: model-based and data-driven methods. 91-93 - Guillaume Plassan, Katell Morin-Allory, Dominique Borrione:
Extraction of missing formal assumptions in under-constrained designs. 94-103 - Luan Viet Nguyen, James Kapinski, Xiaoqing Jin, Jyotirmoy V. Deshmukh, Taylor T. Johnson:
Hyperproperties of real-valued signals. 104-113 - Arun Chandrasekharan, Daniel Große, Rolf Drechsler:
Yise - a novel framework for boolean networks using y-inverter graphs. 114-117 - Kenneth Roe, Scott F. Smith:
Using the coq theorem prover to verify complex data structure invariants. 118-121 - Thomas N. Reynolds, Adam M. Procter, William L. Harrison, Gerard Allwein:
A core calculus for secure hardware: its formal semantics and proof system. 122-131 - Hsin-Hung Lin, Bow-Yaw Wang:
Releasing VDM proof obligations with SMT solvers. 132-135 - Hammond A. Pearce, Matthew M. Y. Kuo, Nathan Allen, Partha S. Roop, Avinash Malik:
Simulation of cyber-physical systems using IEC61499. 136-145 - Ezio Bartocci, Luca Bortolussi, Michele Loreti, Laura Nenzi:
Monitoring mobile and spatially distributed cyber-physical systems. 146-155 - Franz-Josef Grosch:
Elevate embedded real-time programming with a synchronous language. 156 - Antti Jääskeläinen, Hannu-Matti Järvinen, Mikko Tiusanen:
Concurrent execution system for action languages. 157-160 - Assaf Marron:
A reactive specification formalism for enhancing system development, analysis and adaptivity. 161-164 - Jean-Paul Bodeveix, Mamoun Filali-Amine, Shuanglong Kan:
A refinement-based compiler development for synchronous languages. 165-174 - Stephen A. Edwards, Richard Townsend, Martha A. Kim:
Compositional dataflow circuits. 175-184 - Haven Blake Skinner, Rafael Trapani Possignolo, Jose Renau:
Liam: an actor based programming model for HDLs. 185-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.