Shenghao Yuan, Zhibin Yang, J. Bodeveix, M. Filali, Tiexin Wang, Yong Zhou
{"title":"Automated Ada Code Generation from Synchronous Dataflow Programs on Multicore: Approach and Industrial Study","authors":"Shenghao Yuan, Zhibin Yang, J. Bodeveix, M. Filali, Tiexin Wang, Yong Zhou","doi":"10.1007/978-3-030-46902-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-46902-3_4","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133285866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Model Checking Against CTLK Using Quantified Boolean Formulas","authors":"Emily Yu, M. Seidl, Armin Biere","doi":"10.1007/978-3-030-46902-3_8","DOIUrl":"https://doi.org/10.1007/978-3-030-46902-3_8","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Singh, Y. A. Ameur, D. Méry, D. Navarre, Philippe A. Palanque, M. Pantel
{"title":"Formal Development of Multi-Purpose Interactive Application (MPIA) for ARINC 661","authors":"N. Singh, Y. A. Ameur, D. Méry, D. Navarre, Philippe A. Palanque, M. Pantel","doi":"10.1007/978-3-030-46902-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-46902-3_2","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifying Resource Adequacy of Networked IMA Systems at Concept Level","authors":"R. S. D. Moraes, S. Nadjm-Tehrani","doi":"10.1007/978-3-030-46902-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-46902-3_3","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131634161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"POP: A Tuning Assistant for Mixed-Precision Floating-Point Computations","authors":"Dorra Ben Khalifa, M. Martel, Assalé Adjé","doi":"10.1007/978-3-030-46902-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-46902-3_5","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126844125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elisabetta De Maria, Thibaud L'Yvonnet, S. Moisan, J. Rigault
{"title":"Probabilistic Activity Recognition for Serious Games with Applications in Medicine","authors":"Elisabetta De Maria, Thibaud L'Yvonnet, S. Moisan, J. Rigault","doi":"10.1007/978-3-030-46902-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-46902-3_7","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Verification of Random Forests in Safety-Critical Applications","authors":"John Törnblom, S. Nadjm-Tehrani","doi":"10.1007/978-3-030-12988-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-12988-0_4","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114589674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abstraction Refinement with Path Constraints for 3-Valued Bounded Model Checking","authors":"Nils Timm, S. Gruner","doi":"10.1007/978-3-030-12988-0_9","DOIUrl":"https://doi.org/10.1007/978-3-030-12988-0_9","url":null,"abstract":"","PeriodicalId":206212,"journal":{"name":"International Workshop on Formal Techniques for Safety-Critical Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}