Yoriyuki Yamagata

Orcid: 0000-0003-2096-677X

According to our database1, Yoriyuki Yamagata authored at least 28 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the Metric Temporal Logic for Continuous Stochastic Processes.
CoRR, 2023

2022
On proving consistency of equational theories in Bounded Arithmetic.
CoRR, 2022

Individual-based epidemiological model of COVID19 using location data.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning.
IEEE Trans. Software Eng., 2021

Assurance Carrying Code for Software Supply Chain.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

ARCH-COMP 2021 Category Report: Falsification with Validation of Results.
Proceedings of the 8th International Workshop on Applied Verification of Continuous and Hybrid Systems (ARCH21), 2021

Finding repeated strings in code repositories and its applications to code-clone detection.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Algebraic Approach for Confidence Evaluation of Assurance Cases.
Proceedings of the Formal Methods and Software Engineering, 2020

ARCH-COMP 2020 Category Report: Falsification.
Proceedings of the ARCH20. 7th International Workshop on Applied Verification of Continuous and Hybrid Systems (ARCH20), 2020

2019
ARCH-COMP 2019 Category Report: Falsification.
Proceedings of the ARCH19. 6th International Workshop on Applied Verification of Continuous and Hybrid Systemsi, 2019

2018
Consistency Proof of a Fragment of PV with Substitution in Bounded Arithmetic.
J. Symb. Log., 2018

2017
Operational Semantics of Process Monitors.
Proceedings of the Runtime Verification - 17th International Conference, 2017

Log-Based Anomaly Detection of CPS Using a Statistical Method.
Proceedings of the 8th International Workshop on Empirical Software Engineering in Practice, 2017

Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

2016
Java Pathfinder on Android Devices.
ACM SIGSOFT Softw. Eng. Notes, 2016

Runtime Monitoring for Concurrent Systems.
Proceedings of the Runtime Verification - 16th International Conference, 2016

2015
Cardinality of UDP Transmission Outcomes.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2015

Model-Based Testing of Stateful APIs with Modbat.
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Domain-Specific Languages with Scala.
Proceedings of the Formal Methods and Software Engineering, 2015

2014
A formal semantics of extended hierarchical state transition matrices using CSP#.
Formal Aspects Comput., 2014

Evaluation of A Resilience Embedded System Using Probabilistic Model-Checking.
Proceedings of the Proceedings Third International Workshop on Engineering Safety and Security Systems, 2014

2013
With an Open Mind: How to Write Good Models.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013

2012
Formal semantics of extended hierarchical state transition matrix by CSP.
ACM SIGSOFT Softw. Eng. Notes, 2012

Bounded Arithmetic in Free Logic
Log. Methods Comput. Sci., 2012

On Accelerating SMT-based Bounded Model Checking of HSTM Designs.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2008
A sequent calculus for limit computable mathematics.
Ann. Pure Appl. Log., 2008

2004
Strong normalization of the second-order symmetric lambda mu -calculus.
Inf. Comput., 2004

2002
Strong normalization of a symmetric lambda calculus for second-order classical logic.
Arch. Math. Log., 2002


  Loading...