


default search action
10th SETTA 2024: Hong Kong, China
- Timothy Bourke
, Liqian Chen
, Amir Kafshdar Goharshady
:
Dependable Software Engineering. Theories, Tools, and Applications - 10th International Symposium, SETTA 2024, Hong Kong, China, November 26-28, 2024, Proceedings. Lecture Notes in Computer Science 15469, Springer 2025, ISBN 978-981-96-0601-6
Invited Talks
- Jean-François Raskin, Yun Chen Tsai:
Synthesis from LTL with Reward Optimization in Sampled Oblivious Environments. 3-21
Regular Papers
- Huiling Wu, Anran Cui, Yuxin Deng:
An Assertion-Based Logic for Local Reasoning about Probabilistic Programs. 25-45 - Jiyang Wu, Qinxiang Cao:
Extending Symbolic Heap to Support Shared Ownership. 46-63 - Yuchen Li
, Hongfei Fu
, Haowen Long
, Guoqiang Li
:
Constraint Based Invariant Generation with Modular Operations. 64-84 - Juxin Niu
, Yunlong Yu, Wei Zhang, Nan Guan:
Data-Dependent WAR Analysis for Efficient Task-Based Intermittent Computing. 85-101 - Minyu Chen
, Guoqiang Li
, Ling-I Wu
, Ruibang Liu
, Yuxin Su
, Xi Chang
, Jianxin Xue
:
Can Language Models Pretend Solvers? Logic Code Simulation with LLMs. 102-121 - Zipan Tang, Yixuan Yan, Rongchen Li, Hanze Dong, Haiming Chen, Hongyu Gao:
Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-expressions. 122-141 - Shidong Shen
, Yicheng Liu
, Lijun Zhang
, Fu Song
, Zhilin Wu
:
Formal Verification of RISC-V Processor Chisel Designs. 142-160 - Zhongyun Zhang
, Kundu Chen
, Weiqi Guo, Wenbo Zhang
:
The Principle of Staking: Formal Verification of Staking Smart Contract. 161-179 - Xu Lu, Cong Tian, Bin Gu, Bin Yu, Chen Chen, Zhenhua Duan:
A Contract-Based Framework for Formal Verification of Embedded Software. 180-196 - Jiayi Lu
, Shenghao Yuan
, David Sanán
, Yongwang Zhao
:
Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness. 197-216 - Yihao Yin, Hao Wu, Shuling Wang, Xiong Xu, Fanjiang Xu, Naijun Zhan:
The Design of Intelligent Temperature Control System of Smart House with MARS. 217-235 - Chao Wang, Peng Wu, Gustavo Petri, Qiaowen Jia, Youlin He, Yi Lv, Zhiming Liu:
Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects. 236-255 - Shangshang Xiao, Mengxia Sun, Wei Zhang, Naijun Zhan, Lei Ju:
Cache Behavior Analysis with SP-Relative Addressing for WCET Estimation. 256-274 - Xiantong Luo, Haochun Liang, Yue Tang, Xu Jiang, Nan Guan, Wang Yi:
Timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals. 275-292 - Shaojun Deng, Wanwei Liu, Miaomiao Zhang:
Runtime Verification of Neural-Symbolic Systems. 293-309 - Hanwei Zhang, Luo Cheng, Qisong He, Wei Huang, Renjue Li, Ronan Sicre, Xiaowei Huang, Holger Hermanns, Lijun Zhang:
Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds. 310-326 - Zeming Wei, Yihao Zhang, Meng Sun:
MILE: A Mutation Testing Framework of In-Context Learning Systems. 327-343 - Mengxi Wang, Chunmei Dong, Weihao Su, Chengyao Peng, Haiming Chen:
A Derivative-Based Membership Algorithm for Enhanced Regular Expressions. 344-362 - Quan Hong
, Jiaqi Li
, Wen Zhang, Lidong Zhai
:
NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive. 363-381 - Xuran Cai, Amir Kafshdar Goharshady:
Faster Lifetime-Optimal Speculative Partial Redundancy Elimination for Goto-Free Programs. 382-398 - Feng Liang, Jing Liu
:
EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning. 399-415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.