Browse Results

Showing 9,151 through 9,175 of 63,454 results

Computer Aided Verification: 31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11562)

by Isil Dillig Serdar Tasiran

The open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency.

Computer Aided Verification: 12th International Conference, CAV 2000 Chicago, IL, USA, July 15-19, 2000 Proceedings (Lecture Notes in Computer Science #1855)

by E. Allen Emerson A. Prasad Sistla

This volume contains the proceedings of the 12th International Conference on Computer Aided Veri?cation (CAV 2000) held in Chicago, Illinois, USA during 15-19 July 2000. The CAV conferences are devoted to the advancement of the theory and practice of formal methods for hardware and software veri?cation. The con- rence covers the spectrum from theoretical foundations to concrete applications, with an emphasis on veri?cation algorithms, methods, and tools together with techniques for their implementation. The conference has traditionally drawn contributions from both researchers and practitioners in academia and industry. This year 91 regular research papers were submitted out of which 35 were - cepted, while 14 brief tool papers were submitted, out of which 9 were accepted for presentation. CAV included two invited talks and a panel discussion. CAV also included a tutorial day with two invited tutorials. Many industrial companies have shown a serious interest in CAV, ranging from using the presented technologies in their business to developing and m- keting their own formal veri?cation tools. We are very proud of the support we receive from industry. CAV 2000 was sponsored by a number of generous andforward-lookingcompaniesandorganizationsincluding:CadenceDesign- stems, IBM Research, Intel, Lucent Technologies, Mentor Graphics, the Minerva Center for Veri?cation of Reactive Systems, Siemens, and Synopsys. TheCAVconferencewasfoundedbyitsSteeringCommittee:EdmundClarke (CMU), Bob Kurshan (Bell Labs), Amir Pnueli (Weizmann), and Joseph Sifakis (Verimag).

Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings (Lecture Notes in Computer Science #3576)

by Kousha Etessami Sriram K. Rajamani

This volume contains the proceedings of the International Conference on Computer Aided Veri?cation (CAV), held in Edinburgh, Scotland, July 6–10, 2005. CAV 2005 was the seventeenth in a series of conferences dedicated to the advancement of the theory and practice of computer-assisted formal an- ysis methods for software and hardware systems. The conference covered the spectrum from theoretical results to concrete applications, with an emphasis on practical veri?cation tools and the algorithms and techniques that are needed for their implementation. We received 123 submissions for regular papers and 32 submissions for tool papers.Ofthesesubmissions,theProgramCommitteeselected32regularpapers and 16 tool papers, which formed the technical program of the conference. The conference had three invited talks, by Bob Bentley (Intel), Bud Mishra (NYU), and George C. Necula (UC Berkeley). The conference was preceded by a tutorial day, with two tutorials: – Automated Abstraction Re?nement, by Thomas Ball (Microsoft) and Ken McMillan (Cadence); and – Theory and Practice of Decision Procedures for Combinations of (First- Order) Theories, by Clark Barrett (NYU) and Cesare Tinelli (U Iowa). CAV 2005 had six a?liated workshops: – BMC 2005: 3rd Int. Workshop on Bounded Model Checking; – FATES 2005: 5th Workshop on Formal Approaches to Testing Software; – GDV 2005: 2nd Workshop on Games in Design and Veri?cation; – PDPAR 2005: 3rd Workshop on Pragmatics of Decision Procedures in - tomated Reasoning; – RV 2005: 5th Workshop on Runtime Veri?cation; and – SoftMC 2005: 3rd Workshop on Software Model Checking.

Computer Aided Verification: 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011, Proceedings (Lecture Notes in Computer Science #6806)

by Ganesh Gopalakrishnan Shaz Qadeer

This book constitutes the refereed proceedings of the 23rd International Conference on Computer Aided Verification, CAV 2011, held in Snowbird, UT, USA, in July 2011. The 35 revised full papers presented together with 20 tool papers were carefully reviewed and selected from 161 submissions. The papers are organized in topical sections on the following workshops: 4th International Workshop on Numerical Software Verification (NSV 2011), 10th International Workshop on Parallel and Distributed Methods in Verifications (PDMC 2011), 4th International Workshop on Exploiting Concurrency Efficiently and Correctly (EC2 2011), Frontiers in Analog Circuit Synthesis and Verification (FAC 2011), International Workshop on Satisfiability Modulo Theories, including SMTCOMP (SMT 2011), 18th International SPIN Workshop on Model Checking of Software (SPIN 2011), Formal Methods for Robotics and Automation (FM-R 2011), and Practical Synthesis for Concurrent Systems (PSY 2011).

