default search action
17th MEMOCODE 2019: La Jolla, CA, USA
- Partha S. Roop, Naijun Zhan, Sicun Gao, Pierluigi Nuzzo:
Proceedings of the 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2019, La Jolla, CA, USA, October 9-11, 2019. ACM 2019, ISBN 978-1-4503-6997-8 - Jin Woo Ro, Avinash Malik, Partha S. Roop:
A compositional semantics of Simulink/Stateflow based on quantized state hybrid automata. 1:1-1:11 - David J. Greaves:
Further sub-cycle and multi-cycle schedulling support for Bluespec Verilog. 2:1-2:11 - Hammond A. Pearce, Matthew M. Y. Kuo, Partha S. Roop, Srinivas Pinisetty:
Securing implantable medical devices with runtime enforcement hardware. 3:1-3:9 - Maryam Dabaghchian, Zvonimir Rakamaric:
A timeless model for the verification of quasi-periodic distributed systems. 4:1-4:11 - Vighnesh Iyer, Donggyu Kim, Borivoje Nikolic, Sanjit A. Seshia:
RTL bug localization through LTL specification mining (WIP). 5:1-5:5 - Mohammad Hekmatnejad, Shakiba Yaghoubi, Adel Dokhanchi, Heni Ben Amor, Aviral Shrivastava, Lina J. Karam, Georgios Fainekos:
Encoding and monitoring responsibility sensitive safety rules for automated vehicles in signal temporal logic. 6:1-6:11 - Nathan Allen, Yash Raje, Jin Woo Ro, Partha S. Roop:
A compositional approach for real-time machine learning. 7:1-7:5 - Michael Witterauf, Frank Hannig, Jürgen Teich:
Polyhedral fragments: an efficient representation for symbolically generating code for processor arrays. 8:1-8:10 - Yinghua Hu, Vivek V. Menon, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Pierluigi Nuzzo:
Security-driven metrics and models for efficient evaluation of logic encryption schemes. 9:1-9:5 - Cody Kinneer, Ryan Wagner, Fei Fang, Claire Le Goues, David Garlan:
Modeling observability in adaptive systems to defend against advanced persistent threats. 10:1-10:11 - Bernard Nongpoh, Rajarshi Ray, Ansuman Banerjee:
Approximate computing for multithreaded programs in shared memory architectures. 11:1-11:9 - Ratan Lal, Pavithra Prabhakar:
Compositional construction of bounded error over-approximations of acyclic interconnected continuous dynamical systems. 12:1-12:5 - Peter W. V. Tran-Jørgensen, Tomas Kulik, Jalil Boudjadar, Peter Gorm Larsen:
Security analysis of cloud-connected industrial control systems using combinatorial testing. 13:1-13:11 - Luan Viet Nguyen, Gautam Mohan, James Weimer, Oleg Sokolsky, Insup Lee, Rajeev Alur:
Detecting security leaks in hybrid systems with information flow analysis. 14:1-14:11 - Paritosh K. Pandya, Amol Wakankar:
Logical specification and uniform synthesis of robust controllers. 15:1-15:11 - Karine Even-Mendoza, Antti E. J. Hyvärinen, Hana Chockler, Natasha Sharygina:
Lattice-based SMT for program verification. 16:1-16:11 - Freek Verbeek, Joshua A. Bockenek, Abhijith Bharadwaj, Binoy Ravindran, Ian Roessle:
Establishing a refinement relation between binaries and abstract code. 17:1-17:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.