Dependable Software Engineering. Theories, Tools, and Applications : 9th International Symposium, SETTA 2023, Nanjing, China, November 27-29, 2023, Proceedings (Lecture Notes in Computer Science)

個数:

Dependable Software Engineering. Theories, Tools, and Applications : 9th International Symposium, SETTA 2023, Nanjing, China, November 27-29, 2023, Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9789819986637

Full Description

This book constitutes the proceedings of the 9th International Symposium on Dependable Software Engineering, SETTA 2023, held in Nanjing, China, during November 27-29, 2023.

The 24 full papers presented in this volume were carefully reviewed and selected from 78 submissions. They deal with latest research results and ideas on bridging the gap between formal methods and software engineering.

 

Contents

String Constraints with Regex-Counting and String-Length Solved More Efficiently.- Reachability Based Uniform Controllability to Target Set with Evolution Function.- Enhancing Branch and Bound for Robustness Verification of Neural Networks via An Effective Branching Strategy.- Graph-Based Log Anomaly Detection via Adversarial Training.- Formal Verification based Synthesis for Behavior Trees.- SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries.- Session Types with Multiple Senders Single Receiver.- Understanding the Reproducibility Issues of Monkey for GUI Testing.- Multi-Dimensional Abstraction and Decomposition for Separation of Concerns.- Solving SMT Over Non-Linear Real Arithmetic via Numerical Sampling and Symbolic Verification.- Leveraging TLA+ Specifications to Improve the Reliability of the ZooKeeper Coordination Service.- Modeling Regex Operators for Solving Regex Crossword Puzzles.- Software Vulnerability Detection Using an Enhanced Generalization Strategy.- HeatC: a Variable-Grained Coverage Criterion for Deep Learning Systems.- Formalization of Lambda Calculus with Explicit Names as a Nominal Reasoning Framework.- Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications.- Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance.- An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side Intervals.- Deducing Matching Strings for Real-World Regular Expressions.- Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis.- Cheat-FlipIt: an Approach to Modeling and Perception of a Deceptive Opponent.- Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification.- Optimized Solutions for Highly Contended Transactional Workloads.- DeepTD: Diversity-Guided Deep Neural Network Test Generation.

最近チェックした商品