Formal Methods for Industrial Critical Systems: 25th International Conference, FMICS 2020, Vienna, Austria, September 2–3, 2020, Proceedings

s of Invited Talks A Survey of Bidding Games on Graphs Guy Avni and Thomas A. Henzinger

[1]  Tommi Karhela,et al.  A toolset for model checking of PLC software , 2013, 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA).

[2]  Jaco van de Pol,et al.  State Space Reduction of Linear Processes Using Control Flow Reconstruction , 2009, ATVA.

[3]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[4]  Daniel Kroening,et al.  Successful Use of Incremental BMC in the Automotive Industry , 2015, FMICS.

[5]  Daniel Dewey,et al.  Reinforcement Learning and the Reward Engineering Principle , 2014, AAAI Spring Symposia.

[6]  Anthony Hall,et al.  Seven myths of formal methods , 1990, IEEE Software.

[7]  Luis Garcia,et al.  HyPLC: hybrid programmable logic controller program translation for verification , 2019, ICCPS.

[8]  Michael Leuschel,et al.  From Animation to Data Validation: The ProB Constraint Solver 10 Years On , 2014 .

[9]  Marko C. J. D. van Eekelen,et al.  Making resource analysis practical for real-time Java , 2012, JTRES '12.

[10]  Marko C. J. D. van Eekelen,et al.  Using Dependent Types to Define Energy Augmented Semantics of Programs , 2015, FOPARA.

[11]  Pierre Wolper,et al.  The tableau method for temporal logic: an overview , 1985 .

[12]  Eric Saxe,et al.  Power-efficient software , 2010, Commun. ACM.

[13]  Pierre-Yves Schobbens,et al.  A Decade of Featured Transition Systems , 2019, From Software Engineering to Formal Methods and Tools, and Back.

[14]  Sriram Sankaranarayanan,et al.  Model-based falsification of an artificial pancreas control system , 2017, SIGBED.

[15]  Jean-Raymond Abrial,et al.  Introducing Dynamic Constraints in B , 1998, B.

[16]  Dana Fisman,et al.  Functional Specification of Hardware via Temporal Logic , 2018, Handbook of Model Checking.

[17]  Dmitriy Fradkin,et al.  Under Consideration for Publication in Knowledge and Information Systems Mining Sequential Patterns for Classification , 2022 .

[18]  Reinhard Wilhelm Real time spent on real time , 2020, Commun. ACM.

[19]  Iso. Lotos,et al.  A Formal Description Technique Based on the Temporal Ordering of Observational Behaviour , 1985 .

[20]  Radu Mateescu,et al.  A Model Checking Language for Concurrent Value-Passing Systems , 2008, FM.

[21]  Anantha Chandrakasan,et al.  JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.

[22]  Fatemeh Ghassemi,et al.  Modeling and efficient verification of wireless ad hoc networks , 2016, Formal Aspects of Computing.

[23]  Sander J. J. Leemans,et al.  Formalising and analysing the control software of the Compact Muon Solenoid Experiment at the Large Hadron Collider , 2011, Sci. Comput. Program..

[24]  Michael Leuschel,et al.  Formally Checking Large Data Sets in the Railways , 2012, ArXiv.

[25]  Benoît Dupont de Dinechin,et al.  Time-critical computing on a single-chip massively parallel processor , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[26]  Amir Pnueli,et al.  On the synthesis of a reactive module , 1989, POPL '89.

[27]  Frank S. de Boer,et al.  Modeling and Verification of Reactive Systems using Rebeca , 2004, Fundam. Informaticae.

[28]  Marjan Sirjani,et al.  Power is Overrated, Go for Friendliness! Expressiveness, Faithfulness, and Usability in Modeling: The Actor Experience , 2018, Principles of Modeling.

[29]  Mykel J. Kochenderfer,et al.  Belief state planning for autonomously navigating urban intersections , 2017, 2017 IEEE Intelligent Vehicles Symposium (IV).

[30]  R. R. Khayrutdinov,et al.  Studies of plasma equilibrium and transport in a Tokamak fusion device with the inverse-variable technique , 1993 .

[31]  André Platzer,et al.  A Uniform Substitution Calculus for Differential Dynamic Logic , 2015, CADE.

[32]  Darren D. Cofer,et al.  Study on the Barriers to the Industrial Adoption of Formal Methods , 2013, FMICS.

[33]  Laurent Voisin,et al.  Formal Implementation of Data Validation for Railway Safety-Related Systems with OVADO , 2013, SEFM Workshops.

[34]  M. Keilhacker,et al.  H-mode confinement in tokamaks , 1987 .

[35]  Thomas A. Henzinger,et al.  Bidding Mechanisms in Graph Games , 2019, MFCS.

[36]  Michael Leuschel,et al.  Who watches the watchers: Validating the ProB Validation Tool , 2014, F-IDE.

