Formal Techniques for Distributed Objects, Components, and Systems Alexey Gotsman, Ana Sokolova |
Front Matter |
Full Papers
|
Strategy Synthesis for Autonomous Driving in a Moving Block Railway System with Uppaal Stratego Davide Basile, Maurice Beek, Axel Legay |
3-21 |
Towards Bridging Time and Causal Reversibility Marco Bernardo, Claudio Mezzina |
22-38 |
Defining and Verifying Durable Opacity: Correctness for Persistent Software Transactional Memory Eleni Bila, Simon Doherty, Brijesh Dongol, John Derrick, Gerhard Schellhorn, Heike Wehrheim |
39-58 |
Conformance-Based Doping Detection for Cyber-Physical Systems Rayna Dimitrova, Maciej Gazda, Mohammad Mousavi, Sebastian Biewer, Holger Hermanns |
59-77 |
On Implementable Timed Automata Sergio Feo-Arenis, Milan Vujinović, Bernd Westphal |
78-95 |
Deep Statistical Model Checking Timo Gros, Holger Hermanns, Joerg Hoffmann, Michaela Klauck, Marcel Steinmetz |
96-114 |
Trace Equivalence and Epistemic Logic to Express Security Properties Kiraku Minami |
115-132 |
Derivation of Heard-of Predicates from Elementary Behavioral Patterns Adam Shimi, Aurélie Hurault, Philippe Queinnec |
133-149 |
Probabilistic Timed Automata with One Clock and Initialised Clock-Dependent Probabilities Jeremy Sproston |
150-168 |
A Formal Framework for Consent Management Shukun Tokas, Olaf Owe |
169-186 |
Tutorials
|
Tutorial: Parameterized Verification with Byzantine Model Checker Igor Konnov, Marijana Lazić, Ilina Stoilkovska, Josef Widder |
189-207 |
Typechecking Java Protocols with [St]Mungo A. Voinea, Ornela Dardha, Simon Gay |
208-224 |
Short Paper
|
Towards a Hybrid Verification Methodology for Communication Protocols (Short Paper) Christian Bartolo Burlò, Adrian Francalanza, Alceste Scalas |
227-235 |