Tools and Algorithms for the Construction and Analysis of Systems 26th International Conference, TACAS 2020, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25-30, 2020, Proceedings, Part II

This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and...

Celý popis

Uložené v:
Podrobná bibliografia
Hlavní autori: Biere, Armin, Parker, David
Médium: E-kniha
Jazyk:English
Vydavateľské údaje: Cham Springer International Publishing AG 2020
Springer Nature
Vydanie:1
Edícia:Lecture Notes in Computer Science; Theoretical Computer Science and General Issues
ISBN:9783030452360, 3030452360
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The total of 60 regular papers presented in these volumes was carefully reviewed and selected from 155 submissions. The papers are organized in topical sections as follows: Part I: Program verification; SAT and SMT; Timed and Dynamical Systems; Verifying Concurrent Systems; Probabilistic Systems; Model Checking and Reachability; and Timed and Probabilistic Systems. Part II: Bisimulation; Verification and Efficiency; Logic and Proof; Tools and Case Studies; Games and Automata; and SV-COMP 2020.
AbstractList This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The total of 60 regular papers presented in these volumes was carefully reviewed and selected from 155 submissions. The papers are organized in topical sections as follows: Part I: Program verification; SAT and SMT; Timed and Dynamical Systems; Verifying Concurrent Systems; Probabilistic Systems; Model Checking and Reachability; and Timed and Probabilistic Systems. Part II: Bisimulation; Verification and Efficiency; Logic and Proof; Tools and Case Studies; Games and Automata; and SV-COMP 2020.
Author Biere, Armin
Parker, David
Author_xml – sequence: 1
  fullname: Biere, Armin
– sequence: 2
  fullname: Parker, David
BookMark eNqFz0tLAzEUBeCID7S1_yE7dVHIYyaZLOtQH1BwYXE7ZGZubG2a6NxU6b936Ci4c3MPBz4O3BE5CTHAERlJJlmWC6nNMZkYXfx2xc7IiPNc8LwQQpyTCeIbY0wIYzhXF2S2jNEjtaGlM_8au3VabZG62NG0AlrGgKnbNWkdw2CC9XtcI42OPu8xwRYvyamzHmHyk2Pycjdflg_TxdP9YzlbTK1QhdJTZQ1rtZPcCSuNyFqlQDas5pz31zRFDQ6YdbWxLQOpmXLgWgWK1610JpdjcjMMW9zAF66iT1h9eqhj3GD152mte3s12PcufuwAU3VgDYTUWV_Nb0uVCcYO8vofKbmWmeznvwG9qmnj
ContentType eBook
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3030452379
9783030452377
Edition 1
1st ed. 2020.
ExternalDocumentID 9783030452377
EBC6420077
EBC31734378
GroupedDBID 38.
AABBV
AAKKN
AALJR
AAQKC
ABEEZ
ACGCR
ADOGT
AEDXK
AEHEY
AEJLV
AEJNW
AEKFX
AGWHU
AIQUZ
ALMA_UNASSIGNED_HOLDINGS
ALNDD
APEJL
AVCSZ
AZTDL
BBABE
CYNQG
CZZ
DACMV
EIXGO
ESBCR
I4C
IEZ
OAOFD
OPOMJ
SBO
TPJZQ
TSXQS
V1H
Z5O
Z7R
Z7S
Z7U
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
A7I
AAYZJ
AKAAH
LDH
Z7V
Z82
ID FETCH-LOGICAL-a26867-6a90d7f31f2a3924d66e3c0b111c0b9c8befe0afb9ad0e3706fefd6e61bd3f953
ISBN 9783030452360
3030452360
IngestDate Fri Nov 08 03:20:35 EST 2024
Thu Apr 17 09:02:26 EDT 2025
Mon Aug 11 05:55:52 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident QA76.758
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a26867-6a90d7f31f2a3924d66e3c0b111c0b9c8befe0afb9ad0e3706fefd6e61bd3f953
OCLC 1152158222
PQID EBC31734378
PageCount 437
ParticipantIDs askewsholts_vlebooks_9783030452377
proquest_ebookcentral_EBC6420077
proquest_ebookcentral_EBC31734378
PublicationCentury 2000
PublicationDate 2020
2020-04-17
PublicationDateYYYYMMDD 2020-01-01
2020-04-17
PublicationDate_xml – year: 2020
  text: 2020
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Lecture Notes in Computer Science; Theoretical Computer Science and General Issues
PublicationYear 2020
Publisher Springer International Publishing AG
Springer Nature
Publisher_xml – name: Springer International Publishing AG
– name: Springer Nature
SSID ssj0002299116
Score 2.15678
Snippet This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of...
