Software Formal Verification Research Topics for MS PhD
Software Formal Verification Research Topic ideas for MS, or Ph.D. Degree
I am sharing with you some of the research topics regarding Software Formal Verification that you can choose for your research proposal for the thesis work of MS, or Ph.D. Degree.
- A systematic literature review on formal verification of software‐defined networks
- Empowering SysML-based software architecture description with formal verification: from SysADL to CSP
- A Survey on the Applications of Swarm Intelligence to Software Verification
- Formal Verification of a Merge Sort Algorithm in SPARK
- Formal analysis and verification of airborne software based on DO-333
- Formal Verification Issues For Component-Based Development
- kPWorkbench: A software suit for membrane systems
- A formal approach to AADL model-based software engineering
- Advances in automatic software verification: SV-COMP 2020
- Formal Verification of High-Level Synthesis
- Formal verification of input-output mappings of tree ensembles
- Software verification: 10th comparative evaluation (SV-COMP 2021)
- Formal verification of SDN-based firewalls by using TLA+
- Are you sure your software will not kill anyone?
- FVIL: Intermediate Language Based on Formal Verification Virtual Machine
- Natural Hoare Logic: Towards formal verification of programs from logical forms of natural language specifications
- Security modelling and formal verification of survivability properties: Application to cyber–physical systems
- Formal Verification of Neural Networks?
- Using taint analysis and reinforcement learning (tarl) to repair autonomous robot software
- Verification of cyberphysical systems
- Modeling and Verification of Launch Vehicle Onboard Software Using SPIN Model Checker
- A security modeling and verification method of embedded software based on Z and MARTE
- FORMAL VERIFICATION OF AN AUTONOMOUS GRASPING ALGORITHM
- Towards automated service-oriented verification of embedded control software modeled in Simulink
- Software Engineering and Formal Methods LNCS 12310
- Verification and testing of safety-critical airborne systems: A model-based methodology
- Continuous Formal Verification of Microservice-Based Process Flows
- Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature Review
- Introduction to the minitrack on software development for mobile devices, the internet-of-things, and cyber-physical systems
- Formal Verification and Design of Smart Stick for Blind People
- Towards Formal Verification of Autonomous Driving Supervisor Functions
- A security policy model transformation and verification approach for software defined networking
- A systematic map on verification and validation of emergent behavior in software engineering research
- Software Verification with PDR: An Implementation of the State of the Art
- Improving the formal verification of reachability policies in virtualized networks
- Hardware/Software Co-verification Using Path-based Symbolic Execution
- Analysis of existing parallel programs verification technologies
- Security-Minded Verification of Space Systems
- Formal verification of braking while swerving in automobiles
- Code-level model checking in the software development workflow
- Coco: Co-design and co-verification of masked software implementations on CPUs
- Verified Hardware/Software Co-Assurance: Enhancing Safety and Security for Critical Systems
- Formal verification of cP systems using PAT3 and ProB
- Formal Verification of Functional Requirements for Smart Contract Compositions in Supply Chain Management Systems
- Towards formal verification of IoT protocols: A review
- Formal Verification of Tree Ensembles in Safety-Critical Applications
- Formal verification of a hybrid machine learning-based fault prediction model in Internet of Things applications
- Simulation-Based and Formal Verification of Domain-Specific Language Model
- Bridging the gap between formal verification and schedulability analysis: The case of robotics
- Rooting Formal Methods within Higher Education Curricula for Computer Science and Software Engineering–A White Paper
- Reductions and abstractions for formal verification of distributed round-based algorithms
- A Formal Verification Framework for Security Issues of Blockchain Smart Contracts
- Model checking software in cyberphysical systems
- Exploring the effects of environmental conditions and design choices on IoT systems using formal methods
- Formal Verification of Hardware Components in Critical Systems
- Formal Verification of Neural Agents in Non-deterministic Environments.
- Formal verification of a task scheduler for embedded operating systems
- Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges
- Testing and verification of neural-network-based safety-critical control software: A systematic literature review
- Formal Verification Tool Evaluation For Unmanned Aircraft Containing Complex Functions
- Towards Compositional Verification for Modular Robotic Systems
- Formal Verification of an Industrial Distributed Algorithm: an Experience Report
- State of the Art in Software Tool Qualification with DO-330: A Survey
- Modeling and Formal Verification of Interlocking System Based on UML and HCPN
- Scratch-Based User-Friendly Requirements Definition for Formal Verification of Control Systems
- Formal Verification of Intelligent Cyber-Physical Systems with the Interactive Theorem Prover KeYmaera X
- A hybrid formal verification approach for QoS-aware multi-cloud service composition
- Benchmarking software model checkers on automotive code
- A Software Fault Tree Analysis Technique for Formal Requirement Specifications of Nuclear Reactor Protection Systems
- Formal Verification of a Distributed Algorithm for Task Execution
- From testing to formal verification in Haskell
- A secure hardware-software solution based on RISC-V, logic locking and microkernel
- Software Reliability Growth as an Offshoot of Verification and Validation Process
- Formal Verification and Performance Analysis of a Data Exchange Protocol for Connected Vehicles
- Attend and Represent: A Novel View on Algorithm Selection for Software Verification
- … Formal Methods, Verification and Validation: Verification Principles: 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020 …
- Formal verification and model-based testing techniques for validating a blockchain-based healthcare records sharing system
- Towards Formal Verification of Program Obfuscation
- Accidental Sensitive Data Leaks Prevention via Formal Verification.
- Verification of Virtual Machine Architecture in a Hypervisor through Model Checking
- Model‐based hypothesis testing of uncertain software systems
- Verification of smart contracts: A survey
- Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process
- Detecting execution anomalies as an oracle for autonomy software robustness
- Formal Verification of Astronaut-Rover Teams for Planetary Surface Operations
- Simplifying neural networks using formal verification
- Formal verification of parallel prefix sum
- Formal verification of misbinding attacks on secure device pairing and bootstrapping
- A User-Friendly Verification Approach for IEC 61131-3 PLC Programs
- Modeling and verifying the topology discovery mechanism of OpenFlow controllers in software-defined networks using process algebra
- Detecting semantic bugs in autopilot software by classifying anomalous variables
- Formal verification of timed synchronous dataflow graphs using Lustre
- {APEX}: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
- Dynamic software updating: a systematic mapping study
- Abstract Transducers for Software Analysis and Verification
- Towards a unified catalog of attributes to guide industry in software testing technique selection
- QED at large: A survey of engineering of formally verified software
- Masking in fine-grained leakage models: Construction, implementation and verification
- Bridging the Gap Between Requirements and Simulink Model Analysis.
- On the Verification of Smart Contracts: A Systematic Review
- On slicing software product line signatures
- A hybrid formal verification system in coq for ensuring the reliability and security of ethereum-based service smart contracts
- A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs
- A framework for formal verification of behavior trees with linear temporal logic
- Towards Model Checking Real-World Software-Defined Networks
- Verification of Software Network Functions with No Verification Expertise
- Tamarin software–the tool for protocols verification security
- An efficient approach to state space management in model checking of complex software systems using machine learning techniques
- A Learning Framework for Intelligent Selection of Software Verification Algorithms
- Atomic Predicates-Based Data Plane Properties Verification in Software Defined Networking Using Spark
- Adaptive middleware in go-a software architecture-based approach
- Cloud-Ready Acceleration of Formal Method Techniques for Cyber-Physical Systems
- A software architecture for autonomous taxiing of aircraft
- Automated Software Verification using Superposition-based Theorem Proving
- Mind the gap: robotic mission planning meets software engineering
- On Decomposing Formal Verification of CTL-based Properties on IaaS Cloud Environment
- Software requirements elicitation, verification, and documentation: an ontology based approach
- Verifiable self-aware agent-based autonomous systems
- Formal verification of some mutual exclusion
- Formal verification of Fischer’s real-time mutual exclusion protocol by the OTS/CafeOBJ method
- Statistical model checking for blockchain-based applications
- Moderator Factors of Software Security and Performance Verification
- Towards Compositional Verification for Modular Robotic Systems
- Algorithm selection for software validation based on graph kernels
- Formal Verification of Swerving Maneuvers for Car Collision Avoidance
- SW-VHDL Co-Verification Environment Using Open Source Tools
- Combined software and hardware fault injection vulnerability detection
- Formal Verification of Access Control Model for My Health Record System
- Formal verification by the book: Error detection and correction codes
- Formal Verification of Multi-agent Plans for Vehicle Platooning
- Deep Learning & Software Engineering: State of Research and Future Directions
- Handling B models in the PERF integrated verification framework: Formalised and certified embedding
- A survey on network forwarding in Software-Defined Networking
- Verifying OpenJDK’s LinkedList using KeY
- A Formal Verification Approach for Detecting Opcode Trojans
- Erroneous models in neural networks and their threats for formal verification
- Verification of system-wide safety properties of ROS applications
- A verified optimizer for quantum circuits
- Verification of Programs with Pointers in SPARK
- Metastases or benign adrenal lesions in patients with histopathological verification of lung cancer: can CT texture analysis distinguish?
