Computer Aided Verification 36th International Conference, CAV 2024, Montreal, QC, Canada, July 24–27, 2024, Proceedings, Part II

This open access 3-volume set constitutes the proceedings of the 36th International Conference on Computer-Aided Verification, CAV 2024, which took place in Montreal, Canada, during July 24–27, 2024. The primary focus of CAV is to extend the frontiers of verification techniques by expanding to new d...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autoři: Gurfinkel, Arie, Ganesh, Vijay
Médium: E-kniha
Jazyk:angličtina
Vydáno: Cham Springer Nature 2024
Springer
Vydání:1
Edice:Lecture Notes in Computer Science
Témata:
ISBN:9783031656309, 9783031656293, 303165630X, 3031656296
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract This open access 3-volume set constitutes the proceedings of the 36th International Conference on Computer-Aided Verification, CAV 2024, which took place in Montreal, Canada, during July 24–27, 2024. The primary focus of CAV is to extend the frontiers of verification techniques by expanding to new domains such as security, quantum computing, and machine learning.
AbstractList This open access 3-volume set constitutes the proceedings of the 36th International Conference on Computer-Aided Verification, CAV 2024, which took place in Montreal, Canada, during July 24–27, 2024. The primary focus of CAV is to extend the frontiers of verification techniques by expanding to new domains such as security, quantum computing, and machine learning.
Author Gurfinkel, Arie
Ganesh, Vijay
Author_xml – sequence: 1
  fullname: Gurfinkel, Arie
– sequence: 2
  fullname: Ganesh, Vijay
BookMark eNpdTjlPwzAUNuIQtOQHIBg6sgSe_XzEA0OJyiFVYkFdLSexUaCNg5MO_HtcyoBY3vG973gTctSFzhFyQeGGAqhbrYocc0CaSyERcn1AsoRhQn4AffhvPyETygVwkSo_JdkwvAMAMkRg7IxclmHTb0cXZ_O2cc1s5WLr29qObejOybG368Flv31KVg-L1_IpX748PpfzZW4Zai5yr7EufME8rXmTQrVTgtdNU1lbKQRR-QpFLRn10gO3UlurQaanCsooUw6n5Hpv3MfwuXXDaFwVwkftujHatVncl0iF5lSpRL3bU4PtXWf62G5s_DLBtmbdVnE_7y4hvhkGRgAYyqRQRjMFOumv_uqbYHdJg6EcmWT4DUa4Y6Y
ContentType eBook
DBID V1H
A7I
DOI 10.1007/978-3-031-65630-9
DatabaseName DOAB: Directory of Open Access Books
OAPEN
DatabaseTitleList

Database_xml – sequence: 1
  dbid: V1H
  name: DOAB: Directory of Open Access Books
  url: https://directory.doabooks.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783031656309
303165630X
Edition 1
Editor Gurfinkel, Arie
Ganesh, Vijay
Editor_xml – sequence: 1
  fullname: Gurfinkel, Arie
– sequence: 2
  fullname: Ganesh, Vijay
ExternalDocumentID EBC31594177
oai_library_oapen_org_20_500_12657_92709
143262
GroupedDBID A7I
AABBV
AACKP
AAHEH
AAKKN
AALJR
AAQKC
ABEEZ
ABHYI
ABLGM
ADZDO
AEDXK
AEIVC
AEKFX
AFIJG
AGWHU
AIQUZ
ALMA_UNASSIGNED_HOLDINGS
ALNDD
BBABE
CZZ
EIXGO
IEZ
SBO
TPJZQ
TSXQS
V1H
Z5O
Z7R
Z7S
Z7U
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
ID FETCH-LOGICAL-a23945-f93c8f82f1c4d5639e754cddbaab7305bfb35c621f6f04a69aa906450812127e3
IEDL.DBID A7I
ISBN 9783031656309
9783031656293
303165630X
3031656296
IngestDate Wed Jun 18 00:44:49 EDT 2025
Wed Dec 10 14:58:49 EST 2025
Tue Oct 07 20:35:19 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident QA76.758
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a23945-f93c8f82f1c4d5639e754cddbaab7305bfb35c621f6f04a69aa906450812127e3
OCLC 1450451454
OpenAccessLink https://library.oapen.org/handle/20.500.12657/92709
PQID EBC31594177
PageCount 430
ParticipantIDs proquest_ebookcentral_EBC31594177
oapen_primary_oai_library_oapen_org_20_500_12657_92709
oapen_doabooks_143262
PublicationCentury 2000
PublicationDate 2024
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – year: 2024
  text: 2024
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationYear 2024
Publisher Springer Nature
Springer
Publisher_xml – name: Springer Nature
– name: Springer
SSID ssj0003233022
Score 2.3837545
Snippet This open access 3-volume set constitutes the proceedings of the 36th International Conference on Computer-Aided Verification, CAV 2024, which took place in...
