000938655 000__ 02852cam\a2200517Ii\4500 000938655 001__ 938655 000938655 005__ 20230306151953.0 000938655 006__ m\\\\\o\\d\\\\\\\\ 000938655 007__ cr\nn\nnnunnun 000938655 008__ 200728s2020\\\\sz\\\\\\o\\\\\101\0\eng\d 000938655 019__ $$a1183926972 000938655 020__ $$a9783030532888$$q(electronic book) 000938655 020__ $$a3030532887$$q(electronic book) 000938655 020__ $$z9783030532871 000938655 0247_ $$a10.1007/978-3-030-53288-8$$2doi 000938655 0248_ $$a10.1007/978-3-030-53 000938655 035__ $$aSP(OCoLC)on1179001834 000938655 035__ $$aSP(OCoLC)1179001834$$z(OCoLC)1183926972 000938655 040__ $$aLQU$$beng$$cLQU$$dYDXIT$$dGW5XE 000938655 049__ $$aISEA 000938655 050_4 $$aQA76.76.V47$$bC38 2020 000938655 08204 $$a004.24$$223 000938655 1112_ $$aCAV (Conference)$$n(32nd :$$d2020 :$$cLos Angeles, Calif.) 000938655 24510 $$aComputer aided verification :$$b32nd international conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020 : proceedings.$$nPart I /$$cShuvendu K. Lahiri, Chao Wang (eds.). 000938655 2463_ $$aCAV 2020 000938655 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2020] 000938655 300__ $$a1 online resource. 000938655 336__ $$atext$$btxt$$2rdacontent 000938655 337__ $$acomputer$$bc$$2rdamedia 000938655 338__ $$aonline resource$$bcr$$2rdacarrier 000938655 4901_ $$aLecture notes in computer science ;$$v12224 000938655 4901_ $$aLNCS sublibrary. SL 1, Theoretical computer science and general issues 000938655 500__ $$aIncludes author index. 000938655 5050_ $$aAI Verification -- Blockchain and Security -- Hardware Veri cation and Decision Procedures -- Hybrid and Dynamic Systems. 000938655 506__ $$aAccess limited to authorized users. 000938655 520__ $$aThe open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic. 000938655 588__ $$aDescription based on online resource; title from digital title page (viewed on August 13, 2020). 000938655 650_0 $$aComputer software$$xVerification$$vCongresses. 000938655 7001_ $$aLahiri, Shuvendu,$$eeditor. 000938655 7001_ $$aWang, Chao,$$d1985-$$eeditor. 000938655 830_0 $$aLecture notes in computer science ;$$v12224. 000938655 830_0 $$aLNCS sublibrary.$$nSL 1,$$pTheoretical computer science and general issues. 000938655 852__ $$bebk 000938655 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-53288-8$$zOnline Access$$91397441.1 000938655 909CO $$ooai:library.usi.edu:938655$$pGLOBAL_SET 000938655 980__ $$aEBOOK 000938655 980__ $$aBIB 000938655 982__ $$aEbook 000938655 983__ $$aOnline 000938655 994__ $$a92$$bISE