Tools and Algorithms for the Construction and Analysis of Systems 26th International Conference, TACAS 2020, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25-30, 2020, Proceedings, Part II
This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and...
Uložené v:
| Hlavní autori: | , |
|---|---|
| Médium: | E-kniha |
| Jazyk: | English |
| Vydavateľské údaje: |
Cham
Springer International Publishing AG
2020
Springer Nature |
| Vydanie: | 1 |
| Edícia: | Lecture Notes in Computer Science; Theoretical Computer Science and General Issues |
| ISBN: | 9783030452360, 3030452360 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The total of 60 regular papers presented in these volumes was carefully reviewed and selected from 155 submissions. The papers are organized in topical sections as follows: Part I: Program verification; SAT and SMT; Timed and Dynamical Systems; Verifying Concurrent Systems; Probabilistic Systems; Model Checking and Reachability; and Timed and Probabilistic Systems. Part II: Bisimulation; Verification and Efficiency; Logic and Proof; Tools and Case Studies; Games and Automata; and SV-COMP 2020. |
|---|---|
| AbstractList | This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The total of 60 regular papers presented in these volumes was carefully reviewed and selected from 155 submissions. The papers are organized in topical sections as follows: Part I: Program verification; SAT and SMT; Timed and Dynamical Systems; Verifying Concurrent Systems; Probabilistic Systems; Model Checking and Reachability; and Timed and Probabilistic Systems. Part II: Bisimulation; Verification and Efficiency; Logic and Proof; Tools and Case Studies; Games and Automata; and SV-COMP 2020. |
| Author | Biere, Armin Parker, David |
| Author_xml | – sequence: 1 fullname: Biere, Armin – sequence: 2 fullname: Parker, David |
| BookMark | eNqFz0tLAzEUBeCID7S1_yE7dVHIYyaZLOtQH1BwYXE7ZGZubG2a6NxU6b936Ci4c3MPBz4O3BE5CTHAERlJJlmWC6nNMZkYXfx2xc7IiPNc8LwQQpyTCeIbY0wIYzhXF2S2jNEjtaGlM_8au3VabZG62NG0AlrGgKnbNWkdw2CC9XtcI42OPu8xwRYvyamzHmHyk2Pycjdflg_TxdP9YzlbTK1QhdJTZQ1rtZPcCSuNyFqlQDas5pz31zRFDQ6YdbWxLQOpmXLgWgWK1610JpdjcjMMW9zAF66iT1h9eqhj3GD152mte3s12PcufuwAU3VgDYTUWV_Nb0uVCcYO8vofKbmWmeznvwG9qmnj |
| ContentType | eBook |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 3030452379 9783030452377 |
| Edition | 1 1st ed. 2020. |
| ExternalDocumentID | 9783030452377 EBC6420077 EBC31734378 |
| GroupedDBID | 38. AABBV AAKKN AALJR AAQKC ABEEZ ACGCR ADOGT AEDXK AEHEY AEJLV AEJNW AEKFX AGWHU AIQUZ ALMA_UNASSIGNED_HOLDINGS ALNDD APEJL AVCSZ AZTDL BBABE CYNQG CZZ DACMV EIXGO ESBCR I4C IEZ OAOFD OPOMJ SBO TPJZQ TSXQS V1H Z5O Z7R Z7S Z7U Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 A7I AAYZJ AKAAH LDH Z7V Z82 |
| ID | FETCH-LOGICAL-a26867-6a90d7f31f2a3924d66e3c0b111c0b9c8befe0afb9ad0e3706fefd6e61bd3f953 |
| ISBN | 9783030452360 3030452360 |
| IngestDate | Fri Nov 08 03:20:35 EST 2024 Thu Apr 17 09:02:26 EDT 2025 Mon Aug 11 05:55:52 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum_Ident | QA76.758 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a26867-6a90d7f31f2a3924d66e3c0b111c0b9c8befe0afb9ad0e3706fefd6e61bd3f953 |
| OCLC | 1152158222 |
| PQID | EBC31734378 |
| PageCount | 437 |
| ParticipantIDs | askewsholts_vlebooks_9783030452377 proquest_ebookcentral_EBC6420077 proquest_ebookcentral_EBC31734378 |
| PublicationCentury | 2000 |
| PublicationDate | 2020 2020-04-17 |
| PublicationDateYYYYMMDD | 2020-01-01 2020-04-17 |
| PublicationDate_xml | – year: 2020 text: 2020 |
| PublicationDecade | 2020 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Cham |
| PublicationSeriesTitle | Lecture Notes in Computer Science; Theoretical Computer Science and General Issues |
| PublicationYear | 2020 |
| Publisher | Springer International Publishing AG Springer Nature |
| Publisher_xml | – name: Springer International Publishing AG – name: Springer Nature |