- A Parallel Tableau Algorithm for BIG DATA Verification
- Formal Verification of Workflow Policies for Smart Contracts in Azure Blockchain
- Radiomic features for prostate cancer grade detection through formal verification
- Formal Verification of Heuristic Autonomous Intersection Management Using Statistical Model Checking
- Dynamic GSPNs: formal definition, transformation towards GSPNs and formal verification
- (User-friendly) formal requirements verification in the context of ISO26262
- Formal Verification of UML MARTE Specifications Based on a True Concurrency Real Time Model
- Verification for Autonomous Underwater Systems
- A Reward Based Formal Model for Distributed Software Defined Networks
- ROSMonitoring: A Runtime Verification Framework for ROS
- Understanding link fabrication attack in software defined network using formal methods
- Migration of existing software systems to mobile computing platforms: a systematic mapping study
- Toward Modeling and Verification of Uncertainty in Cyber-Physical Systems
- A formal methods-based Rule Verification Framework for end-user programming in campus Building Automation Systems
- A formal system of axiomatic set theory in Coq
- Enabling continuous integration in a formal methods setting
- The challenges of theory-software translation
- Formal verification of engineering models via extended symbolic transition systems
- Security Verification of Industrial Control Systems using Partial Model Checking
- Adding a Verification View for an Autonomous Real-Time System Architecture
- Formal Verification of Parallel Stream Compaction and Summed-Area Table Algorithms
- Formale Methoden für rekonfigurierbare cyber-physische Systeme in der Produktion
- NNV: The neural network verification tool for deep neural networks and learning-enabled cyber-physical systems
- Formal verification of an approach for systematic false positive mitigation in safe automated driving system
- Formal Verification of Safety Critical Autonomous Systems via Bayesian Optimization
- Alliance of model-driven engineering with a proof-based formal approach
- Formal specification and verification of reusable communication models for distributed systems architecture
- ChemTest: An Automated Software Testing Framework for an Emerging Paradigm
- Towards a Verification-Driven Iterative Development of Cyber-Physical System
- Hardware-software contracts for secure speculation
- Understanding Practitioners’ challenges on software modeling: A survey
- Multiclock Constraint System Modelling and Verification for Ensuring Cooperative Autonomous Driving Safety
- Formal analysis of the Schulz matrix inversion algorithm: A paradigm towards computer aided verification of general matrix flow solvers
- Experiences from Large-Scale Model Checking: Verification of a Vehicle Control System
- Quantum Software Engineering: Landscapes and Horizons
- Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
- Methods and Tools for Formal Verification of Cloud Sisal Programs
- Formal Verification of Arithmetic RTL: Translating Verilog to C++ to ACL2
- Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe
- A Boolean Control Network Approach to the Formal Verification of Feedback Context-Aware Pervasive Systems
- DEv-PROMELA: modeling, verification, and validation of a video game by combining model-checking and simulation
- A formal modeling approach for QOS in MQTT protocol
- SILVER–Statistical Independence and Leakage Verification
- Formal Verification of a Certified Policy Language
- Verification and refutation of C programs based on k-induction and invariant inference
- Regression verification for automated evaluation of students programs
- Formal Verification Applied to Spacecraft Attitude Control
- Trustworthy ai
- Applying analytical and empirical schedulability analysis techniques to a real spacecraft flight software
- Packet Reachability Verification in OpenFlow Networks
- Verifying Autonomous Robots: Challenges and Reflections (Invited Talk)
- On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks
- Formal Verification of the Race Condition Vulnerability in Ladder Programs
- Enhanced Virtual Prototyping: Featuring RISC-V Case Studies
- End-to-end verification of initial and transition properties of GR (1) designs in SPARK
- Design principles for the General Data Protection Regulation (GDPR): A formal concept analysis and its evaluation
- Smart, and also Reliable and Gas-Efficient, Contracts
- FORMAL VERIFICATION TO ENSURING THE MEMORY SAFETY OF C++ PROGRAMS
- Synthesis of Specifications and Refinement Maps for Real-time Object Code Verification
- Building Energy Model for Mexican Energy Standard Verification Using Physics-Based Open Studio SGSAVE Software Simulation
- Qualification of hardware description language designs for safety critical applications in nuclear power plants
- Intelligent agent for formal modelling of temporal multi-agent systems
- Formal Verification of Integer Multiplier Circuits using Algebraic Reasoning-A Survey
- Model-based testing of software product lines: Mapping study and research roadmap
- Deductive Binary Code Verification Against Source-Code-Level Specifications
- A Design and Verification Methodology for a TrustZone Trusted Execution Environment
- Formal Verification of Parallel Prefix Sum
- Compilation, Optimization and Verification of Near-Term Quantum Computing
- Modular regression verification for reactive systems
- An educational case study of using sysml and ttool for unmanned aerial vehicles design
- From legal agreements to blockchain smart contracts
- Beyond SOTIF: Black Swans and Formal Methods
- Formal Verification of Divider and Square-root Arithmetic Circuits Using Computer Algebra Methods
- On Delay Bounds and Measurements: A COTS Testbed for Network Performance Experimentation
- Online Verification through Model Checking of Medical Critical Intelligent Systems
- A model-driven approach for the verification of an adaptive service composition
- Modular verification of JML contracts using bounded model checking
- Designing a demonstrator of formal methods for railways infrastructure managers
- Knowledge-Based Verification of Concatenative Programming Patterns Inspired by Natural Language for Resource-Constrained Embedded Devices
- Formal modeling and verification of cloud‐based web service composition
- Mining assumptions for software components using machine learning
- WIP: Finding Bugs Automatically in Smart Contracts with Parameterized Invariants
- Policy specification and verification for blockchain and smart contracts in 5G networks
- Towards digital twins for the description of automotive software systems
- … Through Intelligent Software Methodologies, Tools and Techniques: Proceedings of the 19th International Conference on New Trends in Intelligent Software …
- An approach for the transformation and verification of BPMN models to colored petri nets models
- Formal Specification and Verification of Solidity Contracts with Events (Short Paper)
- Component-Based Software Engineering: Methods and Metrics
- Timing of autonomous driving software: Problem analysis and prospects for future solutions
- Embedding online runtime verification for fault disambiguation on Robonaut2
- Open questions in formal methods
- Exhaustive testing of safety-critical software for reactor protection system
- The changing nature of computational science software
- A Systematic Migration Methodology for Complex Real-time Software Systems
- Role of ontology in software testing
- A framework for supporting the development of verifiably safe medical best practice guideline systems
- Survey on automated symbolic verification and its application for synthesising cyber-physical systems
- ERP software inspections and audits
- Methods and formal models of intelligent analysis of weakly structured data
- SMT-based verification of temporal properties for component-based software systems
- ASSISTANT FOR INTERACTIVE PROGRAM CODE VERIFICATION
- Efficient plagiarism detection for software modeling assignments
- A framework for assume-guarantee regression verification of evolving software
- Concept enforcement and modularization as methods for the ISO 26262 safety argumentation of neural networks
- The Decidability of Verification under PS 2.0
- Methods for Modeling Urban Road Traffic Using Timed Automata
- Modelling and Verification of Cash Withdrawal Transaction in Automated Teller Machine Using Timed Automata
- Understanding Software Security from Design to Deployment
- Verification of a Failure Management Protocol for Stateful IoT Applications
- Elaborating Requirements for Cyber-Physical Systems in Automotive Domain for the Purpose of Their Formal Verification
- Verification of Privacy-Enhanced Collaborations
- A Cache-Based Model Abstraction and Runtime Verification for the Internet-of-Things Applications
- Fundamentals of Software Engineering: Designed to provide an insight into the software engineering concepts
- System level formal verification as a service
- Incorporating software failure in risk analysis––Part 2: Risk modeling process and case study
- Constraint-Based Contract Inference for Deductive Verification
- Verification of deep convolutional neural networks using imagestars
- Survey on scenario-based safety assessment of automated vehicles
- Reinforcement learning with quantitative verification for assured multi-agent policies
- Slow denial-of-service attacks on software defined networks
- Computational determinacy of cellular automata
- Digital Twin for Verification and Validation of Industrial Automation Systems–a Survey
- Robust software development for university-built satellites
- An Empirical Study of Flight Control System Model Checking Integrated with FMEA
- Formal Specification and Verification of UML Class Diagram Refactorings-Based on FGT Paradigm
- Status report on software testing: Test-Comp 2021
- Incorporating software failure in risk analysis–Part 1: Software functional failure mode classification
- Introducing H, an institution-based formal specification and verification language
- A Model-Based Approach to the Design, Verification and Deployment of Railway Interlocking System
- Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries
- Role Based Access Control for Software Defined Networking: Formal Models and Implementation
- A Two-Phase Approach for Conditional Floating-Point Verification
- Specification and verification of railway safety-critical systems using TLA+: A Case Study
- DeepCert: Verification of Contextually Relevant Robustness for Neural Network Image Classifiers
- Empirical study of software development life cycle and its various models
- An efficient strategy for the development of software test libraries for an automotive microcontroller family
- Year IV, Software Quality Assurance and Testing, Effective methods for software testing
- A Comparative Study on Transformation of UML/OCL to Other Specifications
- Geographical verification of Slovenian milk using stable isotope ratio, multi-element and multivariate modelling approaches
- Overview of Formal Methods
- A Research on Testing Strategies of OSS Used by Equipment Software
- Reludiff: Differential verification of deep neural networks
- A System Verilog Approach for Verification of Memory Controller
- A Biological-Like Synthesis Framework for Software Engineering Environments
- A Case Study in Formal Specification and Runtime Verification of a CubeSat Communications System
- Ensuring safety with system level formal modelling
- Second Competition on Software Testing: Test-Comp 2020.