[37]  Axel-Cyrille Ngonga Ngomo,et al.  An Efficient Approach for the Generation of Allen Relations , 2016, ECAI.

[38]  Colin F. Snook,et al.  Embedded System Design Using Formal Model Refinement: An Approach Based on the Combined Use of UML and the B Language , 2004, Des. Autom. Embed. Syst..

[39]  Siamak Mohammadi,et al.  Functional and Performance Analysis of Network-on-Chips Using Actor-based Modeling and Formal Verification , 2013, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[40]  Marius Bozga,et al.  State space reduction based on live variables analysis , 1999, Sci. Comput. Program..

[41]  Per Stenström,et al.  Timing anomalies in dynamically scheduled microprocessors , 1999, Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054).

[42]  Joel Nothman,et al.  SciPy 1.0-Fundamental Algorithms for Scientific Computing in Python , 2019, ArXiv.

[43]  Y. Shimomura,et al.  ITER overview , 1999 .

[44]  Pamela Zave,et al.  The compositional architecture of the internet , 2019, Commun. ACM.

[45]  Grigore Rosu,et al.  Finite-trace linear temporal logic: coinductive completeness , 2016, RV.

[46]  Jean-Raymond Abrial,et al.  The B Tool (Abstract) , 1988, VDM Europe.

[47]  A. Pironti,et al.  Fusion, tokamaks, and plasma control: an introduction and tutorial , 2005, IEEE Control Systems.

[48]  Dan Grossman,et al.  EnerJ: approximate data types for safe and general low-power computation , 2011, PLDI '11.

[49]  Eelco Visser,et al.  Migrating custom DSL implementations to a language workbench (tool demo) , 2018, SLE.

[50]  Alan Wassyng,et al.  Lessons Learned from a Successful Implementation of Formal Methods in an Industrial Project , 2003, FME.

[51]  Jean-Raymond Abrial,et al.  The B-book - assigning programs to meanings , 1996 .

[52]  Daniel Jackson,et al.  Model-Based Security Analysis of a Water Treatment System , 2016, 2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS).

[53]  Jan Martin Jansen,et al.  The Sky is the Limit: Analysing Resource Consumption Over Time Using Skylines , 2017, IFL.

[54]  Jussi Lahtinen,et al.  Model Checking Large Nuclear Power Plant Safety System Designs , 2016 .

[55]  Raimund Kirner,et al.  Principles of timing anomalies in superscalar processors , 2005, Fifth International Conference on Quality Software (QSIC'05).

[56]  Eelco Visser,et al.  Stratego/XT 0.17. A language and toolset for program transformation , 2008, Sci. Comput. Program..

[57]  Erik P. de Vink,et al.  Family-Based Model Checking with mCRL2 , 2017, FASE.

[58]  Mohammad Mahdi Jaghoori,et al.  Ten Years of Analyzing Actors: Rebeca Experience , 2011, Formal Modeling: Actors, Open Systems, Biological Systems.

[59]  Butler W. Lampson,et al.  Crash Recovery in a Distributed Data Storage System , 1981 .

[60]  Radu Mateescu,et al.  CADP 2011: a toolbox for the construction and analysis of distributed processes , 2012, International Journal on Software Tools for Technology Transfer.

[61]  Cristina Rea,et al.  Exploratory Machine Learning Studies for Disruption Prediction Using Large Databases on DIII-D , 2018 .

[62]  Xin Chen,et al.  Decomposed Reachability Analysis for Nonlinear Systems , 2016, 2016 IEEE Real-Time Systems Symposium (RTSS).

[63]  Jan Friso Groote,et al.  Formalising the Dezyne Modelling Language in mCRL2 , 2017, FMICS-AVoCS.

[64]  Guillaume Melquiond,et al.  Coquelicot: A User-Friendly Library of Real Analysis for Coq , 2015, Math. Comput. Sci..

[65]  Marco Montali,et al.  Reasoning on LTL on Finite Traces: Insensitivity to Infiniteness , 2014, AAAI.

[66]  Maurice H. ter Beek,et al.  Comparing Formal Tools for System Design: a Judgment Study , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).

[67]  Bas Luttik,et al.  Towards model checking executable UML specifications in mCRL2 , 2009, Innovations in Systems and Software Engineering.

[68]  John D. Hunter,et al.  Matplotlib: A 2D Graphics Environment , 2007, Computing in Science & Engineering.

[69]  Dániel Varró,et al.  VIATRA - visual automated transformations for formal verification and validation of UML models , 2002, Proceedings 17th IEEE International Conference on Automated Software Engineering,.

[70]  André Platzer,et al.  Adaptive Cruise Control: Hybrid, Distributed, and Now Formally Verified , 2011, FM.

[71]  Werner Retschitzegger,et al.  Tactical contract composition for hybrid system component verification , 2018, International Journal on Software Tools for Technology Transfer.

[72]  Fatemeh Ghassemi,et al.  Hybrid Rebeca: Modeling and Analyzing of Cyber-Physical Systems , 2018, CyPhy/WESE.

