Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    b3kat_BV049817971
    Umfang: 1 Online-Ressource
    ISBN: 9783031656309
    Serie: Lecture notes in computer science 14682
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-65629-3
    Sprache: Englisch
    Schlagwort(e): Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949863653502882
    Umfang: 1 online resource (447 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031656309
    Serie: Lecture Notes in Computer Science Series ; v.14682
    Anmerkung: Intro -- Preface -- Organization -- Invited Talks -- How to Solve Math Problems Without Talent -- Bridging Formal Mathematics and Software Verification -- The Art of SMT Solving -- Contents - Part II -- Concurrency -- The VerCors Verifier: A Progress Report -- 1 Introduction -- 2 New and Improved Language Support -- 2.1 Improved Existing Language Support -- 2.2 Newly Supported Frameworks -- 2.3 Programming Languages Encoded into VerCors -- 3 VerCors Implementation Changes -- 4 Deriving Verified, Optimised Programs -- 5 Case Studies -- 5.1 Tunnel Control Software Components -- 5.2 Verification of Red-Black Trees and their Parallel Merge -- 5.3 GPU Case Studies -- 5.4 Student Projects -- 6 Conclusions, Related Work and Future Work -- References -- Parsimonious Optimal Dynamic Partial Order Reduction -- 1 Introduction -- 2 Main Concepts -- 3 Programs, Executions, and Equivalence -- 4 Design of the POP Algorithm -- 4.1 Parsimonious Race Reversals -- 4.2 The Parsimonious-OPtimal DPOR (POP) Algorithm -- 4.3 Parsimonious Sleep Set Characterization -- 5 Correctness and Space Complexity -- 6 Implementation and Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Collective Contracts for Message-Passing Parallel Programs -- 1 Introduction -- 2 A Theory of Collective Contracts -- 2.1 Language -- 2.2 Semantics -- 2.3 Collective Correctness -- 2.4 Simulation -- 3 Collective Contracts for C/MPI -- 3.1 Background from MPI -- 3.2 Contract Structure -- 4 Evaluation -- 4.1 Collective Contract Examples -- 4.2 Bounded Verification of Collective Contracts -- 5 Related Work -- 6 Discussion -- References -- Distributed Systems -- mypyvy: A Research Platform for Verification of Transition Systems in First-Order Logic -- 1 Introduction -- 2 Modeling Language -- 2.1 Benchmarks -- 3 Satisfiability-Based Queries -- 3.1 Queries -- 3.2 Counterexamples. , 3.3 Decidability and Finite Counterexamples via EPR -- 4 Invariant Inference -- 5 Designing mypyvy's Internals -- 6 Works Using mypyvy -- 7 Related Work -- References -- Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas -- 1 Introduction -- 2 Background -- 3 Subsumption-Based Representation of Sets of Formulas -- 3.1 Bounded First-Order Languages -- 3.2 Syntactic Subsumption -- 3.3 Canonicalization -- 3.4 Representing Sets of Formulas -- 4 The Weaken Operator -- 4.1 Weakening a Single Canonical Formula -- 4.2 Weakening Sets of Formulas -- 4.3 Design Consideration and Tradeoffs -- 5 Data Structure for Sets of Formulas -- 6 Implementation and Evaluation -- 6.1 Implementation -- 6.2 Experiments -- 6.3 Results -- 7 Related Work -- 8 Conclusion -- References -- Verifying Cake-Cutting, Faster -- 1 Introduction -- 2 Cake-Cutting Preliminaries -- 3 Language and Type System -- 3.1 Syntax of Base Slice -- 3.2 A Linear Type System for Slice -- 3.3 Semantics -- 3.4 Disjointness -- 4 Constraints -- 5 Piecewise Uniform Reduction -- 5.1 Replicating Protocol Executions -- 5.2 Piecewise Uniform Valuations -- 5.3 Piecewise Uniform Replacement -- 6 Implementation and Evaluation -- 7 Related and Future Work -- References -- Runtime Verification and Monitoring -- General Anticipatory Runtime Verification -- 1 Introduction -- 2 Lola Monitoring Revisited -- 2.1 Recurrent Monitoring -- 2.2 Lola -- 3 Lola Recurrent Online Monitoring Semantics -- 4 An Abstraction Framework for Lola Monitoring -- 5 Abstraction-Based Recurrent Lola Monitoring -- 6 Symbolic Recurrent Lola Monitoring -- 7 Empirical Evaluation -- 8 Conclusion -- References -- Proactive Real-Time First-Order Enforcement -- 1 Introduction -- 2 Preliminaries -- 3 Proactive, Real-Time, First-Order Enforcement -- 3.1 System Model -- 3.2 Enforcers -- 4 Enforceable MFOTL Formulae. , 5 Enforcing EMFOTL -- 5.1 Obligations -- 5.2 Checking Satisfaction of MFOTL Formulae Under Assumptions -- 5.3 The Enforcement Algorithm -- 5.4 Correctness -- 6 Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Predictive Monitoring with Strong Trace Prefixes -- 1 Introduction -- 2 Predictive Monitoring and Trace Theory -- 3 Strong Trace Prefixes -- 3.1 Modelling Correct Reorderings with Strong Trace Prefixes -- 4 Complexity of Predictive Monitoring -- 4.1 Non-deterministic Predictive Monitoring -- 4.2 Deterministic Predictive Monitoring -- 4.3 Ensuring Well-Formedness and Soundness -- 5 Strong Reads-From Prefixes -- 6 Strong Prefixes Versus Synchronization Preservation -- 7 Experimental Evaluation -- 7.1 Enhanced Predictive Power of Strong Prefixes -- 7.2 Strong Reads-From Prefixes v/s Sync-Preservation -- 8 Related Work and Conclusions -- References -- Case Studies and Tools -- Monitoring Unmanned Aircraft: Specification, Integration, and Lessons-Learned -- 1 Introduction -- 1.1 Related Work -- 2 Stream-Based Monitoring -- 3 Setup -- 3.1 Monitoring Applications -- 3.2 Development Cycle for the Monitor -- 4 Abstract Integration -- 4.1 Common Interfaces -- 5 Concrete Integration of Representative Specifications -- 6 Conclusion -- References -- Testing the Migration from Analog to Software-Based Railway Interlocking Systems -- 1 Introduction -- 2 Operational Setting -- 3 Bridging the Gap Between ReRIS and SwRIS -- 3.1 Simulations Extractor -- 3.2 Working with a Partial ReRIS Model -- 3.3 Mapping a ReRIS Simulation into an Abstract SwRIS Test -- 3.4 Test Execution -- 4 Related Works -- 5 Experimental Evaluation -- 6 Conclusions -- References -- soid: A Tool for Legal Accountability for Automated Decision Making -- 1 Introduction -- 1.1 Related Work -- 2 soid Tool Architecture and Usage -- 2.1 Example #1: Decision Tree Inference. , 3 soid-gui Architecture and Usage -- 3.1 Example #2: Three Cars on the Stand -- 4 Conclusion -- References -- Machine Learning and Neural Networks -- Marabou 2.0: A Versatile Formal Analyzer of Neural Networks -- 1 Introduction -- 2 Architecture and Core Components -- 2.1 Engine -- 2.2 Context-Dependent Data-Structures -- 2.3 Proof Module -- 2.4 Front End -- 2.5 Availability, License, and Installation -- 3 Highlighted Features and Applications -- 4 Runtime Evaluation -- 5 Conclusion and Next Steps -- References -- Monitizer: Automating Design and Evaluation of Neural Network Monitors -- 1 Introduction -- 2 Related Work -- 3 Monitizer -- 3.1 Overview -- 3.2 Use Cases -- 3.3 Phases of Monitizer -- 3.4 Classification of Out-of-Distribution Data -- 3.5 Library of Monitors, NNs, and Datasets -- 4 Summary of Evaluation by Case Study -- 5 Conclusion -- References -- Guiding Enumerative Program Synthesis with Large Language Models -- 1 Introduction -- 2 Background -- 3 Overview -- 4 Stand-Alone LLM -- 4.1 Prompting the LLM -- 5 Synthesis with pCFG Guidance: pCFG-synth -- 5.1 Inferring a Weighted CFG -- 5.2 Probabilistic Guided Search -- 5.3 Weighted A* Search -- 6 Enumerative Synthesis with an Integrated LLM (iLLM-synth) -- 6.1 Integrated Prompting -- 6.2 Updating the Weighted Grammar -- 6.3 Integrating Syntactic Feedback into Enumerative Search -- 7 Evaluation -- 8 Threats to Validity -- 9 Related Work -- 10 Conclusions -- References -- Enchanting Program Specification Synthesis by Large Language Models Using Static Analysis and Program Verification -- 1 Introduction -- 2 Background and Motivation -- 3 Methodology -- 3.1 Code Decomposition -- 3.2 Hierarchical Specification Generation -- 3.3 Specification Validation -- 4 Evaluation -- 4.1 Evaluation Setup -- 4.2 RQ1. Effectiveness on General Specification -- 4.3 RQ2. Effectiveness on Loop Invariants. , 4.4 RQ3. Efficiency of AutoSpec -- 4.5 RQ4. Ablation Study -- 4.6 Case