SourceID proquest
oapen
SourceType Publisher
SubjectTerms Applications
Artificial intelligence
Computer programming / software engineering
Computer science
Computing and Information Technology
Informatics
Mathematical theory of computation
Software Engineering
Subtitle 36th International Conference, CAV 2024, Montreal, QC, Canada, July 24–27, 2024, Proceedings, Part II
TableOfContents 4.1 Qualitative Safety Verification
3.3 Decidability and Finite Counterexamples via EPR -- 4 Invariant Inference -- 5 Designing mypyvy's Internals -- 6 Works Using mypyvy -- 7 Related Work -- References -- Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas -- 1 Introduction -- 2 Background -- 3 Subsumption-Based Representation of Sets of Formulas -- 3.1 Bounded First-Order Languages -- 3.2 Syntactic Subsumption -- 3.3 Canonicalization -- 3.4 Representing Sets of Formulas -- 4 The Weaken Operator -- 4.1 Weakening a Single Canonical Formula -- 4.2 Weakening Sets of Formulas -- 4.3 Design Consideration and Tradeoffs -- 5 Data Structure for Sets of Formulas -- 6 Implementation and Evaluation -- 6.1 Implementation -- 6.2 Experiments -- 6.3 Results -- 7 Related Work -- 8 Conclusion -- References -- Verifying Cake-Cutting, Faster -- 1 Introduction -- 2 Cake-Cutting Preliminaries -- 3 Language and Type System -- 3.1 Syntax of Base Slice -- 3.2 A Linear Type System for Slice -- 3.3 Semantics -- 3.4 Disjointness -- 4 Constraints -- 5 Piecewise Uniform Reduction -- 5.1 Replicating Protocol Executions -- 5.2 Piecewise Uniform Valuations -- 5.3 Piecewise Uniform Replacement -- 6 Implementation and Evaluation -- 7 Related and Future Work -- References -- Runtime Verification and Monitoring -- General Anticipatory Runtime Verification -- 1 Introduction -- 2 Lola Monitoring Revisited -- 2.1 Recurrent Monitoring -- 2.2 Lola -- 3 Lola Recurrent Online Monitoring Semantics -- 4 An Abstraction Framework for Lola Monitoring -- 5 Abstraction-Based Recurrent Lola Monitoring -- 6 Symbolic Recurrent Lola Monitoring -- 7 Empirical Evaluation -- 8 Conclusion -- References -- Proactive Real-Time First-Order Enforcement -- 1 Introduction -- 2 Preliminaries -- 3 Proactive, Real-Time, First-Order Enforcement -- 3.1 System Model -- 3.2 Enforcers -- 4 Enforceable MFOTL Formulae
5 Enforcing EMFOTL -- 5.1 Obligations -- 5.2 Checking Satisfaction of MFOTL Formulae Under Assumptions -- 5.3 The Enforcement Algorithm -- 5.4 Correctness -- 6 Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Predictive Monitoring with Strong Trace Prefixes -- 1 Introduction -- 2 Predictive Monitoring and Trace Theory -- 3 Strong Trace Prefixes -- 3.1 Modelling Correct Reorderings with Strong Trace Prefixes -- 4 Complexity of Predictive Monitoring -- 4.1 Non-deterministic Predictive Monitoring -- 4.2 Deterministic Predictive Monitoring -- 4.3 Ensuring Well-Formedness and Soundness -- 5 Strong Reads-From Prefixes -- 6 Strong Prefixes Versus Synchronization Preservation -- 7 Experimental Evaluation -- 7.1 Enhanced Predictive Power of Strong Prefixes -- 7.2 Strong Reads-From Prefixes v/s Sync-Preservation -- 8 Related Work and Conclusions -- References -- Case Studies and Tools -- Monitoring Unmanned Aircraft: Specification, Integration, and Lessons-Learned -- 1 Introduction -- 1.1 Related Work -- 2 Stream-Based Monitoring -- 3 Setup -- 3.1 Monitoring Applications -- 3.2 Development Cycle for the Monitor -- 4 Abstract Integration -- 4.1 Common Interfaces -- 5 Concrete Integration of Representative Specifications -- 6 Conclusion -- References -- Testing the Migration from Analog to Software-Based Railway Interlocking Systems -- 1 Introduction -- 2 Operational Setting -- 3 Bridging the Gap Between ReRIS and SwRIS -- 3.1 Simulations Extractor -- 3.2 Working with a Partial ReRIS Model -- 3.3 Mapping a ReRIS Simulation into an Abstract SwRIS Test -- 3.4 Test Execution -- 4 Related Works -- 5 Experimental Evaluation -- 6 Conclusions -- References -- soid: A Tool for Legal Accountability for Automated Decision Making -- 1 Introduction -- 1.1 Related Work -- 2 soid Tool Architecture and Usage -- 2.1 Example #1: Decision Tree Inference
