|
|
|
|
LEADER |
02309nmm a2200409 u 4500 |
001 |
EB001899449 |
003 |
EBX01000000000000001062358 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
200810 ||| eng |
020 |
|
|
|a 9783030532888
|
100 |
1 |
|
|a Lahiri, Shuvendu K.
|e [editor]
|
245 |
0 |
0 |
|a Computer Aided Verification
|h Elektronische Ressource
|b 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part I
|c edited by Shuvendu K. Lahiri, Chao Wang
|
250 |
|
|
|a 1st ed. 2020
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2020, 2020
|
300 |
|
|
|a XVII, 669 p. 616 illus., 117 illus. in color
|b online resource
|
505 |
0 |
|
|a AI Verification -- Blockchain and Security -- Hardware Veri cation and Decision Procedures -- Hybrid and Dynamic Systems
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Software engineering
|
653 |
|
|
|a Computer science
|
653 |
|
|
|a Software Engineering
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Computers
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Engineering and Networks
|
653 |
|
|
|a Computer Hardware
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Computer engineering
|
653 |
|
|
|a Theory of Computation
|
700 |
1 |
|
|a Wang, Chao
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Theoretical Computer Science and General Issues
|
028 |
5 |
0 |
|a 10.1007/978-3-030-53288-8
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-53288-8?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.1
|
520 |
|
|
|a The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic
|