Formal Methods and Software Engineering : 26th International Conference on Formal Engineering Methods, ICFEM 2025, Hangzhou, China, November 10-13, 2025, Proceedings (Lecture Notes in Computer Science)

個数:
  • 予約

Formal Methods and Software Engineering : 26th International Conference on Formal Engineering Methods, ICFEM 2025, Hangzhou, China, November 10-13, 2025, Proceedings (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9789819542123

Full Description

This volume LNCS 16229 constitutes the refereed proceedings of 26th International Conference on Formal Methods and Software Engineering, ICFEM 2025, in Hangzhou, China, during November 10-13, 2025.

The 20 full papers presented were carefully reviewed and selected from 47 submissions. The conference focuses on wide range of research areas, covering both theoretical foundations and practical applications of formal engineering methods.

Contents

.- Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks.

.- Automata-Based Steering of Large Language Models for Diverse Structured Generation.

.- LLM-SYM: Integrating Symbolic Methods and Large Language Models for Automated Theorem Proving.

.- Modeling and Analysis of Cyber-Physical Systems in the Hybrid pi-Calculus Using Extended Sequence Diagrams.

.- Neural-Symbolic System Control Adjustment Based on Runtime Verification.

.- Formalizing Requirements into Dafny Specifications with LLMs.

.- Detecting Vector Container Errors in C++ Programs via Abstract Interpretation.

.- BCCIC3:Batch Clause Construction Enhanced Generalization in IC3.

.- MetaLogic: Robustness Evaluation of Text-to-Image Models Using Logically Equivalent Prompts.

.- Formal Construction of Threat Detections from Attack Trees.

.- A Test-Driven Approach for Refining Use Case Specifications of Software Requirements with LLMs.

.- ZK-ProVer: Proving Programming Verification in Non-Interactive Zero-Knowledge Proofs.

.- Synthesizing Loops from Linear Ranking Functions.

.- Modeling and Verifying Concurrent Reactive Systems Using Separation Logic.

.- Formal Modeling and Verification of Blockchain Consensus Protocols: A Case Study on ChainMaker.

.- A Unified Method to Efficiently Verify Opacity of Discrete-Timed Automata.

.- Quantitative Verification for Temporal Properties of Massive Linear Systems.

.- Avoiding Larger Conflict Regions in CDCL-Style Methods for Solving SMT-NRA.

.- Formal Modeling of Reinforcement Learning Systems with SMT.

.- Formal modelling of fault tolerant robotic missions.

.- Towards High-Level SMT Program Modeling: Bounded Integers, Simplified Structs, and Metaprogramming.

最近チェックした商品