首页 > 最新文献

Automated Technology for Verification and Analysis最新文献

英文 中文
Optimistic and Topological Value Iteration for Simple Stochastic Games 简单随机对策的乐观和拓扑值迭代
Pub Date : 2022-07-29 DOI: 10.48550/arXiv.2207.14417
Muqsit Azeem, Alexandros Evangelidis, Jan Křetínský, Alexander Slivinskiy, Maximilian Weininger
. While value iteration (VI) is a standard solution approach to simple stochastic games (SSGs), it suffered from the lack of a stopping criterion. Recently, several solutions have appeared, among them also “optimistic” VI (OVI). However, OVI is applicable only to one-player SSGs with no end components. We lift these two assumptions, making it available to general SSGs . Further, we utilize the idea in the context of topological VI, where we provide an efficient precise solution. In order to compare the new algorithms with the state of the art, we use not only the standard benchmarks, but we also design a random generator of SSGs, which can be biased towards various types of models, aiding in understanding the advantages of different algorithms on SSGs.
. 虽然值迭代(VI)是简单随机博弈(ssg)的标准解决方法,但它缺乏停止准则。最近出现了几种解决方案,其中也有“乐观”的VI (OVI)。但是,OVI只适用于没有终端组件的单人ssg。我们取消了这两个假设,使其适用于一般的ssg。此外,我们在拓扑VI的背景下利用这个想法,我们提供了一个有效的精确的解决方案。为了将新算法与最先进的算法进行比较,我们不仅使用了标准基准,而且还设计了一个ssg的随机生成器,它可以偏向于各种类型的模型,有助于理解不同算法在ssg上的优势。
{"title":"Optimistic and Topological Value Iteration for Simple Stochastic Games","authors":"Muqsit Azeem, Alexandros Evangelidis, Jan Křetínský, Alexander Slivinskiy, Maximilian Weininger","doi":"10.48550/arXiv.2207.14417","DOIUrl":"https://doi.org/10.48550/arXiv.2207.14417","url":null,"abstract":". While value iteration (VI) is a standard solution approach to simple stochastic games (SSGs), it suffered from the lack of a stopping criterion. Recently, several solutions have appeared, among them also “optimistic” VI (OVI). However, OVI is applicable only to one-player SSGs with no end components. We lift these two assumptions, making it available to general SSGs . Further, we utilize the idea in the context of topological VI, where we provide an efficient precise solution. In order to compare the new algorithms with the state of the art, we use not only the standard benchmarks, but we also design a random generator of SSGs, which can be biased towards various types of models, aiding in understanding the advantages of different algorithms on SSGs.","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"281 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Repair For Omega-regular Properties 最佳修复Omega-regular属性
Pub Date : 2022-07-27 DOI: 10.48550/arXiv.2207.13416
V. Dave, S. Krishna, Vishnu Murali, Ashutosh Trivedi
This paper presents an optimization based framework to automate system repair against omega-regular properties. In the proposed formalization of optimal repair, the systems are represented as Kripke structures, the properties as $omega$-regular languages, and the repair space as repair machines -- weighted omega-regular transducers equipped with B"uchi conditions -- that rewrite strings and associate a cost sequence to these rewritings. To translate the resulting cost-sequences to easily interpretable payoffs, we consider several aggregator functions to map cost sequences to numbers -- including limit superior, supremum, discounted-sum, and average-sum -- to define quantitative cost semantics. The problem of optimal repair, then, is to determine whether traces from a given system can be rewritten to satisfy an $omega$-regular property when the allowed cost is bounded by a given threshold. We also consider the dual challenge of impair verification that assumes that the rewritings are resolved adversarially under some given cost restriction, and asks to decide if all traces of the system satisfy the specification irrespective of the rewritings. With a negative result to the impair verification problem, we study the problem of designing a minimal mask of the Kripke structure such that the resulting traces satisfy the specifications despite the threshold-bounded impairment. We dub this problem as the mask synthesis problem. This paper presents automata-theoretic solutions to repair synthesis, impair verification, and mask synthesis problem for limit superior, supremum, discounted-sum, and average-sum cost semantics.
