ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Dependable Software Engineering. Theories, Tools, and Applications: 7th International Symposium, SETTA 2021, Beijing, China, November 25–27, 2021, Proceedings

دانلود کتاب مهندسی نرم افزار قابل اعتماد تئوری ها، ابزارها و کاربردها: هفتمین سمپوزیوم بین المللی، SETTA 2021، پکن، چین، 25 تا 27 نوامبر 2021، مجموعه مقالات

Dependable Software Engineering. Theories, Tools, and Applications: 7th International Symposium, SETTA 2021, Beijing, China, November 25–27, 2021, Proceedings

مشخصات کتاب

Dependable Software Engineering. Theories, Tools, and Applications: 7th International Symposium, SETTA 2021, Beijing, China, November 25–27, 2021, Proceedings

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 3030912647, 9783030912642 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 321
[327] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 20 Mb 

قیمت کتاب (تومان) : 59,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Dependable Software Engineering. Theories, Tools, and Applications: 7th International Symposium, SETTA 2021, Beijing, China, November 25–27, 2021, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مهندسی نرم افزار قابل اعتماد تئوری ها، ابزارها و کاربردها: هفتمین سمپوزیوم بین المللی، SETTA 2021، پکن، چین، 25 تا 27 نوامبر 2021، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مهندسی نرم افزار قابل اعتماد تئوری ها، ابزارها و کاربردها: هفتمین سمپوزیوم بین المللی، SETTA 2021، پکن، چین، 25 تا 27 نوامبر 2021، مجموعه مقالات

این کتاب مجموعه مقالات هفتمین سمپوزیوم بین‌المللی مهندسی نرم‌افزار قابل اعتماد، SETTA 2021 است که در نوامبر 2021 در پکن، چین برگزار شد. از سخنرانی های اصلی آنها با آخرین نتایج تحقیقات و ایده ها در مورد پر کردن شکاف بین روش های رسمی و مهندسی نرم افزار سروکار دارند.


توضیحاتی درمورد کتاب به خارجی

This book constitutes the proceedings of the 7th International Symposium on Dependable Software Engineering, SETTA 2021, held in Beijing, China, in November 2021. The 16 full papers in this volume were carefully reviewed and selected from 39 submissions, and are presented with 3 abstracts of keynote speeches. They deal with latest research results and ideas on bridging the gap between formal methods and software engineering.