- TestTDO: A Top-Domain Software Testing Ontology
- Uncertainty modeling and runtime verification for autonomous vehicles driving control: A machine learning-based approach
- Practical abstractions for automated verification of shared-memory concurrency
- Smart Contract modeling and verification techniques: A survey
- A Software Security Assessment using OWASP’s Application Security Verification Standard: Results and Experiences from Assessing the DHIS2 Open-Source …
- Formal analysis of 5g eap-tls authentication protocol using proverif
- Efficiency of using utility for usernames verification in online community management
- Using Architectural Runtime Verification for Offline Data Analysis
- Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities
- A systematic literature review on semantic web enabled software testing
- … : 23rd International Conference, FOSSACS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin …
- A Generalized Formal Semantic Framework for Smart Contracts.
- Towards Formalization of Enhanced Privacy ID (EPID)-based Remote Attestation in Intel SGX
- Incremental Verification of UML/OCL Models
- QoS-aware service provisioning in fog computing
- Re-Envisioning RCx: Achieving Max Potential HVAC Controls Retrofits through Modernized BAS Hardware and Software
- Safety verification of unknown dynamical systems via gaussian process regression
- A case study of agile software development for safety-Critical systems projects
- The Derivation of Defect Priorities and Core Defects through Impact Relationship Analysis between Embedded Software Defects
- Architecture of a Machine Code Deductive Verification System
- Approach to the Analysis of Software Requirements Specification on Its Structure Correctness
- Cross-level Co-simulation and Verification of an Automatic Transmission Control on Embedded Processor
- Digital Age of Consent and Age Verification: Can They Protect Children?
- Optimization of automated executions based on integration test configurations of embedded software
- A cloud software life cycle process (CSLCP) model
- Automated and scalable verification of integer multipliers
- Efficient verification of relu-based neural networks via dependency analysis
- Empowering Multilevel DSMLs with Integrated Runtime Verification
- Heterogeneous verification of an autonomous curiosity rover
- The VerifyThis Collaborative Long Term Challenge
- No Crash, No Exploit: Automated Verification of Embedded Kernels
- Automatically partition software into least privilege components using dynamic data dependency analysis.(2013)
- Deciding reachability under persistent x86-TSO
- Formal methods for prostate cancer gleason score and treatment prediction using radiomic biomarkers
- Silas: A High-Performance Machine Learning Foundation for Logical Reasoning and Verification
- THE TAKEOFF OF OPEN SOURCE SOFTWARE: A SIGNALING PERSPECTIVE BASED ON COMMUNITY ACTIVITIES.
- … of the implementation of a subset of ISO/IEC 29110 Software Implementation process in four teams of undergraduate students of Ecuador. An empirical software …
- Verification Method of Safety Properties of Embedded Assembly Program by Combining SMT-Based Bounded Model Checking and Reduction of Interrupt Handler …
- Towards automated verification of smart contract fairness
- Methods for Domain Specialization of Verification-Oriented Process Ontologies
- Safety Verification of IEC 61131-3 Structured Text Programs
- Simple: A remote attestation approach for resource-constrained iot devices
- Detecting critical bugs in SMT solvers using blackbox mutational fuzzing
- Verification of concurrent HARPO programs using formal verification theory
- Comparison of Cloud‐Top Property Retrievals From Advanced Himawari Imager, MODIS, CloudSat/CPR, CALIPSO/CALIOP, and Radiosonde
- Bigraph specification of software architecture and evolution analysis in mobile computing environment
- A Comprehensive Investigation of Universal Verification Methodology (UVM) Standard for Design Verification
- Verification of ML Systems via Reparameterization
- Modeling and analysis of an industrial communication protocol in the Gamma framework
- A framework for FMI-based co-simulation of human–machine interfaces
- A Study of Software Testing: Categories, Levels, Techniques, and Types
- Formal model-based assurance cases in Isabelle/SACM: An autonomous underwater vehicle case study
- Passlab: A Password Security Tool for the Blue Team
- CLARVA: Model-based Residual Verification of Java Programs.
- Graph transformation for software engineers: With applications to model-based development and domain-specific language engineering
- A survey of model-driven techniques and tools for cyber-physical systems
- Software Security Patch Management–A Systematic Literature Review of Challenges, Approaches, Tools and Practices
- Testing Software and Systems
- A safety framework for critical systems utilising deep neural networks
- Feasibility of a Software agent providing a brief Intervention for Self-help to Uplift psychological wellbeing (“SISU”). A single-group pretest-posttest trial …
- Multiple fault localization of software programs: A systematic literature review
- Using online verification to prevent autonomous vehicles from causing accidents
- Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems
- Accelerating hardware security verification and vulnerability detection through state space reduction
- Model checking for malicious family detection and phylogenetic analysis in mobile environment
- Generation of formal requirements from structured natural language
- Collaborative filtering based recommendation of sampling methods for software defect prediction
- Formal Modeling and Verification of Rate Adaptive Pacemakers for Heart Failure
- Test Case Generation Method for Increasing Software Reliability in Safety-Critical Embedded Systems
- Documentation of quality requirements in agile software development
- Specification and verification in the field: Applying formal methods to {BPF} just-in-time compilers in the Linux kernel
- Interface protocol inference to aid understanding legacy software components
- Verified Translation Between Purely Functional and Imperative Domain Specific Languages in HELIX
- DevOps workflow verification and duration prediction using non‐Markovian stochastic Petri nets
- Analyzing and documenting the systematic review results of software testing ontologies
- Engineering Management Methods for FPGA Products in the Aviation and the Aerospace Fields
- Synchronous Modeling and Verification with the Language Lustre
- Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems
- Compatibility checking for asynchronously communicating software
- On the TOCTOU problem in remote attestation
- Runtime Abstract Interpretation for Numerical Accuracy and Robustness
- Taxonomical classification of barriers for scaling agile methods in global software development environment using fuzzy analytic hierarchy process
- Automated verification of customizable middlebox properties with gravel
- Inconsistency-tolerating guidance for software engineering processes
- Automatic Verification of LLVM Code
- MetaVal: Witness validation via verification
- Designing blockchain-based access control protocol in iot-enabled smart-grid system
- Automatic analysis of complex interactions in microservice systems
- Learning How to Monitor: Pairing Monitoring and Learning for Online System Verification
- Strength analysis in regulatory design documents and computational software
- Data Flow Verification in SoC Using Formal Techniques
- Foundations of Probabilistic Programming
- Candidate Software Process Flaws for the Boeing 737 Max MCAS Algorithm and Risks for a Proposed Upgrade
- Verification of Patterns
- Deductive Verification of Floating-Point Java Programs in KeY
- Modeling and verification of running process control for underground mine locomotive
- HyDiff: Hybrid differential software analysis
- Formal Analysis of a Neural Network Predictor inShared-Control Autonomous Driving
- Mutation Testing for Rule-Based Verification of Railway Signaling Data
- Exploring factors and measures to select open source software
- Software-testing education: A systematic literature mapping
- The Move Prover
- Modularising Verification Of Durable Opacity
- AR2B: FORMALIZATION OF ARABIC TEXTS WITH EVENT-B
- A context‐aware framework for modelling and verification of smart parking systems in urban cities
- QPR Verify: A Static Analysis Tool for Embedded Software Based on Bounded Model Checking
- Formal Specification of Robotic Architectures for Experimental Robotics
- Demystifying the Challenges of Formally Specifying API Properties for Runtime Verification
- An Automated Deductive Verification Framework for Circuit-building Quantum Programs
- Branch and bound for piecewise linear neural network verification
- Open geospatial software and data: A review of the current state and a perspective into the future
- Numerical optimization of intake and exhaust structure and experimental verification on single-screw expander for small-scale ORC applications
- Coordination artifacts in agile software development
- Software process simulation modeling: systematic literature review
- A modeling method for systematic architecture reconstruction of microservice-based software systems
- The moving target of visualization software for an increasingly complex world
- Requirements engineering issues causing software development outsourcing failure
- A Requirements Engineering Technology for the IoT Software Systems
- Capturing software architecture knowledge for pattern-driven design
- Refinement and verification of responsive control systems
- Real-time-aware reconfiguration decisions for dynamic software product lines
- Coverage-Guided Testing for Scalable Virtual Prototype Verification
- Formal requirements elicitation with fret
- Formal Non-fragile Verification of Step Response Requirements for Digital State-Feedback Control Systems
- Low cost high integrity platform
- Formal modelling and verification of a distributed railway interlocking system using UPPAAL
- CoqTL: a Coq DSL for rule-based model transformation
- Modeling events and events of events in software engineering
- Managing software variability for dynamic reconfiguration of robot control systems
- Testing Approaches for Web and Mobile Applications: An Overview
- Ontology-Based Transformation and Verification of UML Class Model
- Recovering variability information from source code of clone-and-own software systems
- A survey on the use of access permission-based specifications for program verification
- How Can Software Testing be Improved by Analytics to Deliver Better Apps?