Studies -- 5 Threats to Validity -- 6 Related Work -- 7 Conclusion -- References -- Verifying Global Two-Safety Properties in Neural Networks with Confidence -- 1 Introduction -- 2 Background -- 2.1 Feed-Forward Neural Networks -- 2.2 Hyperproperties -- 2.3 Relational Verification and Self-composition -- 2.4 Robustness and Fairness -- 3 Confidence Based Global Verification of Feed-Forward Neural Networks -- 3.1 Encoding 2-Safety Properties as Product Neural Network -- 3.2 Softmax Approximation -- 4 Implementation -- 5 Experimental Evaluation -- 5.1 Discussion -- 6 Conclusion -- References -- Certified Robust Accuracy of Neural Networks Are Bounded Due to Bayes Errors -- 1 Introduction -- 2 Preliminary and Problem Definition -- 2.1 Robustness in Classification -- 2.2 Bayes Rules for Distributions -- 3 An Upper Bound of Robustness from Bayes Error -- 3.1 Certified Training Increases Bayes Error -- 3.2 Irreducible Robustness Error and Robustness Upper Bound -- 4 Experiment and Results -- 5 Related Works -- 6 Conclusion -- References -- Boosting Few-Pixel Robustness Verification via Covering Verification Designs -- 1 Introduction -- 2 Background -- 3 Our Approach: Covering Verification Designs -- 4 CoVerD -- 4.1 Our System -- 4.2 Choosing a Covering Verification Design -- 4.3 Constructing a Covering Verification Design -- 4.4 A Running Example -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems -- 1 Introduction -- 2 Preliminaries -- 2.1 DNN-Controlled Systems -- 2.2 Barrier Certificate and Its Neural Implementation -- 3 Verification Problem and Our Framework -- 3.1 Problem Statement -- 3.2 Overview of Our Framework -- 4 Qualitative and Quantitative Safety Verification. , 4.1 Qualitative Safety Verification.
    Weitere Ausg.: Print version: Gurfinkel, Arie Computer Aided Verification Cham : Springer International Publishing AG,c2024 ISBN 9783031656293
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9949858749002882
    Umfang: 1 online resource (447 pages)
    Ausgabe: 1st ed. 2024.
    ISBN: 3-031-65630-X
    Serie: Lecture Notes in Computer Science, 14682
    Inhalt: This open access book constitutes the proceedings of the 36th International Conference on Computer-Aided Verification, CAV 2024, which took place in Montreal, Canada, during July 24–27, 2024.
    Anmerkung: Intro -- Preface -- Organization -- Invited Talks -- How to Solve Math Problems Without Talent -- Bridging Formal Mathematics and Software Verification -- The Art of SMT Solving -- Contents - Part II -- Concurrency -- The VerCors Verifier: A Progress Report -- 1 Introduction -- 2 New and Improved Language Support -- 2.1 Improved Existing Language Support -- 2.2 Newly Supported Frameworks -- 2.3 Programming Languages Encoded into VerCors -- 3 VerCors Implementation Changes -- 4 Deriving Verified, Optimised Programs -- 5 Case Studies -- 5.1 Tunnel Control Software Components -- 5.2 Verification of Red-Black Trees and their Parallel Merge -- 5.3 GPU Case Studies -- 5.4 Student Projects -- 6 Conclusions, Related Work and Future Work -- References -- Parsimonious Optimal Dynamic Partial Order Reduction -- 1 Introduction -- 2 Main Concepts -- 3 Programs, Executions, and Equivalence -- 4 Design of the POP Algorithm -- 4.1 Parsimonious Race Reversals -- 4.2 The Parsimonious-OPtimal DPOR (POP) Algorithm -- 4.3 Parsimonious Sleep Set Characterization -- 5 Correctness and Space Complexity -- 6 Implementation and Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Collective Contracts for Message-Passing Parallel Programs -- 1 Introduction -- 2 A Theory of Collective Contracts -- 2.1 Language -- 2.2 Semantics -- 2.3 Collective Correctness -- 2.4 Simulation -- 3 Collective Contracts for C/MPI -- 3.1 Background from MPI -- 3.2 Contract Structure -- 4 Evaluation -- 4.1 Collective Contract Examples -- 4.2 Bounded Verification of Collective Contracts -- 5 Related Work -- 6 Discussion -- References -- Distributed Systems -- mypyvy: A Research Platform for Verification of Transition Systems in