[73]  Jim Woodcock,et al.  Industrial Practice in Formal Methods: A Review , 2009, FM.

[74]  Bernd Becker,et al.  Automatic Identification of Timing Anomalies for Cycle-Accurate Worst-Case Execution Time Analysis , 2006, 2006 IEEE Design and Diagnostics of Electronic Circuits and systems.

[75]  Wei-Tsun Sun,et al.  Build Your Own Static WCET analyser: the Case of the Automotive Processor AURIX TC275 , 2020 .

[76]  Leslie Lamport,et al.  Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers [Book Review] , 2002, Computer.

[77]  E. Kuznetsov,et al.  Continuous, saturation, and discontinuous tokamak plasma vertical position control systems , 2016 .

[78]  Michael J. Butler,et al.  Decomposition Structures for Event-B , 2009, IFM.

[79]  Michael J. Butler,et al.  An Open Extensible Tool Environment for Event-B , 2006, ICFEM.

[80]  Thomas A. Henzinger,et al.  A Survey of Bidding Games on Graphs (Invited Paper) , 2020, CONCUR.

[81]  Björn Wachter,et al.  Towards Symbolic State Traversal for Efficient WCET Analysis of Abstract Pipeline and Cache Models , 2007, WCET.

[82]  Mathieu Jan,et al.  Formal Executable Models for Automatic Detection of Timing Anomalies , 2018, WCET.

[83]  Michael Leuschel,et al.  Improving Railway Data Validation with ProB , 2013, Industrial Deployment of System Engineering Methods.

[84]  Rance Cleaveland,et al.  Probabilistic reachability for multi-parameter bifurcation analysis of cardiac alternans , 2018, Theor. Comput. Sci..

[85]  Pierre Wolper,et al.  An Automata-Theoretic Approach to Automatic Program Verification (Preliminary Report) , 1986, LICS.

[86]  Michael Leuschel,et al.  Using B and ProB for Data Validation Projects , 2016, ABZ.

[87]  M. Pachter,et al.  Research issues in autonomous control of tactical UAVs , 1998, Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No.98CH36207).

[88]  André Platzer,et al.  Pegasus: A Framework for Sound Continuous Invariant Generation , 2019, FM.

[89]  David Déharbe,et al.  Safety Analysis of a CBTC System: A Rigorous Approach with Event-B , 2017, RSSRail.

[90]  Josep Silva,et al.  A vocabulary of program slicing-based techniques , 2012, CSUR.

[91]  Sylvain Conchon,et al.  Low Cost High Integrity Platform , 2020, ArXiv.

[92]  Marieke Huisman,et al.  Formal Methods: From Academia to Industrial Practice. A Travel Guide , 2020, ArXiv.

[93]  Spyridon Samonas,et al.  The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security , 2014 .

[94]  Jan Reineke,et al.  Design and Analysis of SIC: A Provably Timing-Predictable Pipelined Processor Core , 2018, 2018 IEEE Real-Time Systems Symposium (RTSS).

[95]  Jonathan P. Bowen,et al.  Ten Commandments of Formal Methods , 1995, Computer.

[96]  Jean-Raymond Abrial,et al.  The Rodin Platform Has Turned Ten , 2014, ABZ.

[97]  Ehsan Khamespanah,et al.  Timed Rebeca schedulability and deadlock freedom analysis using bounded floating time transition system , 2015, Sci. Comput. Program..

[98]  Kim G. Larsen,et al.  UPPAAL-Tiga: Time for Playing Games! , 2007, CAV.

[99]  Jeannette M. Wing A specifier's introduction to formal methods , 1990, Computer.

[100]  Colin F. Snook,et al.  Formal Modelling Techniques for Efficient Development of Railway Control Products , 2017, RSSRail.

[101]  Yang Liu,et al.  An Automatic Approach to Model Checking UML State Machines , 2010, 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion.

[102]  Gianluigi Greco,et al.  The Complexity of LTL on Finite Traces: Hard and Easy Fragments , 2016, AAAI.

[103]  Erik D. Demaine,et al.  Energy-Efficient Algorithms , 2016, ITCS.

[104]  Atif Mashkoor,et al.  Evaluating the suitability of state‐based formal methods for industrial deployment , 2018, Softw. Pract. Exp..

[105]  Dexter Kozen,et al.  Results on the Propositional µ-Calculus , 1982, ICALP.

[106]  Michael Leuschel,et al.  Property-Based Modelling and Validation of a CBTC Zone Controller in Event-B , 2019, RSSRail.

[107]  Michael J. Butler,et al.  Rewriting and Well-Definedness within a Proof System , 2010, PAR@ITP.

[108]  Neil Evans,et al.  Hardware Verification and Beyond: Using B at AWE , 2007, B.

[109]  Jean-Pierre Jacquot,et al.  JeB: Safe Simulation of Event-B Models in JavaScript , 2013, 2013 20th Asia-Pacific Software Engineering Conference (APSEC).

[110]  Edward A. Lee,et al.  Model Checking Software in Cyberphysical Systems , 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC).

[111]  Michael Paulitsch,et al.  Using TLA+ in the Development of a Safety-Critical Fault-Tolerant Middleware , 2017, 2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).

[112]  Fabienne Boyer,et al.  Specifying and Verifying the SYNERGY Reconfiguration Protocol with LOTOS NT and CADP , 2011, FM.

[113]  Bernhard Steffen,et al.  The physics of software tools: SWOT analysis and vision , 2017, International Journal on Software Tools for Technology Transfer.

[114]  Manuel V. Hermenegildo,et al.  Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models , 2013, LOPSTR.

[115]  Jan Reineke,et al.  Enabling Compositionality for Multicore Timing Analysis , 2016, RTNS.

[116]  Bernard van Gastel,et al.  Assessing sustainability of software - Analysing Correctness, Memory and Energy Consumption , 2016 .

[117]  William Chan Temporal-logic queries , 2000 .

[118]  Jian Yang,et al.  A Hierarchical Cooperative Mission Planning Mechanism for Multiple Unmanned Aerial Vehicles , 2019, Electronics.

[119]  Michael J. Butler,et al.  ProB: an automated analysis toolset for the B method , 2008, International Journal on Software Tools for Technology Transfer.

[120]  Olivier Boite Automatiser les preuves d'un sous-langage de la méthode B , 2002, Tech. Sci. Informatiques.

[121]  Dana Dghaym,et al.  Formalising the Hybrid ERTMS Level 3 specification in iUML-B and Event-B , 2019, International Journal on Software Tools for Technology Transfer.

[122]  Axel Legay,et al.  Modelling and Analysing ERTMS L3 Moving Block Railway Signalling with Simulink and Uppaal SMC , 2019, FMICS.

[123]  Ehsan Khamespanah,et al.  On Time Actors , 2016, Theory and Practice of Formal Methods.

[124]  A. Tarski A Decision Method for Elementary Algebra and Geometry , 2023 .

[125]  Charles Pecheur,et al.  Verification of Railway Interlocking - Compositional Approach with OCRA , 2016, RSSRail.

[126]  Kees Verstoep,et al.  From UML to Process Algebra and Back: An Automated Approach to Model-Checking Software Design Artifacts of Concurrent Systems , 2013, NASA Formal Methods.

[127]  Ehsan Khamespanah,et al.  Modeling and analyzing real-time wireless sensor and actuator networks using actors and model checking , 2018, International Journal on Software Tools for Technology Transfer.

[128]  Rance Cleaveland,et al.  A Tableau Construction for Finite Linear-Time Temporal Logic , 2019, ArXiv.

[129]  Avi Ostfeld,et al.  Characterizing Cyber-Physical Attacks on Water Distribution Systems , 2017 .

[130]  Thomas A. Henzinger,et al.  Handbook of Model Checking , 2018, Springer International Publishing.

[131]  Maurice H. ter Beek,et al.  Adopting Formal Methods in an Industrial Setting: The Railways Case , 2019, FM.

[132]  Thierry Lecomte Applying a Formal Method in Industry: A 15-Year Trajectory , 2009, FMICS.

[133]  Martin Hofmann,et al.  Multivariate amortized resource analysis , 2012, TOPL.

[134]  Dominique Cansell,et al.  Click'n Prove: Interactive Proofs within Set Theory , 2003, TPHOLs.

[135]  Tal Shima,et al.  A Task and Motion Planning Algorithm for the Dubins Travelling Salesperson Problem , 2014 .

[136]  Francisco J. Cazorla,et al.  Merasa: Multicore Execution of Hard Real-Time Applications Supporting Analyzability , 2010, IEEE Micro.

[137]  Josef Tkadlec,et al.  All-Pay Bidding Games on Graphs , 2019, AAAI.

[138]  Grigore Rosu,et al.  Allen Linear (Interval) Temporal Logic - Translation to LTL and Monitor Synthesis , 2006, CAV.

[139]  Denis Sabatier Using Formal Proof and B Method at System Level for Industrial Projects , 2016, RSSRail.

[140]  Eddie Jaffuel Using B Machines for Model-Based Testing of Smartcard Software , 2007, B.

[141]  Kim G. Larsen,et al.  Uppaal Stratego , 2015, TACAS.

[142]  Robert Atkey,et al.  Amortised Resource Analysis with Separation Logic , 2010, ESOP.

[143]  Shiqiang Hu,et al.  2D path planning with dubins-path-based A∗ algorithm for a fixed-wing UAV , 2017, 2017 3rd IEEE International Conference on Control Science and Systems Engineering (ICCSSE).

[144]  Henrik Sandberg,et al.  A Survey of Physics-Based Attack Detection in Cyber-Physical Systems , 2018, ACM Comput. Surv..

[145]  Marsha Chechik,et al.  Temporal Logic Query Checking: A Tool for Model Exploration , 2003, IEEE Trans. Software Eng..

[146]  Carmel Domshlak,et al.  Integrating Task and Motion Planning for Unmanned Aerial Vehicles , 2014 .

[147]  Xianfeng Li,et al.  Estimating the Worst-Case Energy Consumption of Embedded Software , 2006, 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'06).

[148]  Thomas A. Henzinger,et al.  Alternating-time temporal logic , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[149]  André Platzer,et al.  Differential Hybrid Games , 2015, ACM Trans. Comput. Log..

[150]  Rance Cleaveland,et al.  Query Checking for Linear Temporal Logic , 2017, FMICS-AVoCS.

[151]  Viet Anh Nguyen,et al.  Using Model Checking to Identify Timing Interferences on Multicore Processors , 2020 .

[152]  Jean-Baptiste Jeannin,et al.  Formally Verified Safe Vertical Maneuvers for Non-deterministic, Accelerating Aircraft Dynamics , 2017, ITP.

[153]  Fred Kröger,et al.  Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.

[154]  Fabienne Boyer,et al.  Robust reconfigurations of component assemblies , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[155]  Dr. A. Leventi-Peetz Summary of the book : Formal Methods for Safe and Secure Computer Systems , 2013 .

[156]  James C. King,et al.  Symbolic execution and program testing , 1976, CACM.

[157]  André Platzer,et al.  The Complete Proof Theory of Hybrid Systems , 2012, 2012 27th Annual IEEE Symposium on Logic in Computer Science.

[158]  Edward A. Lee,et al.  A PRET architecture supporting concurrent programs with composable timing properties , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[159]  Fabienne Boyer,et al.  Verification of a Self-configuration Protocol for Distributed Applications in the Cloud , 2013, Assurances for Self-Adaptive Systems.

[160]  Sasa Z. Djokic,et al.  An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems , 2015, ICA3PP.

[161]  Jan Reineke,et al.  Towards compositionality in execution time analysis: definition and challenges , 2015, SIGBED.

[162]  Thierry Lecomte,et al.  The Bourgeois Gentleman, Engineering and Formal Methods , 2020, FM Workshops.

[163]  Dieter Gollmann,et al.  Cyber-Physical Systems Security: Experimental Analysis of a Vinyl Acetate Monomer Plant , 2015, CPSS@ASIACSS.

[164]  Ludovic Noirie,et al.  Rigorous Design and Deployment of IoT Applications , 2019, 2019 IEEE/ACM 7th International Conference on Formal Methods in Software Engineering (FormaliSE).

[165]  Michael J. Butler,et al.  The First Twenty-Five Years of Industrial Use of the B-Method , 2020, FMICS.

[166]  Eelco Visser,et al.  A Language Designer's Workbench: A One-Stop-Shop for Implementation and Verification of Language Designs , 2014, Onward!.

[167]  André Platzer,et al.  Differential Dynamic Logic for Hybrid Systems , 2008, Journal of Automated Reasoning.

[168]  Alexandre Duret-Lutz,et al.  Spot 2 . 0 — a framework for LTL and ω-automata manipulation , 2016 .

[169]  Michael J. Butler,et al.  On an Extensible Rule-Based Prover for Event-B , 2010, ASM.

[170]  Fabienne Boyer,et al.  Reliable self-deployment of cloud applications , 2014, SAC.

[171]  thierry lecomte,et al.  Formal Methods in Safety-Critical Railway Systems , 2007 .

[172]  Salah Obeid Developing Safety Critical Applications , 2004 .

[173]  Edmund M. Clarke,et al.  Formal Verification of Curved Flight Collision Avoidance Maneuvers: A Case Study , 2009, FM.

[174]  Wang Yi,et al.  Timed Automata: Semantics, Algorithms and Tools , 2003, Lectures on Concurrency and Petri Nets.

[175]  Michael Leuschel,et al.  Using a Formal B Model at Runtime in a Demonstration of the ETCS Hybrid Level 3 Concept with Real Trains , 2018, ABZ.

[176]  Michael Leuschel,et al.  BMotionWeb: A Tool for Rapid Creation of Formal Prototypes , 2016, SEFM.

[177]  George E. Collins,et al.  Partial Cylindrical Algebraic Decomposition for Quantifier Elimination , 1991, J. Symb. Comput..

[178]  Thomas A. Henzinger,et al.  Infinite-duration Bidding Games , 2017, CONCUR.

[179]  Marc V. Benveniste On Using B in the Design of Secure Micro-controllers: An Experience Report , 2011, Electron. Notes Theor. Comput. Sci..

[180]  Wei Chen,et al.  dReach: δ-Reachability Analysis for Hybrid Systems , 2015, TACAS.

[181]  André Platzer,et al.  Logical Foundations of Cyber-Physical Systems , 2018, Springer International Publishing.

[182]  Fabrice Bouquet,et al.  BZ-testing-tools: A tool-set for test generation from Z and B using constraint logic programming , 2002 .

[183]  Ramakrishnan Srikant,et al.  Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[184]  Michael Golm,et al.  Formal Verification of Train Control with Air Pressure Brakes , 2017, RSSRail.

[185]  Thomas A. Henzinger,et al.  Infinite-Duration Poorman-Bidding Games , 2018, WINE.

[186]  Xiang Ma,et al.  Receding Horizon Planning for Dubins Traveling Salesman Problems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[187]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.

[188]  Thomas A. Henzinger,et al.  The theory of hybrid automata , 1996, Proceedings 11th Annual IEEE Symposium on Logic in Computer Science.

[189]  Dines Bjørner,et al.  40 Years of Formal Methods - Some Obstacles and Some Possibilities? , 2014, FM.

[190]  Jeong-Han Yun,et al.  A Comparison of ICS Datasets for Security Research Based on Attack Paths , 2018, CRITIS.

[191]  Antonio Brogi,et al.  Fault-aware management protocols for multi-component applications , 2018, J. Syst. Softw..

[192]  Elvira Albert,et al.  COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode , 2008, FMCO.

[193]  Ludovic Noirie,et al.  IoT Composer: Composition and Deployment of IoT Applications , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion).

[194]  Michael Cohen,et al.  Energy types , 2012, OOPSLA '12.

[195]  Ping Zhang,et al.  Modeling and detection of cyber attacks on discrete event systems , 2018 .

[196]  Jean-Raymond Abrial,et al.  Formal Methods: Theory Becoming Practice , 2007, J. Univers. Comput. Sci..

[197]  Michael Leuschel,et al.  Under consideration for publication in Formal Aspects of Computing Automated Property Verification for Large Scale B Models with ProB , 2010 .

[198]  Martin Leucker,et al.  Runtime Verification for Linear-Time Temporal Logic , 2016, SETSS.

[199]  Majid Nili Ahmadabadi,et al.  Bounded Rational Search for On-the-Fly Model Checking of LTL Properties , 2009, FSEN.

[200]  Jean-Baptiste Jeannin,et al.  Hybrid Theorem Proving of Aerospace Systems: Applications and Challenges , 2014, J. Aerosp. Inf. Syst..

[201]  Andy R. Terrel,et al.  SymPy: Symbolic computing in Python , 2017, PeerJ Prepr..

[202]  Kim G. Larsen,et al.  Formal Analysis and Testing of Real-Time Automotive Systems Using UPPAAL Tools , 2015, FMICS.

[203]  Christel Baier,et al.  Principles of model checking , 2008 .

[204]  Jan Friso Groote,et al.  Parameterised boolean equation systems , 2005, Theor. Comput. Sci..

[205]  Rudolf Ahlswede,et al.  Incomparability and Intersection Properties of Boolean Interval Lattices and Chain Posets , 1996, Eur. J. Comb..

[206]  André Platzer,et al.  Formal verification of obstacle avoidance and navigation of ground robots , 2016, Int. J. Robotics Res..

[207]  Paulo Romero Martins Maciel,et al.  Analyzing Software Performance and Energy Consumption of Embedded Systems by Probabilistic Modeling: An Approach Based on Coloured Petri Nets , 2006, ICATPN.

[208]  Jean-Louis LANET The use of B for Smart Card , 2002 .

[209]  Mahshid Helali Moghadam,et al.  From Requirements to Verifiable Executable Models Using Rebeca , 2020, SEFM.

[210]  Michael Leuschel,et al.  Visualising Event-B Models with B-Motion Studio , 2009, FMICS.

[211]  Marko C. J. D. van Eekelen,et al.  Skylines for Symbolic Energy Consumption Analysis , 2020, FMICS.

[212]  Nathan Fulton,et al.  Bellerophon: Tactical Theorem Proving for Hybrid Systems , 2017, ITP.

[213]  Ken Robinson The B Method and the B Toolkit , 1997, AMAST.

[214]  Jan Friso Groote,et al.  Modeling and Analysis of Communicating Systems , 2014 .

[215]  Ofer Strichman,et al.  Variants of LTL Query Checking , 2010, Haifa Verification Conference.

[216]  Edward A. Lee,et al.  Ptolemy: A Framework for Simulating and Prototyping Heterogenous Systems , 2001, Int. J. Comput. Simul..

[217]  Hannu Tenhunen,et al.  Fault tolerant and scalable IoT-based architecture for health monitoring , 2015, 2015 IEEE Sensors Applications Symposium (SAS).

[218]  A. Tsourdos,et al.  Formal techniques for the modelling and validation of a co-operating UAV team that uses Dubins set for path planning , 2005, Proceedings of the 2005, American Control Conference, 2005..

[219]  Erik P. de Vink,et al.  The mCRL2 Toolset for Analysing Concurrent Systems - Improvements in Expressivity and Usability , 2019, TACAS.

[220]  Edmund M. Clarke,et al.  Formal Methods: State of the Art and Future Directions Working Group Members , 1996 .

[221]  J.K. Hedrick,et al.  Path planning and control for multiple point surveillance by an unmanned aircraft in wind , 2006, 2006 American Control Conference.

[222]  N. W. Eidietis,et al.  Disruption prediction investigations using Machine Learning tools on DIII-D and Alcator C-Mod , 2018, Plasma Physics and Controlled Fusion.

[223]  Margaret Martonosi,et al.  Wattch: a framework for architectural-level power analysis and optimizations , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).

[224]  Ariel Felner,et al.  Theta*: Any-Angle Path Planning on Grids , 2007, AAAI.

[225]  Gustavo Rau de Almeida Callou,et al.  A Formal Model for Performance and Energy Evaluation of Embedded Systems , 2011, EURASIP J. Embed. Syst..

[226]  Neil Evans,et al.  Modelling and Refinement in CODA , 2013, Refine@IFM.

[227]  Edmund M. Clarke,et al.  Symbolic model checking for sequential circuit verification , 1993, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[228]  Edmund M. Clarke,et al.  Characterizing Finite Kripke Structures in Propositional Temporal Logic , 1988, Theor. Comput. Sci..

[229]  George S. Avrunin,et al.  Patterns in property specifications for finite-state verification , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[230]  Thierry Servat,et al.  BRAMA: A New Graphic Animation Tool for B Models , 2007, B.

[231]  Nathan Fulton,et al.  Verifiably Safe Off-Model Reinforcement Learning , 2019, TACAS.

[232]  Goran Frehse,et al.  PHAVer: algorithmic verification of hybrid systems past HyTech , 2005, International Journal on Software Tools for Technology Transfer.

[233]  Marko C. J. D. van Eekelen,et al.  A Hoare Logic for Energy Consumption Analysis , 2013, FOPARA.

[234]  Jim Woodcock,et al.  Industrial Deployment of Formal Methods: Trends and Challenges , 2013, Industrial Deployment of System Engineering Methods.

[235]  Patrice Godefroid,et al.  Temporal logic query checking , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.

[236]  Parthasarathy Ranganathan Recipe for efficiency: principles of power-aware computing , 2010, CACM.

[237]  Michael Leuschel,et al.  VisB: A Lightweight Tool to Visualize Formal Models with SVG Graphics , 2020, ABZ.

[238]  Sam Payne,et al.  Discrete bidding games , 2010, Electron. J. Comb..

[239]  Rushby John,et al.  Formal Methods and Digital Systems Validation for Airborne Systems , 2003 .

[240]  Thomas A. Henzinger,et al.  Determinacy in Discrete-Bidding Infinite-Duration Games , 2019, CONCUR.

[241]  Flemming Nielson,et al.  Semantics with applications - a formal introduction , 1992, Wiley professional computing.

[242]  Bas Luttik,et al.  Formal Modelling and Verification of an Interlocking Using mCRL2 , 2019, FMICS.

[243]  Martin Lange,et al.  The Complexity of Model Checking Higher-Order Fixpoint Logic , 2007, Log. Methods Comput. Sci..

[244]  G. Ambrosino,et al.  Magnetic control of plasma current, position, and shape in Tokamaks: a survey or modeling and control approaches , 2005, IEEE Control Systems.

[245]  Chi-Sheng Shih,et al.  Supporting Service Adaptation in Fault Tolerant Internet of Things , 2015, 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA).

[246]  Jeannette M. Wing What is a specification language ? , 2001 .

[247]  Martin Hofmann,et al.  A program logic for resources , 2007, Theor. Comput. Sci..

[248]  Andreas Rausch,et al.  Checking Consistency of Real-Time Requirements on Distributed Automotive Control Software Early in the Development Process Using UPPAAL , 2018, FMICS.

[249]  Frédéric Badeau,et al.  Formal Data Validation with Event-B , 2012, ArXiv.

[250]  Lawrie Brown,et al.  Computer Security: Principles and Practice , 2007 .

[251]  Thomas A. Henzinger,et al.  The benefits of relaxing punctuality , 1991, PODC '91.

[252]  Y. Peres,et al.  Tug-of-war and the infinity Laplacian , 2006, math/0605002.

[253]  Edmund M. Clarke,et al.  dReal: An SMT Solver for Nonlinear Theories over the Reals , 2013, CADE.

[254]  Maria Grazia Fugini,et al.  Exception Handling for Repair in Service-Based Processes , 2010, IEEE Transactions on Software Engineering.

[255]  Antoine Girard,et al.  SpaceEx: Scalable Verification of Hybrid Systems , 2011, CAV.

[256]  Stephan Merz,et al.  Model checking UML state machines and collaborations , 2001, Workshop on Software Model Checking @ CAV.

[257]  Daniel Dollé,et al.  B in Large-Scale Projects: The Canarsie Line CBTC Experience , 2007, B.

[258]  Pascal Sainrat,et al.  OTAWA: An Open Toolbox for Adaptive WCET Analysis , 2010, SEUS.

[259]  Michael Leuschel,et al.  Automated Property Verification for Large Scale B Models , 2009, FM.

[260]  Bernd Becker,et al.  A Definition and Classification of Timing Anomalies , 2006, WCET.

[261]  Gerardo Rubino,et al.  Introduction to Rare Event Simulation , 2009, Rare Event Simulation using Monte Carlo Methods.

[262]  Martin Lange,et al.  Model checking for hybrid branching-time logics , 2020, J. Log. Algebraic Methods Program..

[263]  Armando Solar-Lezama,et al.  Verifiably safe exploration for end-to-end reinforcement learning , 2020, HSCC.

[264]  J. R. Abraial The B tool , 1988 .

[265]  Nathan Fulton,et al.  Safe Reinforcement Learning via Formal Methods: Toward Safe Control Through Proof and Learning , 2018, AAAI.

[266]  Edward A. Lee,et al.  Aspect-oriented modeling of attacks in automotive Cyber-Physical Systems , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[267]  Giuseppe De Giacomo,et al.  Linear Temporal Logic and Linear Dynamic Logic on Finite Traces , 2013, IJCAI.

[268]  Fabrice Bouquet,et al.  CLPS-B - A Constraint Solver for B , 2002, TACAS.

[269]  Michael Leuschel,et al.  Validation and real-life demonstration of ETCS hybrid level 3 principles using a formal B model , 2020, International Journal on Software Tools for Technology Transfer.

[270]  Maurice H. ter Beek,et al.  On the Industrial Uptake of Formal Methods in the Railway Domain - A Survey with Stakeholders , 2018, IFM.

[271]  Fabienne Boyer,et al.  Reliable self‐deployment of distributed cloud applications , 2017, Softw. Pract. Exp..

[272]  Douglas B. Terry,et al.  Toward a New Approach to IoT Fault Tolerance , 2016, Computer.

[273]  Jean-Baptiste Jeannin,et al.  A formally verified hybrid system for safe advisories in the next-generation airborne collision avoidance system , 2016, International Journal on Software Tools for Technology Transfer.

[274]  Nathan Fulton,et al.  KeYmaera X: An Axiomatic Tactical Theorem Prover for Hybrid Systems , 2015, CADE.

[275]  Ulrich Berger,et al.  Verification of the European Rail Traffic Management System in Real-Time Maude , 2017, Sci. Comput. Program..

[276]  Benedikt Huber,et al.  T-CREST: Time-predictable multi-core architecture for embedded systems , 2015, J. Syst. Archit..

[277]  Jean-Baptiste Jeannin,et al.  Formal verification of braking while swerving in automobiles , 2020, HSCC.

[278]  Diego Latella,et al.  Automatic Verification of a Behavioural Subset of UML Statechart Diagrams Using the SPIN Model-checker , 1999, Formal Aspects of Computing.

[279]  Edward A. Lee,et al.  Formal Semantics of Predictable Pipelines: a Comparative Study , 2020, 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC).

[280]  Stefan Leue,et al.  Automated Functional Safety Analysis of Automated Driving Systems , 2018, FMICS.

[281]  A. Prasad Sistla,et al.  On Model-Checking for Fragments of µ-Calculus , 1993, CAV.

[282]  Matthias Althoff,et al.  Analyzing Reachability of Linear Dynamic Systems with Parametric Uncertainties , 2011 .

[283]  A. Prasad Sistla,et al.  The complexity of propositional linear temporal logics , 1982, STOC '82.

[284]  Faron Moller,et al.  Rooting Formal Methods within Higher Education Curricula for Computer Science and Software Engineering - A White Paper , 2020, FMFun.

[285]  Adam Shostack,et al.  Threat Modeling: Designing for Security , 2014 .

[286]  M. Rabin Decidability of second-order theories and automata on infinite trees , 1968 .

[287]  J. Propp,et al.  Combinatorial Games under Auction Play , 1999 .

[288]  Sanjit A. Seshia,et al.  UCLID5: Integrating Modeling, Verification, Synthesis and Learning , 2018, 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE).

[289]  Edmund M. Clarke,et al.  Model Checking and the State Explosion Problem , 2011, LASER Summer School.

[290]  Rayman Preet Singh,et al.  Rivulet: a fault-tolerant platform for smart-home applications , 2017, Middleware.

[291]  Nils Ole Tippenhauer,et al.  Towards Formal Security Analysis of Industrial Control Systems , 2017, AsiaCCS.

[292]  G. Tommasi Plasma Magnetic Control in Tokamak Devices , 2019 .