本文提出了一种基于优化的基于-规则特性的系统自动修复框架。在建议的最优修复形式化中,系统被表示为Kripke结构,属性被表示为$omega$正则语言,修复空间被表示为修复机器——配备了B uchi条件的加权ω -正则换能器——重写字符串并将代价序列与这些重写相关联。为了将结果成本序列转换为易于解释的收益,我们考虑了几个聚合器函数来将成本序列映射到数字——包括极限优越、最高、折扣和平均和——以定义定量成本语义。那么,最优修复的问题是,当允许的成本被给定的阈值所限制时,确定给定系统的迹线是否可以重写以满足$ ω $-正则性质。我们还考虑了损害验证的双重挑战,它假设重写是在某些给定的成本限制下对抗性地解决的,并要求确定系统的所有痕迹是否满足规范,而不考虑重写。针对缺陷验证问题的否定结果,我们研究了在存在阈值有界缺陷的情况下,如何设计Kripke结构的最小掩模,使所得到的迹线满足规范。我们把这个问题称为掩模合成问题。本文从自动机的角度给出了代价语义上的最优、最优、折现和、平均和的修复综合、损伤验证和掩码综合问题的解法。
{"title":"Optimal Repair For Omega-regular Properties","authors":"V. Dave, S. Krishna, Vishnu Murali, Ashutosh Trivedi","doi":"10.48550/arXiv.2207.13416","DOIUrl":"https://doi.org/10.48550/arXiv.2207.13416","url":null,"abstract":"This paper presents an optimization based framework to automate system repair against omega-regular properties. In the proposed formalization of optimal repair, the systems are represented as Kripke structures, the properties as $omega$-regular languages, and the repair space as repair machines -- weighted omega-regular transducers equipped with B\"uchi conditions -- that rewrite strings and associate a cost sequence to these rewritings. To translate the resulting cost-sequences to easily interpretable payoffs, we consider several aggregator functions to map cost sequences to numbers -- including limit superior, supremum, discounted-sum, and average-sum -- to define quantitative cost semantics. The problem of optimal repair, then, is to determine whether traces from a given system can be rewritten to satisfy an $omega$-regular property when the allowed cost is bounded by a given threshold. We also consider the dual challenge of impair verification that assumes that the rewritings are resolved adversarially under some given cost restriction, and asks to decide if all traces of the system satisfy the specification irrespective of the rewritings. With a negative result to the impair verification problem, we study the problem of designing a minimal mask of the Kripke structure such that the resulting traces satisfy the specifications despite the threshold-bounded impairment. We dub this problem as the mask synthesis problem. This paper presents automata-theoretic solutions to repair synthesis, impair verification, and mask synthesis problem for limit superior, supremum, discounted-sum, and average-sum cost semantics.","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129534735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Shielding for Reinforcement Learning in Black-Box Environments 黑盒环境下强化学习的动态屏蔽
Pub Date : 2022-07-27 DOI: 10.48550/arXiv.2207.13446
Masaki Waga, Ezequiel Castellano, Sasinee Pruekprasert, Stefan Klikovits, Toru Takisaka, I. Hasuo
. It is challenging to use reinforcement learning (RL) in cyber-physical systems due to the lack of safety guarantees during learning. Although there have been various proposals to reduce undesired behaviors during learning, most of these techniques require prior system knowledge, and their applicability is limited. This paper aims to reduce undesired behaviors during learning without requiring any prior system knowledge. We propose dynamic shielding : an extension of a model-based safe RL technique called shielding using data-driven automata learning . The dynamic shielding technique constructs an approximate system model in parallel with RL using a variant of the RPNI algorithm and sup-presses undesired explorations due to the shield constructed from the learned model. Through this combination, potentially unsafe actions can be foreseen before the agent experiences them. Experiments show that our dynamic shield significantly decreases the number of undesired events during training. and experiment results.
