Dependable software engineering : theories, tools, and applications : 5th International Symposium, SETTA 2019, Shanghai, China, November 27-29, 2019, Proceedings / Nan Guan, Joost-Pieter Katoen, Jun Sun (eds.)

This book constitutes the proceedings of the 5th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2019, held in Shanghai, China, in November 2019. The 8 full papers presented were carefully reviewed and selected from 26 submissions. They present cu...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: SETTA (Symposium) Shanghai, China)
Other Authors: Guan, Nan (Editor), Katoen, Joost-Pieter (Editor), Sun, Jun (Editor)
Other title:SETTA 2019.
Format: Conference Proceeding eBook
Language:English
Published: Cham, Switzerland : Springer, 2019.
Series:Lecture notes in computer science ; 11951.
LNCS sublibrary. Programming and software engineering.
Subjects:

MARC

LEADER 00000cam a2200000xi 4500
001 b10858665
003 CoU
005 20191214054720.6
006 m o d
007 cr |||||||||||
008 191120s2019 sz a ob 101 0 eng d
020 |a 9783030355401  |q (electronic bk.) 
020 |a 3030355403  |q (electronic bk.) 
020 |z 9783030355395  |q (print) 
024 7 |a 10.1007/978-3-030-35540-1 
035 |a (OCoLC)spr1128093016 
035 |a (OCoLC)1128093016 
037 |a spr978-3-030-35540-1 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d EBLCP  |d DKU  |d UKMGB  |d OCLCF 
049 |a GWRE 
050 4 |a QA76.758 
111 2 |a SETTA (Symposium)  |n (5th :  |d 2019 :  |c Shanghai, China)  |0 http://id.loc.gov/authorities/names/nb2019023989. 
245 1 0 |a Dependable software engineering :  |b theories, tools, and applications : 5th International Symposium, SETTA 2019, Shanghai, China, November 27-29, 2019, Proceedings /  |c Nan Guan, Joost-Pieter Katoen, Jun Sun (eds.) 
246 3 |a SETTA 2019. 
264 1 |a Cham, Switzerland :  |b Springer,  |c 2019. 
300 |a 1 online resource (xiii, 139 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science ;  |v 11951. 
490 1 |a LNCS sublibrary. SL 2, Programming and software engineering. 
500 |a International conference proceedings. 
504 |a Includes bibliographical references and author index. 
505 0 |a Intro; Preface; Organization; Abstracts; The Rise of Model Counting: A Child of SAT Revolution; Building and Updating Safety-Critical Embedded Systems with Deterministic Timing and Functional Behaviours; Contents; A Bounded Model Checking Technique for Higher-Order Programs; 1 Introduction; 2 The Language: HORef; 3 A Bounded Translation for HORef; 4 A Points-To Analysis for Names; 5 Implementation and Experiments; References; Fault Trees from Data: Efficient Learning with an Evolutionary Algorithm; 1 Introduction; 2 Related Work; 3 Background. 
505 8 |a 4 Learning Fault Trees with Nature-Inspired Stochastic Optimization4.1 Initialization; 4.2 Mutation and Recombination; 4.3 Evaluation; 4.4 Selection; 4.5 Termination; 5 Learning of Partial Fault Trees; 5.1 Initialization; 5.2 Mutation and Recombination; 6 Experimental Evaluation; 6.1 Experimental Set Up; 6.2 Synthetic Dataset: Accuracy and Runtime; 6.3 Synthetic Dataset: Other Statistics; 6.4 Case Study with Industrial Dataset; 6.5 Fault Tree Benchmark; 7 Discussion; 8 Conclusion and Future Work; References; Simplifying the Analysis of Software Design Variants with a Colorful Alloy. 