Computer Aided Verification: 20th International Conference, CAV 2008 Princeton, NJ, USA, July 7-14, 2008, Proceedings (Lecture Notes in Computer Science #5123)

by Aarti Gupta Sharad Malik

This book constitutes the refereed proceedings of the 20th International Conference on Computer Aided Verification, CAV 2008, held in Princeton, NJ, USA, in July 2008. The 33 revised full papers presented together with 14 tool papers and 2 invited papers and 4 invited tutorials were carefully reviewed and selected from 104 regular paper and 27 tool paper submissions. The papers are organized in topical sections on concurrency, memory consistency, abstraction/refinement, hybrid systems, dynamic verification, modeling and specification formalisms, decision procedures, program verification, program and shape analysis, security and program analysis, hardware verification, model checking, space efficient algorithms, and model checking.

Computer Aided Verification: 15th International Conference, CAV 2003, Boulder, CO, USA, July 8-12, 2003, Proceedings (Lecture Notes in Computer Science #2725)

by Warren A. Hunt Fabio Somenzi

The refereed proceedings of the 15th International Conference on Computer Aided Verification, CAV 2003, held in Boulder, CO, USA in July 2003. The 32 revised full papers and 9 tool papers presented were carefully reviewed and selected from a total of 102 submissions. The papers are organized in topical sections on bounded model checking; symbolic model checking; games, trees, and counters; tools; abstraction; dense time; infinite state systems; applications; theorem proving; automata-based verification; invariants; and explicit model checking.

Computer Aided Verification: 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part II (Lecture Notes in Computer Science #9207)

by Daniel Kroening Corina S. Păsăreanu

The two-volume set LNCS 9206 and LNCS 9207 constitutes the refereed proceedings of the 27th International Conference on Computer Aided Verification, CAV 2015, held in San Francisco, CA, USA, in July 2015.The total of 58 full and 11 short papers presented in the proceedings was carefully reviewed and selected from 252 submissions. The papers were organized in topical sections named: model checking and refinements; quantitative reasoning; software analysis; lightning talks; interpolation, IC3/PDR, and Invariants; SMT techniques and applications; HW verification; synthesis; termination; and concurrency.

Computer Aided Verification: 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I (Lecture Notes in Computer Science #9206)

by Daniel Kroening Corina S. Păsăreanu

The two-volume set LNCS 9206 and LNCS 9207 constitutes the refereed proceedings of the 27th International Conference on Computer Aided Verification, CAV 2015, held in San Francisco, CA, USA, in July 2015.The total of 58 full and 11 short papers presented in the proceedings was carefully reviewed and selected from 252 submissions. The papers were organized in topical sections named: model checking and refinements; quantitative reasoning; software analysis; lightning talks; interpolation, IC3/PDR, and Invariants; SMT techniques and applications; HW verification; synthesis; termination; and concurrency.

Computer Aided Verification: 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II (Lecture Notes in Computer Science #10427)

by Rupak Majumdar Viktor Kunčak

The two-volume set LNCS 10426 and LNCS 10427 constitutes the refereed proceedings of the 29th International Conference on Computer Aided Verification, CAV 2017, held in Heidelberg, Germany, in July 2017.The total of 50 full and 7 short papers presented together with 5 keynotes and tutorials in the proceedings was carefully reviewed and selected from 191 submissions. The CAV conference series is dedicated to the advancement of the theory and practice of computer-aided formal analysis of hardware and software systems. The conference covers the spectrum from theoretical results to concrete applications, with an emphasis on practical verification tools and the algorithms and techniques that are needed for their implementation.

Computer Aided Verification: 24th International Conference, CAV 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings (Lecture Notes in Computer Science #7358)

by Madhusudan Parthasarathy Sanjit A. Seshia

This book constitutes the refereed proceedings of the 24th International Conference on Computer Aided Verification, CAV 2012, held in Berkeley, CA, USA in July 2012. The 38 regular and 20 tool papers presented were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on automata and synthesis, inductive inference and termination, abstraction, concurrency and software verification, biology and probabilistic systems, embedded and control systems, SAT/SMT solving and SMT-based verification, timed and hybrid systems, hardware verification, security, verification and synthesis, and tool demonstration.