| SSID | ssj0002299116 |
| Score | 2.15678 |
| Snippet | This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of... |
| SourceID | askewsholts proquest |
| SourceType | Aggregation Database Publisher |
| Subtitle | 26th International Conference, TACAS 2020, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, April 25-30, 2020, Proceedings, Part II |
| TableOfContents | 2.3 Principles and workflow of the analysis method -- 2.4 Presentation of results -- 3 Design and implementation of the tool chain -- 3.1 Front-end -- 3.2 Feature trees and constraints -- 3.3 Specifications of UNIX commands -- 3.4 Analysis by symbolic execution -- 3.5 Scenarios -- 4 Results and impact -- 4.1 Coverage of the case study -- 4.2 Corpus mining -- 4.3 Bugs found -- 4.4 Lessons learnt -- 5 Conclusion -- References -- Endicheck: Dynamic Analysis for Detecting Endianness Bugs -- 1 Introduction -- 2 Dynamic Analysis for Checking Endianness -- 2.1 Algorithm Overview -- 2.2 Shadow Memory -- 2.3 Propagation of Metadata -- 2.4 Discussion: Analysis Design and Precision -- 3 Implementation -- 4 User Guide -- 5 Evaluation -- 5.1 Case Study -- 5.2 Search for Bugs -- 5.3 Performance -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- 7.1 FutureWork -- Acknowledgments -- References -- Describing and Simulating Concurrent Quantum Systems -- 1 Processes -- 1.1 A programming language -- 1.2 Symbolic quantum calculation -- 1.3 No cloning -- 1.4 Other notable features -- 2 Straightforward description -- 3 Performance on examples -- 4 Conclusions -- 5 Data Availability and Acknowledgements -- References -- EMTST: Engineering the Meta-theory of Session Types -- 1 Introduction -- 2 EMTST: a Tool for Representing the Meta-theory of Session Types -- 2.1 Environments and Multiple Name Scopes -- 3 Two Case Studies on Binary Session Types -- 3.1 The Original System -- 3.2 The Revised System -- 4 Related Work and Conclusions -- Acknowledgements -- Bibliography -- Games and Automata -- Solving Mean-Payo Games via Quasi Dominions -- 1 Introduction -- 2 Mean-Payo Games -- 3 Solving Mean-Payo Games via Progress Measures -- 4 Solving Mean-Payo Games via Quasi Dominions -- 5 Experimental Evaluation -- 6 Concluding Remarks -- References 4.1 Terms Computed and Assumptions Accumulated by Executions -- 4.2 Coherence -- 5 Axioms over Relations -- 5.1 Verification modulo EPR axioms -- 5.2 Reflexivity, Irreflexivity, and Symmetry -- 5.3 Transitivity -- 5.4 Strict Partial Orders -- 5.5 Strict Total Orders -- 6 Axioms Over Functions -- 6.1 Associativity -- 6.2 Commutativity -- 6.3 Idempotence -- 7 Combining Axioms -- 8 Related Work -- 9 Conclusions -- References -- Formalized Proofs of the Infinity and Normal Form Predicates in the First-Order Theory of Rewriting -- 1 Introduction -- 2 Preliminaries -- 3 Infinity Predicate -- 4 Executable Infinity Predicate -- 5 Normal Form Predicate -- 6 Conclusion and Future Work -- References -- Fold/Unfold Transformations for Fixpoint Logic -- 1 Introduction -- 2 First-Order Fixpoint Logic MuArith -- 2.1 Syntax -- 2.2 Semantics -- 2.3 Program Verification as Validity Checking of MuArith Formulas -- 2.4 Auxiliary Definitions -- 3 Fold/Unfold-Like Transformations -- 3.1 Overview of Transformations for MuArith -- 3.2 Transformations for μ-Formulas -- 3.3 Fold/Unfold for ν-Formulas -- 4 Further Examples -- 4.1 Relational Reasoning on Recursive Programs -- 4.2 Proving Temporal Properties -- 5 Algorithm and Evaluation -- 5.1 Algorithm -- 5.2 Implementation and Experiments -- 6 Related Work -- 7 Conclusions -- References -- Tools and Case Studies -- Verifying OpenJDK's LinkedList using KeY -- 1 Introduction -- 2 LinkedList in OpenJDK -- 2.1 Integer overflow bug -- 2.2 Reproduction -- 3 Specification and verification of BoundedLinkedList -- 3.1 Specification -- 3.2 Verification -- 4 Discussion -- 4.1 Related work -- Self-references -- References -- Analysing installation scenarios of Debian packages -- 1 Introduction -- 2 Overview of the case study and analysis methodology -- 2.1 Debian packages -- 2.2 Managing package installation Intro -- ETAPS Foreword -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Bisimulation -- An O(m log n) algorithm for branching bisimilarity on labelled transition systems -- 1 Introduction -- 2 Branching bisimilarity -- 3 The algorithm -- 3.1 High-level description of the algorithm -- 3.2 Abstract algorithm -- 3.3 Correctness -- 3.4 In-depth description of the algorithm -- 3.5 Time complexity -- 4 Splitting blocks -- 5 Experimental evaluation -- References -- Verifying Quantum Communication Protocols with Ground Bisimulation* -- 1 Introduction -- 2 Quantum CCS -- 3 Algorithm -- 4 Implementation and Experiments -- 4.1 Implementation -- 4.2 BB84 Quantum Key Distribution Protocol -- 4.3 Experimental Results -- 5 Conclusion and Future Work -- Appendix -- References -- Deciding the bisimilarity of context-free session types -- 1 Introduction -- 2 Context-free session types -- 3 An algorithm to decide type bisimilarity -- 4 Correctness of the algorithm -- 5 Evaluation -- 6 Conclusion -- References -- Sharp Congruences Adequate with Temporal Logics Combining Weak and Strong Modalities -- 1 Introduction -- 2 Processes, Compositions, and Reductions -- 3 Temporal Logics -- 4 Sharp Bisimilarity -- 5 LTS Reduction -- 6 Experimentation -- 7 Related Work -- 8 Conclusion -- References -- Verification and Efficiency -- How Many Bits Does it Take to Quantize Your Neural Network? -- 1 Introduction -- 2 Quantization of Feed-forward Networks -- 3 Robustness is Non-monotonic in the Number of Bits -- 4 Verification of Quantized Networks using Bit-precise SMT-solving -- 5 Experimental Results -- 5.1 Scalability and performance -- 5.2 Comparison to other methods -- 5.3 The effect of quantization on robustness -- 5.4 Network specifications beyond robustness -- 6 Conclusion -- Acknowledgments -- References Highly Automated Formal Proofs over Memory Usage of Assembly Code -- 1 Introduction -- 2 Formal Memory Usage Certificates -- 3 FMUC Verification -- 3.1 Verification Tools Used -- 3.2 Per-block Verification -- 3.3 Verification of Function Body -- 3.4 Composition -- 4 Case Study: Xen Project -- 5 Related Work -- 6 Conclusion -- References -- GASOL: Gas Analysis and Optimization for Ethereum Smart Contracts -- 1 Introduction and Main Applications -- 2 Gas Analysis using Gasol -- 3 Gas Optimization using Gasol -- 4 Related Tools and Conclusions -- References -- CPU Energy Meter: A Tool for Energy-Aware Algorithms Engineering -- 1 Introduction -- 2 Intel Running Average Power Limit (RAPL) -- 3 CPU Energy Meter -- 4 Applications -- 5 Conclusion -- References -- Logic and Proof -- Practical Machine-Checked Formalization of Change Impact Analysis -- 1 Introduction -- 2 Background -- 2.1 Change Impact Analysis -- 2.2 Regression Test Selection and Regression Proof Selection -- 2.3 Build Systems -- 2.4 The Coq Proof Assistant and Mathematical Components -- 3 Formal Model -- 3.1 Definitions -- 3.2 Example -- 3.3 Correctness Approach -- 4 Model Encoding -- 4.1 Encoding in Coq -- 4.2 Correctness Statements -- 5 Component Hierarchies -- 5.1 Formal Model of Hierarchies -- 5.2 Encoding and Correctness in Coq -- 6 Tool Implementation -- 6.1 Optimizations -- 6.2 Encapsulation -- 7 Evaluation of the Model -- 7.1 Tool Integration -- 7.2 Projects -- 7.3 Experimental Setup -- 7.4 Results -- 8 Related Work -- 9 Conclusion -- Acknowledgments -- References -- What's Decidable About Program Verification Modulo Axioms? -- 1 Introduction -- 2 Illustrative Example -- 3 Preliminaries -- 3.1 Program Syntax -- 3.2 Executions and Semantics of Uninterpreted Programs -- 3.3 Feasibility of Executions Modulo Axioms -- 3.4 Program Verification Modulo Axioms -- 4 Coherence Modulo Axioms 4 Software