First-Order Logic -- 1 Introduction -- 2 Modeling Language -- 2.1 Benchmarks -- 3 Satisfiability-Based Queries -- 3.1 Queries -- 3.2 Counterexamples. , 3.3 Decidability and Finite Counterexamples via EPR -- 4 Invariant Inference -- 5 Designing mypyvy's Internals -- 6 Works Using mypyvy -- 7 Related Work -- References -- Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas -- 1 Introduction -- 2 Background -- 3 Subsumption-Based Representation of Sets of Formulas -- 3.1 Bounded First-Order Languages -- 3.2 Syntactic Subsumption -- 3.3 Canonicalization -- 3.4 Representing Sets of Formulas -- 4 The Weaken Operator -- 4.1 Weakening a Single Canonical Formula -- 4.2 Weakening Sets of Formulas -- 4.3 Design Consideration and Tradeoffs -- 5 Data Structure for Sets of Formulas -- 6 Implementation and Evaluation -- 6.1 Implementation -- 6.2 Experiments -- 6.3 Results -- 7 Related Work -- 8 Conclusion -- References -- Verifying Cake-Cutting, Faster -- 1 Introduction -- 2 Cake-Cutting Preliminaries -- 3 Language and Type System -- 3.1 Syntax of Base Slice -- 3.2 A Linear Type System for Slice -- 3.3 Semantics -- 3.4 Disjointness -- 4 Constraints -- 5 Piecewise Uniform Reduction -- 5.1 Replicating Protocol Executions -- 5.2 Piecewise Uniform Valuations -- 5.3 Piecewise Uniform Replacement -- 6 Implementation and Evaluation -- 7 Related and Future Work -- References -- Runtime Verification and Monitoring -- General Anticipatory Runtime Verification -- 1 Introduction -- 2 Lola Monitoring Revisited -- 2.1 Recurrent Monitoring -- 2.2 Lola -- 3 Lola Recurrent Online Monitoring Semantics -- 4 An Abstraction Framework for Lola Monitoring -- 5 Abstraction-Based Recurrent Lola Monitoring -- 6 Symbolic Recurrent Lola Monitoring -- 7 Empirical Evaluation -- 8 Conclusion -- References -- Proactive Real-Time First-Order Enforcement -- 1 Introduction -- 2 Preliminaries -- 3 Proactive, Real-Time, First-Order Enforcement -- 3.1 System Model -- 3.2 Enforcers -- 4 Enforceable MFOTL Formulae. , 5 Enforcing EMFOTL -- 5.1 Obligations -- 5.2 Checking Satisfaction of MFOTL Formulae Under Assumptions -- 5.3 The Enforcement Algorithm -- 5.4 Correctness -- 6 Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Predictive Monitoring with Strong Trace Prefixes -- 1 Introduction -- 2 Predictive Monitoring and Trace Theory -- 3 Strong Trace Prefixes -- 3.1 Modelling Correct Reorderings with Strong Trace Prefixes -- 4 Complexity of Predictive Monitoring -- 4.1 Non-deterministic Predictive Monitoring -- 4.2 Deterministic Predictive Monitoring -- 4.3 Ensuring Well-Formedness and Soundness -- 5 Strong Reads-From Prefixes -- 6 Strong Prefixes Versus Synchronization Preservation -- 7 Experimental Evaluation -- 7.1 Enhanced Predictive Power of Strong Prefixes -- 7.2 Strong Reads-From Prefixes v/s Sync-Preservation -- 8 Related Work and Conclusions -- References -- Case Studies and Tools -- Monitoring Unmanned Aircraft: Specification, Integration, and Lessons-Learned -- 1 Introduction -- 1.1 Related Work -- 2 Stream-Based Monitoring -- 3 Setup -- 3.1 Monitoring Applications -- 3.2 Development Cycle for the Monitor -- 4 Abstract Integration -- 4.1 Common Interfaces -- 5 Concrete Integration of Representative Specifications -- 6 Conclusion -- References -- Testing the Migration from Analog to Software-Based Railway Interlocking Systems -- 1 Introduction -- 2 Operational Setting -- 3 Bridging the Gap Between ReRIS and SwRIS -- 3.1 Simulations Extractor -- 3.2 Working with a Partial ReRIS Model -- 3.3 Mapping a ReRIS Simulation into an Abstract SwRIS Test -- 3.4 Test Execution -- 4 Related Works -- 5 Experimental Evaluation -- 6 Conclusions -- References -- soid: A Tool for Legal Accountability for Automated Decision Making -- 1 Introduction -- 1.1 Related Work -- 2 soid Tool Architecture and Usage -- 2.1 Example #1: Decision Tree Inference. , 3 soid-gui Architecture and Usage -- 3.1 Example #2: Three Cars on the Stand -- 4 Conclusion -- References -- Machine Learning and Neural Networks -- Marabou 