Computer Aided Verification: 11th International Conference, CAV'99, Trento, Italy, July 6-10, 1999, Proceedings (Lecture Notes in Computer Science #1633)

by Doron Peled Nicolas Halbwachs

This book constitutes the refereed proceedings of the 11th International Conference on Computer Aided Verification, CAV'99, held in Trento, Italy in July 1999 as part of FLoC'99.The 34 revised full papers presented were carefully reviewed and selected from a total of 107 submissions. Also included are six invited contributions and five tool presentations. The book is organized in topical sections on processor verification, protocol verification and testing, infinite state spaces, theory of verification, linear temporal logic, modeling of systems, symbolic model checking, theorem proving, automata-theoretic methods, and abstraction.

Computer Aided Verification: 33rd International Conference, CAV 2021, Virtual Event, July 20–23, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12760)

by Alexandra Silva K. Rustan M. Leino

This open access two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer Aided Verification, CAV 2021, held virtually in July 2021.The 63 full papers presented together with 16 tool papers and 5 invited papers were carefully reviewed and selected from 290 submissions. The papers were organized in the following topical sections: Part I: invited papers; AI verification; concurrency and blockchain; hybrid and cyber-physical systems; security; and synthesis. Part II: complexity and termination; decision procedures and solvers; hardware and model checking; logical foundations; and software verification.

Computer Aided Verification: 33rd International Conference, CAV 2021, Virtual Event, July 20–23, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12759)

by Alexandra Silva K. Rustan M. Leino

This open access two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer Aided Verification, CAV 2021, held virtually in July 2021. The 63 full papers presented together with 16 tool papers and 5 invited papers were carefully reviewed and selected from 290 submissions. The papers were organized in the following topical sections: Part I: invited papers; AI verification; concurrency and blockchain; hybrid and cyber-physical systems; security; and synthesis. Part II: complexity and termination; decision procedures and solvers; hardware and model checking; logical foundations; and software verification.This is an open access book.

Computer Algebra: Symbolic and Algebraic Computation (Computing Supplementa #4)

by R. Albrecht

this gap. In sixteen survey articles the most important theoretical results, algorithms and software methods of computer algebra are covered, together with systematic references to literature. In addition, some new results are presented. Thus the volume should be a valuable source for obtaining a first impression of computer algebra, as well as for preparing a computer algebra course or for complementary reading. The preparation of some papers contained in this volume has been supported by grants from the Austrian "Fonds zur Forderung der wissenschaftlichen For­ schung" (Project No. 3877), the Austrian Ministry of Science and Research (Department 12, Dr. S. Hollinger), the United States National Science Foundation (Grant MCS-8009357) and the Deutsche Forschungsgemeinschaft (Lo-23 1-2). The work on the volume was greatly facilitated by the opportunity for the editors to stay as visitors at the Department of Computer and Information Sciences, University of Delaware, at the General Electric Company Research and Development Center, Schenectady, N. Y. , and at the Mathematical Sciences Department, Rensselaer Polytechnic Institute, Troy, N. Y. , respectively. Our thanks go to all these institutions. The patient and experienced guidance and collaboration of the Springer-Verlag Wien during all the stages of production are warmly appreciated. The editors of the Cooperative editor of Supplementum Computing B. Buchberger R. Albrecht G. Collins R. Loos Contents Loos, R. : Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . 1 Buchberger, B. , Loos, R. : Algebraic Simplification . . . . . . . . . . 11 Neubiiser, J. : Computing with Groups and Their Character Tables. 45 Norman, A. C. : Integration in Finite Terms. . . . . . . . . . . . . .

Computer Ethics (The International Library of Essays in Public and Professional Ethics)

by John Weckert

The study of the ethical issues related to computer use developed primarily in the 1980s, although a number of important papers were published in previous decades, many of which are contained in this volume. Computer ethics, as the field became known, flourished in the following decades. The emphasis initially was more on the computing profession: on questions related to the development of systems, the behaviour of computing professionals and so on. Later the focus moved to the Internet and to users of computer and related communication technologies. This book reflects these different emphases and has articles on most of the important issues, organised into sections on the history and nature of computer ethics, cyberspace, values and technology, responsibility and professionalism, privacy and surveillance, what computers should not do and morality and machines.