- Synthesis of Solar Photovoltaic Systems: Optimal Sizing Comparison
- Verification of embedded binaries using coverage-guided fuzzing with SystemC-based virtual prototypes
- X-by-Construction: Correctness Meets Probability
- Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
- Requirement validation for embedded systems in automotive industry through modeling
- GDPR Compliance Verification in Internet of Things
- The four dimensions of social network analysis: An overview of research methods, applications, and software tools
- Certain trends in uncertainty and sensitivity analysis: An overview of software tools and techniques
- Complex Software Testing Analysis using International Standards
- Modular answer set programming as a formal specification language
- Bitcoin Trace-Net: Formal Contract Verification at Signing Time
- Boundary Value Exploration for Software Analysis
- Toward Operational Safety Verification Via Hybrid Automata Mining Using I/O Traces of AI-Enabled CPS.
- The Implementation of Software Measurement Programs in Medium and Small Projects: A Systematic Literature Review
- Mercury accumulation in tree rings: observed trends in quantity and isotopic composition in Shenandoah National Park, Virginia
- Sustainability in Software Engineering Education: a case of general professional competencies
- Testing relative to usage scope: Revisiting software coverage criteria
- Modeling and verification of CTCS-3 level code sequence verification scene based on UPPAAL
- A hybrid service selection and composition model for cloud-edge computing in the internet of things
- Probabilistic approximation of runtime quantitative verification in self-adaptive systems
- MOZART: Design and deployment of advanced IoT applications
- Automata-based Formal Analysis and Verification of the Real-Time Linux Kernel
- Empirical research on the application of a structure-based software reliability model
- Defining and verifying durable opacity: correctness for persistent software transactional memory
- Writing Robotics Applications with X-Klaim
- Meshing agile and plan-driven development in safety-critical software: a case study
- Accurate Smart Contract Verification Through Direct Modelling
- A Tutorial on Verifying LinkedList Using KeY
- A survey on methods for the safety assurance of machine learning based systems
- Performance Verification of Programmable Data Planes at the End-Host
- Current trends in flow cytometry automated data analysis software
- Reliable Decision-Making in Autonomous Vehicles
- Formal Modelling & Verification of E-NIC Issuing System Via Colored Petri Nets (CPN)
- Model checking intelligent avionics systems for test cases generation using multi-agent systems
- Model checking reveals design issues leading to spurious actuation of nuclear instrumentation and control systems
- An abstraction-based framework for neural network verification
- Software Requirement in Iterative SDLC Model
- A Rule-Based Language and Verification Framework of Dynamic Service Composition
- Automated discovery of cross-plane event-based vulnerabilities in software-defined networking
- Formal analysis of the compact position reporting algorithm
- Risk management in the software life cycle: A systematic literature review
- Symmetric Modeling of Communication Effectiveness and Satisfaction for Communication Software on Job Performance
- Learning From Families: Inferring Behavioral Variability From Software Product Lines
- Usage of Psychophysiological Data as an Improvement in the Context of Software Engineering: A Systematic Mapping Study
- CABEAN: a software for the control of asynchronous Boolean networks
- Rigorous engineering of collective adaptive systems
- TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies
- Understanding collaborative software development: An interview study
- On reliability assessment when a software-based system is replaced by a thought-to-be-better one
- Mining component-based software behavioral models using dynamic analysis
- Enhancing scratch damage resistance of PMMA via layer assembly with PVDF: Numerical modeling prediction and experimental verification
- Using hypersafety verification for proving correctness of programming assignments
- fault: A Python Embedded Domain-Specific Language for Metaprogramming Portable Hardware Verification Components
- Inferring performance from code: a review
- Systematic literature review and empirical investigation of motivators for requirements change management process in global software development
- Random stimuli generation for the verification of quantum circuits
- Modeling Injection Molding of High-Density Polyethylene with Crystallization in Open-Source Software
- Tendermint blockchain synchronization: formal specification and model checking
- Run-Time Assurance for Learning-Enabled Systems
- Case study: verifying the safety of an autonomous racing car with a neural network controller
- Verification and Synthesis of Information Flow Secure Hardware Designs
- Automated Quantification of Immunohistochemical Staining of Large Animal Brain Tissue Using QuPath Software
- Monte Carlo Based Statistical Model Checking of Cyber-Physical Systems: A Review
- Formal semantics of predictable pipelines: a comparative study
- Research Software Engineering
- A mobile application for self-guided study of formal reasoning
- Freelancers in the Software Development Process: A Systematic Mapping Study
- An Introduction to Self-adaptive Systems: A Contemporary Software Engineering Perspective
- A Survey of Smart Contract Formal Specification and Verification
- The Effects of Static Analysis for Dynamic Software Updating: An Exploratory Study
- Evaluating and strategizing the onboarding of software developers in large-scale globally distributed projects
- Early Synthesis of Timing Models in AUTOSAR-based Automotive Embedded Software Systems.
- Secure software leasing
- FPGA-Based Hardware/Software Co-Design of a Bio-Inspired SAT Solver
- Certified machine-learning models
- Statistical model checking of approximate circuits: challenges and opportunities
- Hoare-Style Logic for Unstructured Programs
- Collaborative learning-based industrial IoT API recommendation for software-defined devices: The implicit knowledge discovery perspective
- Conflict as software levels diversify: Tactical elimination or strategic transformation of practice?
