Description |
1 online resource (xiv, 692 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 10951 |
|
Formal methods |
|
LNCS sublibrary. SL 2, Programming and software engineering |
|
Lecture notes in computer science ; 10951. 0302-9743
|
|
Lecture notes in computer science. Formal methods
|
|
LNCS sublibrary. SL 2, Programming and software engineering.
|
Contents |
Intro -- Preface -- Organization -- Contents -- Invited Papers -- Processing Text for Privacy: An Information Flow Perspective -- 1 Introduction -- 2 Text Document Processing -- 2.1 Representing Documents for Topic Classification and Author Identification -- 2.2 Privacy Versus Utility -- 3 Channels, Secrets and Information Flow -- 3.1 Vulnerability Induced by Gain-Functions -- 3.2 Privacy Mechanisms as Channels -- 3.3 Attacks on Simple Confusability -- 3.4 Universal Confusability -- 3.5 Differential Privacy -- 3.6 Privacy Versus Utility -- 4 Generalised Differential Privacy and Obfuscation |
|
4.1 Experiments -- 5 Conclusions and Future Work -- References -- 20Years of Real Real Time Model Validation -- 1 Introduction -- 2 The Uppaal Tool Suite -- 3 Verification -- 4 Testing -- 5 Planning, Scheduling and Synthesis -- 6 Lessons Learned -- References -- FM 2018 Main Conference -- Deadlock Detection for Actor-Based Coroutines -- 1 Introduction -- 2 The Programming Language -- 3 The Concrete System -- 4 The Abstract System -- 5 Correctness of Predicate Abstraction -- 6 Decidability of Deadlock Detection -- 7 Conclusion -- References |
|
An Algebraic Approach for Reasoning About Information Flow -- 1 Introduction -- 2 Preliminaries -- 3 Operators on Channel Composition -- 3.1 The Parallel Composition Operator -- 3.2 The Visible Choice Operator p -- 3.3 The Hidden Choice Operator p -- 3.4 A Compositional Description of the Dining Cryptographers -- 4 Algebraic Properties of Channel Operators -- 4.1 Properties Regarding Channel Operators -- 4.2 Properties Regarding Cascading -- 5 Information Leakage of Channel Operators -- 5.1 The Problem of Compositional Vulnerability -- 5.2 The Problem of Relative Monotonicity |
|
6 Case Study: The Crowds Protocol -- 7 Related Work -- 8 Conclusions and Future Work -- References -- Towards ̀Verifying' a Water Treatment System -- 1 Introduction -- 2 Background -- 3 Our Approach -- 3.1 The Model -- 3.2 Learning Algorithm -- 3.3 Verification -- 3.4 Abstraction Refinement -- 3.5 Overall Algorithm -- 4 Case Study Results -- 5 Conclusion and Related Work -- References -- FSM Inference from Long Traces -- 1 Introduction -- 2 Definitions -- 3 Passive Inference -- 3.1 Problem Statement -- 3.2 Encoding as a SAT Problem -- 3.3 Auxiliary Variables -- 3.4 Symmetry Breaking |
|
4 Incremental Inference -- 4.1 Prefix-Based Method -- 4.2 Suffix-Based Method -- 4.3 Discussion -- 5 Industrial Case Study -- 6 Conclusion -- References -- A Weakness Measure for GR(1) Formulae -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Problem Statement -- 5 Weakness Measure of GR(1) Formulae -- 5.1 Dimension of Invariants -- 5.2 Fairness and Fairness Complements -- 5.3 Dimension Pairs for GR(1) Formulae -- 5.4 Initial Conditions -- 6 Evaluation -- 7 Conclusion -- References -- Producing Explanations for Rich Logics -- 1 Introduction -- 2 The Propositional µ-Calculus |
Summary |
This book constitutes the refereed proceedings of the 22nd International Symposium on Formal Methods, FM 2018, held in Oxford, UK, in July 2018. The 44 full papers presented together with 2 invited papers were carefully reviewed and selected from 110 submissions. They present formal methods for developing and evaluating systems. Examples include autonomous systems, robots, and cyber-physical systems in general. The papers cover a broad range of topics in the following areas: interdisciplinary formal methods; formal methods in practice; tools for formal methods; role of formal methods in software systems engineering; and theoretical foundations |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed July 20, 2018) |
Subject |
Formal methods (Computer science) -- Congresses
|
|
Programming & scripting languages: general.
|
|
Computer science.
|
|
Artificial intelligence.
|
|
Computer modelling & simulation.
|
|
Systems analysis & design.
|
|
Software Engineering.
|
|
Computers -- Programming Languages -- General.
|
|
Computers -- Computer Science.
|
|
Computers -- Intelligence (AI) & Semantics.
|
|
Computers -- Computer Simulation.
|
|
Computers -- Hardware -- Handheld Devices.
|
|
Computers -- Software Development & Engineering -- General.
|
|
Formal methods (Computer science)
|
Genre/Form |
Electronic books
|
|
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Havelund, Klaus, 1955- editor.
|
|
Peleska, Jan, editor
|
|
Roscoe, A. W., editor.
|
|
Vink, Erik de, editor.
|
|
Federated Logic Conference (2018 : Oxford, England), jointly held conference.
|
ISBN |
9783319955827 |
|
3319955829 |
|