Search

Showing total 31 results

Search Constraints

Start Over You searched for: Publisher springer nature Remove constraint Publisher: springer nature Publisher kth, teoretisk datalogi, tcs Remove constraint Publisher: kth, teoretisk datalogi, tcs
31 results

Search Results

1. Automatic Program Instrumentation for Automatic Verification

2. Contract Based Embedded Software Design

3. Deductive Verification Based Abstraction for Software Model Checking

4. TriCo—Triple Co-piloting of Implementation, Specification and Tests

5. Analysing the Impact of Security Attacks on Safety Using SysML and Event-B

6. Formal Specification of Fault-Tolerant Multi-agent Systems

7. Foundations of Consistency Types for a Higher-Order Distributed Language

8. Mining Dense Subgraphs with Similar Edges

9. An Abstract Contract Theory for Programs with Procedures

10. Modelling and Verification of Safety of Access Control in SCADA Systems

11. Automated patch assessment for program repair at scale

12. Regularized impurity reduction : accurate decision trees with complexity guarantees

13. Styler : learning formatting conventions to repair Checkstyle violations

14. Provable randomized rounding for minimum-similarity diversification

15. Equivalence classes and conditional hardness in massively parallel computations

16. A comprehensive study of code-removal patches in automated program repair

17. Modelling resilient collaborative multi-agent systems

18. A comprehensive study of bloated dependencies in the Maven ecosystem

19. Constraint-Based Contract Inference for Deductive Verification

20. An approach and benchmark to detect behavioral changes of commits in continuous integration

21. Edge-Based Graph Neural Networks for Cell-Graph Modeling and Prediction

22. On the Impossibility of Key Agreements from Quantum Random Oracles

23. Secure Partitioning of Composite Cloud Applications

24. Use Case Testing : A Constrained Active Machine Learning Approach

25. Discovering Dense Correlated Subgraphs in Dynamic Networks

26. Diversity-Aware k-median : Clustering with Fair Center Representation

27. On Testing Message-Passing Components

28. Who Carries the Burden of Modularity? : Introduction to ISoLA 2020 Track on Modularity and (De-)composition in Verification

29. Automated Verification of Embedded Control Software : Track Introduction

30. Distance-bounding, privacy-preserving attribute-based credentials

31. On the configuration LP for maximum budgeted allocation