標題: Titlebook: Automated Technology for Verification and Analysis; 11th International S Dang Hung,Mizuhito Ogawa Conference proceedings 2013 Springer Inte [打印本頁] 作者: 葉子 時間: 2025-3-21 19:32
書目名稱Automated Technology for Verification and Analysis影響因子(影響力)
書目名稱Automated Technology for Verification and Analysis影響因子(影響力)學科排名
書目名稱Automated Technology for Verification and Analysis網(wǎng)絡(luò)公開度
書目名稱Automated Technology for Verification and Analysis網(wǎng)絡(luò)公開度學科排名
書目名稱Automated Technology for Verification and Analysis被引頻次
書目名稱Automated Technology for Verification and Analysis被引頻次學科排名
書目名稱Automated Technology for Verification and Analysis年度引用
書目名稱Automated Technology for Verification and Analysis年度引用學科排名
書目名稱Automated Technology for Verification and Analysis讀者反饋
書目名稱Automated Technology for Verification and Analysis讀者反饋學科排名
作者: Mast-Cell 時間: 2025-3-21 22:32
Accounting and Measurement Issues,ween energy problems and reachability and Büchi acceptance for semiring-weighted automata, we show that these generalized energy problems are decidable. We also provide complexity results for important special cases.作者: 沙文主義 時間: 2025-3-22 03:32 作者: 窗簾等 時間: 2025-3-22 05:31
Conference proceedings 2013ment techniques for analysis and verification, analytical techniques for safety, security, and dependability, testing and runtime analysis based on verification technology, analysis and verification of parallel and concurrent hardware/software systems, verification in industrial practice, and applications and case studies.作者: Inoperable 時間: 2025-3-22 12:25 作者: Thyroid-Gland 時間: 2025-3-22 13:16 作者: left-ventricle 時間: 2025-3-22 18:39
https://doi.org/10.1057/9781403943804?coNP, and is at least as hard as solving mean-payoff games. For multiple dimensions, we show that (.)?the problem with fixed window size is EXPTIME-complete, and (.)?there is no primitive-recursive algorithm to decide the existence of a bounded window.作者: macabre 時間: 2025-3-22 23:00
Automated Verification and Strategy Synthesis for Probabilistic Systemson probabilistic LTL and expected reward objectives. We also describe how to apply multi-objective model checking to investigate trade-offs between several properties, and extensions to stochastic multi-player games. The paper concludes with a summary of future challenges in this area.作者: 要控制 時間: 2025-3-23 04:13 作者: Tremor 時間: 2025-3-23 07:15 作者: 使人煩燥 時間: 2025-3-23 12:28 作者: 開玩笑 時間: 2025-3-23 14:55 作者: modest 時間: 2025-3-23 18:23 作者: glisten 時間: 2025-3-24 00:26
https://doi.org/10.1007/978-1-4615-4367-1 we decided to specify the protocol with the LNT value-passing process algebra and to verify it using the model checking tools available in the CADP toolbox. As a result, the introduction of formal techniques and tools help to deeply revise the protocol, and these improvements have been taken into account in the corresponding Java implementation.作者: Negotiate 時間: 2025-3-24 03:33 作者: Essential 時間: 2025-3-24 08:40 作者: 北極人 時間: 2025-3-24 12:55 作者: 反對 時間: 2025-3-24 15:37
Acceleration for Petri Netset can be obtained by runs labeled by words in a bounded language. As a direct consequence, classical algorithms based on acceleration techniques effectively compute a formula in the Presburger arithmetic denoting the reachability set.作者: Thyroiditis 時間: 2025-3-24 21:09 作者: Cuisine 時間: 2025-3-24 23:44 作者: 王得到 時間: 2025-3-25 05:38 作者: 一再煩擾 時間: 2025-3-25 08:02
Verification of Heap Manipulating Programs with Ordered Data by Extended Forest Automatae have implemented our approach as an extension of the Forester tool and successfully applied it to a?number of programs dealing with data structures such as various forms of singly- and doubly-linked lists, binary search trees, as well as skip lists.作者: Limerick 時間: 2025-3-25 15:24