505 8 |a 1 Introduction2 Overview; 3 Language; 4 Analysis; 5 Evaluation; 5.1 Evaluation Subjects; 5.2 Results; 6 Related Work; 7 Conclusion and Future Work; References; Response Time Analysis of Typed DAG Tasks for G-FP Scheduling; 1 Introduction; 2 Related Work; 3 Preliminaries; 4 Rationale; 4.1 Bounding Intra-interference; 5 Bounding Inter-interference; 5.1 Bounding Carry-In Interference; 5.2 Bounding Carry-Out Interference; 6 Schedulability Analysis; 7 Evaluation; 8 Conclusion; References; A Formal Modeling and Verification Framework for Flash Translation Layer Algorithms; 1 Introduction. 
505 8 |a 2 Informal Development2.1 Modeling FTL Algorithms; 2.2 Correctness Requirement of FTL Algorithms; 2.3 Our Proof Technique Based on Invariant; 3 Modeling FTL and Its Functional Correctness; 3.1 Disk Device; 3.2 Flash Device and FTL; 3.3 The Correctness Definition of FTL; 4 Verification Framework; 5 Case Study: Verifying an FTL Algorithm BAST; 5.1 Overview of BAST; 5.2 The Global Invariant for BAST; 5.3 Mechanized Proof and Experience; 6 Related Work and Conclusion; 7 Conclusion; References; Mixed Criticality Scheduling of Probabilistic Real-Time Systems; 1 Introduction. 
505 8 |a 1.1 Problem Discussion and Contribution2 Notations and Definitions; 2.1 Computational Model; 3 Probabilistic Scheduling Model; 3.1 Graph Model; 3.2 Scheduling Tree; 4 Evaluation; 5 Conclusion; References; Improving the Analysis of GPC in Real-Time Calculus; 1 Introduction; 2 RTC Basics; 2.1 Arrival and Service Curves; 2.2 Greedy Processing Component (GPC); 3 Revised Proof of Output Curves; 4 Improving Output Arrival Curves; 5 Experiments; 5.1 Parameter Setting I; 5.2 Parameter Setting II; 6 Conclusion; References; A Verified Specification of TLSF Memory Management Allocator Using State Monads. 
520 |a This book constitutes the proceedings of the 5th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2019, held in Shanghai, China, in November 2019. The 8 full papers presented were carefully reviewed and selected from 26 submissions. They present cutting-edge advancements in the field of formal methods and its interoperability with software engineering and focus on the application of formal techniques and tools for building reliable, safe, secure, and smart systems with multi-dimensional complexities. --  |c Provided by publisher. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed November 20, 2019) 
650 0 |a Software engineering  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008111658. 
650 7 |a Software engineering.  |2 fast  |0 (OCoLC)fst01124185. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Guan, Nan,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2019023990  |1 http://isni.org/isni/0000000080532605. 
700 1 |a Katoen, Joost-Pieter,  |e editor.  |0 http://id.loc.gov/authorities/names/nb99050268  |1 http://isni.org/isni/0000000116531672. 
700 1 |a Sun, Jun,  |e editor.  |0 http://id.loc.gov/authorities/names/n2005062412. 
830 0 |a Lecture notes in computer science ;  |v 11951.  |0 http://id.loc.gov/authorities/names/n42015162. 
830 0 |a LNCS sublibrary.  |n SL 2,  |p Programming and software engineering.  |0 http://id.loc.gov/authorities/names/no2007033954. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-35540-1  |z Full Text (via Springer) 
907 |a .b108586650  |b 03-19-20  |c 12-18-19 
998 |a web  |b 12-31-19  |c b  |d b   |e -  |f eng  |g sz   |h 0  |i 1 
907 |a .b108586650  |b 01-06-20  |c 12-18-19 
944 |a MARS - RDA ENRICHED 
907 |a .b108586650  |b 01-02-20  |c 12-18-19 
915 |a I 
956 |a Springer e-books 
956 |b Springer Computer Science eBooks 2019 English+International 
999 f f |i 33c19cdc-6a40-59c0-a1ca-81998db0fda5  |s bf0e693d-f965-58ae-974f-bfe6e91018d9 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.758  |h Library of Congress classification  |i Ebooks, Prospector  |n 1