2.0: A Versatile Formal Analyzer of Neural Networks -- 1 Introduction -- 2 Architecture and Core Components -- 2.1 Engine -- 2.2 Context-Dependent Data-Structures -- 2.3 Proof Module -- 2.4 Front End -- 2.5 Availability, License, and Installation -- 3 Highlighted Features and Applications -- 4 Runtime Evaluation -- 5 Conclusion and Next Steps -- References -- Monitizer: Automating Design and Evaluation of Neural Network Monitors -- 1 Introduction -- 2 Related Work -- 3 Monitizer -- 3.1 Overview -- 3.2 Use Cases -- 3.3 Phases of Monitizer -- 3.4 Classification of Out-of-Distribution Data -- 3.5 Library of Monitors, NNs, and Datasets -- 4 Summary of Evaluation by Case Study -- 5 Conclusion -- References -- Guiding Enumerative Program Synthesis with Large Language Models -- 1 Introduction -- 2 Background -- 3 Overview -- 4 Stand-Alone LLM -- 4.1 Prompting the LLM -- 5 Synthesis with pCFG Guidance: pCFG-synth -- 5.1 Inferring a Weighted CFG -- 5.2 Probabilistic Guided Search -- 5.3 Weighted A* Search -- 6 Enumerative Synthesis with an Integrated LLM (iLLM-synth) -- 6.1 Integrated Prompting -- 6.2 Updating the Weighted Grammar -- 6.3 Integrating Syntactic Feedback into Enumerative Search -- 7 Evaluation -- 8 Threats to Validity -- 9 Related Work -- 10 Conclusions -- References -- Enchanting Program Specification Synthesis by Large Language Models Using Static Analysis and Program Verification -- 1 Introduction -- 2 Background and Motivation -- 3 Methodology -- 3.1 Code Decomposition -- 3.2 Hierarchical Specification Generation -- 3.3 Specification Validation -- 4 Evaluation -- 4.1 Evaluation Setup -- 4.2 RQ1. Effectiveness on General Specification -- 4.3 RQ2. Effectiveness on Loop Invariants. , 4.4 RQ3. Efficiency of AutoSpec -- 4.5 RQ4. Ablation Study -- 4.6 Case Studies -- 5 Threats to Validity -- 6 Related Work -- 7 Conclusion -- References -- Verifying Global Two-Safety Properties in Neural Networks with Confidence -- 1 Introduction -- 2 Background -- 2.1 Feed-Forward Neural Networks -- 2.2 Hyperproperties -- 2.3 Relational Verification and Self-composition -- 2.4 Robustness and Fairness -- 3 Confidence Based Global Verification of Feed-Forward Neural Networks -- 3.1 Encoding 2-Safety Properties as Product Neural Network -- 3.2 Softmax Approximation -- 4 Implementation -- 5 Experimental Evaluation -- 5.1 Discussion -- 6 Conclusion -- References -- Certified Robust Accuracy of Neural Networks Are Bounded Due to Bayes Errors -- 1 Introduction -- 2 Preliminary and Problem Definition -- 2.1 Robustness in Classification -- 2.2 Bayes Rules for Distributions -- 3 An Upper Bound of Robustness from Bayes Error -- 3.1 Certified Training Increases Bayes Error -- 3.2 Irreducible Robustness Error and Robustness Upper Bound -- 4 Experiment and Results -- 5 Related Works -- 6 Conclusion -- References -- Boosting Few-Pixel Robustness Verification via Covering Verification Designs -- 1 Introduction -- 2 Background -- 3 Our Approach: Covering Verification Designs -- 4 CoVerD -- 4.1 Our System -- 4.2 Choosing a Covering Verification Design -- 4.3 Constructing a Covering Verification Design -- 4.4 A Running Example -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems -- 1 Introduction -- 2 Preliminaries -- 2.1 DNN-Controlled Systems -- 2.2 Barrier Certificate and Its Neural Implementation -- 3 Verification Problem and Our Framework -- 3.1 Problem Statement -- 3.2 Overview of Our Framework -- 4 Qualitative and Quantitative Safety Verification. , 4.1 Qualitative Safety Verification.
    Weitere Ausg.: ISBN 3-031-65629-6
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    kobvindex_HPB1450451454
    Umfang: 1 online resource (xxv, 430 pages) : , illustrations (chiefly color).
    ISBN: 9783031656309 , 303165630X
    Serie: Lecture notes in computer science, 14682
    Inhalt: This open access book constitutes the proceedings of the 36th International Conference on Computer-Aided Verification, CAV 2024, which took place in Montreal, Canada, during July 24-27, 2024.
