Search

Showing total 31 results

Search Constraints

Start Over You searched for: Publisher springer nature Remove constraint Publisher: springer nature Publisher kth, teoretisk datalogi, tcs Remove constraint Publisher: kth, teoretisk datalogi, tcs
31 results

Search Results

1. Automatic Program Instrumentation for Automatic Verification

2. Contract Based Embedded Software Design

3. Edge-Based Graph Neural Networks for Cell-Graph Modeling and Prediction

4. A comprehensive study of code-removal patches in automated program repair

5. Analysing the Impact of Security Attacks on Safety Using SysML and Event-B

6. Deductive Verification Based Abstraction for Software Model Checking

7. Equivalence classes and conditional hardness in massively parallel computations

8. On the Impossibility of Key Agreements from Quantum Random Oracles

9. Provable randomized rounding for minimum-similarity diversification

10. Regularized impurity reduction : accurate decision trees with complexity guarantees

11. Secure Partitioning of Composite Cloud Applications

12. Styler : learning formatting conventions to repair Checkstyle violations

13. TriCo—Triple Co-piloting of Implementation, Specification and Tests

14. A comprehensive study of bloated dependencies in the Maven ecosystem

15. An Abstract Contract Theory for Programs with Procedures

16. Automated patch assessment for program repair at scale

17. Discovering Dense Correlated Subgraphs in Dynamic Networks

18. Diversity-Aware k-median : Clustering with Fair Center Representation

19. Formal Specification of Fault-Tolerant Multi-agent Systems

20. Foundations of Consistency Types for a Higher-Order Distributed Language

21. Mining Dense Subgraphs with Similar Edges

22. Modelling and Verification of Safety of Access Control in SCADA Systems

23. Modelling resilient collaborative multi-agent systems

24. Use Case Testing : A Constrained Active Machine Learning Approach

25. An approach and benchmark to detect behavioral changes of commits in continuous integration

26. Automated Verification of Embedded Control Software : Track Introduction

27. Constraint-Based Contract Inference for Deductive Verification

28. Distance-bounding, privacy-preserving attribute-based credentials

29. On Testing Message-Passing Components

30. Who Carries the Burden of Modularity? : Introduction to ISoLA 2020 Track on Modularity and (De-)composition in Verification

31. On the configuration LP for maximum budgeted allocation