000 05924nam a22006135i 4500
001 978-3-031-13188-2
003 DE-He213
005 20240423125417.0
007 cr nn 008mamaa
008 220805s2022 sz | s |||| 0|eng d
020 _a9783031131882
_9978-3-031-13188-2
024 7 _a10.1007/978-3-031-13188-2
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1
_223
245 1 0 _aComputer Aided Verification
_h[electronic resource] :
_b34th International Conference, CAV 2022, Haifa, Israel, August 7–10, 2022, Proceedings, Part II /
_cedited by Sharon Shoham, Yakir Vizel.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXIX, 549 p. 160 illus., 122 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13372
505 0 _aA Billion SMT Queries a Day -- Program Verification with Constrained Horn Clauses -- Formal Methods for Probabilistic Programs Data-Driven Invariant Learning for Probabilistic Programs -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs.-Does a Program Yield the Right Distribution? Verifying Probabilistic Programs via Generating Functions -- Abstraction-Renement for Hierarchical Probabilistic Models -- Formal Methods for Neural Networks Shared Certificates for Neural Network Verification -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- Verifying Neural Networks Against Backdoor Attacks -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- Neural Network Robustness as a Verication Property: A Principled Case Study -- Software Verication and Model Checking The Lattice-Theoretic Essence of Property Directed Reachability Analysis -- A‑ne Loop Invariant Generation via Matrix Algebra -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- Proof-guided Underapproximation Widening for Bounded Model Checking -- SolCMC: Solidity Compiler's Model Checker -- Sharygina Hyperproperties and Security Software Verication of Hyperproperties Beyond k-Safety -- Abstraction Modulo Stability for Reverse Engineering -- A Modular and Highly Extensible API Fuzzer for SMT Solvers -- Automata and Logic FORQ-based Language Inclusion Formal Testing -- Sound Automation of Magic Wands -- Divide-and-Conquer Determinization of Büchi Automata based on SCC Decomposition -- Complementing Büchi Automata with Ranker -- Deductive Verication and Decision Procedures Even Faster Conicts and Lazier Reductions for String Solvers -- Local Search For SMT on Linear Integer Arithmetic -- Reasoning about Data Trees using CHCs -- Veried Erasure Correction in Coq with MathComp and VST -- Appel End-to-end Mechanised Proof of an eBPF Virtual Machine for Microcontrollers -- A DSL and Verication Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols -- Machine Learning Specication-Guided Learning of Nash Equilibria with High Social Welfare -- Synthesizing Fair Decision Trees via Iterative Constraint Solving -- SMT-based Translation Validation for Machine Learning Compiler -- Lee Verifying Fairness in Quantum Machine Learning -- MoGym: Using Formal Models for Training and Verifying Decision-making Agents -- Synthesis and Concurrency Synthesis and Analysis of Petri Nets from Causal Specications -- Verifying generalised and structural soundness of workow netsvia relaxations -- Capture, Analyze, Diagnose: Realizability Checking of Requirements in FRET -- Information Flow Guided Synthesis -- Randomized Synthesis for Diversity and Cost Constraints with Control Improvisation.
506 0 _aOpen Access
520 _aThis open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following topical sections: Part I: Invited papers; formal methods for probabilistic programs; formal methods for neural networks; software Verification and model checking; hyperproperties and security; formal methods for hardware, cyber-physical, and hybrid systems. Part II: Probabilistic techniques; automata and logic; deductive verification and decision procedures; machine learning; synthesis and concurrency. This is an open access book.
650 0 _aSoftware engineering.
650 0 _aArtificial intelligence.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aComputer science.
650 1 4 _aSoftware Engineering.
650 2 4 _aArtificial Intelligence.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aTheory of Computation.
700 1 _aShoham, Sharon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVizel, Yakir.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031131875
776 0 8 _iPrinted edition:
_z9783031131899
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13372
856 4 0 _uhttps://doi.org/10.1007/978-3-031-13188-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-SOB
942 _cSPRINGER
999 _c177624
_d177624