    Anmerkung: International conference proceedings. , Includes author index. , Intro -- Preface -- Organization -- Invited Talks -- How to Solve Math Problems Without Talent -- Bridging Formal Mathematics and Software Verification -- The Art of SMT Solving -- Contents - Part II -- Concurrency -- The VerCors Verifier: A Progress Report -- 1 Introduction -- 2 New and Improved Language Support -- 2.1 Improved Existing Language Support -- 2.2 Newly Supported Frameworks -- 2.3 Programming Languages Encoded into VerCors -- 3 VerCors Implementation Changes -- 4 Deriving Verified, Optimised Programs -- 5 Case Studies -- 5.1 Tunnel Control Software Components , 5.2 Verification of Red-Black Trees and their Parallel Merge -- 5.3 GPU Case Studies -- 5.4 Student Projects -- 6 Conclusions, Related Work and Future Work -- References -- Parsimonious Optimal Dynamic Partial Order Reduction -- 1 Introduction -- 2 Main Concepts -- 3 Programs, Executions, and Equivalence -- 4 Design of the POP Algorithm -- 4.1 Parsimonious Race Reversals -- 4.2 The Parsimonious-OPtimal DPOR (POP) Algorithm -- 4.3 Parsimonious Sleep Set Characterization -- 5 Correctness and Space Complexity -- 6 Implementation and Evaluation -- 7 Related Work -- 8 Conclusion -- References , Collective Contracts for Message-Passing Parallel Programs -- 1 Introduction -- 2 A Theory of Collective Contracts -- 2.1 Language -- 2.2 Semantics -- 2.3 Collective Correctness -- 2.4 Simulation -- 3 Collective Contracts for C/MPI -- 3.1 Background from MPI -- 3.2 Contract Structure -- 4 Evaluation -- 4.1 Collective Contract Examples -- 4.2 Bounded Verification of Collective Contracts -- 5 Related Work -- 6 Discussion -- References -- Distributed Systems -- mypyvy: A Research Platform for Verification of Transition Systems in First-Order Logic -- 1 Introduction -- 2 Modeling Language , 2.1 Benchmarks -- 3 Satisfiability-Based Queries -- 3.1 Queries -- 3.2 Counterexamples -- 3.3 Decidability and Finite Counterexamples via EPR -- 4 Invariant Inference -- 5 Designing mypyvy's Internals -- 6 Works Using mypyvy -- 7 Related Work -- References -- Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas -- 1 Introduction -- 2 Background -- 3 Subsumption-Based Representation of Sets of Formulas -- 3.1 Bounded First-Order Languages -- 3.2 Syntactic Subsumption -- 3.3 Canonicalization -- 3.4 Representing Sets of Formulas -- 4 The Weaken Operator , 4.1 Weakening a Single Canonical Formula -- 4.2 Weakening Sets of Formulas -- 4.3 Design Consideration and Tradeoffs -- 5 Data Structure for Sets of Formulas -- 6 Implementation and Evaluation -- 6.1 Implementation -- 6.2 Experiments -- 6.3 Results -- 7 Related Work -- 8 Conclusion -- References -- Verifying Cake-Cutting, Faster -- 1 Introduction -- 2 Cake-Cutting Preliminaries -- 3 Language and Type System -- 3.1 Syntax of Base Slice -- 3.2 A Linear Type System for Slice -- 3.3 Semantics -- 3.4 Disjointness -- 4 Constraints -- 5 Piecewise Uniform Reduction -- 5.1 Replicating Protocol Executions
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; proceedings (reports) ; Conference papers and proceedings. ; Actes de congrès.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    almahu_9949850887002882
    Umfang: XXV, 430 p. 127 illus., 95 illus. in color. , online resource.
    Ausgabe: 1st ed. 2024.
    ISBN: 9783031656309
    Serie: Lecture Notes in Computer Science, 14682
    Inhalt: This open access book constitutes the proceedings of the 36th International Conference on Computer-Aided Verification, CAV 2024, which took place in Montreal, Canada, during July 24-27, 2024.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783031656293
    Weitere Ausg.: Printed edition: ISBN 9783031656316
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    gbv_191622847X
    Umfang: 1 Online-Ressource
    ISBN: 9783031656309
    Serie: Lecture Notes in Computer Science Series v.14682
