Return to home page
Searching: Muskingum library catalog
We are currently experiencing delivery delays for items requested from other institutions while transitioning to a new statewide delivery service. Please contact your library with questions or advice about alternative resources. Thank you for your patience!
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Conference International Symposium of Formal Methods Europe (22nd : 2018 : Oxford, England)
Title Formal methods : 22nd International Symposium, FM 2018, held as part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 15-17, 2018, Proceedings / Klaus Havelund, Jan Peleska, Bill Roscoe, Erik de Vink (eds.).
Imprint Cham, Switzerland : Springer, 2018.

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
Conference International Symposium of Formal Methods Europe (22nd : 2018 : Oxford, England)
Series Lecture notes in computer science, 0302-9743 ; 10951.
Formal methods.
LNCS sublibrary. SL 2, Programming and software engineering.
Lecture notes in computer science ; 10951. 0302-9743.
Lecture notes in computer science. Formal methods.
LNCS sublibrary. SL 2, Programming and software engineering.
Subject Formal methods (Computer science) -- Congresses.
Alt Name Havelund, Klaus, 1955-
Peleska, Jan,
Roscoe, A. W.,
Vink, Erik de,
Federated Logic Conference (2018 : Oxford, England), jointly held conference.
Add Title FM 2018
Description 1 online resource (xiv, 692 pages) : illustrations.
Note International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed July 20, 2018).
Summary This book constitutes the refereed proceedings of the 22nd International Symposium on Formal Methods, FM 2018, held in Oxford, UK, in July 2018. The 44 full papers presented together with 2 invited papers were carefully reviewed and selected from 110 submissions. They present formal methods for developing and evaluating systems. Examples include autonomous systems, robots, and cyber-physical systems in general. The papers cover a broad range of topics in the following areas: interdisciplinary formal methods; formal methods in practice; tools for formal methods; role of formal methods in software systems engineering; and theoretical foundations.
Contents Intro -- Preface -- Organization -- Contents -- Invited Papers -- Processing Text for Privacy: An Information Flow Perspective -- 1 Introduction -- 2 Text Document Processing -- 2.1 Representing Documents for Topic Classification and Author Identification -- 2.2 Privacy Versus Utility -- 3 Channels, Secrets and Information Flow -- 3.1 Vulnerability Induced by Gain-Functions -- 3.2 Privacy Mechanisms as Channels -- 3.3 Attacks on Simple Confusability -- 3.4 Universal Confusability -- 3.5 Differential Privacy -- 3.6 Privacy Versus Utility -- 4 Generalised Differential Privacy and Obfuscation
4.1 Experiments -- 5 Conclusions and Future Work -- References -- 20Years of Real Real Time Model Validation -- 1 Introduction -- 2 The Uppaal Tool Suite -- 3 Verification -- 4 Testing -- 5 Planning, Scheduling and Synthesis -- 6 Lessons Learned -- References -- FM 2018 Main Conference -- Deadlock Detection for Actor-Based Coroutines -- 1 Introduction -- 2 The Programming Language -- 3 The Concrete System -- 4 The Abstract System -- 5 Correctness of Predicate Abstraction -- 6 Decidability of Deadlock Detection -- 7 Conclusion -- References
An Algebraic Approach for Reasoning About Information Flow -- 1 Introduction -- 2 Preliminaries -- 3 Operators on Channel Composition -- 3.1 The Parallel Composition Operator -- 3.2 The Visible Choice Operator p -- 3.3 The Hidden Choice Operator p -- 3.4 A Compositional Description of the Dining Cryptographers -- 4 Algebraic Properties of Channel Operators -- 4.1 Properties Regarding Channel Operators -- 4.2 Properties Regarding Cascading -- 5 Information Leakage of Channel Operators -- 5.1 The Problem of Compositional Vulnerability -- 5.2 The Problem of Relative Monotonicity
6 Case Study: The Crowds Protocol -- 7 Related Work -- 8 Conclusions and Future Work -- References -- Towards ̀Verifying' a Water Treatment System -- 1 Introduction -- 2 Background -- 3 Our Approach -- 3.1 The Model -- 3.2 Learning Algorithm -- 3.3 Verification -- 3.4 Abstraction Refinement -- 3.5 Overall Algorithm -- 4 Case Study Results -- 5 Conclusion and Related Work -- References -- FSM Inference from Long Traces -- 1 Introduction -- 2 Definitions -- 3 Passive Inference -- 3.1 Problem Statement -- 3.2 Encoding as a SAT Problem -- 3.3 Auxiliary Variables -- 3.4 Symmetry Breaking
4 Incremental Inference -- 4.1 Prefix-Based Method -- 4.2 Suffix-Based Method -- 4.3 Discussion -- 5 Industrial Case Study -- 6 Conclusion -- References -- A Weakness Measure for GR(1) Formulae -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Problem Statement -- 5 Weakness Measure of GR(1) Formulae -- 5.1 Dimension of Invariants -- 5.2 Fairness and Fairness Complements -- 5.3 Dimension Pairs for GR(1) Formulae -- 5.4 Initial Conditions -- 6 Evaluation -- 7 Conclusion -- References -- Producing Explanations for Rich Logics -- 1 Introduction -- 2 The Propositional µ-Calculus
ISBN 9783319955827 (electronic bk.)
3319955829 (electronic bk.)
9783319955810 (print)
3319955810
ISBN/ISSN 10.1007/978-3-319-95582-7
OCLC # 1045068470
Additional Format Printed edition: 9783319955810.



If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team