What are the verification problems? What are the deduction techniques?
Edinburgh, July 20–21, 2010
in connection with IJCAR 2010
Keynote SpeakersV. Cortier (LORIA INRIA-Lorraine, France)C. Jones (Newcastle University, UK) A. Platzer (Carnegie Mellon University, USA) Program & Workshop ChairsM. Aderhold (TU Darmstadt)S. Autexier (DFKI Bremen) H. Mantel (TU Darmstadt) Program CommitteeB. Beckert (Karlsruhe Institute of Technology, Germany)I. Cervesato (Carnegie Mellon University, Qatar) C. Fournet (Microsoft Research, Cambridge) J. Guttman (Worcester Polytechnic Institute, USA) R. Hähnle (Chalmers University, Sweden) J. Hurd (Galois, Inc., USA) D. Hutter (DFKI Bremen, Germany) P. Jackson (University of Edinburgh, UK) C. Jones (Newcastle University, UK) D. Kapur (University of New Mexico, USA) J.-P. Katoen (RWTH Aachen, Germany) G. Klein (NICTA, Australia) G. Lowe (University of Oxford, UK) F. Martinelli (CNR Pisa, Italy) C. Meadows (Naval Research Laboratory, USA) D. Pichardie (INRIA Rennes, France) G. Schneider (University of Gothenburg, Sweden) J. Schumann (NASA Ames Research Center, USA) C. Walther (TU Darmstadt, Germany) Call for papersPDF – ASCIIImportant dates
Previous VERIFY workshopsContactIf you need further information, do not hesitate tocontact the workshop chairs by sending an e-mail to verify2010@mais.informatik.tu-darmstadt.de. |
ProgramDay 1: Tuesday, July 20, 2010
09:00–10:00 Session 1: Invited Talk
10:00–10:30 Coffee Break10:30–12:30 Session 2: Verification in Various Domains
12:30–14:00 Lunch Break14:00–15:00 Session 3: Invited Talk
15:00–15:30 Coffee Break15:30–17:00 Session 4: Verification of IT-Security
19:00 Workshop DinnerDay 2: Wednesday, July 21, 201009:00–10:00 Session 5: Invited Talk
10:00–10:30 Coffee Break10:30–12:30 Session 6: Verification Techniques and Tools
12:30–13:50 Lunch Break — ATTENTION: The next session already starts at 13:50.13:50–15:10 Session 7: Software Security and Software Testing
15:10–15:30 Coffee Break15:30–17:00 Session 8: Panel Discussion (joint with ASA-4)
|