


default search action
FSEN 2019: Tehran, Iran
- Hossein Hojjat, Mieke Massink:

Fundamentals of Software Engineering - 8th International Conference, FSEN 2019, Tehran, Iran, May 1-3, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11761, Springer 2019, ISBN 978-3-030-31516-0
Agent Based Systems
- Narges Khakpour

, Jetty Kleijn, Marjan Sirjani:
A Formal Model to Integrate Behavioral and Structural Adaptations in Self-adaptive Systems. 3-19 - Sanaz Hasanzadeh Fard, Hadi Tabatabaee Malazi

:
A Two-Dimensional Self-coordination Mechanism of Agents in a Minority Game. 20-36 - Marco Piangerelli

, Luca Tesei
, Emanuela Merelli
:
A Persistent Entropy Automaton for the Dow Jones Stock Market. 37-42
Theorem Proving
- M. Saqib Nawaz

, Meng Sun, Philippe Fournier-Viger
:
Proof Guidance in PVS with Sequential Pattern Mining. 45-60 - M. Saqib Nawaz

, Meng Sun:
Using PVS for Modeling and Verification of Probabilistic Connectors. 61-76 - Sharmin Moosavi, Hassan Haghighi, Hasti Sahabi, Farzam Vatanzade, Mojtaba Vahidi-Asl:

Greenify: A Game with the Purpose of Test Data Generation for Unit Testing. 77-92
Learning
- Lisette Sanchez

, Jan Friso Groote
, Ramon R. H. Schiffelers
:
Active Learning of Industrial Software with Data. 95-110 - Samad Paydar, Aidin Azamnouri

:
An Experimental Study on Flakiness and Fragility of Randoop Regression Test Suites. 111-126
Verification
- Antonio González-Burgueño, Peter Csaba Ölveczky:

Formalizing and Analyzing Security Ceremonies with Heterogeneous Devices in ANP and PDL. 129-144 - Leandro Gomes

, Alexandre Madeira
, Mario R. F. Benevides:
Logics for Petri Nets with Propagating Failures. 145-157 - Thomas Neele

, Marijn Rol, Jan Friso Groote
:
Verifying System-Wide Properties of Industrial Component-Based Software. 158-175
Distributed Algorithms
- Samira Akili, Kim Völlinger:

Case Study on Certifying Distributed Algorithms: Reducing Intrusiveness. 179-185 - José Proença

, Alexandre Madeira
:
Taming Hierarchical Connectors. 186-193 - Behnaz Changizi, Natallia Kokash

, Farhad Arbab:
Service Orchestration with Priority Constraints. 194-209
Program Analysis
- Nathan Wasser, Asmae Heydari Tabar

, Reiner Hähnle
:
Modeling Non-deterministic C Code with Active Objects. 213-227 - Wolfgang Ahrendt, Richard Bubel, Joshua Ellul

, Gordon J. Pace
, Raúl Pardo, Vincent Rebiscoul, Gerardo Schneider:
Verification of Smart Contract Business Logic - Exploiting a Java Source Code Verifier. 228-243 - Babak Bagheri, Mohammad Rezaalipour

, Mojtaba Vahidi-Asl:
An Approach to Generate Effective Fault Localization Methods for Programs. 244-259

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