Computer Ethics (The International Library of Essays in Public and Professional Ethics)

by John Weckert

The study of the ethical issues related to computer use developed primarily in the 1980s, although a number of important papers were published in previous decades, many of which are contained in this volume. Computer ethics, as the field became known, flourished in the following decades. The emphasis initially was more on the computing profession: on questions related to the development of systems, the behaviour of computing professionals and so on. Later the focus moved to the Internet and to users of computer and related communication technologies. This book reflects these different emphases and has articles on most of the important issues, organised into sections on the history and nature of computer ethics, cyberspace, values and technology, responsibility and professionalism, privacy and surveillance, what computers should not do and morality and machines.

Computer Logic: Design Principles and Applications

by John Y. Hsu

This book provides the reader with the key concepts and techniques of modern digital logic design and applications. This concise treatment provides essential development and explanations for both classical and modern topics. The modern topics include unicode, unipolar transistors, copper technology, flash memory, HDL, verilog and logic simulation software tools. Also covered are combinatorial logic circuits and transistor circuits. It will be an essential resource for computer scientists, logic circuit designers and computer engineers.

Computer Processing of Oriental Languages. Beyond the Orient: 21st International Conference, ICCPOL 2006, Singapore, December 17-19, 2006, Proceedings (Lecture Notes in Computer Science #4285)

by Kam-Fai Wong Min Zhang Yuji Matsumoto Richard Sproat

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Processing of Oriental Languages, ICCPOL 2006, held in Singapore in December 2006, co-located with ISCSLP 2006, the 5th International Symposium on Chinese Spoken Language Processing. Coverage includes information retrieval, machine translation, word segmentation, abbreviation expansion, writing-system issues, semantics, and lexical resources.

Computer Processing of Oriental Languages. Language Technology for the Knowledge-based Economy: 22nd International Conference, ICCPOL 2009, Hong Kong, March 26-27, 2009. Proceedings (Lecture Notes in Computer Science #5459)

by Wenjie Li Diego Mollá-Aliod

The International Conference on the Computer Processing of Oriental L- guages(ICCPOL)seriesishostedbytheChineseandOrientalLanguagesSociety (COLCS),aninternationalsocietyfoundedin1975.RecentICCPOLeventshave been held in Hong Kong (1997), Tokushima, Japan (1999), Seoul, Korea (2001), Shenyang, China (2003) and Singapore (2006). This volume presents the proceedings of the 22nd International Conference ontheComputerProcessingofOrientalLanguages(ICCPOL2009)heldinHong Kong, March 26-27, 2009. We received 63 submissions and all the papers went through a blind review process by members of the Program Committee. After careful discussion, 25 of them were selected for oral presentation and 15 for poster presentation. The accepted papers covered a variety of topics in natural language processing and its applications, including word segmentation, phrase and term extraction, chunking and parsing, semantic labelling, opinion mining, ontology construction, machine translation, information extraction, document summarization and so on. On behalf of the Program Committee, we would like to thank all authors of submitted papers for their support. We wish to extend our appreciation to the Program Committee members and additional external reviewers for their tremendous e?ort and excellent reviews. We gratefully acknowledge the Or- nizing Committee and Publication Committee members for their generous c- tribution to the success of the conference. We also thank the Asian Federation of Natural Language Processing (AFNLP), the Department of Computing, The Hong Kong Polytechnic University, Hong Kong, the Department of Systems - gineering and Engineering Management, The Chinese University of Hong Kong, Hong Kong, and the Centre for Language Technology, Macquarie University, Australia for their valuable support.

Computer Safety, Reliability, and Security: SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings (Lecture Notes in Computer Science #9923)

by Amund Skavhaug Jérémie Guiochet Erwin Schoitsch Friedemann Bitsch

This book constitutes the refereed proceedings of four workshops co-located with SAFECOMP 2016, the 35th International Conference on Computer Safety, Reliability, and Security, held in Trondheim, Norway, in September 2016. The 30 revised full papers presented together with 4 short and 5 invited papers were carefully reviewed and selected from numerous submissions. This year’s workshop are: ASSURE 2016 - Assurance Cases for Software-intensive Systems; DECSoS 2016 - EWICS/ERCIM/ARTEMIS Dependable Cyber-physical Systems and Systems-of-Systems Workshop; SASSUR 2016 - Next Generation of System Assurance Approaches for Safety-Critical Systems; and TIPS 2016 – Timing Performance in Safety Engineering.

