Program | |||
Day 1 : October 18 | |||
9H - 9H30 | Welcome & Registration | ||
9H30 - 10H00 | Opening Session | ||
10H00 - 11H | Invited Talk (Silvano Dal Zilio) : How to Use Polyhedral Reduction for the Verification of Petri nets. | ||
11H - 11H30 | Coffe Break | ||
11H30 - 12H30 | Session 1 : Formal Methods | ||
11H30 - 12H | Johan Arcile, Raymond Devillers and Hanna Klaudel. Factorization of the state space construction for cyclic systems with data | ||
12H - 12H30 | Frederic Loulergue and Ali Ed-Dbali. Verified High Performance Computing with a Proof Assistant: the SyDPaCC Approach | ||
12H30 - 14H00 | Lunch | ||
14H00 - 15H | Invited Talk (Antonín Kučera) : Asymptotic Analysis of Probabilistic VASS Programs. | ||
15H00 - 17H00 | Session 2: Formal Verification | ||
15H00 - 15H30 | Wiem Taktak, Mohamed Escheikh and Kamel Barkaoui. A QoE driven DRL approach for network slicing based on SFC orchestration in SDN/NFV enabled networks | ||
15H30 - 16H00 | Coffe Break | ||
16H00 - 16H30 | Samir Ouchani. An Enhanced Interface-based Probabilistic Compositional Verification Approach | ||
16H30 - 17H00 | Habbachi Salwa, Imene Ben Hafaiedh, Zhiwu Li and Moez Krichen. On Language-Based Opacity Verification Problem in Discrete Event Systems Under Orwellian Observation | ||
20H - 23H | Dinner | ||
Day 2 : October 19 | |||
9H -10H | Invited Talk (Ahmed Bouajjani) : On verifying concurrent programs under weakly consistent memory models. | ||
10H00 - 12H00 | Session 3 : Applied formal methods | ||
10H - 15H30 | Fateh Boudardara, Abderraouf Boussif and Mohamed Ghazel. A sound abstraction method towards efficient neural networks verification | ||
10H30 - 11H00 | Coffe Break | ||
11H00 - 11H30 | Ikram Garfatta, Nour Elhouda Souid and Kais Klai. Towards Formal Verification of Node RED-based IoT Applications | ||
11H30 - 12H00 | Hugo Beguinet, Céline Chevalier, Thomas Ricosset and Hugo Senet. Formal Verification of a Post-Quantum Signal Protocol with Tamarin | ||
12H00 - 14H00 | Lunch | ||
14H-16H | Session 4 : Cybersecurity and Smart Contract | ||
14H - 14H30 | Abdeslam Rehaimi, Yassine Sadqi and Yassine Maleh. A Comparative Study of Online Cybersecurity Training Platforms | ||
14H30 - 15H00 | Afef Jmal Maalej and Mariam Lahami. White-Box Mutation Testing of Smart Contracts : A Quick Review | ||
15h00 - 15H30 | Mariem Fourati, Amel Meddeb Makhlouf and Faouzi Zarai. Blockchain-based Trust Management for IoMT Environment | ||
15H30 - 16H00 | Coffe Break | ||
16H00 - 16H30 | Moussa Amrani, Abdelkader Ouared and Pierre-Yves Schobbens. Command & Control in UAVs Fleets: Coordinating Drones for Ground Missions In Changing Contexts | ||
16H30 - 17H00 | Closing Session |
Copyright © VECoS 2023. All Rights Reserved.