Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
EdSketch: execution-driven sketching for Java Jinru Hua, Sarfraz Khurshid |
EdSketch: execution-driven sketching for Java Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Explicit state model checking with generalized Büchi and Rabin automata Vincent Bloemen, Alexandre Duret-Lutz, Jaco van de Pol |
Explicit state model checking with generalized Büchi and Rabin automata Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Formal verification of data-intensive applications through model checking modulo theories Marcello M. Bersani, Francesco Marconi, Matteo Rossi, Madalina Erascu, Silvio Ghilardi |
Formal verification of data-intensive applications through model checking modulo theories Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical controller synthesis for MTL0, ∞ Guangyuan Li, Peter Gjøl Jensen, Kim Guldstrand Larsen, Axel Legay, Danny Bøgsted Poulsen |
Practical controller synthesis for MTL0, ∞ Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CARET model checking for malware detection Huu-Vu Nguyen, Tayssir Touili |
CARET model checking for malware detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimizing parallel Korat using invalid ranges Nima Dini, Cagdas Yelen, Sarfraz Khurshid |
Optimizing parallel Korat using invalid ranges Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The RERS 2017 challenge and workshop (invited paper) Marc Jasper, Maximilian Fecke, Bernhard Steffen, Markus Schordan, Jeroen Meijer, Jaco van de Pol, Falk Howar, Stephen F. Siegel |
The RERS 2017 challenge and workshop (invited paper) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated formal reasoning about amazon web services (keynote) Byron Cook |
Automated formal reasoning about amazon web services (keynote) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Stateless model checking of the Linux kernel's hierarchical read-copy-update (tree RCU) Michalis Kokologiannakis, Konstantinos Sagonas |
Stateless model checking of the Linux kernel's hierarchical read-copy-update (tree RCU) Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Distributed binary decision diagrams for symbolic reachability Wytse Oortwijn, Tom van Dijk, Jaco van de Pol |
Distributed binary decision diagrams for symbolic reachability Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
LeeTL: LTL with quantifications over model objects Pouria Mellati, Ehsan Khamespanah, Ramtin Khosravi |
LeeTL: LTL with quantifications over model objects Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Daniel Ratiu, Andreas Ulrich |
Details |
Author Comments:
The MDCC approach is now part of the mbeddr release. The mbeddr tutorial contains 10 lessons on how to use MDCC from mbeddr.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Model learning and model checking of SSH implementations Paul Fiterau-Brostean, Toon Lenaerts, Erik Poll, Joeri de Ruiter, Frits W. Vaandrager, Patrick Verleg |
Model learning and model checking of SSH implementations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Runtime enforcement of reactive systems using synchronous enforcers Srinivas Pinisetty, Partha S. Roop, Steven Smyth, Stavros Tripakis, Reinhard von Hanxleden |
Runtime enforcement of reactive systems using synchronous enforcers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Marco A. Feliú, Camilo Rocha, Swee Balachandran |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Runtime enforcement using Büchi games Matthieu Renard, Antoine Rollet, Yliès Falcone |
Runtime enforcement using Büchi games Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An ordered approach to solving parity games in quasi polynomial time and quasi linear space John Fearnley, Sanjay Jain, Sven Schewe, Frank Stephan, Dominik Wojtczak |
An ordered approach to solving parity games in quasi polynomial time and quasi linear space Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SIMPAL: a compositional reasoning framework for imperative programs Lucas G. Wagner, David Greve, Andrew Gacek |
SIMPAL: a compositional reasoning framework for imperative programs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Backward coverability with pruning for lossy channel systems Thomas Geffroy, Jérôme Leroux, Grégoire Sutre |
Backward coverability with pruning for lossy channel systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cobra: fast structural code checking (keynote) Gerard J. Holzmann |
Cobra: fast structural code checking (keynote) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
A hot method for synthesising cool controllers Idress Husien, Nicolas Berthier, Sven Schewe |
A hot method for synthesising cool controllers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ExpoSE: practical symbolic execution of standalone JavaScript Blake Loring, Duncan Mitchell, Johannes Kinder |
ExpoSE: practical symbolic execution of standalone JavaScript Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
SunDew: systematic automated security testing (keynote) Domagoj Babic |
SunDew: systematic automated security testing (keynote) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Addressing challenges in obtaining high coverage when model checking Android applications Heila Botha, Oksana Tkachuk, Brink van der Merwe, Willem Visser |
Addressing challenges in obtaining high coverage when model checking Android applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Guided test case generation for mobile apps in the TRIANGLE project: work in progress Laura Panizo, Alberto Salmerón, María-del-Mar Gallardo, Pedro Merino |
Guided test case generation for mobile apps in the TRIANGLE project: work in progress Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|