。由于在学习过程中缺乏安全保障,在网络物理系统中使用强化学习(RL)具有挑战性。尽管有各种各样的建议来减少学习过程中的不良行为,但大多数这些技术都需要事先的系统知识,而且它们的适用性是有限的。本文的目的是在不需要任何先验系统知识的情况下减少学习过程中的不良行为。我们提出动态屏蔽:基于模型的安全强化学习技术的扩展,称为使用数据驱动的自动机学习的屏蔽。动态屏蔽技术使用RPNI算法的一种变体,与RL并行构建一个近似的系统模型,并抑制由于从学习模型构建的屏蔽而导致的不期望的探索。通过这种组合,可以在代理经历潜在的不安全行为之前预见到它们。实验表明,我们的动态屏蔽显著减少了训练过程中不希望发生的事件。以及实验结果。
{"title":"Dynamic Shielding for Reinforcement Learning in Black-Box Environments","authors":"Masaki Waga, Ezequiel Castellano, Sasinee Pruekprasert, Stefan Klikovits, Toru Takisaka, I. Hasuo","doi":"10.48550/arXiv.2207.13446","DOIUrl":"https://doi.org/10.48550/arXiv.2207.13446","url":null,"abstract":". It is challenging to use reinforcement learning (RL) in cyber-physical systems due to the lack of safety guarantees during learning. Although there have been various proposals to reduce undesired behaviors during learning, most of these techniques require prior system knowledge, and their applicability is limited. This paper aims to reduce undesired behaviors during learning without requiring any prior system knowledge. We propose dynamic shielding : an extension of a model-based safe RL technique called shielding using data-driven automata learning . The dynamic shielding technique constructs an approximate system model in parallel with RL using a variant of the RPNI algorithm and sup-presses undesired explorations due to the shield constructed from the learned model. Through this combination, potentially unsafe actions can be foreseen before the agent experiences them. Experiments show that our dynamic shield significantly decreases the number of undesired events during training. and experiment results.","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126919463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Specification sketching for Linear Temporal Logic 线性时序逻辑规范草图
Pub Date : 2022-06-14 DOI: 10.48550/arXiv.2206.06722
Simon Lutz, D. Neider, Rajarshi Roy
Virtually all verification and synthesis techniques assume that the formal specifications are readily available, functionally correct, and fully match the engineer's understanding of the given system. However, this assumption is often unrealistic in practice: formalizing system requirements is notoriously difficult, error-prone, and requires substantial training. To alleviate this severe hurdle, we propose a fundamentally novel approach to writing formal specifications, named specification sketching for Linear Temporal Logic (LTL). The key idea is that an engineer can provide a partial LTL formula, called an LTL sketch, where parts that are hard to formalize can be left out. Given a set of examples describing system behaviors that the specification should or should not allow, the task of a so-called sketching algorithm is then to complete a given sketch such that the resulting LTL formula is consistent with the examples. We show that deciding whether a sketch can be completed falls into the complexity class NP and present two SAT-based sketching algorithms. We also demonstrate that sketching is a practical approach to writing formal specifications using a prototype implementation.
实际上,所有的验证和综合技术都假定正式的规范是现成的,功能正确的,并且完全符合工程师对给定系统的理解。然而,这个假设在实践中通常是不现实的:形式化系统需求是出了名的困难,容易出错,并且需要大量的培训。为了减轻这个严重的障碍,我们提出了一种基本新颖的方法来编写正式规范,称为线性时序逻辑(LTL)的规范草图。关键思想是工程师可以提供部分LTL公式,称为LTL草图,其中难以形式化的部分可以省略。给定一组描述规范应该或不应该允许的系统行为的示例,那么所谓的草图算法的任务就是完成给定的草图,从而使生成的LTL公式与示例一致。我们证明了决定草图是否可以完成属于复杂度类NP,并提出了两种基于sat的草图算法。我们还演示了绘制草图是使用原型实现编写正式规范的实用方法。
{"title":"Specification sketching for Linear Temporal Logic","authors":"Simon Lutz, D. Neider, Rajarshi Roy","doi":"10.48550/arXiv.2206.06722","DOIUrl":"https://doi.org/10.48550/arXiv.2206.06722","url":null,"abstract":"Virtually all verification and synthesis techniques assume that the formal specifications are readily available, functionally correct, and fully match the engineer's understanding of the given system. However, this assumption is often unrealistic in practice: formalizing system requirements is notoriously difficult, error-prone, and requires substantial training. To alleviate this severe hurdle, we propose a fundamentally novel approach to writing formal specifications, named specification sketching for Linear Temporal Logic (LTL). The key idea is that an engineer can provide a partial LTL formula, called an LTL sketch, where parts that are hard to formalize can be left out. Given a set of examples describing system behaviors that the specification should or should not allow, the task of a so-called sketching algorithm is then to complete a given sketch such that the resulting LTL formula is consistent with the examples. We show that deciding whether a sketch can be completed falls into the complexity class NP and present two SAT-based sketching algorithms. We also demonstrate that sketching is a practical approach to writing formal specifications using a prototype implementation.","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prioritizing Corners in OoD Detectors via Symbolic String Manipulation 通过符号字符串操作确定OoD检测器拐角的优先级