- Perfectly parallel fairness certification of neural networks
- Empirical studies on software traceability: A mapping study
- Researches on Software Requirements Elicitation Approach of the Aviation Electronics Systems based on Multi-ontology
- A verification framework for spatio-temporal consistency language with CCSL as a specification language
- Software defect prediction using heterogeneous ensemble classification based on segmented patterns
- Specification and Verification of the Zab Protocol with TLA+
- How bugs are born: a model to identify how bugs are introduced in software components
- MSL: A pattern language for engineering self-adaptive systems
- A Software Analysis Based Vulnerability Detection System For Smart Contracts
- A Process Model for Component-Based Model-Driven Software Development
- An evidence-based inquiry into the use of grey literature in software engineering
- 密码产品的侧信道分析与评估
- The current practices of changing secure software: an empirical study
- Verifying replicated data types with typeclass refinements in Liquid Haskell
- Formal Framework for Safety, Security, and Availability of Aircraft Communication Networks
- Social Network Analysis in Software Development Projects: A Systematic Literature Review
- Testing Software and Hardware Data Security Tools Using the Automata Theory and the Graph Theory
- Interoperability and integration testing methods for IoT systems: A systematic mapping study
- Interrupt nesting method based on time slice in embedded software
- A robust software watermarking framework using shellcode
- An optimized and unique methodology for software test case automation strategy
- Smart routing: Towards proactive fault handling of software-defined networks
- Experimental Assessment of Friction Coefficient in Deep Drawing and Its Verification by Numerical Simulation
- Hardware penetration testing knocks your SoCs off
- Hardware private circuits: From trivial composition to full verification
- VerifyThis 2019: A Program Verification Competition
- Runtime verification of real-time event streams under non-synchronized arrival
- Secure over-the-air software updates in connected vehicles: A survey
- Integrating runtime verification into an automated uas traffic management system
- Software Engineering at Google: Lessons Learned from Programming Over Time
- Program transformations enable verification tools to solve interactive fiction games
- Using model checking to identify timing interferences on multicore processors
- Behavioral simulation for smart contracts
- A Cost-Efficient Software Based Router and Traffic Generator for Simulation and Testing of IP Network
- Twin-finder: Integrated reasoning engine for pointer-related code clone detection
- Software Engineering Practice: A Case Study Approach
- A Pattern-Based Formal Modelling Framework for Wireless Sensor Networks
- A system concept representation framework and its testing on patents, urban architectural patterns, and software patterns
- A systematic literature review of modern software visualization
- Together We Are Stronger: Evidence-Based Reflections on Industry-Academia Collaboration in Software Testing
- Towards a reference process for software architecture reconstruction
- SDLV: Verification of Steering Angle Safety for Self-Driving Cars
- The Journal of Systems & Software
- Mutation Operators for Decision Table-Based Contracts Used in Software Testing
- Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks
- The root cause analysis algorithm design incorporated with analytic hierarchy process for software application error
- Transcriptome analysis of fetal rat testis following intrauterine exposure to the azole fungicides triticonazole and flusilazole reveals subtle changes despite …
- Improving software bug-specific named entity recognition with deep neural network
- Software product line applied to the internet of things: A systematic literature review
- Combining Fault Analysis Technologies for ISO26262 Functional Safety Verification
- Safety Verification of a Data-driven Adaptive Cruise Controller
- Quantum Software Testing.
- An Interface Theory for Program Verification
- Igloo: soundly linking compositional refinement and separation logic for distributed system verification
- Reliability of Kinovea® software and agreement with a three-dimensional motion system for gait analysis in healthy subjects
- Secure attribute-based search in RFID-based inventory control systems
- The development of a next-generation human reliability analysis: Systems analysis for formal pharmaceutical human reliability (SAFPH)
- Specification and automated verification of atomic concurrent real-time transactions
- A Systematic Investigation of State-of-the-Art SystemC Verification
- Verification artifacts in cooperative verification: Survey and unifying component framework
- Tornado: Automatic generation of probing-secure masked bitsliced implementations
- Model-driven environment for configuration control and deployment of on-board satellite software
- Variable Domain-specific Software Languages with DjDSL
- Software engineering for artificial intelligence and machine learning software: A systematic literature review
- Making software measurement standards understandable
- Symbolic verification of message passing interface programs
- A maude-based rewriting approach to model and verify cloud/fog self-adaptation and orchestration
- A systematic literature review on federated machine learning: From a software engineering perspective
- Software and reversible systems: a survey of recent activities
- A comprehensive security assessment framework for software-defined networks
- Recursive data structures in SPARK
- Application of green solvent to separate the minimum boiling point azeotrope based on molecular structure prediction and experimental verification
- Falsification of cyber-physical systems with robustness-guided black-box checking
- A formal approach to the engineering of domain-specific distributed systems
- Specification and Verification of a Transient Data Structure Research internship proposal, M2
- Synthesizing barrier certificates using neural networks
- Understanding and discovering software configuration dependencies in cloud and datacenter systems
- Coastal Management Software to Support the Decision-Makers to Mitigate Coastal Erosion
- Approximation-refinement testing of compute-intensive cyber-physical models: An approach based on system identification
- Automatic software refactoring: a systematic literature review
- Verification of neural network behaviour: Formal guarantees for power system applications
- … With Single-Isocenter Radiosurgery to Target Multiple Brain Metastases Using an Automated Treatment Planning Software: Clinical Outcomes and Optimal …
- Bridging the Gap between Design and Verification of Embedded Systems in Model Based System Engineering: A Meta-model for Modeling Universal Verification …
- Development of Secure Software with GRaViTY
- Deductive Verification of Floating-Point Java Programs in KeY
- Learning concise models from long execution traces
- Delta-oriented development of model-based software product lines with DeltaEcore and SiPL: A comparison
- Towards an Architecture for Trusted Edge IoT Security Gateways
- A sustainable software testing process for the Square Kilometre Array project
- A new algorithm on application of blockchain technology in live stream video transmissions and telecommunications
- Software quality analysis based on cost and error using fuzzy combined COCOMO model
- Hierarchical Formal Modeling of Internet of Things System Oriented to User Behavior
- Online Verification Concept for Autonomous Vehicles–Illustrative Study for a Trajectory Planning Module
- Evaluating verification awareness as a method for assessing adaptation risk
- The μ-Calculus Model-Checking Algorithm for Generalized Possibilistic Decision Process
- CoCoSim, a code generation framework for control/command applications An overview of CoCoSim for multi-periodic discrete Simulink models
- Integrating security and privacy in software development
- Assessing software defection prediction performance: Why using the Matthews correlation coefficient matters
- LAKS-NVT: Provably secure and lightweight Authentication and key agreement scheme without verification table in medical internet of things
- Towards an FDIR Software Fault Tree Library for Onboard Computers
- Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme
- The impact of mathematical modeling languages on model quality in systems biology: A software engineering perspective
- Verification of Control Sequences within OpenBuildingControl
- Optimal design of high-strength water-soluble sand core for investment casting system: Thermodynamic analysis and experimental verification
- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures
- Ex-man component model for component-based software construction
- Verifying x86 instruction implementations
- Leveraging Compiler Intermediate Representation for Multi-and Cross-Language Verification
- IT Security for Measuring Instruments: Confidential Checking of Software Functionality
- Robustness verification of soft security systems
- Opportunistic intermittent control with safety guarantees for autonomous systems
- Interval change-point detection for runtime probabilistic model checking
- Validation of image-based neural network controllers through adaptive stress testing
- Graph Transformation
- Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
- Accelerating robustness verification of deep neural networks guided by target labels
- Specifying the Design Science Research Process: An Applied Case of Building a Software Testing Ontology
- Colluding android apps detection via model checking
- Automated simulation and verification of process models discovered by process mining
- Reachability analysis for hybrid systems with nonlinear guard sets
- Minimal Modifications of Deep Neural Networks using Verification.
- Verified sequential malloc/free
- Synthesizing environment invariants for modular hardware verification
- Discovery and quality evaluation of software component behavioral models
- Model checking smart contracts for ethereum
- Efficient feature extraction model for validation performance improvement of duplicate bug report detection in software bug triage systems
- Toward comprehensive network verification: Practices, challenges and beyond
- Violation witnesses and result validation for multi-threaded programs
- Automatic test case and test oracle generation based on functional scenarios in formal specifications for conformance testing
- ClassifyMe: a field-scouting software for the identification of wildlife in camera trap images
- ACADF: ant colony unified with adaptive dragonfly algorithm enabled with fitness function for model transformation
- Formal analysis and verification of interactions in the O2N middleware framework
- A review of the application of component-based software development in open CNC systems
- Search-based software engineering for self-adaptive systems: One survey, five disappointments and six opportunities
- Impact of Security Measures on Performance Aspects in SysML Models.