Interpolation Properties and SAT-Based Model Checkingn systems and compares the necessary collectives. This paper proposes a uniform framework, which encompasses (and generalizes) the most common collectives exploited in verification. We use it for a systematic study of the collectives and of the constraints they pose on propositional interpolation systems used in SAT-based model checking.作者: 損壞 時間: 2025-3-25 19:50 作者: notice 時間: 2025-3-25 23:25
Improved Upper and Lower Bounds for Büchi Disambiguationentially improves the previously known lower bound (i.e. Ω(2.)). Finally, we present a new tecúhnique to prove the already known exponential lower bound for disambiguating automata over finite or infinite words. Our technique is significantly simpler than earlier techniques based on ranks of matrices used for proving disambiguation lower bounds.作者: 使害羞 時間: 2025-3-26 00:45
An Automatic Technique for Checking the Simulation of Timed Systemss model-checker without any specific algorithm needed to analyze the result of the composition. We also show that our simulation relation supports interesting results concerning the trace inclusion and the preservation of linear properties. Finally, the technique is validated using the FIACRE/TINA toolset.作者: RACE 時間: 2025-3-26 04:45 作者: 侵略 時間: 2025-3-26 11:19
Conclusion: Re-Kinning First Mothers,n automata. Our translation applies to a fragment that is strictly larger than LTL(.,.). Experimental results show that our algorithm can produce significantly smaller automata compared to Rabinizer and ., especially for more complex LTL formulae.作者: magnate 時間: 2025-3-26 13:34 作者: 不容置疑 時間: 2025-3-26 17:24
Governance, Succession, and Fraud,s model-checker without any specific algorithm needed to analyze the result of the composition. We also show that our simulation relation supports interesting results concerning the trace inclusion and the preservation of linear properties. Finally, the technique is validated using the FIACRE/TINA toolset.作者: 首創(chuàng)精神 時間: 2025-3-26 22:52
Policy Responses to Global Financial Criseshread synchronisation making it highly scalable. This is confirmed by an experimental evaluation that demonstrates good speed up at a low overhead in workload and with little waiting time caused by synchronisation.作者: formula 時間: 2025-3-27 03:01 作者: bibliophile 時間: 2025-3-27 07:02
A Framework for Ranking Vacuity Results about satisfying the second. Our methodology formally explains this, as the probability of .(?.) to hold in a random computation is?0, whereas the probability of . . is?1. From a theoretical point of view, we study of the problem of finding the probability of LTL formulas to be satisfied in a rando作者: FLING 時間: 2025-3-27 12:23 作者: enormous 時間: 2025-3-27 15:02
Integrating Policy Iterations in Abstract Interpretersnfer quadratic invariants on linear systems with guards. Those systems often constitute the core of embedded control systems and are hard, when not impossible, to analyze with linear abstract domains. The method has been implemented and applied to some benchmark systems, giving good results.作者: 慢跑 時間: 2025-3-27 19:56 作者: 使人煩燥 時間: 2025-3-27 23:08
https://doi.org/10.1057/9781403943804weighted automaton ., we relate the safety of . with the structure of ., and we study the problem of deciding whether . is .-safe for a given .. We also study the weighted safety of . and provide bounds on the minimal value |.| for which a weighted language . is .-safe.作者: 模范 時間: 2025-3-28 05:27 作者: Noctambulant 時間: 2025-3-28 06:16 作者: Pericarditis 時間: 2025-3-28 14:10 作者: insipid 時間: 2025-3-28 15:42
Automated Technology for Verification and Analysis11th International S作者: flutter 時間: 2025-3-28 22:01
https://doi.org/10.1007/978-3-319-02444-8component-based systems; formal verification; logic and games; model checking; theorem proving作者: 慢慢流出 時間: 2025-3-29 01:43 作者: TIGER 時間: 2025-3-29 05:28 作者: Inoperable 時間: 2025-3-29 10:23 作者: 世俗 時間: 2025-3-29 11:31