SourceID askewsholts
proquest
SourceType Aggregation Database
Publisher
Subtitle 26th International Conference, TACAS 2020, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25-30, 2020, Proceedings, Part II
TableOfContents 2.3 Principles and workflow of the analysis method -- 2.4 Presentation of results -- 3 Design and implementation of the tool chain -- 3.1 Front-end -- 3.2 Feature trees and constraints -- 3.3 Specifications of UNIX commands -- 3.4 Analysis by symbolic execution -- 3.5 Scenarios -- 4 Results and impact -- 4.1 Coverage of the case study -- 4.2 Corpus mining -- 4.3 Bugs found -- 4.4 Lessons learnt -- 5 Conclusion -- References -- Endicheck: Dynamic Analysis for Detecting Endianness Bugs -- 1 Introduction -- 2 Dynamic Analysis for Checking Endianness -- 2.1 Algorithm Overview -- 2.2 Shadow Memory -- 2.3 Propagation of Metadata -- 2.4 Discussion: Analysis Design and Precision -- 3 Implementation -- 4 User Guide -- 5 Evaluation -- 5.1 Case Study -- 5.2 Search for Bugs -- 5.3 Performance -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- 7.1 FutureWork -- Acknowledgments -- References -- Describing and Simulating Concurrent Quantum Systems -- 1 Processes -- 1.1 A programming language -- 1.2 Symbolic quantum calculation -- 1.3 No cloning -- 1.4 Other notable features -- 2 Straightforward description -- 3 Performance on examples -- 4 Conclusions -- 5 Data Availability and Acknowledgements -- References -- EMTST: Engineering the Meta-theory of Session Types -- 1 Introduction -- 2 EMTST: a Tool for Representing the Meta-theory of Session Types -- 2.1 Environments and Multiple Name Scopes -- 3 Two Case Studies on Binary Session Types -- 3.1 The Original System -- 3.2 The Revised System -- 4 Related Work and Conclusions -- Acknowledgements -- Bibliography -- Games and Automata -- Solving Mean-Payo Games via Quasi Dominions -- 1 Introduction -- 2 Mean-Payo Games -- 3 Solving Mean-Payo Games via Progress Measures -- 4 Solving Mean-Payo Games via Quasi Dominions -- 5 Experimental Evaluation -- 6 Concluding Remarks -- References
4.1 Terms Computed and Assumptions Accumulated by Executions -- 4.2 Coherence -- 5 Axioms over Relations -- 5.1 Verification modulo EPR axioms -- 5.2 Reflexivity, Irreflexivity, and Symmetry -- 5.3 Transitivity -- 5.4 Strict Partial Orders -- 5.5 Strict Total Orders -- 6 Axioms Over Functions -- 6.1 Associativity -- 6.2 Commutativity -- 6.3 Idempotence -- 7 Combining Axioms -- 8 Related Work -- 9 Conclusions -- References -- Formalized Proofs of the Infinity and Normal Form Predicates in the First-Order Theory of Rewriting -- 1 Introduction -- 2 Preliminaries -- 3 Infinity Predicate -- 4 Executable Infinity Predicate -- 5 Normal Form Predicate -- 6 Conclusion and Future Work -- References -- Fold/Unfold Transformations for Fixpoint Logic -- 1 Introduction -- 2 First-Order Fixpoint Logic MuArith -- 2.1 Syntax -- 2.2 Semantics -- 2.3 Program Verification as Validity Checking of MuArith Formulas -- 2.4 Auxiliary Definitions -- 3 Fold/Unfold-Like Transformations -- 3.1 Overview of Transformations for MuArith -- 3.2 Transformations for μ-Formulas -- 3.3 Fold/Unfold for ν-Formulas -- 4 Further Examples -- 4.1 Relational Reasoning on Recursive Programs -- 4.2 Proving Temporal Properties -- 5 Algorithm and Evaluation -- 5.1 Algorithm -- 5.2 Implementation and Experiments -- 6 Related Work -- 7 Conclusions -- References -- Tools and Case Studies -- Verifying OpenJDK's LinkedList using KeY -- 1 Introduction -- 2 LinkedList in OpenJDK -- 2.1 Integer overflow bug -- 2.2 Reproduction -- 3 Specification and verification of BoundedLinkedList -- 3.1 Specification -- 3.2 Verification -- 4 Discussion -- 4.1 Related work -- Self-references -- References -- Analysing installation scenarios of Debian packages -- 1 Introduction -- 2 Overview of the case study and analysis methodology -- 2.1 Debian packages -- 2.2 Managing package installation