- CSim2 Compositional Top-down Verification of Concurrent Systems using Rely-Guarantee
- PyMTL3: a Python framework for open-source hardware modeling, generation, simulation, and verification
- HybridTiger: Hybrid model checking and domination-based partitioning for efficient multi-goal test-suite generation (competition contribution)
- An approach to industrial automation based on low-cost embedded platforms and open software
- Modeling Software Requirements
- Spider: Enabling fast patch propagation in related software repositories
- Simultaneous analysis of polyethylene glycol in dietary supplement tablets using high-performance liquid chromatography and verification with liquid chromatography …
- Relational Test Tables: A Practical Specification Language for Evolution and Security
- A new algorithm for implementing message authentication and integrity in software implementations
- Automated verification and synthesis of stochastic hybrid systems: A survey
- Verification runtime analysis: get the most out of partial verification
- Towards automatic hardware synthesis from formal specification to implementation
- Abstract Contract Synthesis and Verification in the Symbolic 𝕂 Framework
- The first twenty-five years of industrial use of the B-method
- Formal Modeling and Analysis of Probabilistic Real-Time Systems
- Domain-specific scenarios for refinement-based methods
- The Future of Security Validation and Verification
- The evolution of empirical methods in software engineering
- Software as a profession
- A multimodal-Siamese Neural Network (mSNN) for person verification using signatures and EEG
- Plankton: Scalable network configuration verification through model checking
- What support do systematic reviews provide for evidence-informed teaching about software engineering practice?
- ModCon: a model-based testing platform for smart contracts
- Chaining model transformations for system model verification: application to verify capella model with simulink
- Incongruence of grammatical subjects activates brain regions involved in perspective taking in a sentence-sentence verification task
- Combining Static and Dynamic Program Analysis Techniques for Checking Relational Properties
- Towards dynamic dependable systems through evidence-based continuous certification
- A software maintenance-focused process and supporting toolset for academic environments
- Deep Learning in Software Engineering
- Utilizing automatic query reformulations as genetic operations to improve feature location in software models
- Property-Directed Verification of Recurrent Neural Networks
- Verification Methodology for Computational Wind Engineering Prediction of Wind Loads on Structures
- Input validation for neural networks via runtime local robustness verification
- Verification of attenuation models based on strong ground motion data in Northern Thailand
- High-Level Implementation-Independent Functional Software-Based Self-Test for RISC Processors
- An Efficient Floating-Point Bit-Blasting API for Verifying C Programs
- Cobomarsen, an oligonucleotide inhibitor of miR-155, slows DLBCL tumor cell growth in vitro and in vivo
- Give inconsistency a chance: Semantics for ontology-mediated verification
- Model Checking a Distributed Interlocking System Using k-induction with RT-Tester
- Formalizing UML/OCL structural features with FoCaLiZe
- Formal reasoning under cached address translation
- Teaching Accessibility to Software Engineering Students
- A situation-aware scheme for efficient device authentication in smart grid-enabled home area networks
- Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity
- Formal Methods and Computing Identity-based Mentorship for Early Stage Researchers
- Ontology-based requirement verification for complex systems
- Verified development and deployment of multiple interacting smart contracts with VeriSolid
- A natural language processing (NLP) framework for embedded systems to automatically extract verification aspects from textual design requirements
- Pragmatic reuse for DSML development
- Control-flow flattening preserves the constant-time policy (extended version)
- Software fault tolerance for cyber-physical systems via full system restart
- Formal analysis of the biological circuits using higher-order-logic theorem proving
- Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry
- More Accurate Dynamic Slicing for Better Supporting Software Debugging
- Systematic model-based design assurance and property-based fault injection for safety critical digital systems
- Adapting requirements models to varying environments
- FCM: a component-based platform with explicit support of crosscutting and dynamic features
- Execution-Guided Overapproximation (EGO) for Improving Scalability of Neural Network Verification
- Formal synthesis of lyapunov neural networks
- Law and software agents: Are they “Agents” by the way?
- Specification of synchronous network flooding in temporal logic
- A Theory of Value for Value-based Feature Selection in Software Engineering
- A qualitative study of the background, skill acquisition, and learning preferences of software testers
- Intelligent Software Mining with Business Intelligence Tools for Automation of Micro services in SOA: A Use Case for Analytics
- Impacts of process audit review and control efforts on software project outcomes
- Effective control of SARS-CoV-2 transmission between healthcare workers during a period of diminished community prevalence of COVID-19
- Static verification for Snap!
- Being correct is not enough: efficient verification using robust linear temporal logic
- WhylSon: Proving your Michelson Smart Contracts in Why3
- Flight Test Validation of a Safety-Critical Neural Network Based Longitudinal Controller for a Fixed-Wing UAS
- Propagation of the Pearcey Gaussian beams in a medium with a parabolic refractive index
- Formal Analysis and Redesign of a Neural Network-Based Aircraft Taxiing System with VerifAI
- A reallocation approach for software trustworthiness based on trustworthy attributes
- Combining SLiVER with CADP to analyze multi-agent systems
- Proving quantum programs correct
- Leveraging systematic functional analysis to benchmark an in silico framework distinguishes driver from passenger MEK mutants in cancer
- COTS-Based Architectural Framework for Reliable Real-Time Control Applications in Manufacturing
- How we refactor and how we document it? On the use of supervised machine learning algorithms to classify refactoring documentation
- Efficient verified (UN) SAT certificate checking
- Formal reasoning on knowledge and commitments in multi-agent systems using Theatre
- Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems
- ARMv8-A system semantics: instruction fetch in relaxed architectures
- A novel three-factor authentication protocol for wireless sensor networks with IoT notion
- What Leads to a Confirmatory or Disconfirmatory Behaviour of Software Testers?
- Comprehensive analysis of heat transfer of double-skin facades integrated high concentration photovoltaic (CPV-DSF)
- Students’ Outcomes in MATLAB Software Programming Project-Oriented Agile Course
- Test framework and key challenges for virtual verification of automated vehicles: the VeriCAV project
- Correctness enhancement: a pervasive software engineering paradigm
- PRISM-games 3.0: Stochastic game verification with concurrency, equilibria and time
- A general approach to conflict detection in software-defined networks
- Optimized in-network authentication against pollution attacks in software-defined-named data networking
- Scaling to Meet the Online Demand in Software Engineering
- Performance evaluation of equivalent forwarding sets in software defined networking
- Automated temporal verification of integrated dependent effects
- Verification of tree induced suction with numerical model
- Formalizing and Guaranteeing* Human-Robot Interaction
- Accuracy verification of spatio-temporal and kinematic parameters for gait using inertial measurement unit system
- CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples
- Conformance verification for neural network models of glucose-insulin dynamics
- From Domain-Specific Language to Code: Smart Contracts and the Application of Design Patterns
- Automating Verification of State Machines with Reactive Designs and Isabelle/UTP
- The Relational Method with Message Anonymity for the Verification of Cryptographic Protocols
- … nitrogen plus methane (CO2+ N2+ CH4) system: Measurements of vapor-liquid equilibrium data at temperatures from 223 to 298 K and verification of EOS-CG …
- Nuclear analysis of the Water cooled lithium lead DEMO reactor
- A Taxonomy of Techniques for SLO Failure Prediction in Software Systems
- How to evaluate solutions in Pareto-based search-based software engineering? A critical review and methodological guidance
- Theoretical modelling and experimental verification of modal responses of skewed laminated sandwich structure with epoxy-filled softcore
- Continuous development and testing of access and usage control: a systematic literature review
- Who Carries the Burden of Modularity?