4.4 RQ3. Efficiency of AutoSpec -- 4.5 RQ4. Ablation Study -- 4.6 Case Studies -- 5 Threats to Validity -- 6 Related Work -- 7 Conclusion -- References -- Verifying Global Two-Safety Properties in Neural Networks with Confidence -- 1 Introduction -- 2 Background -- 2.1 Feed-Forward Neural Networks -- 2.2 Hyperproperties -- 2.3 Relational Verification and Self-composition -- 2.4 Robustness and Fairness -- 3 Confidence Based Global Verification of Feed-Forward Neural Networks -- 3.1 Encoding 2-Safety Properties as Product Neural Network -- 3.2 Softmax Approximation -- 4 Implementation -- 5 Experimental Evaluation -- 5.1 Discussion -- 6 Conclusion -- References -- Certified Robust Accuracy of Neural Networks Are Bounded Due to Bayes Errors -- 1 Introduction -- 2 Preliminary and Problem Definition -- 2.1 Robustness in Classification -- 2.2 Bayes Rules for Distributions -- 3 An Upper Bound of Robustness from Bayes Error -- 3.1 Certified Training Increases Bayes Error -- 3.2 Irreducible Robustness Error and Robustness Upper Bound -- 4 Experiment and Results -- 5 Related Works -- 6 Conclusion -- References -- Boosting Few-Pixel Robustness Verification via Covering Verification Designs -- 1 Introduction -- 2 Background -- 3 Our Approach: Covering Verification Designs -- 4 CoVerD -- 4.1 Our System -- 4.2 Choosing a Covering Verification Design -- 4.3 Constructing a Covering Verification Design -- 4.4 A Running Example -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems -- 1 Introduction -- 2 Preliminaries -- 2.1 DNN-Controlled Systems -- 2.2 Barrier Certificate and Its Neural Implementation -- 3 Verification Problem and Our Framework -- 3.1 Problem Statement -- 3.2 Overview of Our Framework -- 4 Qualitative and Quantitative Safety Verification
Intro -- Preface -- Organization -- Invited Talks -- How to Solve Math Problems Without Talent -- Bridging Formal Mathematics and Software Verification -- The Art of SMT Solving -- Contents - Part II -- Concurrency -- The VerCors Verifier: A Progress Report -- 1 Introduction -- 2 New and Improved Language Support -- 2.1 Improved Existing Language Support -- 2.2 Newly Supported Frameworks -- 2.3 Programming Languages Encoded into VerCors -- 3 VerCors Implementation Changes -- 4 Deriving Verified, Optimised Programs -- 5 Case Studies -- 5.1 Tunnel Control Software Components -- 5.2 Verification of Red-Black Trees and their Parallel Merge -- 5.3 GPU Case Studies -- 5.4 Student Projects -- 6 Conclusions, Related Work and Future Work -- References -- Parsimonious Optimal Dynamic Partial Order Reduction -- 1 Introduction -- 2 Main Concepts -- 3 Programs, Executions, and Equivalence -- 4 Design of the POP Algorithm -- 4.1 Parsimonious Race Reversals -- 4.2 The Parsimonious-OPtimal DPOR (POP) Algorithm -- 4.3 Parsimonious Sleep Set Characterization -- 5 Correctness and Space Complexity -- 6 Implementation and Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Collective Contracts for Message-Passing Parallel Programs -- 1 Introduction -- 2 A Theory of Collective Contracts -- 2.1 Language -- 2.2 Semantics -- 2.3 Collective Correctness -- 2.4 Simulation -- 3 Collective Contracts for C/MPI -- 3.1 Background from MPI -- 3.2 Contract Structure -- 4 Evaluation -- 4.1 Collective Contract Examples -- 4.2 Bounded Verification of Collective Contracts -- 5 Related Work -- 6 Discussion -- References -- Distributed Systems -- mypyvy: A Research Platform for Verification of Transition Systems in First-Order Logic -- 1 Introduction -- 2 Modeling Language -- 2.1 Benchmarks -- 3 Satisfiability-Based Queries -- 3.1 Queries -- 3.2 Counterexamples