    Anmerkung: Intro -- Preface -- Organization -- Invited Talks -- How to Solve Math Problems Without Talent -- Bridging Formal Mathematics and Software Verification -- The Art of SMT Solving -- Contents - Part II -- Concurrency -- The VerCors Verifier: A Progress Report -- 1 Introduction -- 2 New and Improved Language Support -- 2.1 Improved Existing Language Support -- 2.2 Newly Supported Frameworks -- 2.3 Programming Languages Encoded into VerCors -- 3 VerCors Implementation Changes -- 4 Deriving Verified, Optimised Programs -- 5 Case Studies -- 5.1 Tunnel Control Software Components -- 5.2 Verification of Red-Black Trees and their Parallel Merge -- 5.3 GPU Case Studies -- 5.4 Student Projects -- 6 Conclusions, Related Work and Future Work -- References -- Parsimonious Optimal Dynamic Partial Order Reduction -- 1 Introduction -- 2 Main Concepts -- 3 Programs, Executions, and Equivalence -- 4 Design of the POP Algorithm -- 4.1 Parsimonious Race Reversals -- 4.2 The Parsimonious-OPtimal DPOR (POP) Algorithm -- 4.3 Parsimonious Sleep Set Characterization -- 5 Correctness and Space Complexity -- 6 Implementation and Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Collective Contracts for Message-Passing Parallel Programs -- 1 Introduction -- 2 A Theory of Collective Contracts -- 2.1 Language -- 2.2 Semantics -- 2.3 Collective Correctness -- 2.4 Simulation -- 3 Collective Contracts for C/MPI -- 3.1 Background from MPI -- 3.2 Contract Structure -- 4 Evaluation -- 4.1 Collective Contract Examples -- 4.2 Bounded Verification of Collective Contracts -- 5 Related Work -- 6 Discussion -- References -- Distributed Systems -- mypyvy: A Research Platform for Verification of Transition Systems in First-Order Logic -- 1 Introduction -- 2 Modeling Language -- 2.1 Benchmarks -- 3 Satisfiability-Based Queries -- 3.1 Queries -- 3.2 Counterexamples. , 3.3 Decidability and Finite Counterexamples via EPR -- 4 Invariant Inference -- 5 Designing mypyvy's Internals -- 6 Works Using mypyvy -- 7 Related Work -- References -- Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas -- 1 Introduction -- 2 Background -- 3 Subsumption-Based Representation of Sets of Formulas -- 3.1 Bounded First-Order Languages -- 3.2 Syntactic Subsumption -- 3.3 Canonicalization -- 3.4 Representing Sets of Formulas -- 4 The Weaken Operator -- 4.1 Weakening a Single Canonical Formula -- 4.2 Weakening Sets of Formulas -- 4.3 Design Consideration and Tradeoffs -- 5 Data Structure for Sets of Formulas -- 6 Implementation and Evaluation -- 6.1 Implementation -- 6.2 Experiments -- 6.3 Results -- 7 Related Work -- 8 Conclusion -- References -- Verifying Cake-Cutting, Faster -- 1 Introduction -- 2 Cake-Cutting Preliminaries -- 3 Language and Type System -- 3.1 Syntax of Base Slice -- 3.2 A Linear Type System for Slice -- 3.3 Semantics -- 3.4 Disjointness -- 4 Constraints -- 5 Piecewise Uniform Reduction -- 5.1 Replicating Protocol Executions -- 5.2 Piecewise Uniform Valuations -- 5.3 Piecewise Uniform Replacement -- 6 Implementation and Evaluation -- 7 Related and Future Work -- References -- Runtime Verification and Monitoring -- General Anticipatory Runtime Verification -- 1 Introduction -- 2 Lola Monitoring Revisited -- 2.1 Recurrent Monitoring -- 2.2 Lola -- 3 Lola Recurrent Online Monitoring Semantics -- 4 An Abstraction Framework for Lola Monitoring -- 5 Abstraction-Based Recurrent Lola Monitoring -- 6 Symbolic Recurrent Lola Monitoring -- 7 Empirical Evaluation -- 8 Conclusion -- References -- Proactive Real-Time First-Order Enforcement -- 1 Introduction -- 2 Preliminaries -- 3 Proactive, Real-Time, First-Order Enforcement -- 3.1 System Model -- 3.2 Enforcers -- 4 Enforceable MFOTL Formulae. , 5 Enforcing EMFOTL -- 5.1 Obligations -- 5.2 Checking Satisfaction of MFOTL Formulae Under Assumptions -- 5.3 The Enforcement Algorithm -- 5.4 Correctness -- 6 Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Predictive Monitoring with Strong Trace Prefixes -- 1 Introduction -- 2 Predictive Monitoring and Trace Theory -- 3 Strong Trace Prefixes -- 3.1 Modelling Correct Reorderings with Strong Trace Prefixes -- 4 Complexity of Predictive Monitoring -- 4.1 Non-deterministic Predictive Monitoring -- 4.2 Deterministic Predictive Monitoring -- 4.3 Ensuring Well-Formedness and Soundness -- 5 Strong Reads-From Prefixes -- 6 Strong Prefixes Versus Synchronization Preservation -- 7 Experimental Evaluation -- 7.1 Enhanced Predictive Power of Strong Prefixes -- 7.2 Strong Reads-From Prefixes v/s Sync-Preservation -- 8 Related Work and Conclusions -- References -- Case Studies and Tools -- Monitoring Unmanned Aircraft: Specification, Integration, and Lessons-Learned -- 1 Introduction -- 1.1 Related Work -- 2 Stream-Based Monitoring -- 3 Setup -- 3.1 Monitoring Applications -- 3.2 Development Cycle for the Monitor -- 4 Abstract Integration -- 4.1 Common Interfaces -- 5 Concrete Integration of Representative Specifications -- 6 Conclusion -- References -- Testing the Migration from Analog