Intro -- ETAPS Foreword -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Bisimulation -- An O(m log n) algorithm for branching bisimilarity on labelled transition systems -- 1 Introduction -- 2 Branching bisimilarity -- 3 The algorithm -- 3.1 High-level description of the algorithm -- 3.2 Abstract algorithm -- 3.3 Correctness -- 3.4 In-depth description of the algorithm -- 3.5 Time complexity -- 4 Splitting blocks -- 5 Experimental evaluation -- References -- Verifying Quantum Communication Protocols with Ground Bisimulation* -- 1 Introduction -- 2 Quantum CCS -- 3 Algorithm -- 4 Implementation and Experiments -- 4.1 Implementation -- 4.2 BB84 Quantum Key Distribution Protocol -- 4.3 Experimental Results -- 5 Conclusion and Future Work -- Appendix -- References -- Deciding the bisimilarity of context-free session types -- 1 Introduction -- 2 Context-free session types -- 3 An algorithm to decide type bisimilarity -- 4 Correctness of the algorithm -- 5 Evaluation -- 6 Conclusion -- References -- Sharp Congruences Adequate with Temporal Logics Combining Weak and Strong Modalities -- 1 Introduction -- 2 Processes, Compositions, and Reductions -- 3 Temporal Logics -- 4 Sharp Bisimilarity -- 5 LTS Reduction -- 6 Experimentation -- 7 Related Work -- 8 Conclusion -- References -- Verification and Efficiency -- How Many Bits Does it Take to Quantize Your Neural Network? -- 1 Introduction -- 2 Quantization of Feed-forward Networks -- 3 Robustness is Non-monotonic in the Number of Bits -- 4 Verification of Quantized Networks using Bit-precise SMT-solving -- 5 Experimental Results -- 5.1 Scalability and performance -- 5.2 Comparison to other methods -- 5.3 The effect of quantization on robustness -- 5.4 Network specifications beyond robustness -- 6 Conclusion -- Acknowledgments -- References
Highly Automated Formal Proofs over Memory Usage of Assembly Code -- 1 Introduction -- 2 Formal Memory Usage Certificates -- 3 FMUC Verification -- 3.1 Verification Tools Used -- 3.2 Per-block Verification -- 3.3 Verification of Function Body -- 3.4 Composition -- 4 Case Study: Xen Project -- 5 Related Work -- 6 Conclusion -- References -- GASOL: Gas Analysis and Optimization for Ethereum Smart Contracts -- 1 Introduction and Main Applications -- 2 Gas Analysis using Gasol -- 3 Gas Optimization using Gasol -- 4 Related Tools and Conclusions -- References -- CPU Energy Meter: A Tool for Energy-Aware Algorithms Engineering -- 1 Introduction -- 2 Intel Running Average Power Limit (RAPL) -- 3 CPU Energy Meter -- 4 Applications -- 5 Conclusion -- References -- Logic and Proof -- Practical Machine-Checked Formalization of Change Impact Analysis -- 1 Introduction -- 2 Background -- 2.1 Change Impact Analysis -- 2.2 Regression Test Selection and Regression Proof Selection -- 2.3 Build Systems -- 2.4 The Coq Proof Assistant and Mathematical Components -- 3 Formal Model -- 3.1 Definitions -- 3.2 Example -- 3.3 Correctness Approach -- 4 Model Encoding -- 4.1 Encoding in Coq -- 4.2 Correctness Statements -- 5 Component Hierarchies -- 5.1 Formal Model of Hierarchies -- 5.2 Encoding and Correctness in Coq -- 6 Tool Implementation -- 6.1 Optimizations -- 6.2 Encapsulation -- 7 Evaluation of the Model -- 7.1 Tool Integration -- 7.2 Projects -- 7.3 Experimental Setup -- 7.4 Results -- 8 Related Work -- 9 Conclusion -- Acknowledgments -- References -- What's Decidable About Program Verification Modulo Axioms? -- 1 Introduction -- 2 Illustrative Example -- 3 Preliminaries -- 3.1 Program Syntax -- 3.2 Executions and Semantics of Uninterpreted Programs -- 3.3 Feasibility of Executions Modulo Axioms -- 3.4 Program Verification Modulo Axioms -- 4 Coherence Modulo Axioms
4 Software Project and Contributors
