Tools and Algorithms for the Construction and Analysis of Systems : 28th International Conference, TACAS 2022, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2-7, 2022, Proceedings, Part II.
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing AG,
2022.
|
| Edition: | 1st ed. |
| Series: | Lecture Notes in Computer Science Series
|
| Subjects: | |
| Online Access: | Click to View |
Table of Contents:
- Intro
- ETAPS Foreword
- Preface
- Organization
- Contents - Part II
- Contents - Part I
- Probabilistic Systems
- A Probabilistic Logic for Verifying Continuous-time Markov Chains
- 1 Introduction
- 2 Preliminaries
- 3 Continuous-time Markov Chains as Distributions Transformers
- 4 Symbolic Dynamics of CTMCs
- 5 Continuous Linear-time Logic
- 6 CLL Model Checking
- 7 Numerical Implementation
- 8 Related Works
- 9 Conclusion
- Acknowledgments
- References
- Under-Approximating Expected Total Rewards in POMDPs
- 1 Introduction
- 2 Preliminaries and Problem Statement
- 3 Finite Exploration Under-Approximation
- 4 Experimental Evaluation
- 5 Conclusion
- References
- Correct Probabilistic Model Checkingwith Floating-Point Arithmetic
- 1 Introduction
- 2 Probabilistic Model Checking
- 3 Floating-Point Arithmetic
- 4 Correctly Rounding Interval Iteration
- 5 Experiments
- 6 Conclusion
- References
- Correlated Equilibria and Fairness in Concurrent Stochastic Games
- 1 Introduction
- 2 Normal Form Games
- 3 Concurrent Stochastic Games
- 4 Case Studies and Experimental Results
- 5 Conclusions
- References
- Omega Automata
- A Direct Symbolic Algorithm for Solving Stochastic Rabin Games
- 1 Introduction
- 2 Preliminaries
- 3 Problem Statement and Outline
- 4 From Randomness to Extreme Fairness
- 5 Extremely Fair Adversarial Rabin Games
- 5.1 Preliminaries on Symbolic Computations over Game Graphs
- 5.2 The Symbolic Algorithm
- 5.3 Proof Outline
- 6 Experimental Evaluation
- 6.1 The VLTS Benchmark Experiments
- 6.2 Synthesis for Stochastically Perturbed Dynamical Systems
- References
- Practical Applications of theAlternating Cycle Decomposition
- 1 Introduction
- 2 Preliminaries
- 3 The Alternating Cycle Decomposition
- 4 An Efficient Computation of the ACD.
- 5 From Emerson-Lei to Parity Automata
- 6 Degeneralization of Generalized Büchi Automata
- 7 Deciding Typeness
- 8 Availability
- 9 Conclusion
- References
- Sky Is Not the Limit
- 1 Introduction
- 2 Preliminaries
- 3 Complementing Büchi automata
- 4 Elevator Automata
- 5 Rank Propagation
- 6 Experimental Evaluation
- 7 Related Work
- References
- On-The-Fly Solving for Symbolic Parity Games
- 1 Introduction
- 2 Preliminaries
- 3 Incomplete Parity Games
- 4 On-the-fly Solving
- 5 Experimental Results
- 6 Conclusion
- References
- Equivalence Checking
- Distributed Coalgebraic Partition Refinement
- 1 Introduction
- 2 Preliminaries
- 3 Coalgebraic Partition Refinement
- 4 The Distributed Algorithm
- 5 Evaluation
- 6 Conclusions and Future Work
- References
- From Bounded Checking to Verification of Equivalence via Symbolic Up-to Techniques
- 1 Introduction
- 2 High-Level Intuitions
- 3 Language and Semantics
- 4 LTS with Symbolic Higher-Order Transitions
- 5 Up-to Techniques
- 6 Symbolic First-Order Transitions
- 7 Up to State Invariants
- 8 Implementation and Evaluation
- 9 Comparison with Existing Tools
- 10 Conclusion
- References
- Equivalence Checking for Orthocomplemented Bisemilattices in Log-Linear Time
- 1 Introduction
- 2 Preliminaries
- 2.1 Lattices and Bisemilattices
- 2.2 Term Rewriting Systems
- 3 Directed Acyclic Graph Equivalence
- 4 Word Problem on Orthocomplemented Bisemilattices
- 4.1 Confluence of the Rewriting System
- 4.2 Complete Terminating Confluent Rewrite System
- 5 Algorithm and Complexity
- 5.1 Combining Rewrite Rules and Tree Isomorphism
- 5.2 Case of Quadratic Runtime for the Basic Algorithm
- 5.3 Final Log-Linear Time Algorithm
- 6 Conclusion
- References
- Monitoring and Analysis
- A Theoretical Analysis of Random Regression Test Prioritization.
