posted by user: adm56 || 5076 views || tracked by 14 users: [display]

VERIFY 2010 : 6th International Verification Workshop


When Jul 20, 2010 - Jul 21, 2010
Where Edinburgh, UK
Abstract Registration Due Apr 7, 2010
Submission Deadline Apr 11, 2010
Notification Due Apr 29, 2010
Final Version Due May 17, 2010
Categories    verification   security   formal methods   automated theorem proving

Call For Papers


6th International Verification Workshop (VERIFY-2010)

What are the verification problems? What are the deduction techniques?

in connection with IJCAR-2010 at FLoC-2010

July 20-21, 2010, Edinburgh, UK


********************* Keynote speakers ******************************
** Véronique Cortier (LORIA INRIA-Lorraine, France)
** Cliff Jones (Newcastle University, UK)
** André Platzer (Carnegie Mellon University, USA)

The formal verification of critical information systems has a long
tradition as one of the main areas of application for automated
theorem proving. Nevertheless, the area is of still growing
importance as the number of computers affecting everyday life and the
complexity of these systems are both increasing. The purpose of the
VERIFY workshop series is to discuss problems arising during the
formal modeling and verification of information systems and to
investigate suitable solutions. Possible perspectives include those
of automated theorem proving, tool support, system engineering, and

The VERIFY workshops aim at bringing together people who are
interested in the development of safety and security critical systems,
in formal methods, in the development of automated theorem proving
techniques, and in the development of tool support. Practical
experiences gained in realistic verifications are of interest to the
automated theorem proving community and new theorem proving techniques
should be transferred into practice. The overall objective of the
VERIFY workshops is to identify open problems and to discuss possible
solutions under the theme

What are the verification problems? What are the deduction techniques?

The scope of VERIFY includes topics such as

+ ATP techniques in verification + Information flow security
+ Case studies + Integration of ATPs and CASE-tools
(specification and verification) + Management of change
+ Combination of verification systems + Refinement and decomposition
+ Compositional and modular reasoning + Reliability of mobile computing
+ Experience reports on using + Reuse of specifications and proofs
formal methods + Safety-critical systems
+ Formal methods for fault tolerance + Security models
+ Gaps between problems and + Tool support for formal methods

Submissions are encouraged in one of the following two categories:

A. Regular papers: Submissions in this category should describe
previously unpublished work (completed or in progress), including
descriptions of research, tools, and applications. Papers must
be 5-14 pages long (in EasyChair style) or 6-15 pages long (in
Springer LNCS style).

B. Discussion papers: Submissions in this category are intended to
initiate discussions and should address controversial issues, and
may include provocative statements. Papers must be 3-14 pages
long (in EasyChair style) or 3-15 pages long (in Springer LNCS

Submission of papers is via EasyChair:
Upon submission, the category (either A or B) should be indicated.

Final versions of accepted papers have to be prepared with LaTeX using
the EasyChair class ( Each
accepted paper shall be presented at the workshop and at least one
author of each paper must attend the workshop.

In addition to informal proceedings, we envisage a special issue in a
journal on the topic of the workshop. Participants of VERIFY-2010 are
particularly encouraged to submit a paper to the special issue, but
other submissions will also be welcome.

Program & Workshop Co-Chairs
M. Aderhold (TU Darmstadt)
S. Autexier (DFKI Bremen)
H. Mantel (TU Darmstadt)

Program Committee
B. Beckert (Karlsruhe Institute of Technology)
I. Cervesato (Carnegie Mellon University)
C. Fournet (Microsoft Research)
J. Guttman (Worcester Polytechnic Institute)
R. Hähnle (Chalmers University)
J. Hurd (Galois Inc.)
D. Hutter (DFKI Bremen)
P. Jackson (University of Edinburgh)
C. Jones (Newcastle University)
D. Kapur (University of New Mexico)
J.-P. Katoen (RWTH Aachen)
G. Klein (NICTA)
G. Lowe (University of Oxford)
F. Martinelli (CNR Pisa)
C. Meadows (Naval Research Laboratory)
D. Pichardie (INRIA Rennes)
G. Schneider (University of Gothenburg)
J. Schumann (NASA Ames Research Center)
C. Walther (TU Darmstadt)

Important dates:
Abstract submission deadline: April 7, 2010
Paper submission deadline: April 11, 2010
Notification of acceptance: April 29, 2010
Final version due: May 17, 2010
Workshop date: July 20-21, 2010

Workshop e-mail:

Related Resources

ATVA 2022   The 20th International Symposium on Automated Technology for Verification and Analysis
IJPLA 2022   International Journal of Programming Languages and Applications
EAI TRIDENTCOM 2022   17th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies
SCOM 2022   10th International Conference on Soft Computing
NSV 2022   15th International Workshop on Numerical Software Verification
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
ModeVVa 2022   19th Workshop on Model Driven Engineering, Verification and Validation
ICCD 2022   International Conference on Computer Design
SECURWARE 2022   International Conference on Emerging Security Information, Systems and Technologies
SBMF 2022   25th Brazilian Symposium on Formal Methods