Bourke / Goharshady / Chen | Dependable Software Engineering. Theories, Tools, and Applications | Buch | 978-981-960601-6 | sack.de

Buch, Englisch, Band 15469, 418 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 663 g

Reihe: Lecture Notes in Computer Science

Bourke / Goharshady / Chen

Dependable Software Engineering. Theories, Tools, and Applications

10th International Symposium, SETTA 2024, Hong Kong, China, November 26-28, 2024, Proceedings
Erscheinungsjahr 2024
ISBN: 978-981-960601-6
Verlag: Springer Nature Singapore

10th International Symposium, SETTA 2024, Hong Kong, China, November 26-28, 2024, Proceedings

Buch, Englisch, Band 15469, 418 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 663 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-981-960601-6
Verlag: Springer Nature Singapore


This book constitutes the refereed proceedings of the 10th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications, SETTA 2024, held in Hong Kong, China, during November 26–28, 2024.

The 21 full papers included in this book were carefully reviewed and selected from 47 submissions. The purpose of the SETTA symposium series is to bring international researchers together to exchange research results and ideas on bridging the gap between formal methods and software engineering.

Bourke / Goharshady / Chen Dependable Software Engineering. Theories, Tools, and Applications jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Invited Talks.
.- Synthesis from LTL with Reward Optimization in Sampled Oblivious Environments.
.- Regular Papers.
.- An Assertion-Based Separation Logic for Probabilistic Programs with Unbounded Loops.
.- Extending Symbolic Heap to Support Shared Ownership.
.- Constraint Based Invariant Generation with Modular Operations.
.- Data-Dependent WAR Analysis for Efficient Task-Based Intermittent Computing.
.- Can Language Models Pretend Solvers? Logic Code Simulation with LLM.
.- Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-Expressions.
.- Formal Verification of RISC-V Processor Chisel Designs.
.- The Principle of Staking: Formal Verification of Staking Smart Contract.
.- A Contract-based Framework for Formal Verification of Embedded Software.
.- Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness.
.- The Design of Intelligent Temperature Control System of Smart House with MARS.
.- Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects.
.- Cache Behavior Analysis with SP-relative Addressing for WCET Estimation.
.- Timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals.
.- Runtime Verification of Neural-Symbolic Systems.
.- Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds.
.- MILE: A Mutation Testing Framework of In-Context Learning System.
.- A Derivative-based Membership Algorithm for Enhanced Regular Expressions.
.- NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive.
.- Faster Lifetime-optimal Speculative Partial Redundancy Elimination for Goto-free Program.
.- EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.