to Software-Based Railway Interlocking Systems -- 1 Introduction -- 2 Operational Setting -- 3 Bridging the Gap Between ReRIS and SwRIS -- 3.1 Simulations Extractor -- 3.2 Working with a Partial ReRIS Model -- 3.3 Mapping a ReRIS Simulation into an Abstract SwRIS Test -- 3.4 Test Execution -- 4 Related Works -- 5 Experimental Evaluation -- 6 Conclusions -- References -- soid: A Tool for Legal Accountability for Automated Decision Making -- 1 Introduction -- 1.1 Related Work -- 2 soid Tool Architecture and Usage -- 2.1 Example #1: Decision Tree Inference. , 3 soid-gui Architecture and Usage -- 3.1 Example #2: Three Cars on the Stand -- 4 Conclusion -- References -- Machine Learning and Neural Networks -- Marabou 2.0: A Versatile Formal Analyzer of Neural Networks -- 1 Introduction -- 2 Architecture and Core Components -- 2.1 Engine -- 2.2 Context-Dependent Data-Structures -- 2.3 Proof Module -- 2.4 Front End -- 2.5 Availability, License, and Installation -- 3 Highlighted Features and Applications -- 4 Runtime Evaluation -- 5 Conclusion and Next Steps -- References -- Monitizer: Automating Design and Evaluation of Neural Network Monitors -- 1 Introduction -- 2 Related Work -- 3 Monitizer -- 3.1 Overview -- 3.2 Use Cases -- 3.3 Phases of Monitizer -- 3.4 Classification of Out-of-Distribution Data -- 3.5 Library of Monitors, NNs, and Datasets -- 4 Summary of Evaluation by Case Study -- 5 Conclusion -- References -- Guiding Enumerative Program Synthesis with Large Language Models -- 1 Introduction -- 2 Background -- 3 Overview -- 4 Stand-Alone LLM -- 4.1 Prompting the LLM -- 5 Synthesis with pCFG Guidance: pCFG-synth -- 5.1 Inferring a Weighted CFG -- 5.2 Probabilistic Guided Search -- 5.3 Weighted A* Search -- 6 Enumerative Synthesis with an Integrated LLM (iLLM-synth) -- 6.1 Integrated Prompting -- 6.2 Updating the Weighted Grammar -- 6.3 Integrating Syntactic Feedback into Enumerative Search -- 7 Evaluation -- 8 Threats to Validity -- 9 Related Work -- 10 Conclusions -- References -- Enchanting Program Specification Synthesis by Large Language Models Using Static Analysis and Program Verification -- 1 Introduction -- 2 Background and Motivation -- 3 Methodology -- 3.1 Code Decomposition -- 3.2 Hierarchical Specification Generation -- 3.3 Specification Validation -- 4 Evaluation -- 4.1 Evaluation Setup -- 4.2 RQ1. Effectiveness on General Specification -- 4.3 RQ2. Effectiveness on Loop Invariants. , 4.4 RQ3. Efficiency of AutoSpec -- 4.5 RQ4. Ablation Study -- 4.6 Case Studies -- 5 Threats to Validity -- 6 Related Work -- 7 Conclusion -- References -- Verifying Global Two-Safety Properties in Neural Networks with Confidence -- 1 Introduction -- 2 Background -- 2.1 Feed-Forward Neural Networks -- 2.2 Hyperproperties -- 2.3 Relational Verification and Self-composition -- 2.4 Robustness and Fairness -- 3 Confidence Based Global Verification of Feed-Forward Neural Networks -- 3.1 Encoding 2-Safety Properties as Product Neural Network -- 3.2 Softmax Approximation -- 4 Implementation -- 5 Experimental Evaluation -- 5.1 Discussion -- 6 Conclusion -- References -- Certified Robust Accuracy of Neural Networks Are Bounded Due to Bayes Errors -- 1 Introduction -- 2 Preliminary and Problem Definition -- 2.1 Robustness in Classification -- 2.2 Bayes Rules for Distributions -- 3 An Upper Bound of Robustness from Bayes Error -- 3.1 Certified Training Increases Bayes Error -- 3.2 Irreducible Robustness Error and Robustness Upper Bound -- 4 Experiment and Results -- 5 Related Works -- 6 Conclusion -- References -- Boosting Few-Pixel Robustness Verification via Covering Verification Designs -- 1 Introduction -- 2 Background -- 3 Our Approach: Covering Verification Designs -- 4 CoVerD -- 4.1 Our System -- 4.2 Choosing a Covering Verification Design -- 4.3 Constructing a Covering Verification Design -- 4.4 A Running Example -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems -- 1 Introduction -- 2 Preliminaries -- 2.1 DNN-Controlled Systems -- 2.2 Barrier Certificate and Its Neural Implementation -- 3 Verification Problem and Our Framework -- 3.1 Problem Statement -- 3.2 Overview of Our Framework -- 4 Qualitative and Quantitative Safety Verification.
    Weitere Ausg.: Erscheint auch als ISBN 3031656296
    Weitere Ausg.: ISBN 9783031656293
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 393165630x?
Meinten Sie 30316560x?
Meinten Sie 3031656709?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz