LEADER 03764nam 22007695 450 001 9910647771703321 005 20251225203728.0 010 $a9783031258039 010 $a3031258037 024 7 $a10.1007/978-3-031-25803-9 035 $a(MiAaPQ)EBC7188504 035 $a(Au-PeEL)EBL7188504 035 $a(CKB)26076449400041 035 $a(DE-He213)978-3-031-25803-9 035 $a(PPN)267817452 035 $a(EXLCZ)9926076449400041 100 $a20230131d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aVerified Software. Theories, Tools and Experiments $e14th International Conference, VSTTE 2022, Trento, Italy, October 17?18, 2022, Revised Selected Papers /$fedited by Akash Lal, Stefano Tonetta 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (176 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13800 311 08$aPrint version: Lal, Akash Verified Software. Theories, Tools and Experiments Cham : Springer International Publishing AG,c2023 9783031258022 320 $aIncludes bibliographical references and index. 327 $aCompositional Safety LTL Synthesis -- Leroy and Blazy were right: their memory model soundness proof is automatable -- Shellac: a compiler synthesizer for concurrent programs -- A sequentialization procedure for fault-tolerant protocols -- Towards Practical Partial Order Reduction for High-Level Formalisms -- SMT-based Verification of Persistency Invariants of Px86 Programs -- A Formal Semantics for P-Code -- Separating Separation Logic - Modular Verification of Red-Black Trees -- Residual Runtime Verification via Reachability Analysis. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Verified Software. Theories, Tools and Experiments, VSTTE 2022 held in Trento, Italy, during October 17?18, 2022. The 9 papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers describe software verification efforts that involve collaboration, theory unification, tool integration, and formalized domain knowledge as well as novel experiments and case studies evaluating verification techniques and technologies. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13800 606 $aComputer science 606 $aComputers 606 $aSoftware engineering 606 $aComputer systems 606 $aComputers, Special purpose 606 $aLogic programming 606 $aComputer Science Logic and Foundations of Programming 606 $aComputer Hardware 606 $aSoftware Engineering 606 $aComputer System Implementation 606 $aSpecial Purpose and Application-Based Systems 606 $aLogic in AI 615 0$aComputer science. 615 0$aComputers. 615 0$aSoftware engineering. 615 0$aComputer systems. 615 0$aComputers, Special purpose. 615 0$aLogic programming. 615 14$aComputer Science Logic and Foundations of Programming. 615 24$aComputer Hardware. 615 24$aSoftware Engineering. 615 24$aComputer System Implementation. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aLogic in AI. 676 $a005.14 676 $a005.14 702 $aLal$b Akash 702 $aTonetta$b Stefano 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647771703321 996 $aVerified Software. Theories, Tools and Experiments$93004619 997 $aUNINA