Abstract is missing.
- Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance ArchitecturesVivek Nigam, Carolyn L. Talcott. 1-19 [doi]
- Verified Transformation of Continuation-Passing Style into Static Single Assignment FormSiyu Liu, Yuting Wang 0001. 20-37 [doi]
- OAT: An Optimized Android Testing Framework Based on Reinforcement LearningMengjun Du, Peiyang Li, Lian Song, W. K. Chan 0001, Bo Jiang 0001. 38-58 [doi]
- Decomposing Synthesized Strategies for Reactive Multi-agent Reinforcement LearningChenyang Zhu 0001, Jinyu Zhu, Yujie Cai, Fang Wang. 59-76 [doi]
- Contract Based Embedded Software DesignChristian Lidström, Dilian Gurov. 77-94 [doi]
- Verifying Refinement of Probabilistic Contracts Using Timed AutomataAnton Hampus, Mattias Nyberg. 95-113 [doi]
- Asynchronous Test Equivalence over Timed ProcessesPuneet Bhateja. 114-125 [doi]
- Protocol Conformance with Choreographic PlusCalDarius Foo, Andreea Costea, Wei-Ngan Chin. 126-145 [doi]
- Verifying Chips Design at RTL LevelWu Wang, Nan Zhang 0001, Cong Tian, Zhenhua Duan, Zhijie Xu, Chaofeng Yu. 146-163 [doi]
- Maximizing Reachability Probabilities in Rectangular Automata with Random ClocksJoanna Delicaris, Stefan Schupp, Erika Ábrahám, Anne Remke. 164-182 [doi]
- A Hierarchical Spatial Logic for Knowledge Sharing and Fusion in Intelligent Connected Vehicle CooperationShengyang Yao, Qin Li 0002. 183-201 [doi]
- VeriLin: A Linearizability Checker for Large-Scale Concurrent ObjectsQiaowen Jia, Yi Lv, Peng Wu 0002, Bohua Zhan, Jifeng Hao, Hong Ye, Chao Wang 0069. 202-220 [doi]
- Identifying Minimal Changes in the Zone Abstract DomainKenny Ballou, Elena Sherman. 221-239 [doi]
- idDL2DL - Interval Syntax to dℒJaime Santos, Daniel Figueiredo 0001, Alexandre Madeira. 240-247 [doi]
- Safety Verification for Neural Networks Based on Set-Boundary AnalysisZhen Liang, Dejin Ren, Wanwei Liu, Ji Wang 0001, Wenjing Yang 0002, Bai Xue 0001. 248-267 [doi]
- Approximately Learning Quantum AutomataWenjing Chu, Shuo Chen 0010, Marcello M. Bonsangue, Zenglin Shi. 268-285 [doi]
- View-Based Axiomatic Reasoning for PSOLara Bargmann, Heike Wehrheim. 286-304 [doi]
- A Static Analyser for Resource Sensitive Workflow ModelsMuhammad Rizwan Ali, Violet Ka I Pun. 305-312 [doi]
- MTCD: An Efficient Cloning Detection Technique Based on Method TableFangting Liao, Shun Long, Weiheng Zhu, Wenzhu Chen, Silei Cao, Xinyi Guan. 313-326 [doi]
- Stepwise Development of Paraconsistent ProcessesJuliana Cunha, Alexandre Madeira, Luís Soares Barbosa. 327-343 [doi]
- Detecting API-Misuse Based on Pattern Mining via API Usage Graph with ParametersYulin Wu, Zhiwu Xu 0001, Shengchao Qin. 344-363 [doi]