We review the first five years of the international Competition on Runtime Verification (CRV), which began in 2014. Runtime verification focuses on verifying system executions directly and is a useful lightweight tech...
详细信息
ISBN:
(纸本)9783030175023;9783030175016
We review the first five years of the international Competition on Runtime Verification (CRV), which began in 2014. Runtime verification focuses on verifying system executions directly and is a useful lightweight technique to complement static verification techniques. the competition has gone through a number of changes since its introduction, which we highlight in this paper.
In term rewriting, reachability analysis is concerned withthe problem of deciding whether or not one term is reachable from another by rewriting. Reachability analysis has several applications in termination and conf...
详细信息
ISBN:
(纸本)9783030174620;9783030174613
In term rewriting, reachability analysis is concerned withthe problem of deciding whether or not one term is reachable from another by rewriting. Reachability analysis has several applications in termination and confluence analysis of rewrite systems. We give a unified view on reachability analysis for rewriting with and without conditions by means of what we call reachability constraints. Moreover, we provide several techniques that fit into this general framework and can be efficiently implemented. Our experiments show that these techniques increase the power of existing termination and confluence tools.
the dynamism of the global economy and its growing dependence on Information Technology, more complex and integrated, has required a transformation in the education of software professionals withthe focus on the deve...
详细信息
ISBN:
(纸本)9789897582912
the dynamism of the global economy and its growing dependence on Information Technology, more complex and integrated, has required a transformation in the education of software professionals withthe focus on the development of skills such as teamwork, real practice of problem-solving, managerial profile and analysis of solutions. In this context, the Problem-Based Learning (PBL) approach falls as a glove for the training of professionals in these competencies. From this motivation, this paper describes the application of the PBL approach in an Information systems course. Aiming the effectiveness of this approach, the Framework described in (Santos and Rodrigues, 2016) was applied, which proposes tools for the planning, execution, monitoring, and improvements of PBL. the results showed the suitability of the Framework for this purpose, describing how it was applied and how the PBL can be managed, besides emphasizing main benefits and improvement points from this application.
In document analysisthe availability of ground truth data plays a crucial role for the success of a project. this is even more true at the rise of new deep learning methods which heavily rely on the availability of t...
详细信息
ISBN:
(纸本)9781728150543
In document analysisthe availability of ground truth data plays a crucial role for the success of a project. this is even more true at the rise of new deep learning methods which heavily rely on the availability of training data. But even for traditional, hand crafted algorithmsthat are not trained on data, reliable test data is important for the improvement and evaluation of the methods. Because ground truth acquisition is expensive and time consuming, semi-automatic methods are introduced which make use of suggestions coming from document analysissystems. the interaction between the human operator and the automatic analysisalgorithms is the key to speed up the process while improving the quality of the data. the final confirmation of data may always be done by the human operator. this paper demonstrates a use case for acquisition of truth data in a mail processing system. It shows why a new, extended view on truth data is necessary in development and engineering of such systems. An overview over the tool and the data handling is given, the advantages in the workflow are shown, and consequences for the construction of analysisalgorithms are discussed. It can be shown that the interplay between suggest algorithms and human operator leads to very fast truth data capturing. the surprising finding is the fact that if multiple suggest algorithms circularly depend on data, they are especially effective in terms of speed and accuracy.
this paper gives a brief overview of Java Pathfinder, or jpf-core. We describe the architecture of JPF, its strengths, and how it was set up for SV-COMP 2019.
ISBN:
(纸本)9783030175023;9783030175016
this paper gives a brief overview of Java Pathfinder, or jpf-core. We describe the architecture of JPF, its strengths, and how it was set up for SV-COMP 2019.
this paper presents the use of tools and approaches of system dynamics in the analysis of the efficiency of BIM tools implementation in relation to the management and planning of investments in the construction sector...
详细信息
this paper presents the use of tools and approaches of system dynamics in the analysis of the efficiency of BIM tools implementation in relation to the management and planning of investments in the construction sector. the dynamic model based on the approach of system dynamics allows to simulate the impact rate (range) of BIM implementation in strategic investment decision-making in the construction sector. Based on the analysis, the key parameters critically affecting the large construction investment projects are determined. the proposed model is implemented as a submodel in the dynamic model designed for potential refinements in the strategic planning of the extent of investments into projects of civil infrastructure of the Czech Republic. the model allows to test different strategies in the virtual world before their implementation. the prediction of future developments based on the proposed model allows to streamline planning and decision-making processes.
the main objective of the paper is to present model-driven approach to development of Information Security System. We use data centric models, in which the main focus is on the data and we define a conceptual model of...
详细信息
We propose an automated method for computing inductive invariants used to proving deadlock freedom of parametric component-based systems. the method generalizes the approach for computing structural trap invariants fr...
详细信息
ISBN:
(纸本)9783030174651;9783030174644
We propose an automated method for computing inductive invariants used to proving deadlock freedom of parametric component-based systems. the method generalizes the approach for computing structural trap invariants from bounded to parametric systems with general architectures. It symbolically extracts trap invariants from interaction formulae defining the system architecture. the paper presents the theoretical foundations of the method, including new results for the first order monadic logic and proves its soundness. It also reports on a preliminary experimental evaluation on several textbook examples.
VeriFuzz is a program aware fuzz testing tool, which combines the power of feedback-driven evolutionary fuzz testing with static analysis. VeriFuzz deploys lightweight static analysis to extract meaningful information...
详细信息
ISBN:
(纸本)9783030175023;9783030175016
VeriFuzz is a program aware fuzz testing tool, which combines the power of feedback-driven evolutionary fuzz testing with static analysis. VeriFuzz deploys lightweight static analysis to extract meaningful information about program behavior that can aid fuzzing based test-input generation to achieve coverage goals quickly. We use constraint-solver to generate an initial population of test-inputs. VeriFuzz could generate the maximum number of counterexamples for reachsafety category benchmarks in SV-COMP 2019 and in Test-Comp 2019 [16]. (All the terms in typewriter font are competition specific. See [15].)
Withthe ongoing penetration rate of smart devices, their use is becoming popular in many areas, such as in the field of education. Recently, there has been an increasing demand for digital learning based on mobile de...
详细信息
ISBN:
(纸本)9781728149592
Withthe ongoing penetration rate of smart devices, their use is becoming popular in many areas, such as in the field of education. Recently, there has been an increasing demand for digital learning based on mobile devices, namely m-Learning. the development of an effective mobile authoring tool which provides the ability to instructors to manage the learning content withthe intention not only to facilitate the content delivery, but also to improve the learning process by adapting content to students' needs, is a critical task. To this direction, this paper presents the development of a novel mobile content authoring tool which incorporated dynamic reports on refining teaching strategies according to Learning Analytics;i.e. the analysis of the large amount of information resulting from the interaction of students withthe m-learning app. the goal of this authoring tool is to support an m-learning system and help teachers to improve their instruction through personalized suggestions on the design and revision of the provided learning content. the developed authoring tool was used by teachers in secondary schools and was evaluated by them. the results of the evaluation showed that the incorporation of Learning Analytics is indeed considered as useful for the tutors supporting them through efficient authoring tools in m-learning environments.
暂无评论