Project and Contributors Partial-Order Reduction for Parity Games with an Application on Parameterised Boolean Equation Systems -- 1 Introduction -- 2 Preliminaries -- 3 Partial-Order Reduction -- 3.1 Weak Stubborn Sets -- 3.2 Correctness -- 3.3 Optimising D2w -- 4 Parameterised Boolean Equation Systems -- 5 PBES Solving Using POR -- 6 Experiments -- 7 Conclusion -- References -- Polynomial Identification of w-Automata! -- 1 Introduction -- 2 Preliminaries -- 3 Negative Results -- 4 Outline for the positive results -- 5 The characteristic sample for the automaton -- 6 Learning the automaton -- 7 Characteristic sample for a DPA -- 7.1 Constructing the canonical forest of a DPA -- 7.2 Constructing the characteristic sample for a DPA -- 8 The learning algorithm for a DPA -- 9 The sample T_Acc and the learning algorithm for a DMA -- 10 Discussion -- References -- Part 6 SV-COMP 2020 -- Advances in Automatic Software Verification: SV-COMP 2020 -- 1 Introduction -- 2 Organization, Definitions, Formats, and Rules -- 3 Reproducibility -- 4 Results and Discussion -- 5 Conclusion -- References -- 2LS: Heap Analysis and Memory Safety (Competition Contribution) -- 1 Overview -- 2 New Features -- 2.1 Combinations of Abstract Domains -- 2.2 Symbolic Paths -- 2.3 Re-using Freed Memory Object for Next Allocations -- 2.4 Generic Abstract Domain Templates -- 3 Strengths and Weaknesses -- 4 Tool Setup -- 5 Software Project -- References -- COASTAL: Combining Concolic and Fuzzing for Java (Competition Contribution) -- 1 Verification Approach and Software Architecture -- 1.1 Strategies -- 1.2 Observers and Models -- 2 Strengths and weaknesses -- 3 Tool setup -- 4 Software Project -- References -- Dartagnan: Bounded Model Checking for Weak Memory Models (Competition Contribution) -- 1 Overview and Software Architecture -- 2 Strengths and Weaknesses -- 3 Tool Setup and Configuration |
| Title | Tools and Algorithms for the Construction and Analysis of Systems |
| URI | https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=31734378 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6420077 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783030452377 |
| Volume | 12079 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF7SlgO98BbhpQFxiy3Z63RtI3FIQ1CDqigSUdRb5Me6jYjsKrZC_zlXZnbXjwQhwYGLFXsf4-x8yc7Ok7EPPBm6CY_JSzwO7WEaR3bk-aHNsSFOQxyjzAXLS382C66uwnmv97OOhdlt_DwP7u7C2__KanyGzKbQ2X9gdzMpPsDPyHS8ItvxeiARN7eG40Wx0RmXR5vrAg_9NzrZgpItqTBnnSpW9-lkIzFpy0k7wEV1c6AmbIMCtZffePRtwFH-M7tWSqVq5ojA2t2gUfB_LdZ51RmuLBM6GYAJUtARWjpwJqt-RFohPlmM5i2Jz6Qo0_FpFHhjFOG32_VmwM9sT_Wp-86b7djUH8C3mjZ64XMUAbT-lhyAWuPZ1niWtP79xChZfro0BpZZUSm_tUFdA6P-S6QCCItOKOhhu_qaJrO3KXTYVbNw8nm1dVTpnpqVfMhNqpfmFO4pczP3dGGEZlvhji6Tc5DPuzPA94_YkS9IZ7B0LxrVIEcRwXUFRSI1M-tcUe39KTuNyu-4D-IeWZW_CRJKOlo8YieSQmYes57Mn7CH9SKAWYSn904UNAEXA1poAkITEC_QhabuY6AJRQYGmh-BgAl7wIQWWRYoWAItqQUESohKIPbTHESkBiUoUHaGIpUcNCgV8RqUirgBpQUKkmZ6DUgLDBwtUGAEBUbL9OkA0dLvMZ0-Y8svk8X4wjb1R-yIiwAFCBGFTupnnpvxCM8Rw1QI6SVOjPIBXsMkiGUmnSiLwyh1pOc7IpNZKqRw49TLwjPvOTvOi1y-YMBRtBZcRpyyKwUpjg5S6QZxnMRCJDLts_cdfq52G-UrUa720NJn72o2r1S7ceBeTc7HeA7whp4f9Bn8sY8YkmXCf_k3tF6xB-3P4DU7RhzIN-x-sqvW5fatAuwvpRzdxQ |
| linkProvider | Open Access Publishing in European Networks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Tools+and+Algorithms+for+the+Construction+and+Analysis+of+Systems%3A+26th+International+Conference%2C+TACAS+2020%2C+Held+as+Part+of+the+European+Joint+Conferences+on+Theory+and+Practice+of+Software%2C+ETAPS+2020%2C+Dublin%2C+Ireland%2C+April+25-30%2C+2020%2C+Proceedings%2C+Part+II&rft.au=Biere%2C+Armin&rft.au=Parker%2C+David&rft.series=Lecture+Notes+in+Computer+Science%3B+Theoretical+Computer+Science+and+General+Issues&rft.date=2020-04-17&rft.pub=Springer+Nature&rft.isbn=9783030452360&rft.volume=12079&rft.externalDocID=9783030452377 |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830304%2F9783030452377.jpg |