Pub Date : 2022-05-16 DOI: 10.48550/arXiv.2205.07736
Chih-Hong Cheng, Changshun Wu, Emmanouil Seferis, S. Bensalem
. For safety assurance of deep neural networks (DNNs), out-of-distribution (OoD) monitoring techniques are essential as they filter spurious input that is distant from the training dataset. This paper stud-ies the problem of systematically testing OoD monitors to avoid cases where an input data point is tested as in-distribution by the monitor, but the DNN produces spurious output predictions. We consider the def-inition of “in-distribution” characterized in the feature space by a union of hyperrectangles learned from the training dataset. Thus the testing is reduced to finding corners in hyperrectangles distant from the available training data in the feature space. Concretely, we encode the abstract lo-cation of every data point as a finite-length binary string, and the union of all binary strings is stored compactly using binary decision diagrams (BDDs). We demonstrate how to use BDDs to symbolically extract corners distant from all data points within the training set. Apart from test case generation, we explain how to use the proposed corners to fine-tune the DNN to ensure that it does not predict overly confidently. The result is evaluated over examples such as number and traffic sign recognition.
。为了保证深度神经网络(dnn)的安全性,分布外(OoD)监测技术是必不可少的,因为它们可以过滤远离训练数据集的虚假输入。本文研究了系统测试OoD监视器的问题,以避免监视器测试输入数据点作为分布,但DNN产生虚假输出预测的情况。我们考虑通过从训练数据集中学习的超矩形的并集在特征空间中表征的“分布内”的定义。因此,测试被简化为在距离特征空间中可用训练数据的超矩形中寻找角点。具体来说,我们将每个数据点的抽象位置编码为有限长度的二进制字符串,并使用二进制决策图(binary decision diagrams, bdd)紧凑地存储所有二进制字符串的并集。我们演示了如何使用bdd象征性地提取远离训练集中所有数据点的角点。除了生成测试用例之外,我们还解释了如何使用建议的角来微调DNN,以确保它不会过于自信地预测。结果通过数字和交通标志识别等例子进行评估。
{"title":"Prioritizing Corners in OoD Detectors via Symbolic String Manipulation","authors":"Chih-Hong Cheng, Changshun Wu, Emmanouil Seferis, S. Bensalem","doi":"10.48550/arXiv.2205.07736","DOIUrl":"https://doi.org/10.48550/arXiv.2205.07736","url":null,"abstract":". For safety assurance of deep neural networks (DNNs), out-of-distribution (OoD) monitoring techniques are essential as they filter spurious input that is distant from the training dataset. This paper stud-ies the problem of systematically testing OoD monitors to avoid cases where an input data point is tested as in-distribution by the monitor, but the DNN produces spurious output predictions. We consider the def-inition of “in-distribution” characterized in the feature space by a union of hyperrectangles learned from the training dataset. Thus the testing is reduced to finding corners in hyperrectangles distant from the available training data in the feature space. Concretely, we encode the abstract lo-cation of every data point as a finite-length binary string, and the union of all binary strings is stored compactly using binary decision diagrams (BDDs). We demonstrate how to use BDDs to symbolically extract corners distant from all data points within the training set. Apart from test case generation, we explain how to use the proposed corners to fine-tune the DNN to ensure that it does not predict overly confidently. The result is evaluated over examples such as number and traffic sign recognition.","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130670969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reactive Synthesis of Smart Contract Control Flows 智能合约控制流的响应式综合
Pub Date : 2022-05-12 DOI: 10.48550/arXiv.2205.06039
B. Finkbeiner, Jana Hofmann, F. Kohn, Noemi E. Passing
Smart contracts are small but highly error-prone programs that implement agreements between multiple parties. We present a reactive synthesis approach for the automatic construction of smart contract state machines. Towards this end, we extend temporal stream logic (TSL) with universally quantified parameters over infinite domains. Parameterized TSL is a convenient logic to specify the temporal control flow, i.e., the correct order of transactions, as well as the data flow of the contract's fields. We develop a two-step approach that 1) synthesizes a finite representation of the - in general - infinite-state system and 2) splits the system into a compact hierarchical architecture that enables the implementation of the state machine in Solidity. We implement the approach in our prototype tool SCSynt, which - within seconds - automatically constructs Solidity code that realizes the specified control flow.
