Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)
10th International Symposium, SETTA 2024, Hong Kong, China, November 26-28, 2024, Proceedings
Redaktion: Bourke, Timothy; Goharshady, Amir; Chen, Liqian
60,95 €
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
60,95 €
Als Download kaufen
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
30 °P sammeln
Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)
10th International Symposium, SETTA 2024, Hong Kong, China, November 26-28, 2024, Proceedings
Redaktion: Bourke, Timothy; Goharshady, Amir; Chen, Liqian
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 10th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications, SETTA 2024, held in Hong Kong, China, during November 26-28, 2024.
The 21 full papers included in this book were carefully reviewed and selected from 47 submissions. The purpose of the SETTA symposium series is to bring international researchers together to exchange research results and ideas on bridging the gap between formal methods and software engineering.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 19.74MB
Andere Kunden interessierten sich auch für
- Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)59,95 €
- Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)40,95 €
- Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)40,95 €
- Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)40,95 €
- Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)53,95 €
- Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)40,95 €
- Dependable Software Engineering. Theories, Tools, and Applications (eBook, PDF)61,95 €
-
-
-
This book constitutes the refereed proceedings of the 10th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications, SETTA 2024, held in Hong Kong, China, during November 26-28, 2024.
The 21 full papers included in this book were carefully reviewed and selected from 47 submissions. The purpose of the SETTA symposium series is to bring international researchers together to exchange research results and ideas on bridging the gap between formal methods and software engineering.
The 21 full papers included in this book were carefully reviewed and selected from 47 submissions. The purpose of the SETTA symposium series is to bring international researchers together to exchange research results and ideas on bridging the gap between formal methods and software engineering.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 418
- Erscheinungstermin: 24. November 2024
- Englisch
- ISBN-13: 9789819606023
- Artikelnr.: 72315570
- Verlag: Springer Nature Singapore
- Seitenzahl: 418
- Erscheinungstermin: 24. November 2024
- Englisch
- ISBN-13: 9789819606023
- Artikelnr.: 72315570
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Invited Talks.
.- Synthesis from LTL with Reward Optimization in Sampled Oblivious Environments.
.- Regular Papers.
.- An Assertion-Based Separation Logic for Probabilistic Programs with Unbounded Loops.
.- Extending Symbolic Heap to Support Shared Ownership.
.- Constraint Based Invariant Generation with Modular Operations.
.- Data-Dependent WAR Analysis for Efficient Task-Based Intermittent Computing.
.- Can Language Models Pretend Solvers? Logic Code Simulation with LLM.
.- Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-Expressions.
.- Formal Verification of RISC-V Processor Chisel Designs.
.- The Principle of Staking: Formal Verification of Staking Smart Contract.
.- A Contract-based Framework for Formal Verification of Embedded Software.
.- Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness.
.- The Design of Intelligent Temperature Control System of Smart House with MARS.
.- Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects.
.- Cache Behavior Analysis with SP-relative Addressing for WCET Estimation.
.- Timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals.
.- Runtime Verification of Neural-Symbolic Systems.
.- Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds.
.- MILE: A Mutation Testing Framework of In-Context Learning System.
.- A Derivative-based Membership Algorithm for Enhanced Regular Expressions.
.- NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive.
.- Faster Lifetime-optimal Speculative Partial Redundancy Elimination for Goto-free Program.
.- EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning.
.- Synthesis from LTL with Reward Optimization in Sampled Oblivious Environments.
.- Regular Papers.
.- An Assertion-Based Separation Logic for Probabilistic Programs with Unbounded Loops.
.- Extending Symbolic Heap to Support Shared Ownership.
.- Constraint Based Invariant Generation with Modular Operations.
.- Data-Dependent WAR Analysis for Efficient Task-Based Intermittent Computing.
.- Can Language Models Pretend Solvers? Logic Code Simulation with LLM.
.- Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-Expressions.
.- Formal Verification of RISC-V Processor Chisel Designs.
.- The Principle of Staking: Formal Verification of Staking Smart Contract.
.- A Contract-based Framework for Formal Verification of Embedded Software.
.- Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness.
.- The Design of Intelligent Temperature Control System of Smart House with MARS.
.- Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects.
.- Cache Behavior Analysis with SP-relative Addressing for WCET Estimation.
.- Timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals.
.- Runtime Verification of Neural-Symbolic Systems.
.- Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds.
.- MILE: A Mutation Testing Framework of In-Context Learning System.
.- A Derivative-based Membership Algorithm for Enhanced Regular Expressions.
.- NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive.
.- Faster Lifetime-optimal Speculative Partial Redundancy Elimination for Goto-free Program.
.- EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning.
.- Invited Talks.
.- Synthesis from LTL with Reward Optimization in Sampled Oblivious Environments.
.- Regular Papers.
.- An Assertion-Based Separation Logic for Probabilistic Programs with Unbounded Loops.
.- Extending Symbolic Heap to Support Shared Ownership.
.- Constraint Based Invariant Generation with Modular Operations.
.- Data-Dependent WAR Analysis for Efficient Task-Based Intermittent Computing.
.- Can Language Models Pretend Solvers? Logic Code Simulation with LLM.
.- Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-Expressions.
.- Formal Verification of RISC-V Processor Chisel Designs.
.- The Principle of Staking: Formal Verification of Staking Smart Contract.
.- A Contract-based Framework for Formal Verification of Embedded Software.
.- Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness.
.- The Design of Intelligent Temperature Control System of Smart House with MARS.
.- Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects.
.- Cache Behavior Analysis with SP-relative Addressing for WCET Estimation.
.- Timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals.
.- Runtime Verification of Neural-Symbolic Systems.
.- Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds.
.- MILE: A Mutation Testing Framework of In-Context Learning System.
.- A Derivative-based Membership Algorithm for Enhanced Regular Expressions.
.- NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive.
.- Faster Lifetime-optimal Speculative Partial Redundancy Elimination for Goto-free Program.
.- EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning.
.- Synthesis from LTL with Reward Optimization in Sampled Oblivious Environments.
.- Regular Papers.
.- An Assertion-Based Separation Logic for Probabilistic Programs with Unbounded Loops.
.- Extending Symbolic Heap to Support Shared Ownership.
.- Constraint Based Invariant Generation with Modular Operations.
.- Data-Dependent WAR Analysis for Efficient Task-Based Intermittent Computing.
.- Can Language Models Pretend Solvers? Logic Code Simulation with LLM.
.- Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-Expressions.
.- Formal Verification of RISC-V Processor Chisel Designs.
.- The Principle of Staking: Formal Verification of Staking Smart Contract.
.- A Contract-based Framework for Formal Verification of Embedded Software.
.- Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness.
.- The Design of Intelligent Temperature Control System of Smart House with MARS.
.- Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects.
.- Cache Behavior Analysis with SP-relative Addressing for WCET Estimation.
.- Timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals.
.- Runtime Verification of Neural-Symbolic Systems.
.- Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds.
.- MILE: A Mutation Testing Framework of In-Context Learning System.
.- A Derivative-based Membership Algorithm for Enhanced Regular Expressions.
.- NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive.
.- Faster Lifetime-optimal Speculative Partial Redundancy Elimination for Goto-free Program.
.- EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning.