Causality-Aided Falsification
暂无分享,去创建一个
[1] Oded Maler,et al. Robust Satisfaction of Temporal Logic over Real-Valued Signals , 2010, FORMATS.
[2] Houssam Abbas,et al. Benchmarks for Temporal Logic Requirements for Automotive Systems , 2014, ARCH@CPSWeek.
[3] Sriram Sankaranarayanan,et al. Falsification of temporal properties of hybrid systems using the cross-entropy method , 2012, HSCC '12.
[4] Houssam Abbas,et al. Using S-TaLiRo on Industrial Size AuImmlertomotive Models , 2015, ARCH@CPSWeek.
[5] Ichiro Hasuo,et al. Input Synthesis for Sampled Data Systems by Program Logic , 2014, HAS.
[6] Andreas Krause,et al. Information-Theoretic Regret Bounds for Gaussian Process Optimization in the Bandit Setting , 2009, IEEE Transactions on Information Theory.
[7] Sriram Sankaranarayanan,et al. S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems , 2011, TACAS.
[8] Takumi Akazaki. Falsification of Conditional Safety Properties for Cyber-Physical Systems with Gaussian Process Regression , 2016, RV.
[9] Claire Jones,et al. Probabilistic non-determinism , 1990 .
[10] Thomas A. Henzinger,et al. The benefits of relaxing punctuality , 1991, JACM.
[11] Gang Chen,et al. Active Requirement Mining of Bounded-Time Temporal Properties of Cyber-Physical Systems , 2016, ArXiv.
[12] Alexandre Donzé,et al. Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems , 2010, CAV.
[13] Christopher K. I. Williams,et al. Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning) , 2005 .
[14] George J. Pappas,et al. Robustness of temporal logic specifications for continuous-time signals , 2009, Theor. Comput. Sci..
[15] Gang Chen,et al. Active learning based requirement mining for cyber-physical systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[16] Dexter Kozen,et al. Semantics of probabilistic programs , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[17] Sriram Sankaranarayanan,et al. A trajectory splicing approach to concretizing counterexamples for hybrid systems , 2013, 52nd IEEE Conference on Decision and Control.
[18] Annabelle McIver,et al. Probabilistic predicate transformers , 1996, TOPL.
[19] Ichiro Hasuo,et al. Time Robustness in MTL and Expressivity in Hybrid System Falsification , 2015, CAV.
[20] J. Mockus. Bayesian Approach to Global Optimization: Theory and Applications , 1989 .
[21] Dejan Nickovic,et al. Monitoring Temporal Properties of Continuous Signals , 2004, FORMATS/FTRTFT.
[22] Sriram Sankaranarayanan,et al. Multiple shooting, CEGAR-based falsification for hybrid systems , 2014, EMSOFT '14.
[23] James Kapinski,et al. Stochastic Local Search for Falsification of Hybrid Systems , 2015, ATVA.
[24] Joost-Pieter Katoen,et al. Reasoning about Recursive Probabilistic Programs* , 2016, 2016 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS).
[25] Sriram Sankaranarayanan,et al. Requirements driven falsification with coverage metrics , 2015, 2015 International Conference on Embedded Software (EMSOFT).