智能合约是一种小型但极易出错的程序,用于实现多方之间的协议。我们提出了一种用于自动构建智能合约状态机的反应式综合方法。为此,我们在无限域中扩展了具有普遍量化参数的时间流逻辑(TSL)。参数化的TSL是一种方便的逻辑,用于指定临时控制流,即正确的事务顺序,以及合同字段的数据流。我们开发了一种两步方法,1)综合一般无限状态系统的有限表示,2)将系统拆分为紧凑的分层体系结构,使状态机能够在solid中实现。我们在原型工具SCSynt中实现了这种方法,它在几秒钟内自动构建实现指定控制流的Solidity代码。
{"title":"Reactive Synthesis of Smart Contract Control Flows","authors":"B. Finkbeiner, Jana Hofmann, F. Kohn, Noemi E. Passing","doi":"10.48550/arXiv.2205.06039","DOIUrl":"https://doi.org/10.48550/arXiv.2205.06039","url":null,"abstract":"Smart contracts are small but highly error-prone programs that implement agreements between multiple parties. We present a reactive synthesis approach for the automatic construction of smart contract state machines. Towards this end, we extend temporal stream logic (TSL) with universally quantified parameters over infinite domains. Parameterized TSL is a convenient logic to specify the temporal control flow, i.e., the correct order of transactions, as well as the data flow of the contract's fields. We develop a two-step approach that 1) synthesizes a finite representation of the - in general - infinite-state system and 2) splits the system into a compact hierarchical architecture that enables the implementation of the state machine in Solidity. We implement the approach in our prototype tool SCSynt, which - within seconds - automatically constructs Solidity code that realizes the specified control flow.","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Runtime Enforcement of Hyperproperties 超属性的运行时强制
Pub Date : 2022-03-08 DOI: 10.1007/978-3-030-88885-5_19
Norine Coenen, B. Finkbeiner, Christopher Hahn, Jana Hofmann, Yannick Schillo
{"title":"Runtime Enforcement of Hyperproperties","authors":"Norine Coenen, B. Finkbeiner, Christopher Hahn, Jana Hofmann, Yannick Schillo","doi":"10.1007/978-3-030-88885-5_19","DOIUrl":"https://doi.org/10.1007/978-3-030-88885-5_19","url":null,"abstract":"","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Projected Model Counting: Beyond Independent Support 预测模型计数:超越独立支持
Pub Date : 2021-10-18 DOI: 10.1007/978-3-031-19992-9_11
Jiong Yang, Supratik Chakraborty, Kuldeep S. Meel
{"title":"Projected Model Counting: Beyond Independent Support","authors":"Jiong Yang, Supratik Chakraborty, Kuldeep S. Meel","doi":"10.1007/978-3-031-19992-9_11","DOIUrl":"https://doi.org/10.1007/978-3-031-19992-9_11","url":null,"abstract":"","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Formal Semantics of the GraalVM Intermediate Representation GraalVM中间表示的形式化语义
Pub Date : 2021-07-05 DOI: 10.1007/978-3-030-88885-5_8
Brae J. Webb, M. Utting, I. Hayes
{"title":"A Formal Semantics of the GraalVM Intermediate Representation","authors":"Brae J. Webb, M. Utting, I. Hayes","doi":"10.1007/978-3-030-88885-5_8","DOIUrl":"https://doi.org/10.1007/978-3-030-88885-5_8","url":null,"abstract":"","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130516761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Incorporating Monitors in Reactive Synthesis without Paying the Price 在反应合成中不付出代价地加入监视器
Pub Date : 2021-07-02 DOI: 10.1007/978-3-030-88885-5_22
S. Azzopardi, Nir Piterman, G. Schneider
{"title":"Incorporating Monitors in Reactive Synthesis without Paying the Price","authors":"S. Azzopardi, Nir Piterman, G. Schneider","doi":"10.1007/978-3-030-88885-5_22","DOIUrl":"https://doi.org/10.1007/978-3-030-88885-5_22","url":null,"abstract":"","PeriodicalId":335085,"journal":{"name":"Automated Technology for Verification and Analysis","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Automated Technology for Verification and Analysis
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1