فهرست مطالب

Preface
Organization
Abstracts of Keynote Speeches
Mechanically Finding the Right Probabilities in Markov Models
A New Approach for Active Automata Learning Based on Apartness
Enterprise-Scale Static Analysis: A Pinpoint Experience
Contents
Systems Development
Translating a Large Subset of Stateflow to Hybrid CSP with Code Optimization
	1 Introduction
	2 Hybrid CSP
	3 A Brief Tour of Stateflow Semantics
		3.1 States
		3.2 Transitions
		3.3 Junctions
		3.4 State Lifecycle
		3.5 Events and Temporal Events
		3.6 Early Return
		3.7 Data and Messages
		3.8 Functions and Graphical Functions
		3.9 Continuous Evolution
	4 Translation from Stateflow
		4.1 Variables
		4.2 States
		4.3 Transitions and Junctions
		4.4 Events
		4.5 Order of Execution of Charts
		4.6 Translation of Continuous Evolution
	5 Code Optimization
		5.1 Inlining of Procedures
		5.2 Peephole Optimization
		5.3 Constant Propagation
		5.4 Dead Code Elimination
	6 Evaluation
		6.1 Benchmarks
		6.2 Case Studies
	7 Related Work
	8 Conclusion and Future Works
	References
DeepGlobal: A Global Robustness Verifiable FNN Framework
	1 Introduction
	2 Background
		2.1 Feed Forward Neural Networks
		2.2 Adversarial Dangerous Regions
	3 Naive Rule-Generation
	4 Sliding Door Network for Feasible Rule-Generation
		4.1 Sliding Door Network
		4.2 Rule-Generation for SDN
	5 Selection Approach for Generated Rules
		5.1 Pre-processing of Generated Rules
		5.2 Real Boundaries Selection Approach
	6 Experiments
		6.1 Effectiveness of Reducing Rule-Generation Cost
		6.2 Feasibility of Global Verification
	7 Conclusion
	References
Leveraging Event-B Theories for Handling Domain Knowledge in Design Models
	1 Introduction
	2 Event-B: A Refinement and Proof-Based Formal Method
		2.1 Core Event-B
		2.2 Event-B Extensions with Theories
	3 Related Works
	4 Domain Knowledge in State-Based Formal Methods: The Case of Event-B
	5 Ontologies as Event-B Theories
	6 Application to the Design of Critical Interactive Systems
		6.1 The TCAS Case Study
		6.2 A Domain Ontology for the Critical Interactive Systems
		6.3 Ontology-Based Annotation of TCAS Design Model
	7 Assessment
	8 Conclusion and Future Work
	References
Program Analysis and Verifiation
Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics
	1 Introduction
	2 The Technique
		2.1 Specifications
		2.2 Semantic Derivation and Correctness
		2.3 Specification-Aware Inference and Verification
		2.4 Soundness
	3 Illustrative Example
		3.1 Big-Step Semantics of the While Language
		3.2 Factorial Program and Its Specification
		3.3 Proof of the Factorial Program
		3.4 Comparison with Hoare-Style Program Verification
	4 Verification of Iterative and Recursive Programs
		4.1 Extended While Language and Array-Merging Program
		4.2 Eager Functional Language and List-Merging Program
	5 On Completeness of the Technique
	6 Related Work
	7 Future Directions
	8 Conclusion
	References
Trace Semantics and Algebraic Laws for MCA ARMv8 Architecture Based on UTP
	1 Introduction
	2 Trace Semantics
		2.1 The Syntax of ARMv8
		2.2 The Semantic Model
		2.3 Trace Semantics
	3 Algebraic Properties
		3.1 Guarded Choice
		3.2 Head Normal Form
		3.3 Algebraic Laws
	4 Conclusion and Future Work
	A Read Function
	References
Formal Analysis of 5G AKMA
	1 Introduction
	2 AKMA in 5G System
		2.1 General Architecture
		2.2 5G AKMA Protocol
	3 Tamarin Prover
		3.1 Modeling
		3.2 Property Specification
	4 Modeling and Specifying Properties of AKMA
		4.1 Threat Model
		4.2 Modeling the AKMA Service in Tamarin
		4.3 Specifying Properties
	5 Results and Analysis
		5.1 Verification Results and Analysis
		5.2 Suggestions
	6 Conclusion
	References
Verifying the Correctness of Distributed Systems via Mergeable Parallelism
	1 Introduction
	2 Overview
	3 Asynchronous Message Passing Programs
	4 Mergeable Message Passing Programs
	5 Simplified Reasoning
		5.1 Analysis by Inference Rules
		5.2 The Soundness of Using Inference Rules
	6 Algorithm
		6.1 Algorithm_Merging
		6.2 Validity of the Algorithm
	7 Experimental Evaluation
		7.1 Examples
		7.2 Experimental Results
	8 Related Work
	9 Conclusion
	References
Testing and Fault Detection
Mutation Testing of Reinforcement Learning Systems
	1 Introduction
	2 Background
		2.1 Reinforcement Learning
		2.2 Mutation Testing
	3 Mutation Testing Specific to RL Systems
		3.1 Element-Level Mutation Operators
		3.2 Agent-Level Mutation Operators
		3.3 Mutation Testing Framework for RL Systems
	4 Mutation Scores Specific to RL Systems
	5 Design of Test Environments
