Regular Papers |
1
|
Nathan Wasser, Asma Heydari Tabar and Reiner Hähnle
Modeling Non-deterministic C Code with Active Objects
|
2
|
Wolfgang Ahrendt, Richard Bubel, Joshua Ellul, Gordon Pace, Raúl Pardo, Vincent Rebiscoul and Gerardo Schneider
Verification of Smart Contract Business Logic Properties: Exploiting a Java Source Code Verifier
|
3
|
Sanaz Hasanzadehfard and Hadi Tabatabaee Malazi
Two dimensional self-coordination mechanism of agents in minority games
|
4
|
M. Saqib Nawaz, Meng Sun and Philippe Fournier-Viger
Proof Guidance in PVS with Sequential Pattern Mining
|
5
|
Antonio Gonzalez-Burgueño and Peter Ölveczky
Formalizing and Analyzing Security Ceremonies with Heterogeneous Devices in ANP and PDL
|
6
|
Babak Bagheri, Mohammad Rezaalipour and Mojtaba Vahidi-Asl
An Approach to Generate Effective Fault Localization Methods for Programs
|
7
|
Leandro Gomes, Alexandre Madeira and Mario Benevides
Logics for Petri nets with propagating failures
|
8
|
Behnaz Changizi, Natallia Kokash and Farhad Arbab
Service Orchestration with Priority Constraints
|
9
|
M. Saqib Nawaz and Meng Sun
Using PVS for Modeling and Verification of Probabilistic Connectors
|
10
|
Thomas Neele, Marijn Rol and Jan Friso Groote
Verifying System-Wide Properties of Industrial Component-Based Software
|
11
|
Lisette Sanchez, Jan Friso Groote and Ramon Schiffelers
Active Learning of Industrial software with data
|
12
|
Samad Paydar and Aidin Azamnouri
An Empirical Study on Flakiness and Fragility of Randoop Regression Tests
|
13
|
Sharmin Moosavi, Hassan Haghighi, Mojtaba Vahidi Asl, Hasti Sahabi and Farzam Vatanzadeh
Greenify: A game with the purpose of test data generation
|
14
|
Narges Khakpour, Jetty Kleijn and Marjan Sirjani
Integrating Structural and Behavioral Adaptations
|
Short Papers |
1
|
Samira Akili and Kim Völlinger
Case Study on Certifying Distributed Algorithms: Reducing Intrusiveness
|
2
|
Jose Proenca and Alexandre Madeira
Taming Hierarchical Connectors
|
3
|
Marco Piangerelli, Luca Tesei, Emanuela Merelli
A Persistent Entropy Automaton for Dow Jones
|
Poster Papers |
1
|
Ali Bazghandi and Eslam Nazemi
Data Reduction in Self-Adaptive Internet of Things Systems
|
2
|
Ali Fallahi
An Improved Recommender system using Trust Propagation and Multi Layer Perceptron Neural Network
|
3
|
Ahmed Al-Brashdi, Michael Butler and Abdolbaghi Rezazadeh
Generating Database Code from UML-B and Event-B Models
|
4
|
Ali Dorosty, Fathiyeh Faghih and Ramtin Khosravi
Distributed Runtime Verification of LTL Properties using Global Clock
|
Student Poster Competition |
1
|
Farnaz Yousefi, Ehsan Khamespanah, Mohammed Gharib, Marjan Sirjani, Ali Movaghar
A Framework for Verification of Warning Message Dissemination in VANETs
|
2
|
Samad Paydar
Make Your Android Application Monkey-Friendly
|
3
|
Ali Shamakhi
String Encoding in JayHorn Java Model Checker
|
4
|
Mahsa Zarneshan
Formal Modeling and Analysis of Systems based on Communication Patterns
|
5
|
Mahboubeh Samadi, Fatemeh Ghassemi, Ramtin Khosravi
Runtime Verification of Message-driven Distributed System
|
6
|
MohammadReza Besharati, Mohammad Izadi
Semantics Based Compliance Solving
|
7
|
Shohreh Tabatabayi Seifi, Mohammad Izadi
From Discourse Representation Theory to Z specification Language
|
8
|
Maryam Bagheri
Reliable Adaptation of Track-based Traffic Control Systems at Runtime
|
9
|
Alireza Farhadi, Ebrahim Ardeshir-Larijani, Farhad Arbab, Mohammad Izadi
Hybrid Reo Connectors: Simulation and Implementation
|
10
|
Sorour Jahanbin
A Novel Approach for Generating Test Models
|
11
|
Vahid Panahi, Mehdi Kargahi, Fathieh Faghih
Control Performance Verification of Cyber-Physical Systems
|
12
|
Amirhoshang Hoseinpour Dehkordi, Ebrahim Ardeshir-Larijani, Majid Alizadeh, Ali Movaghar
An epistemic logical view of Deep Neural Networks
|
13
|
Mohammad javad Abdolsalehi
Applying Model-based Testing for Reo Connector programs
|
14
|
Mahboubeh Dadkhah
A Semantic Web Enabled Approach For System-level Test Generation
|