Abstract is missing.
- Visual counterexample explanation for model checking with OERITTEPolina Ovsiannikova, Igor Buzhinsky, Antti Pakonen, Valeriy Vyatkin. 1-10 [doi]
- CTL Model Checking of Self Modifying CodeTayssir Touili, Xin Ye 0007. 11-20 [doi]
- Formal Verification of Access Control Model for My Health Record SystemVictor Rivera. 21-30 [doi]
- RL: a Language for Formal EngineeringHadrien Bride, Jin Song Dong, Zhé Hóu, Brendan P. Mahony, Jim McCarthy. 31-36 [doi]
- Parametric non-interference in timed automataÉtienne André, Aleksander Kryukov. 37-42 [doi]
- Automatic Verification of Multi-threaded Programs by Inference of Rely-Guarantee SpecificationsXuan Bach Le, David Sanán, Sun Jun 0001, Shang-Wei Lin 0001. 43-52 [doi]
- Deep Learning Application in Broadcast Tennis Video AnnotationKan Jiang, Masoumeh Izadi, Zhaoyu Liu, Jin Song Dong. 53-62 [doi]
- SeqMobile: An Efficient Sequence-Based Malware Detection System Using RNN on Mobile DevicesRuitao Feng, Jing Qiang Lim, Sen Chen, Shang-Wei Lin, Yang Liu. 63-72 [doi]
- An Empirical Study on Correlation between Coverage and Robustness for Deep Neural NetworksYizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang 0001, Li Wang, Jin Song Dong, Ting Dai. 73-82 [doi]
- Safety Controller Synthesis for Collaborative RobotsMario Gleirscher, Radu Calinescu. 83-92 [doi]
- Achieving Weight Coverage for an Autonomous Driving System with Search-based Test GenerationThomas Laurent 0003, Paolo Arcaini, Fuyuki Ishikawa, Anthony Ventresque. 93-102 [doi]
- Formal Synthesis of Trajectories for Unmanned Aerial Vehicles to Perform Resilient Surveillance of Critical Power Transmission LinesMohammad Ashiqur Rahman, Rahat Masum, Matthew Anderson, Steven L. Drager. 103-112 [doi]
- Towards Deductive Verification of Control Algorithms for Autonomous Marine VehiclesSimon Foster 0001, Mario Gleirscher, Radu Calinescu. 113-118 [doi]
- The Burn-to-Claim cross-blockchain asset transfer protocolBabu Pillai, Kamanashis Biswas, Zhé Hóu, Vallipuram Muthukkumarasamy. 119-124 [doi]
- DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart ContractsRu Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo 0001. 125-134 [doi]
- Foggy: A New Anonymous Communication Architecture Based on MicroservicesHanlin Wei, Guangdong Bai, Zongwei Luo. 135-144 [doi]
- Gathering GitHub OSS Requirements from Q&A Community: an Empirical StudyHao Huang, Yao Lu 0003, XinJun Mao. 145-155 [doi]
- IFIX: Fixing Concurrency Bugs While They Are IntroducedZan Wang, Haichi Wang, Shuang Liu, Jun Sun, Haoyu Wang, Junjie Chen. 155-164 [doi]
- A Fault Localization Approach Derived From Testing-based Formal VerificationRong Wang, Shaoying Liu, Yuji Sato. 165-170 [doi]
- The Semantic SpreadsheetBehzad Farokhi, Katharina Dost, Gerald Weber, Jing Sun, Christof Lutteroth. 171-176 [doi]
- ReoFS: A Read-Efficient and Write-Optimized File System for Persistent MemoryYan Yan, Kaixin Huang, Shengan Zheng, Dongliang Xue, Linpeng Huang. 177-186 [doi]
- ROS-FM: Fast Monitoring for the Robotic Operating System(ROS)Sean Rivera, Antonio Ken Iannillo, Sofiane Lagraa, Clément Joly, Radu State. 187-196 [doi]
- Optimizing Communication Strategies in Contested and Dynamic EnvironmentsClaudia Szabo, Vanja Radenovic, Gregory Judd, Dustin Craggs, Kin Leong Lee, Xiaoshan Chen, Kevin Chan. 197-205 [doi]
- An Anytime Algorithm for Large-scale Heterogeneous Task AllocationQinyuan Li, Minyi Li 0001, Bao Quoc Vo, Ryszard Kowalczyk. 206-215 [doi]
- Automated Planning for Software Architectural MigrationNacha Chondamrongkul, Jing Sun 0002, Ian Warren. 216-224 [doi]