Partial-Order Reduction for Parity Games with an Application on Parameterised Boolean Equation Systems -- 1 Introduction -- 2 Preliminaries -- 3 Partial-Order Reduction -- 3.1 Weak Stubborn Sets -- 3.2 Correctness -- 3.3 Optimising D2w -- 4 Parameterised Boolean Equation Systems -- 5 PBES Solving Using POR -- 6 Experiments -- 7 Conclusion -- References -- Polynomial Identification of w-Automata! -- 1 Introduction -- 2 Preliminaries -- 3 Negative Results -- 4 Outline for the positive results -- 5 The characteristic sample for the automaton -- 6 Learning the automaton -- 7 Characteristic sample for a DPA -- 7.1 Constructing the canonical forest of a DPA -- 7.2 Constructing the characteristic sample for a DPA -- 8 The learning algorithm for a DPA -- 9 The sample T_Acc and the learning algorithm for a DMA -- 10 Discussion -- References -- Part 6 SV-COMP 2020 -- Advances in Automatic Software Verification: SV-COMP 2020 -- 1 Introduction -- 2 Organization, Definitions, Formats, and Rules -- 3 Reproducibility -- 4 Results and Discussion -- 5 Conclusion -- References -- 2LS: Heap Analysis and Memory Safety (Competition Contribution) -- 1 Overview -- 2 New Features -- 2.1 Combinations of Abstract Domains -- 2.2 Symbolic Paths -- 2.3 Re-using Freed Memory Object for Next Allocations -- 2.4 Generic Abstract Domain Templates -- 3 Strengths and Weaknesses -- 4 Tool Setup -- 5 Software Project -- References -- COASTAL: Combining Concolic and Fuzzing for Java (Competition Contribution) -- 1 Verification Approach and Software Architecture -- 1.1 Strategies -- 1.2 Observers and Models -- 2 Strengths and weaknesses -- 3 Tool setup -- 4 Software Project -- References -- Dartagnan: Bounded Model Checking for Weak Memory Models (Competition Contribution) -- 1 Overview and Software Architecture -- 2 Strengths and Weaknesses -- 3 Tool Setup and Configuration
Title Tools and Algorithms for the Construction and Analysis of Systems
URI https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=31734378
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6420077
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783030452377
Volume 12079
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF7SlgO98BbhpQFxiy3Z63RtI3FIQ1CDqigSUdRb5Me6jYjsKrZC_zlXZnbXjwQhwYGLFXsf4-x8yc7Ok7EPPBm6CY_JSzwO7WEaR3bk-aHNsSFOQxyjzAXLS382C66uwnmv97OOhdlt_DwP7u7C2__KanyGzKbQ2X9gdzMpPsDPyHS8ItvxeiARN7eG40Wx0RmXR5vrAg_9NzrZgpItqTBnnSpW9-lkIzFpy0k7wEV1c6AmbIMCtZffePRtwFH-M7tWSqVq5ojA2t2gUfB_LdZ51RmuLBM6GYAJUtARWjpwJqt-RFohPlmM5i2Jz6Qo0_FpFHhjFOG32_VmwM9sT_Wp-86b7djUH8C3mjZ64XMUAbT-lhyAWuPZ1niWtP79xChZfro0BpZZUSm_tUFdA6P-S6QCCItOKOhhu_qaJrO3KXTYVbNw8nm1dVTpnpqVfMhNqpfmFO4pczP3dGGEZlvhji6Tc5DPuzPA94_YkS9IZ7B0LxrVIEcRwXUFRSI1M-tcUe39KTuNyu-4D-IeWZW_CRJKOlo8YieSQmYes57Mn7CH9SKAWYSn904UNAEXA1poAkITEC_QhabuY6AJRQYGmh-BgAl7wIQWWRYoWAItqQUESohKIPbTHESkBiUoUHaGIpUcNCgV8RqUirgBpQUKkmZ6DUgLDBwtUGAEBUbL9OkA0dLvMZ0-Y8svk8X4wjb1R-yIiwAFCBGFTupnnpvxCM8Rw1QI6SVOjPIBXsMkiGUmnSiLwyh1pOc7IpNZKqRw49TLwjPvOTvOi1y-YMBRtBZcRpyyKwUpjg5S6QZxnMRCJDLts_cdfq52G-UrUa720NJn72o2r1S7ceBeTc7HeA7whp4f9Bn8sY8YkmXCf_k3tF6xB-3P4DU7RhzIN-x-sqvW5fatAuwvpRzdxQ
linkProvider Open Access Publishing in European Networks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Tools+and+Algorithms+for+the+Construction+and+Analysis+of+Systems%3A+26th+International+Conference%2C+TACAS+2020%2C+Held+as+Part+of+the+European+Joint+Conferences+on+Theory+and+Practice+of+Software%2C+ETAPS+2020%2C+Dublin%2C+Ireland%2C+April+25-30%2C+2020%2C+Proceedings%2C+Part+II&rft.au=Biere%2C+Armin&rft.au=Parker%2C+David&rft.series=Lecture+Notes+in+Computer+Science%3B+Theoretical+Computer+Science+and+General+Issues&rft.date=2020-04-17&rft.pub=Springer+Nature&rft.isbn=9783030452360&rft.volume=12079&rft.externalDocID=9783030452377
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830304%2F9783030452377.jpg