- 1 Introduction
- 2 Preliminaries
- 3 PMF of α
- 4 Expected Values for All Orders Ωa(T )
- 5 Expected Values for Compatible Orders Ωc(T )
- 6 Properties of Metrics and Checking Prior RTP Work
- 7 Related Work
- 8 Conclusion
- References
- Verified First-Order Monitoring with Recursive Rules
- 1 Introduction
- 2 Metric First-Order Temporal Logic
- 3 Non-Recursive Let Operator
- 4 Past-Recursive Let Operator
- 5 Evaluation
- 6 Conclusion
- References
- Maximizing Branch Coverage withConstrained Horn Clauses
- 1 Introduction
- 2 Related Work
- 3 Motivating Example
- 4 Background
- 5 Test-case Generation for Branch Coverage
- 6 Solving the MBC problem
- 7 Evaluation
- 8 Conclusion
- References
- Efficient Analysis of Cyclic Redundancy Architectures via Boolean Fault Propagation
- 1 Introduction
- 2 Preliminaries
- 3 Cyclic Redundancy Architectures
- 4 Reducing Redundancy UF+V TS to Fault Propagation Graphs
- 5 Related Work
- 6 Experimental Evaluation
- 7 Conclusions and Future Work
- References
- Tools | Optimizations, Repair and Explainability
- Adiar
- 1 Introduction
- 2 Preliminaries
- 3 BDD Manipulation by Time-forward Processing
- 4 Adiar: An Implementation
- 5 Experimental Evalua
- 6 Conclusions and Future Work
- References
- Forest GUMP: A Tool for Explanation
- 1 Introduction
- 2 Random Forests
- 3 Class Vector Aggregation
- 4 Infeasible Path Elimination
- 5 Majority Vote at Compile Time
- 6 Forest GUMP and Three Problems of Explanability
- 7 Lessons Learned
- 8 Conclusion and Perspectives
- References
- Alpinist: an Annotation-Aware GPU Program Optimizer
- 1 Introduction
- 2 Annotation-Aware Optimization using Alpinist
- 3 The Design of Alpinist
- 4 GPU Optimizations
- 5 Evaluation
- 6 Related Work
- 7 Conclusion
- References
- Automatic Repair for Network Programs
- 1 Introduction.
- 2 Overview
- 3 Preliminaries
- 4 Modular Program Repair
- 5 Implementation
- 6 Evaluation
- 7 Related Work
- 8 Limitations and Future Work
- 9 Conclusion
- References
- 11th Competition on Software Verification|SV-COMP 2022
- Progress on Software Verification: SV-COMP 2022
- 1 Introduction
- 2 Organization, Definitions, Formats, and Rules
- 3 Reproducing a Verification Run and Trouble-Shooting Guide
- 4 Participating Verifiers
- 5 Results and Discussion
- 6 Conclusion
- References
- AProVE: Non-Termination Witnesses for C Programs
- 1 Verification Approach and Software Architecture
- 2 Discussion of Strengths and Weaknesses
- 3 Setup and Configuration
- References
- BRICK: Path Enumeration Based Bounded Reachability Checking of C Program(Competition Contribution)
- 1 Verification Approach
- 2 Software Architecture
- 3 Strengths and Weaknesses
- 4 Tool Setup and Configuration
- 5 Software Project and Contributors
- References
- A Prototype for Data Race Detection in CSeq 3 (Competition Contribution)
- 1 Verification Approach
- 2 Software Architecture
- 3 Strengths and Weaknesses
- 4 Setup and Configuration
- References
- Dartagnan: SMT-based Violation Witness Validation (Competition Contribution)
- 1 Introduction
- 2 Validation Approach
- 3 Strengths and Weaknesses
- 4 Validation Results
- 5 Software Project and Configuration
- References
- Deagle: An SMT-based Verifier for Multi-threaded Programs (Competition Contribution)
- 1 Verification Approach
- 2 Software Architecture
- 3 Strengths and Weaknesses
- 4 Tool Setup and Configuration
- 5 Software Project
- 6 Acknowledgement
- References
- The Static Analyzer Frama-C in SV-COMP (Competition Contribution)
- 1 Approach
- 2 Architecture
- 3 Strengths and Weaknesses
- 4 Software Project and Contributors
- References.
- GDart: An Ensemble of Tools for Dynamic Symbolic Execution on the Java Virtual Machine (Competition Contribution)
- 1 Verification Approach
- 2 Software Architecture
- 3 Strengths and Weaknesses
- 4 Tool Setup
- 5 Software Project
- 6 Data Availability Statement
- References
- Graves-CPA: A Graph-Attention Verifier Selector (Competition Contribution)
- 1 Verification Approach
- 2 System Architecture
- 3 Strengths and Weaknesses
- 4 Tool Setup and Configuration
- 5 Software Project and Contributions
- Acknowledgements
- References
- GWIT: A Witness Validator for Java based on GraalVM (Competition Contribution)
- 1 Introduction
- 2 Witness Validation in GWIT
- 3 Performance and Limitations
- 4 Tool Setup
- 5 Software Project
- 6 Data Availability Statement
- References
- The Static Analyzer Infer in SV-COMP(Competition Contribution)
- 1 Facebook Infer
- 2 Infer in SV-COMP
- 3 Usage
- 4 Conclusion
- References
- LART: Compiled Abstract Execution
- 1 Verification Approach and Software Architecture
- 2 Strengths and Weaknesses
- 3 Tool Setup and Configuration
- 4 Software Project and Contributors
- References
- Symbiotic 9: String Analysis and Backward Symbolic Execution with Loop Folding
- 1 Verification Approach
- 2 Strengths and Weaknesses
- 3 Software Project and Contributors
- References
- Symbiotic-Witch: A Klee-Based Violation Witness Checker
- 1 Verification Approach
- 2 Software Architecture
- 3 Strengths and Weaknesses
- 4 Tool Setup and Configuration
- 5 Software Project and Contributors
- References
- Theta: portfolio of CEGAR-based analyses with dynamic algorithm selection (Competition Contribution)
- 1 Verification Approach and Software Architecture
- 2 Strengths and Weaknesses
- 3 Tool Setup and Configuration
- 4 Software Project
- References.
- Ultimate GemCutter and the Axes of Generalization (Competition Contribution).


