令人作呕 发表于 2025-3-26 23:45:24

http://reply.papertrans.cn/27/2658/265732/265732_31.png

CORE 发表于 2025-3-27 01:42:02

Synthesizing Controllers for Multi-lane Traffic Maneuversat the control of safe (collision free) lane change maneuvers in multi-lane traffic on highways can be described by finite state machines extended with continuous variables coming from the environment. We use standard theory for controller synthesis to derive the dynamic behavior of a lane-change co

Aqueous-Humor 发表于 2025-3-27 08:12:06

Extending Hybrid CSP with Probability and Stochasticity of fundamental properties of nature, uncertain environments, or simplifications to overcome complexity. Tightly intertwining discrete, continuous and stochastic dynamics complicates modelling, analysis and verification of stochastic hybrid systems (SHSs). In the literature, this issue has been exte

Cleave 发表于 2025-3-27 11:21:04

Towards Verified Faithful Simulationrget architecture can be proven to provide the same results as the real hardware, and the proof is verified with a theorem prover. The method consists in proving each instruction of the instruction set independently, by proving that the execution of the C code simulating an instruction yields an ide

Cursory 发表于 2025-3-27 14:02:58

http://reply.papertrans.cn/27/2658/265732/265732_35.png

MAPLE 发表于 2025-3-27 19:35:57

Inferring Software Behavioral Models with MapReduceplying machine learning to execution logs. However, the logs generated by a real software system may be very large and the inference algorithm can exceed the capacity of a single computer..This paper focuses on inference of . and explores to use of MapReduce to deal with large logs. The approach con

含沙射影 发表于 2025-3-28 00:18:30

http://reply.papertrans.cn/27/2658/265732/265732_37.png

Abbreviate 发表于 2025-3-28 04:15:20

A High-Level Model for an Assembly Language Attacker by Means of Reflectionecurity of these compilation and interoperation mechanisms often makes use of high-level attacker models to simplify formalisations. In practice, however, the validity of such high-level attacker models is frequently called into question. In this paper we formally prove that a light-weight ML equipp

FISC 发表于 2025-3-28 09:30:26

http://reply.papertrans.cn/27/2658/265732/265732_39.png

温和女孩 发表于 2025-3-28 11:56:13

From Requirements Engineering to Safety Assurance: Refinement Approachent about system safety. In particular, this argument can facilitate construction of a safety case – a structured safety assurance document required for certification of safety-critical systems. However, currently there is no adequate support for using the artefacts created during formal modelling i
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Dependable Software Engineering: Theories, Tools, and Applications; First International Xuandong Li,Zhiming Liu,Wang Yi Conference proceed