- Incremental verification of physical access control systems
- A software deep packet inspection system for network traffic analysis and anomaly detection
- Adapting Teaching of a Software Engineering Service Course Due to COVID-19
- A conservative confidence bound for the probability of failure on demand of a software-based system based on failure-free tests of its components
- Adding concurrency to a sequential refinement tower
- On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment
- Nonlinear tribo-dynamic model and experimental verification of a spur gear drive under loss-of-lubrication condition
- Multilanguage-handwriting self-powered recognition based on triboelectric nanogenerator enabled machine learning
- New foundations of ethical multiagent systems
- Computational Verification of Large Logical Models—Application to the Prediction of T Cell Response to Checkpoint Inhibitors
- Towards runtime verification of programmable switches
- Software engineering
- LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of drone environment
- Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based
- Heat Transfer Coefficient Determination during FC-72 Flow in a Minichannel Heat Sink Using the Trefftz Functions and ADINA Software
- Partially observable Markov decision process to generate policies in software defect management
- Adversarial machine learning-industry perspectives
- Automated Repair of Heap-Manipulating Programs Using Deductive Synthesis
- Scalable analysis of interaction threats in iot systems
- Incremental reasoning in probabilistic signal temporal logic
- A rewriting logic-based semantics and analysis of UML activity diagrams: a graph transformation approach
- The Impact of Anonymous Peripheral Contributions on Open Source Software Development
- Verification of Eventual Consensus in Synod Using a Failure-Aware Actor Model
- A formal model of the kubernetes container framework
- A framework for verifying deadlock and nondeterminism in UML activity diagrams based on CSP
- Operational Safety Verification of AI-Enabled Cyber-Physical Systems
- An SMT Theory of Fixed-Point Arithmetic
- A component-based framework for certification of components in a cloud of HPC services
- Software Effort Estimation for Successful Software Application Development
- Automated Symbolic Verification of Telegram’s MTProto 2.0
- The 2020 expert survey on formal methods
- A corroborative approach to verification and validation of human–robot teams
- Verify: a toolbox for deterministic verification of computational models
- Generating Certification Evidence for Autonomous Aerial Vehicles Decision-Making
- Tool Supported Specification and Verification of Highly Available Applications
- A rigorous user needs experience evaluation method based on software quality standards
- Connection models for the Internet-of-Things
- Formal scenario-based testing of autonomous vehicles: From simulation to the real world
- NetSMC: A custom symbolic model checker for stateful network verification
- Synthesis and verification of models using satisfiability modulo theories
- Verification of Quantitative Hyperproperties Using Trace Enumeration Relations
- Improving fuel cell performance via optimal parameters identification through fuzzy logic based-modeling and optimization
- Model-agnostic counterfactual explanations for consequential decisions
- Investigating the relationship between personalities and agile team climate of software professionals in a telecom company
- Formal Algebraic Description of a Fog/IoT Computing Environment
- MVC-3DC: Software architecture model for designing collaborative augmented reality and virtual reality systems
- Verification of the technical equipment degradation method using a hybrid reinforcement learning trees–artificial neural network system
- Effective System Level Liveness Verification
- Verification of approximate opacity via barrier certificates
- Efficient system verification with multiple weakly-hard constraints for runtime monitoring
- Health economics-based verification of functional myocardial ischemia evaluation of stable coronary artery disease in Japan: A long-term longitudinal study …
- Short-time speaker verification with different speaking style utterances
- Crowbar: Behavioral Symbolic Execution for Deductive Verification of Active Objects
- Requirements Engineering in the Context of Big Data Software Applications
- A lightweight and secure group key based handover authentication protocol for the software-defined space information network
- A content analysis-based approach to explore simulation verification and identify its current challenges
- Timing predictability and security in safety-critical industrial cyber-physical systems: A position paper
- A simplified and fast computing photovoltaic model for string simulation under partial shading condition
- A unified model-based framework for the simplified execution of static and dynamic assertion-based verification
- A software-based calibration approach to increase the robustness of embedded systems
- Property-based Testing of Quantum Programs in Q#
- FTLink: Efficient and flexible link fault tolerance scheme for data plane in Software-Defined Networking
- Preliminary verification of lncRNA ENST00000609755. 1 potential ceRNA regulatory network in coronary heart disease
- Toward safe and efficient reconfiguration with Concerto
- A survey on service composition languages
- Laser-assisted fabrication and in vitro verification of functionalized surface for cells biointegration
- Formal analysis of QUIC handshake protocol using ProVerif
- Non-destructive dose verification of two drugs within 3D printed polyprintlets
- Trace-checking signal-based temporal properties: A model-driven approach
- Understanding the QuickXPlain algorithm: Simple explanation and formal proof
- Verification and validation of openInjMoldSim, an open-Source solver to model the filling stage of thermoplastic injection molding
- Unifying semantic foundations for automated verification tools in Isabelle/UTP
- hpnmg: A C++ Tool for Model Checking Hybrid Petri Nets with General Transitions
- Development and validation of a gene signature classifier for consensus molecular subtyping of colorectal carcinoma in a CLIA-certified setting
- SLEMI: Equivalence modulo input (EMI) based mutation of CPS models for finding compiler bugs in Simulink
- Intertidal wetland vegetation dynamics under rising sea levels
- Verx: Safety verification of smart contracts
- Modelling of Language Syntax and Semantics: The Case of the Assembler Compiler
- Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol
- How do you architect your robots? State of the practice and guidelines for ROS-based systems
- Saw: A tool for safety analysis of weakly-hard systems
- The application of artificial intelligence in software engineering: a review challenging conventional wisdom
- Formal modeling and analysis of medical systems
- Numerical investigation on stress intensity around Bone-Implant interface by 3-Dimensional FEA and experimental verification by optical technique
- Paper B Design, Control, and Analysis of Nonlinear Circuits with Tunnel Diode with Piecewise Affine Dynamics
- Testing and analysis of steady-state helicon plasma source for the Material Plasma Exposure eXperiment (MPEX)
- A study on challenges of testing robotic systems
- Machine Learning and Statistical Verification for Security
- A Vector processing unit implementation for RISC-V vector extension: Functional verification and assertions on submodules
- ct-fuzz: Fuzzing for Timing Leaks
- Co-simulation of bio-inspired multi-agent algorithms
- Tailorability-focused recommendations for United States Air Force software acquisition policy
- Functional safety verification of train control procedure in train-centric CBTC by colored Petri net
- Crop growth, hydrology, and water quality dynamics in agricultural fields across the Western Lake Erie Basin: Multi-site verification of the Nutrient Tracking Tool (NTT)
- Advances in verification of ReLU neural networks
- Towards faster reasoners by using transparent huge pages
- Step-wise development of provably correct actor systems
- Real-Time Verification of Network Properties Based on Header Space
- A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness
- Secure system virtualization: End-to-end verification of memory isolation
- Modeling and Verification of Hospital Intelligent Diagnosis and Treatment Service Based on Timed Automata in Internet of Things
- Business process specification, verification, and deployment in a mono-cloud, multi-edge context
- hW-inference: A heuristic approach to retrieve models through black box testing
- A method for proving unlinkability of stateful protocols
- TotemBioNet Enrichment Methodology: Application to the Qualitative Regulatory Network of the Cell Metabolism
- SoK: Computer-aided cryptography
- Nektar++: Design and implementation of an implicit, spectral/hp element, compressible flow solver using a Jacobian-free Newton Krylov approach
- Developing accurate and scalable simulators of production workflow management systems with wrench
- Interpretation-based violation witness validation for C: NitWit
- Automatically testing string solvers
- Platinum: Reusing Constraint Solutions in Bounded Analysis of Relational Logic.
- A survey of algorithms for black-box safety validation
- Programming language foundations in Agda
- Can determinism and compositionality coexist in RML?(extended version)
- A lightweight three-factor authentication protocol for digital rights management system
- β”needle-shape precipitate formation in Al-Mg-Si alloy: Phase field simulation and experimental verification
- Process Performance Verification Using Viability Theory. Processes 2021, 9, 482
- Reducing commutativity verification to reachability with differencing abstractions
- Internet of things (IoT)-enabled elderly fall verification, exploiting temporal inference models in smart homes
- So near and yet so far-Symbolic verification of distance-bounding protocols
- Theory and experimental verification of a resultant response-based method for assessing the critical seismic excitation direction of curved bridges
- Reachable set estimation for neural network control systems: A simulation-guided approach
- Verification of Fractional Vegetation Coverage and NDVI of Desert Vegetation via UAVRS Technology
- Neutron dosimetry and shielding verification in commissioning of Compact Proton Therapy Centers (CPTC) using MCNP6. 2 Monte Carlo code
- Verifying SysML activity diagrams using formal transformation to Petri nets
- PaRoT: a practical framework for robust deep neural network training
- Novel metaheuristic-based tuning of PID controllers for seismic structures and verification of robustness
- Is Artificial Intelligence Ready for Standardization?
- Automated optimal firewall orchestration and configuration in virtualized networks
- Ivy: a multi-modal verification tool for distributed algorithms
- AMYTISS: Parallelized Automated Controller Synthesis for Large-Scale Stochastic Systems
- How many bits does it take to quantize your neural network?
