


default search action
17th TASE 2023: Bristol, UK
- Cristina David, Meng Sun:

Theoretical Aspects of Software Engineering - 17th International Symposium, TASE 2023, Bristol, UK, July 4-6, 2023, Proceedings. Lecture Notes in Computer Science 13931, Springer 2023, ISBN 978-3-031-35256-0 - Vivek Nigam, Carolyn L. Talcott:

Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures. 1-19 - Siyu Liu

, Yuting Wang
:
Verified Transformation of Continuation-Passing Style into Static Single Assignment Form. 20-37 - Mengjun Du, Peiyang Li, Lian Song, W. K. Chan, Bo Jiang:

OAT: An Optimized Android Testing Framework Based on Reinforcement Learning. 38-58 - Chenyang Zhu, Jinyu Zhu, Yujie Cai, Fang Wang:

Decomposing Synthesized Strategies for Reactive Multi-agent Reinforcement Learning. 59-76 - Christian Lidström

, Dilian Gurov:
Contract Based Embedded Software Design. 77-94 - Anton Hampus

, Mattias Nyberg:
Verifying Refinement of Probabilistic Contracts Using Timed Automata. 95-113 - Puneet Bhateja:

Asynchronous Test Equivalence over Timed Processes. 114-125 - Darius Foo

, Andreea Costea
, Wei-Ngan Chin
:
Protocol Conformance with Choreographic PlusCal. 126-145 - Wu Wang, Nan Zhang, Cong Tian, Zhenhua Duan, Zhijie Xu, Chaofeng Yu:

Verifying Chips Design at RTL Level. 146-163 - Joanna Delicaris

, Stefan Schupp
, Erika Ábrahám
, Anne Remke
:
Maximizing Reachability Probabilities in Rectangular Automata with Random Clocks. 164-182 - Shengyang Yao, Qin Li

:
A Hierarchical Spatial Logic for Knowledge Sharing and Fusion in Intelligent Connected Vehicle Cooperation. 183-201 - Qiaowen Jia, Yi Lv, Peng Wu, Bohua Zhan, Jifeng Hao, Hong Ye, Chao Wang:

VeriLin: A Linearizability Checker for Large-Scale Concurrent Objects. 202-220 - Kenny Ballou

, Elena Sherman
:
Identifying Minimal Changes in the Zone Abstract Domain. 221-239 - Jaime Santos, Daniel Figueiredo

, Alexandre Madeira
:
idDL2DL - Interval Syntax to dℒ. 240-247 - Zhen Liang

, Dejin Ren
, Wanwei Liu
, Ji Wang
, Wenjing Yang
, Bai Xue
:
Safety Verification for Neural Networks Based on Set-Boundary Analysis. 248-267 - Wenjing Chu, Shuo Chen, Marcello M. Bonsangue, Zenglin Shi:

Approximately Learning Quantum Automata. 268-285 - Lara Bargmann

, Heike Wehrheim
:
View-Based Axiomatic Reasoning for PSO. 286-304 - Muhammad Rizwan Ali, Violet Ka I Pun:

A Static Analyser for Resource Sensitive Workflow Models. 305-312 - Fangting Liao, Shun Long, Weiheng Zhu, Wenzhu Chen, Silei Cao, Xinyi Guan:

MTCD: An Efficient Cloning Detection Technique Based on Method Table. 313-326 - Juliana Cunha, Alexandre Madeira

, Luís Soares Barbosa
:
Stepwise Development of Paraconsistent Processes. 327-343 - Yulin Wu, Zhiwu Xu, Shengchao Qin:

Detecting API-Misuse Based on Pattern Mining via API Usage Graph with Parameters. 344-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