Computer Science: The Hardware, Software and Heart of It

by Edward K. Blum and Alfred V. Aho

Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain classical theoretical computer science topics such as Unsolvability (e.g. the halting problem) and Undecidability (e.g. Godel’s incompleteness theorem) that treat problems that exist under the Church-Turing thesis of computation. These problem topics explain inherent limits lying at the heart of software, and in effect define boundaries beyond which computer science professionals cannot go beyond. Newer topics such as Cloud Computing are also covered in this book. After a survey of traditional programming languages (e.g. Fortran and C++), a new kind of computer Programming for parallel/distributed computing is presented using the message-passing paradigm which is at the heart of large clusters of computers. This leads to descriptions of current hardware platforms for large-scale computing, such as clusters of as many as one thousand which are the new generation of supercomputers. This also leads to a consideration of future quantum computers and a possible escape from the Church-Turing thesis to a new computation paradigm. The book’s historical context is especially helpful during this, the centenary of Turing's birth. Alan Turing is widely regarded as the father of Computer Science, since many concepts in both the hardware and software of Computer Science can be traced to his pioneering research. Turing was a multi-faceted mathematician-engineer and was able to work on both concrete and abstract levels. This book shows how these two seemingly disparate aspects of Computer Science are intimately related. Further, the book treats the theoretical side of Computer Science as well, which also derives from Turing's research. Computer Science: The Hardware, Software and Heart of It is designed as a professional book for practitioners and researchers working in the related fields of Quantum Computing, Cloud Computing, Computer Networking, as well as non-scientist readers. Advanced-level and undergraduate students concentrating on computer science, engineering and mathematics will also find this book useful.

Computer Science – Theory and Applications: 11th International Computer Science Symposium in Russia, CSR 2016, St. Petersburg, Russia, June 9-13, 2016, Proceedings (Lecture Notes in Computer Science #9691)

by Alexander S. Kulikov Gerhard J. Woeginger

This book constitutes the proceedings of the 11th International Computer Science Symposium in Russia, CSR 2016, held in St. Petersburg, Russia, in June 2016. The 28 full papers presented in this volume were carefully reviewed and selected from 71 submissions. In addition the book contains 4 invited lectures. The scope of the proposed topics is quite broad and covers a wide range of areas such as: include, but are not limited to: algorithms and data structures; combinatorial optimization; constraint solving; computational complexity; cryptography; combinatorics in computer science; formal languages and automata; computational models and concepts; algorithms for concurrent and distributed systems, networks; proof theory and applications of logic to computer science; model checking; automated reasoning; and deductive methods.

Computer Science – Theory and Applications: 6th International Computer Science Symposium in Russia, CSR 2011, St. Petersburg, Russia, June 14-18, 2011. Proceedings (Lecture Notes in Computer Science #6651)

by Alexander Kulikov Nikolay Vereshchagin

This book constitutes the proceedings of the 6th International Computer Science Symposium in Russia, CSR 2011, held in St. Petersburg, Russia, in June 2011. The 29 papers presented were carefully reviewed and selected from 76 submissions. The scope of topics of the symposium was quite broad and covered basically all areas of the foundations of theoretical computer science.

Computer Science Logic: 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Gödel Colloquium, KGC 2003, Vienna, Austria, August 25-30, 2003, Proceedings (Lecture Notes in Computer Science #2803)

by Matthias Baaz Johann M. Makowsky

This book constitutes the joint refereed proceedings of the 17th International Workshop on Computer Science Logic, CSL 2003, held as the 12th Annual Conference of the EACSL and of the 8th Kurt Gödel Colloquium, KGC 2003 in Vienna, Austria, in August 2003. The 30 revised full papers presented together with abstracts of 9 invited presentations were carefully reviewed and selected from a total of 112 submissions. All current aspects of computer science logic are addressed ranging from mathematical logic and logical foundations to the application of logics in various computing aspects.

Refine Search

Showing 9,151 through 9,175 of 63,454 results