Atnaujinkite slapukų nuostatas

Model Checking Software: 28th International Symposium, SPIN 2022, Virtual Event, May 21, 2022, Proceedings 1st ed. 2022 [Minkštas viršelis]

Edited by , Edited by
  • Formatas: Paperback / softback, 153 pages, aukštis x plotis: 235x155 mm, weight: 267 g, 27 Illustrations, color; 14 Illustrations, black and white; IX, 153 p. 41 illus., 27 illus. in color., 1 Paperback / softback
  • Serija: Lecture Notes in Computer Science 13255
  • Išleidimo metai: 23-Aug-2022
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031150767
  • ISBN-13: 9783031150760
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 153 pages, aukštis x plotis: 235x155 mm, weight: 267 g, 27 Illustrations, color; 14 Illustrations, black and white; IX, 153 p. 41 illus., 27 illus. in color., 1 Paperback / softback
  • Serija: Lecture Notes in Computer Science 13255
  • Išleidimo metai: 23-Aug-2022
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031150767
  • ISBN-13: 9783031150760
Kitos knygos pagal šią temą:
This book constitutes the refereed proceedings of the 28th International Symposium on Model Checking Software, SPIN 2022, held virtually in May 2022.

The 8 full papers were carefully reviewed and selected from 11 submissions. Topics covered include formal verification techniques for automated analysis of software; formal analysis for modeling languages, such as UML/state charts; formal specification languages, temporal logic, design-by-contract; model checking, automated theorem proving, including SAT and SMT; verifying compilers; abstraction and symbolic execution techniques; and much more.

Automated Consistency Analysis for Legal Contracts.- Monitoring
Cyber-Physical Systems using a Tiny Twin to Prevent Cyber-Attacks.- Synthesis
of Rigorous Floating-Point Predicates.- Statistical Model Checking for
Probabilistic Hyperproperties of Real-Valued Signals.- SpecRepair:
Counter-Example Guided Safety Repair of Deep Neural Networks.- Verifying the
SHA-3 Implementation from OpenSSL with the Software Analysis
Workbench.- Bounded-Memory Runtime Enforcement.- Solving String Theories
involving Regular Membership Predicates using SAT.