Browse Subject Headings
Leveraging Applications of Formal Methods, Verification and Validation : REoCAS Colloquium in Honor of Rocco De Nicola: 12th International Symposium, ISoLA 2024 Crete, Greece, October 27-31, 2024, Proceedings
Leveraging Applications of Formal Methods, Verification and Validation : REoCAS Colloquium in Honor of Rocco De Nicola: 12th International Symposium, ISoLA 2024 Crete, Greece, October 27-31, 2024, Proceedings
Click to enlarge
ISBN No.: 9783031737084
Pages: xv, 428
Year: 202410
Format: Trade Paper
Price: $ 110.39
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Introduction to the REoCAS Colloquium in Honor of Rocco De Nicola's 70th Birthday.- Systems Security Modeling and Analysis at IMT Lucca.- Klaim in the making.- Formal approaches for modeling and analysis of business process collaborations.- An abstract account of up-to techniques for inductive behavioural relations.- Language equivalence from Nondeterministic to Weighted Automata --- and back.- A Process Algebraic View of In/Out Prisoners.- Towards a Formal Testing Theory for Quantum Processes.


- Testing Quantum Processes.- The ProbInG Project: Advancing Automatic Analysis of Probabilistic Loops.- Towards a probabilistic programming approach to analyse collective adaptive systems.- Can AI Help with the Formalization of Railway Cybersecurity Requirements?.- White-box validation of collective adaptive systems by statistical model checking and process mining.- Analysing collective adaptive systems by proving theorems.- Engineering Ethical-aware Collective Adaptive Systems.- Emerging Synchrony in Applauding Audiences: Formal Analysis and Specification.


- Flocks of Birds: A Quantitative Evaluation.- Strategies in spatio-temporal logics for multi-agent systems.- Function-as-a-Service Allocation Policies Made Formal.- Asynchronous Multiparty Sessions with Internal Delegation.- Code-centric Code Generation.- Attack Tree Generation via Process Mining.- Local Spaces in Soft Concurrent Constraint Programming Oriented to Security.- Riding the data storms: specifying and analysing IoT security requirements with SURFING.


- Preventing Out-of-Gas Exceptions by Typing.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings