The Community for Technology Leaders
2017 International Symposium on Theoretical Aspects of Software Engineering (TASE) (2017)
Sophia Antipolis, France
Sept. 13, 2017 to Sept. 15, 2017
ISBN: 978-1-5386-1926-1
TABLE OF CONTENTS

[Title page] (PDF)

pp. 1

Preface (PDF)

pp. 1-2

Organization (PDF)

pp. 1-2

Formal methods for software testing (invited paper) (Abstract)

Marie-Claude Gaudel , LRI, Univ. Paris-Sud, CNRS, CentraleSupélec, Université Paris-Saclay Orsay, France 91405
pp. 1-3

SCADE 6: A formal language for embedded critical software development (invited paper) (Abstract)

Jean-Louis Colaco , ANSYS/Esterel-Technologies
Bruno Pagano , ANSYS/Esterel-Technologies
Marc Pouzet , UPMC/ENS/INRIA Paris
pp. 1-11

Conditional transition systems with upgrades (Abstract)

Harsh Beohar , Universität Duisburg-Essen
Barbara Konig , Universität Duisburg-Essen
Sebastian Kupper , FernUniversität in Hagen
Alexandra Silva , University College London
pp. 1-8

Bisimulations for probabilistic linear lambda calculi (Abstract)

Yuxin Deng , Shanghai Key Laboratory of Trustworthy Computing, MOE International Joint Lab of Trustworthy Software, and International Research Center of Trustworthy Software, East China Normal University
Yuan Feng , University of Technology Sydney, Australia
pp. 1-8

Computing behavioural distance for fuzzy transition systems (Abstract)

Tian-Ming Bu , Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai 200062, P.R. China
Hengyang Wu , Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai 200062, P.R. China
Yixiang Chen , Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai 200062, P.R. China
pp. 1-7

Optimizing backbone filtering (Abstract)

Yueling Zhang , Computer Science and Software Engineering Institute, East China Normal University
Jianwen Li , Computer Science and Software Engineering Institute, East China Normal University
Min Zhang , Computer Science and Software Engineering Institute, East China Normal University
Geguang Pu , Computer Science and Software Engineering Institute, East China Normal University
Fu Song , School of Information Science and Technology, ShanghaiTech University
pp. 1-8

An integrated framework for verifying multiple care pathways (Abstract)

J. Bowles , School of Computer Science, University of St Andrews, KY16 9SX St Andrews, United Kingdom
M. B. Caminati , School of Computer Science, University of St Andrews, KY16 9SX St Andrews, United Kingdom
S. Cha , Automation and Information Systems, Technical University of Munich, Boltzmannstraße 15, 85748 Garching bei München, Germany
pp. 1-8

Assembly program verification for multiprocessors with relaxed memory model using SMT solver (Abstract)

Pattaravut Maleehuan , Japan Advanced Institute of Science and Technology, Japan
Yuki Chiba , Japan Advanced Institute of Science and Technology, Japan
Toshiaki Aoki , Japan Advanced Institute of Science and Technology, Japan
pp. 1-8

Formal verification of user-level real-time property patterns (Abstract)

Ning Ge , School of Software, Beihang University Beijing, China
Marc Pantel , IRIT/INPT Toulouse, France
Silvano Dal Zilio , LAAS-CNRS Toulouse, France
pp. 1-8

Time-sensitive information flow control in timed event-B (Abstract)

Chunyan Mu , School of Computing, Teesside University, UK
Shengchao Qin , School of Computing, Teesside University, UK
pp. 1-8

Two under-approximation techniques for 3-modal abstraction coverage of event systems: Joint effort? (Abstract)

Jacques Julliand , FEMTO-ST Institute, Univ. Bourgogne Franche-Comté, CNRS, 16, route de Gray F-25030 Besançon Cedex France
Olga Kouchnarenko , FEMTO-ST Institute, Univ. Bourgogne Franche-Comté, CNRS, 16, route de Gray F-25030 Besançon Cedex France
Pierre-Alain Masson , FEMTO-ST Institute, Univ. Bourgogne Franche-Comté, CNRS, 16, route de Gray F-25030 Besançon Cedex France
Guillaume Voiron , FEMTO-ST Institute, Univ. Bourgogne Franche-Comté, CNRS, 16, route de Gray F-25030 Besançon Cedex France
pp. 1-8

Automatic fine-grained locking generation for shared data structures (Abstract)

Haiyang Liu , LMAM and Dept. of Informatics, School of Math, Peking University, Beijing, China
Tingting Hu , LMAM and Dept. of Informatics, School of Math, Peking University, Beijing, China
Zongyan Qiu , LMAM and Dept. of Informatics, School of Math, Peking University, Beijing, China
pp. 1-8

Formal specification of security guidelines for program certification (Abstract)

Zeineb Zhioua , Eurecom
Yves Roudier , UCA - I3S - CNRS, Université de Nice Sophia Antipolis
Rabea Ameur-Boulifa , LTCI, Télécom ParisTech, Université Paris-Saclay
pp. 1-8

A safety and liveness theory for total reversibility (Abstract)

Claudio Antares Mezzina , IMT School for Advanced Studies, Lucca, Italy
Vasileios Koutavas , Trinity College Dublin, Dublin, Ireland
pp. 1-8

Formal development process of safety-critical embedded human machine interface systems (Abstract)

Ning Ge , School of Software, Beihang University, Beijing, China
Arnaud Dieumegard , IRT-Saint Exupéry, Toulouse, France
Eric Jenn , IRT-Saint Exupéry, Toulouse, France
Bruno daAusbourg , ONERA, Toulouse, France
Yamine Ait-Ameur , IRIT/ENSEEIHT, Toulouse, France
pp. 1-8

A bounded multi-dimensional modal logic for autonomous cars based on local traffic and estimation (Abstract)

Bingqing Xu , Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Shanghai, China 200062
Qin Li , Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Shanghai, China 200062
pp. 1-8

Modeling and reasoning about wireless networks: A graph-based calculus approach (Abstract)

Shichao Liu , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Ying Jiang , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
pp. 1-8

VMDV: A 3D visualization tool for modeling, demonstration, and verification (Abstract)

Jian Liu , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Ying Jiang , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Yanyun Chen , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
pp. 1-7
98 ms
(Ver 3.3 (11022016))