- Semantic Approach to Smart Contract Verification
- Executable cancer models: successes and challenges
- Dynamic adaptation of software-defined networks for IoT systems: a search-based approach
- Design of a secure medical data sharing scheme based on blockchain
- An Abstraction Technique for Verifying Shared-Memory Concurrency
- The SOTA approach to engineering collective adaptive systems
- Modelling of electromagnetic energy harvester with rotational pendulum using mechanical vibrations to scavenge electrical energy
- On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices
- ARCH-COMP20 Category Report: Artificial Intelligence and Neural Network Control Systems (AINNCS) for Continuous and Hybrid Systems Plants
- Improving parity game solvers with justifications
- Symbolic Verification of Quantum Circuits
- Manifold for machine learning assurance
- Network pharmacology-based prediction and verification of the mechanism for Bushen Chengyun granule on low endometrial receptivity
- Trace elements and machine learning for Brazilian beef traceability
- Unbounded-time safety verification of stochastic differential dynamics
- Agile requirements engineering in globally distributed software development projects
- Incorporating convolutional neural networks and sequence graph transform for identifying multilabel protein lysine PTM sites
- The final frontier: Deep learning in space
- Targeted induction of a silent fungal gene cluster encoding the bacteria-specific germination inhibitor fumigermin
- Compressive strength determination of concrete specimens using X-ray computed tomography and finite element method
- Verification of Neural Networks
- FY20 Verification of BISON Using Analytic and Manufactured Solutions.
- Design and model checking of timed automata oriented architecture for Internet of thing
- Performance Verification of a Flexible Vibration Monitoring System
- 60 Years of SAT Solving
- Automating modular verification of secure information flow
- IMDAA Regional Reanalysis: Performance Evaluation During Indian Summer Monsoon Season
- Semantic understanding of smart contracts: executable operational semantics of Solidity
- Specification of Synchronous Network Flooding in Temporal Logic
- Development of a new deformation-controlled rock bolt: Numerical modelling and laboratory verification
- Efficient runtime assertion checking for properties over mathematical numbers
- Secure remote anonymous user authentication scheme for smart home environment
- An efficient statistical model checker for nondeterminism and rare events
- Evidence Verification Optimal Design and Practice of Electronic Health Card System Based on FSM
- Stability of termination and sufficient-completeness under pushouts via amalgamation
- Call graph and model checking for fine-grained android malicious behaviour detection
- Guaranteed-safe approximate reachability via state dependency-based decomposition
- Investigating Controller Evolution and Divergence through Mining and Mutation*
- Trace-driven Modeling and Verification of a Mobility-Aware Service Allocation and Migration Policy for Mobile Edge Computing
- Automated formal synthesis of neural barrier certificates for dynamical models
- What’s Decidable About Program Verification Modulo Axioms?
- Uncertainty-aware specification and analysis for hardware-in-the-loop testing of cyber-physical systems
- Private and Public IPR Protection in a Vertically Differentiated Software Duopoly
- Simulation Analysis and Experimental Verification of the Locking Torque of the Microgravity Platform of the Chinese Space Station
- Deep generation of Coq lemma names using elaborated terms
- A classification and systematic review of product line feature model defects
- ABCDE–agile block chain DApp engineering
- Automatic Verification of Multi-threaded Programs by Inference of Rely-Guarantee Specifications
- Dependency graphs with applications to verification
- Reliability and Confidentiality Co-Verification for Parallel Applications in Distributed Systems
- Safety Versus Security in Aviation, Comparing DO-178C with Security Standards
- Protecting Your Digital Health Intellectual Property: Fundamentals of Intellectual Property and How It Applies to Software, Hardware and Business Processes
- Case Study: Safety Verification of an Unmanned Underwater Vehicle
- Test and evaluation needs of multi-domain autonomous systems
- DeepAbstract: neural network abstraction for accelerating verification
- Formal methods in dependable systems engineering: a survey of professionals from Europe and North America
- Experimental verification of the inverse method of the heat transfer coefficient calculation
- An annotation system for specifying aliasing invariants on object fields
- Hybrid Discrete Hopfield Neural Network based Modified Clonal Selection Algorithm for VLSI Circuit Verification.
- Safe systems programming in Rust: The promise and the challenge
- Survey on Parameterized Verification with Threshold Automata and the Byzantine Model Checker
- Microplastics on sandy beaches of the southern Baltic Sea
- Improved geometric path enumeration for verifying ReLU neural networks
- Accelerating Parallel Verification via Complementary Property Partitioning and Strategy Exploration
- Potential applications of model checking in probabilistic risk assessments
- On Sufficient and Necessary Conditions in Bounded CTL
- A moth odorant receptor highly expressed in the ovipositor is involved in detecting host-plant volatiles
- BigraphTalk: verified design of IoT applications
- Efficient conditional compliance checking of business process models
- Formal approach to model complex adaptive computing systems
- High-Assurance Cryptography in the Spectre Era
- A comprehensive survey of interface protocols for software defined networks
- Scaling correctness-by-construction
- BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for Internet of medical things deployment
- Generating correctness proofs with neural networks
- A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems
- Breaking the circularity in circular analyses: Simulations and formal treatment of the flattened average approach
- Formal development of an operation monitoring and control system for nuclear reactors using Event‐B method
- Verifying recurrent neural networks using invariant inference
- Risk-Based Formal Requirement Elicitation for Automatic Spacecraft Maneuvering
- Health management information system (HMIS) data verification: A case study in four districts in Rwanda
- A Security Verification Template to Assess Cache Architecture Vulnerabilities
- Ethical principles and governance technology development of AI in China
- Verification of a robust method for sizing and siting the small hydropower run-of-river plant potential by using GIS
- Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405
- Residues and enantioselective behavior of cyflumetofen from apple production
- Counterexample-guided correlation algorithm for translation validation
- ONTOARQS: UNA ONTOLOGÍA PARA DESCRIBIR ARQUITECTURA DE SOFTWARE
- New Model-Based Analysis Method with Multiple Constraints for Integrated Modular Avionics Dynamic Reconfiguration Process
- Validation and real-life demonstration of ETCS hybrid level 3 principles using a formal B model
- SMT-based verification of data-aware processes: a model-theoretic approach.
- A Program Verification based Approach to Find Data Race Vulnerabilities in Interrupt-driven Program
- Numerical verification of the orders of accuracy of truncated asymptotic expansion solutions to the van der Pol equation
- Critical Software For Human Spaceflight: Orion Propulsion Software from Development to Qualification
- Development and verification of an aero-hydro-servo-elastic coupled model of dynamics for FOWT, based on the MoWiT library
- Efficient provably-secure privacy-preserving signature-based key establishment protocol
- Development of the formal model for the presentation of poorly structured and unstructured information
- Shrinking counterexamples in property-based testing with genetic algorithms
- Automated Verification of Stand-alone Solar Photovoltaic Systems: Optimal Sizing and Project Validation
- Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
- Система группового управления мобильными роботами с позиций автоматизированного проектирования
- Internalização de novos membros em equipes de desenvolvimento de software: uma versão detalhada
- A conceptual model for software ecosystem governance
- ОЦІНЮВАННЯ ПРОСТОРОВОЇ СКЛАДНОСТІ ЗАДАЧІ ФОРМАЛЬНОЇ ВЕРИФІКАЦІЇ, ВИРІШУВАНОЇ МЕТОДОМ ПЕРЕВІРКИ НА МОДЕЛІ1
- Automatisierung von Hardware/Software Integration Tests auf Mikrocontroller Zielumgebungen
- Verificação Automática dos Protocolos de Segurança Needham-Schroeder, WMF e CSA com a ferramenta Scyther
- Comprobaci on numerica del proceso de homogeneizaci on mediante el metodo de los elementos finitos. Numerical verification of the homogenization process …
- Verificación de Sistemas Concurrentes: Optimalidad, Escalabilidad y Aplicabilidad Verification of Concurrent Systems: Optimality, Scalability and Applicability
Research Topics Computer Science
Topic Covered
Top 10 research topics of Software Formal Verification | list of research topics of Software Formal Verification | trending research topics of Software Formal Verification | research topics for dissertation in Software Formal Verification | dissertation topics of Software Formal Verification in pdf | dissertation topics in Software Formal Verification | research area of interest Software Formal Verification | example of research paper topics in Software Formal Verification | top 10 research thesis topics of Software Formal Verification | list of research thesis topics of Software Formal Verification| trending research thesis topics of Software Formal Verification | research thesis topics for dissertation in Software Formal Verification | thesis topics of Software Formal Verification in pdf | thesis topics in Software Formal Verification | examples of thesis topics of Software Formal Verification | PhD research topics examples of Software Formal Verification | PhD research topics in Software Formal Verification | PhD research topics in computer science | PhD research topics in software engineering | PhD research topics in information technology | Masters (MS) research topics in computer science | Masters (MS) research topics in software engineering | Masters (MS) research topics in information technology | Masters (MS) thesis topics in Software Formal Verification.