|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
on1409202159 |
003 |
OCoLC |
005 |
20240808213014.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
231115s2023 si a o 101 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d GW5XE
|d EBLCP
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|
019 |
|
|
|a 1409027827
|
020 |
|
|
|a 9789819975846
|q (electronic bk.)
|
020 |
|
|
|a 9819975840
|q (electronic bk.)
|
020 |
|
|
|z 9819975832
|
020 |
|
|
|z 9789819975839
|
024 |
7 |
|
|a 10.1007/978-981-99-7584-6
|2 doi
|
035 |
|
|
|a (OCoLC)1409202159
|z (OCoLC)1409027827
|
050 |
|
4 |
|a QA76.9.F67
|
049 |
|
|
|a HCDD
|
111 |
2 |
|
|a International Conference on Formal Engineering Methods
|n (24th :
|d 2022 :
|c Brisbane, Qld.).
|
245 |
1 |
0 |
|a Formal methods and software engineering :
|b 24th International Conference on Formal Engineering Methods, ICFEM 2022, Brisbane, QLD, Australia, November 21-24, 2023 : proceedings /
|c Yi Li, Sofiène Tahar, editors.
|
246 |
3 |
0 |
|a ICFEM 2022
|
264 |
|
1 |
|a Singapore :
|b Springer,
|c [2023]
|
264 |
|
4 |
|c ©2023
|
300 |
|
|
|a 1 online resource (xxviii, 300 pages) :
|b illustrations (some color).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture notes in computer science ;
|v 14308
|
500 |
|
|
|a International conference proceedings.
|
500 |
|
|
|a Includes author index.
|
520 |
|
|
|a This book constitutes the proceedings of the 24th International Conference on Formal Methods and Software Engineering, ICFEM 2023, held in Brisbane, QLD, Australia, during November 2124, 2023. The 13 full papers presented together with 8 doctoral symposium papers in this volume were carefully reviewed and selected from 34 submissions, the volume also contains one invited paper. The conference focuses on applying formal methods to practical applications and presents papers for research in all areas related to formal engineering methods.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed November 17, 2023).
|
505 |
0 |
|
|a Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Compositional Reasoning at The Software/Hardware Interface -- Separation of Concerns for Complexity Mitigation in System and Domain Formal Modelling - A Dive into Algebraic Event-B Theories -- A Foundation for Interaction -- Practical Verified Concurrent Program Security -- On Analysing Weak Memory Concurrency -- Certified Proof and Non-Provability -- Verifying Compiler Optimisations -- Contents -- Invited Paper -- Verifying Compiler Optimisations -- 1 Introduction -- 2 Data-Flow Sub-graphs -- 3 Term Rewriting Rules
|
505 |
8 |
|
|a 4 Verifying Term Rewriting Rules -- 5 Generating Code for Optimisations -- 6 Conclusions -- References -- Regular Papers -- An Idealist's Approach for Smart Contract Correctness -- 1 Introduction -- 2 Overview -- 2.1 Smart Contracts -- 2.2 Vulnerability and Correctness -- 2.3 An Illustrative Example -- 3 Specification Language -- 3.1 High-Level Overview -- 3.2 Formalization -- 4 Verification -- 4.1 Function Validation -- 4.2 Generating Proof Obligations -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Experimental Evaluation -- 6 Related Work and Conclusion -- References
|
505 |
8 |
|
|a Active Inference of EFSMs Without Reset -- 1 Introduction -- 2 Background and Related Work -- 2.1 Running Example -- 2.2 Related Work -- 2.3 Definitions -- 2.4 Inferring Functions with Genetic Programming -- 3 The ehW-Inference Algorithm -- 3.1 Assumptions -- 3.2 Homing and Characterizing -- 3.3 Inputs and Data Structures -- 3.4 ehW-Inference Backbone -- 3.5 Generalisation -- 3.6 Oracle Procedure -- 4 Inferring a Vending Machine Controller -- 5 Conclusions and Future Work -- References -- Learning Mealy Machines with Local Timers -- 1 Introduction -- 2 Related Work -- 3 Preliminaries
|
505 |
8 |
|
|a 3.1 Mealy Machines -- 3.2 The Rivest-Schapire Algorithm -- 4 Mealy Machines with Local Timers -- 4.1 Syntax and Semantics -- 4.2 Expanded Forms and Equivalence -- 5 Learning MMLTs Efficiently -- 5.1 Timer Queries -- 5.2 Timed Counterexample Analysis -- 5.3 Hypothesis Refinement -- 5.4 Hypothesis Completion -- 5.5 Output Query Complexity -- 6 Practical Evaluation -- 7 Conclusion and Future Work -- References -- Compositional Vulnerability Detection with Insecurity Separation Logic -- 1 Introduction -- 2 Motivation -- 3 Attacker Model -- 4 Insecurity Separation Logic (InsecSL)
|
505 |
8 |
|
|a 5 Symbolic Execution -- 6 Implementation -- 7 Evaluation -- 8 Related Work and Conclusion -- References -- Dynamic Extrapolation in Extended Timed Automata -- 1 Introduction -- 2 Preliminary -- 2.1 Extended Timed Automata -- 2.2 Symbolic Semantics -- 2.3 M-Extrapolation in XTA -- 3 Dynamic Extrapolation -- 3.1 Reducing Relevant Paths -- 3.2 Dynamic LU-Extrapolation -- 3.3 A Note on Timed Automata Networks -- 4 Experiments and Results -- 5 Conclusion -- References -- Formalizing Robustness Against Character-Level Perturbations for Neural Network Language Models -- 1 Introduction -- 2 Related Work
|
650 |
|
0 |
|a Formal methods (Computer science)
|v Congresses.
|
650 |
|
0 |
|a Software engineering
|v Congresses.
|
650 |
|
7 |
|a Formal methods (Computer science)
|2 fast
|
650 |
|
7 |
|a Software engineering
|2 fast
|
655 |
|
7 |
|a proceedings (reports)
|2 aat
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 lcgft
|
655 |
|
7 |
|a Actes de congrès.
|2 rvmgf
|
700 |
1 |
|
|a Li, Yi,
|e editor.
|
700 |
1 |
|
|a Tahar, Sofiène,
|d 1966-
|e editor.
|
776 |
0 |
8 |
|c Original
|z 9819975832
|z 9789819975839
|w (OCoLC)1398463578
|
830 |
|
0 |
|a Lecture notes in computer science ;
|v 14308.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-981-99-7584-6
|y Click for online access
|
903 |
|
|
|a SPRING-ALL2023
|
994 |
|
|
|a 92
|b HCD
|