https://doi.org/10.1007/978-3-0348-0594-0scheduling policy: threads execute, without any interruption, until they either terminate or yield the control explicitly to the scheduler..The formal verification of such software poses significant challenges. On the one side, each thread may have infinite state space, that might require some abstr作者: 價值在貶值 時間: 2025-3-29 18:29 作者: Glucose 時間: 2025-3-29 23:13
,First Mothers’ Stunted Choices,nslation is in .(.·(0.76.).). This exponentially improves the best upper bound (i.e., 4 ·(3.).) known earlier for Büchi disambiguation. We also show that the state complexity tradeoff of translating non-deterministic Büchi automata to strongly unambiguous Büchi automata is in Ω((.???1)!). This expon作者: 漫步 時間: 2025-3-30 00:24
https://doi.org/10.1007/978-3-030-18224-3. In this paper, we revisit the decidability results presented in [5] and show that the problem is .-complete. We also show that we can effectively compute fixed points that characterise the sets of states that are reachable (resp. co-reachable) within . time units from a given state.作者: 脊椎動物 時間: 2025-3-30 04:55
Governance, Succession, and Fraud,ion-based method in which two timed transition systems are composed with a timed observer. A .-calculus property that captures the timed weak simulation is then verified on the result of the composition. An interesting feature of the suggested technique is that it only relies on an untimed .-calculu作者: 魔鬼在游行 時間: 2025-3-30 12:13 作者: 秘傳 時間: 2025-3-30 15:10 作者: 食品室 時間: 2025-3-30 19:39
https://doi.org/10.1057/9781403943804hile for single-dimensional games the complexity and memory bounds for both objectives coincide, we show that in contrast to multi-dimensional mean-payoff games that are known to be coNP-complete, multi-dimensional total-payoff games are undecidable. We introduce conservative approximations of these作者: 背叛者 時間: 2025-3-30 22:51
https://doi.org/10.1057/9781403943804 see more and more research on quantitative formal methods, where systems and specifications are weighted. We introduce and study safety in the weighted setting. For a value .?∈?? , we say that a weighted language .:Σ.?→?? is .-safe if every word with cost at least . has a prefix all whose extension作者: PLUMP 時間: 2025-3-31 03:45 作者: palette 時間: 2025-3-31 05:00 作者: Aura231 時間: 2025-3-31 11:37 作者: 一加就噴出 時間: 2025-3-31 16:18 作者: 狂怒 時間: 2025-3-31 17:36
Policy Responses to Global Financial Crisesnstruction to reduce memory consumption. The algorithm proceeds in rounds each consisting of three phases: concurrent expansion of open states, concurrent reduction of potentially new states, and concurrent duplicate detection. An important feature of the algorithm is that it requires little inter-t作者: Insatiable 時間: 2025-4-1 00:53
Lessons from the Global Financial Crisiseen stored data values. The underlying formalism of our framework is that of forest automata (FA), which has previously been developed for verification of heap-manipulating programs. We extend FA by constraints between data elements associated with nodes of the heaps represented by FA, and we presen作者: Lime石灰 時間: 2025-4-1 03:26
Lessons from the Global Financial Crisis, it has not yet seen a broad usage in static analyzers. We believe the main explanation to this restrictive use, beside the novelty of the technique, lies in its lack of integration in the classic abstract domain framework. This prevents an easy integration in existing static analyzers and collabor作者: paradigm 時間: 2025-4-1 06:11
Asim K. Karmakar,Sovik Mukherjeeon Refinement and Lazy Abstraction With Interpolants. Most state-of-the-art model checking techniques based on interpolation require . of interpolants to satisfy particular properties, to which we refer as “collectives”; they do not hold in general for all interpolation systems and have to be establ