Days: Wednesday, June 8th Thursday, June 9th Friday, June 10th
View this program: with abstractssession overviewtalk overview
10:30 | Journal-First: Formal Modelling and Runtime Verification of Autonomous Grasping for Active Debris Removal (abstract) PRESENTER: Marie Farrell |
11:00 | Formal Specification and Verification of JDK’s Identity Hash Map Implementation (abstract) |
11:30 | Reusing Predicate Precision in Value Analysis (abstract) |
12:00 | Certified Verification of Relational Properties (abstract) |
14:30 | Reachability Analysis and Simulation for Hybridised Event-B Models (abstract) |
15:00 | Operation Caching and State Compression for Model Checking of High-Level Models (abstract) |
16:00 - 16:05: Opening by the Chairs of the Artefact Evaluation Committee and an EAPLS board representative.
16:05 - 16:30: One "Elevator pitch" of 3 minutes for each of the 7 Badge-Awarded Artefacts.
16:30 - 17:00: Poster-like time (without poster): one desk for each of the 7 Badge-Awarded Artefacts, where participants can meet the authors, assist to short demos, and possibly play with the artefacts.
17:00 - 17:30: Panel discussion on open science, and specific challenges faced in sharing artefacts, reviewing them and organising an artefact track. Each author of a Badge-Awarded artefact briefly presents benefits and challenges of artefact sharing. Participants can ask questions, moderated by the Artefact Chairs. The Artefact Chairs provide a summary at the end of the session.
View this program: with abstractssession overviewtalk overview
10:30 | Conservative Time Discretization: A Comparative Study (abstract) PRESENTER: Christian Schilling |
11:00 | Untangling the Graphs of Timed Automata to Decrease the Number of Clocks (abstract) |
11:30 | Probabilistic Model Checking of BPMN Processes at Runtime (abstract) |
12:00 | HyperPCTL Model Checking by Probabilistic Decomposition (abstract) |
14:30 | Learning Finite State Models from Recurrent Neural Networks (abstract) |
15:00 | Kaki: Concurrent Update Synthesis for Regular Policies via Petri Games (abstract) |
View this program: with abstractssession overviewtalk overview
10:30 | Verified Password Generation from Password Composition Policies (abstract) |
11:00 | A Policy Language to Capture Compliance of Data Protection Requirements (abstract) |
11:30 | Extending Data Flow Coverage to Test Constraint Refinements (abstract) |
12:00 | Scalable Typestate Analysis for Low-Latency Environments (abstract) |