	6 Evaluation
	7 Related Work
		7.1 Mutation Testing
		7.2 Reinforcement Learning
		7.3 AI Safety
	8 Conclusion and Future Work
	References
AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism
	1 Introduction
	2 Design of AIdetectorX
		2.1 Program Representation
		2.2 TCN Layer
		2.3 Self-attention Layer
		2.4 Overview of AIdetectorX
	3 Experimental Design
		3.1 Evaluation Metrics
		3.2 Comparative Vulnerability Detector
		3.3 Evaluation Datasets
		3.4 Experimental Produce
	4 Results and Discussions
		4.1 Experiments for Answering RQ1
		4.2 Experiments for Answering RQ2
	5 Threats to Validity
	6 Conclusions
	References
MC/DC Test Cases Generation Based on BDDs
	1 Introduction
	2 Background
		2.1 Modified Condition Decision Coverage (MC/DC) Criterion
		2.2 Overview on Binary Decision Diagrams (BDDs)
	3 Approaches and Algorithm for Test Cases Generation
		3.1 Theorems and Definitions for MC/DC in Terms of BDDs
		3.2 Algorithm and Heuristics for Test Cases Generation
	4 Implementation of MC/DC Test Cases Selection
		4.1 Experimental Setup
		4.2 Experimental Results
	5 Related Work
	6 Conclusion and Future Works
	References
Software Quality
Predicting and Monitoring Bug-Proneness at the Feature Level
	1 Introduction
	2 Background and Related Work
		2.1 Bug Prediction at Class or File Level
		2.2 Bug Prediction at Method Level
		2.3 Bug Prediction at Coarse-Grained Level
		2.4 Bug Prediction at Other Granularity Levels
	3 Study Design
		3.1 Feature Identification
		3.2 Attributes: Code Metrics
		3.3 Labeled Classes: Bug-Prone and Not Bug-Prone Feature
		3.4 Machine Learning Algorithms
		3.5 Researched Projects
	4 Evaluation
		4.1 Research Questions
		4.2 Prediction Model Development
		4.3 Evaluation Method
		4.4 Results
	5 Threats to Validity
	6 Conclusion
	References
CSFL: Fault Localization on Real Software Bugs Based on the Combination of Context and Spectrum
	1 Introduction
	2 Background
		2.1 Spectrum-Based Fault Localization
		2.2 Context-Based Fault Localization
	3 Approach
		3.1 Basic Framework
		3.2 The Algorithm of Context Analysis
		3.3 The Case Study of CSFL
		3.4 Time Cost Reduction
	4 Evaluation
		4.1 Research Questions
		4.2 Experimental Subjects
		4.3 Implementation Details
		4.4 Measurements
	5 Results Analysis
		5.1 RQ1: How Does CSFL Perform in Locating Real Faults?
		5.2 RQ2: How Much Efficiency Has CSFL Improved?
		5.3 RQ3: How About the Time Cost of CSFL?
		5.4 Threats to Validity
	6 Related Work
		6.1 Spectrum-Based Fault Localization
		6.2 Combination of Context and Spectrum-Based for Fault Localization
	7 Conclusion
	References
A Distributed Simplex Architecture for Multi-agent Systems
	1 Introduction
	2 Background
		2.1 Simplex Architecture
		2.2 Control Barrier Functions
	3 Distributed Simplex Architecture
		3.1 Baseline Controller
		3.2 Decision Module
		3.3 Safety Theorem
	4 Flocking Case Study
		4.1 Synthesis of Control Barrier Function
		4.2 Advanced Controller
		4.3 Experimental Results
	5 Way-Point Case Study
		5.1 Experimental Results
	6 Microgrid Case Study
		6.1 Synthesis of Control Barrier Function
		6.2 Advanced Controller
		6.3 Experimental Results
	7 Related Work
	8 Conclusion
	References
Satisfiability, Reachability and Model Checking
OURS: Over- and Under-Approximating Reachable Sets for Analytic Time-Invariant Differential Equations
	1 Overview of OURS
	2 Main Theoretical Features
		2.1 EF Based Description of Reachable Set
		2.2 RE Based Approximation of Reachable Sets
	3 Main Implementation Features
		3.1 Inputs and Outputs
		3.2 Technical Implementation
		3.3 Correctness Analysis of OURS
	4 Comparisons with Examples
	5 Conclusion
	References
ESampler: Efficient Sampling of Satisfying Assignments for Boolean Formulas
	1 Introduction
	2 Preliminaries
	3 Derivation Procedure
		3.1 Motivating Example
		3.2 Derivation Algorithm
	4 ESampler
	5 Implementation and Evaluation
		5.1 Comparison with QuickSampler
		5.2 Comparison with STS
		5.3 Comparison with UniGen3
		5.4 Execution Time vs Number of Satisfying Assignments
		5.5 Testing Uniformity
	6 Conclusion
	References
API Usage Pattern Search Based on Model Checking
	1 Introduction
	2 Related Work
	3 API Transition System Model
		3.1 Class Library API Dependency
		3.2 API Transition System
		3.3 Constructing API Transition System
	4 Formalization of the Matching Rules of Queries
		4.1 Semantic Descriptions of Rules
		4.2 Characterization of Query Rules by CTL*
	5 Evaluation
		5.1 Setup
		5.2 Results
	6 Conclusion
	References
Author Index




نظرات کاربران