Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
TASE
TASE 2018
Generate Citations
2018 International Symposium on Theoretical Aspects of Software Engineering (TASE)
Aug. 29 2018 to Aug. 31 2018
Guangzhou
Table of Contents
Table of contents
Freely available from IEEE.
pp. 5-7
Invited Talks
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-12
M-String Segmentation: A Refined Abstract Domain for String Analysis in C Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Agostino Cortesi
,
Martina Olliaro
Asynchronous Sessions with Implicit Functions and Messages
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Alexander Jeffery
,
Martin Berger
A Fully Abstract Encoding for Sub Asynchronous Pi Calculus
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-27
by
Wenjun Du
,
Zhengfeng Yang
,
Huibiao Zhu
Towards a Program Logic for C11 Release-Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-35
by
Mengda He
,
Shengchao Qin
,
Joao Ferreira
Efficient Algorithm for the Iteration Period Computation of Unfolded Synchronous Dataflow Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-43
by
Xue-Yang Zhu
KRust: A Formal Executable Semantics of Rust
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-51
by
Feng Wang
,
Fu Song
,
Min Zhang
,
Xiaoran Zhu
,
Jun Zhang
RepassDroid: Automatic Detection of Android Malware Based on Essential Permissions and Semantic Features of Sensitive APIs
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-59
by
Niannian Xie
,
Fanping Zeng
,
Xiaoxia Qin
,
Yu Zhang
,
Mingsong Zhou
,
Chengcheng Lv
Proving Partial-Correctness and Invariance Properties of Transition-System Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-67
by
Vlad Rusu
,
Gilles Grimaud
,
Michael Hauspie
Formalization and Verification of AUTOSAR OS Standard's Memory Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-75
by
Le Khanh Trinh
,
Yuki Chiba
,
Toshiaki Aoki
Decomposition and Composition of Sequence Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-83
by
Xiaofei Yu
,
Jian-Min Jiang
,
Zhong Hong
Modeling and Verifying TopoGuard in OpenFlow-Based Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-91
by
Shuangqing Xiang
,
Huibiao Zhu
,
Lili Xiao
,
Wanling Xie
A Taxonomy of Code Changes Occurring within a Statement or a Signature
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-99
by
Chunhua Yang
,
E. James Whitehead
Observational Models for Linearizability Checking on Weak Memory Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-107
by
Kirsten Winter
,
Graeme Smith
,
John Derrick
Modeling and Verification of NLSR Protocol using UPPAAL
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-115
by
Yuan Fei
,
Huibiao Zhu
,
Xin Li
Telling Lies in Process Algebra
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-123
by
Mohammad Reza Mousavi
,
Mahsa Varshosaz
Verifying Graph Transformations with Guarded Logics
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-131
by
Jon Haël Brenas
,
Rachid Echahed
,
Martin Strecker
On Syntactic and Semantic Dependencies in Service-Oriented Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-137
by
Diego Marmsoler
Decomposing Models Through Dependency Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-143
by
Qin Ma
,
Pierre Kelsen
An Improved LLF Scheduling for Reducing Maximum Heap Memory Consumption by Considering Laxity Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-149
by
Yuki Machigashira
,
Akio Nakata
Semantics of Real-Time Trigger-Response Properties in Event-B
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Chenyang Zhu
,
Michael Butler
,
Corina Cirstea
Showing 22 out of 22