Digest 发表于 2025-3-25 05:33:30
http://reply.papertrans.cn/67/6601/660026/660026_21.png转换 发表于 2025-3-25 08:57:41
http://reply.papertrans.cn/67/6601/660026/660026_22.png生存环境 发表于 2025-3-25 12:56:38
http://reply.papertrans.cn/67/6601/660026/660026_23.pngGULF 发表于 2025-3-25 19:31:22
http://reply.papertrans.cn/67/6601/660026/660026_24.png符合国情 发表于 2025-3-25 20:11:54
Verification of Scapegoat Trees Using Dafnyementation. Through Dafny’s powerful specification and verification techniques, we prove the correctness of its core operations within our chosen implementation. We also summarized our user experience with Dafny, presenting several techniques that can enhance the efficiency of the proof process.Thymus 发表于 2025-3-26 01:29:46
Real Arithmetic in , d implement them in the . Proof Manager. The latter generates assertions in . and directs them to a selected backend (currently the . SMT solver, which supports the theory of nonlinear real arithmetic). We motivate this functionality with problems arising in safety verification.AXIS 发表于 2025-3-26 05:52:17
http://reply.papertrans.cn/67/6601/660026/660026_27.png尊严 发表于 2025-3-26 11:28:49
Symmetry-Based Abstraction Algorithm for Accelerating Symbolic Control Synthesiss layer of abstraction to guide the order by which actions are explored during synthesis over the grid-based abstraction. We demonstrate the potential of our algorithm by synthesizing a reach-avoid controller for a 3-dimensional ship model with translation and rotation symmetries in the special Euclidean group SE(2) (Code is available at: .).最小 发表于 2025-3-26 14:10:15
Towards Formal Verification of Neural Networks in Cyber-Physical Systemsification System theorem prover to model neural networks based on non-linear activation functions and prove the safety bounds of the output under safety-critical conditions. Finally, we show the application of the proposed approach to a model-predictive controller for autonomous driving.疾驰 发表于 2025-3-26 18:39:24
Quantitative Input Usage Static Analysis underlying abstract backward analyzer and computes a sound over-approximation of the impact of program inputs, providing valuable insights into how the analyzed program handles them. We implement a proof-of-concept static analyzer to demonstrate potential applications.