3 soid-gui Architecture and Usage -- 3.1 Example #2: Three Cars on the Stand -- 4 Conclusion -- References -- Machine Learning and Neural Networks -- Marabou 2.0: A Versatile Formal Analyzer of Neural Networks -- 1 Introduction -- 2 Architecture and Core Components -- 2.1 Engine -- 2.2 Context-Dependent Data-Structures -- 2.3 Proof Module -- 2.4 Front End -- 2.5 Availability, License, and Installation -- 3 Highlighted Features and Applications -- 4 Runtime Evaluation -- 5 Conclusion and Next Steps -- References -- Monitizer: Automating Design and Evaluation of Neural Network Monitors -- 1 Introduction -- 2 Related Work -- 3 Monitizer -- 3.1 Overview -- 3.2 Use Cases -- 3.3 Phases of Monitizer -- 3.4 Classification of Out-of-Distribution Data -- 3.5 Library of Monitors, NNs, and Datasets -- 4 Summary of Evaluation by Case Study -- 5 Conclusion -- References -- Guiding Enumerative Program Synthesis with Large Language Models -- 1 Introduction -- 2 Background -- 3 Overview -- 4 Stand-Alone LLM -- 4.1 Prompting the LLM -- 5 Synthesis with pCFG Guidance: pCFG-synth -- 5.1 Inferring a Weighted CFG -- 5.2 Probabilistic Guided Search -- 5.3 Weighted A* Search -- 6 Enumerative Synthesis with an Integrated LLM (iLLM-synth) -- 6.1 Integrated Prompting -- 6.2 Updating the Weighted Grammar -- 6.3 Integrating Syntactic Feedback into Enumerative Search -- 7 Evaluation -- 8 Threats to Validity -- 9 Related Work -- 10 Conclusions -- References -- Enchanting Program Specification Synthesis by Large Language Models Using Static Analysis and Program Verification -- 1 Introduction -- 2 Background and Motivation -- 3 Methodology -- 3.1 Code Decomposition -- 3.2 Hierarchical Specification Generation -- 3.3 Specification Validation -- 4 Evaluation -- 4.1 Evaluation Setup -- 4.2 RQ1. Effectiveness on General Specification -- 4.3 RQ2. Effectiveness on Loop Invariants
Title Computer Aided Verification
URI https://directory.doabooks.org/handle/20.500.12854/143262
https://library.oapen.org/handle/20.500.12657/92709
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=31594177
Volume 14682
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA7SevBUHxVrVSp4TdnNZDebo5aWClI8yNJbyG4S6KWVtvr7nWSzFfHWy0IykE2GPL6ZZL4h5AnAWm5NSgHBA-UVS2mlcTPEsxQ053UqQpRr-SYWi2K5lO8xjnv367sYbzRa8-Emv2EbQCN9nCWeDCFHE14y4YP2urlPRu3xkHg9OFbwp4AHk4_jwAmLcIV5_r62AEmk3TkI4U8ZEtnefUb6WaAooUFE_avF0LN_O3c4jma9owZyTrrWRzZckBO7viS9Np_DKC7vKzI8VD2vjDWjEmeniz69Piln04_JnMbkCVT7bOcZdRLqwhXMpTU32HtpRcZrYyqtK1zWWeUqyOqcpS53Cde51Fp68jrECJ713cI16aw3a3tDRmAQFErmEMtwjhYjojQHtX9GlQhhknxA-mGYymy0tw12aFAgLGQDkjf1nw1zhvJc1lExqpGgYhRLFGpEBY2ooJEBeWzVq8KlcXypqqYvE0AAxlMhbo9tfEjOGCKTxo9yRzr77Ze9J6f193612z6EyYTfMp3_AG7-vlo
linkProvider Open Access Publishing in European Networks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Computer+Aided+Verification&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2024-01-01&rft.pub=Springer+Nature&rft.isbn=9783031656293&rft.volume=14682&rft_id=info:doi/10.1007%2F978-3-031-65630-9&rft.externalDBID=A7I&rft.externalDocID=oai_library_oapen_org_20_500_12657_92709
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783031656309/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783031656309/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783031656309/sc.gif&client=summon&freeimage=true