{"id":818,"date":"2019-05-05T00:50:06","date_gmt":"2019-05-04T15:50:06","guid":{"rendered":"https:\/\/group-mmm.org\/eratommsd\/?p=818"},"modified":"2019-05-05T00:50:07","modified_gmt":"2019-05-04T15:50:07","slug":"two-papers-authored-by-erato-mmsd-researchers-accepted-for-cav-2019-2","status":"publish","type":"post","link":"https:\/\/group-mmm.org\/eratommsd\/ja\/two-papers-authored-by-erato-mmsd-researchers-accepted-for-cav-2019-2\/","title":{"rendered":"2\u5831\u306e\u8ad6\u6587\u304c CAV 2019 \u306b\u63a1\u629e"},"content":{"rendered":"\n<p>ERATO MMSD \u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306e\u7814\u7a76\u8005\u304c\u8457\u8005\u3068\u306a\u308b2\u5831\u306e\u8ad6\u6587\u304c\uff0c<a href=\"http:\/\/i-cav.org\/2019\/\">CAV 2019<\/a> \u2013 31st International Conference on Computer-Aided Verification \u306b\u63a1\u629e\u3055\u308c\u307e\u3057\u305f\uff0e<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/group-mmm.org\/~mwaga\/\">Masaki Waga<\/a>,&nbsp;<a href=\"https:\/\/lipn.univ-paris13.fr\/~andre\/\">\u00c9tienne Andr\u00e9<\/a>&nbsp;and&nbsp;<a href=\"http:\/\/group-mmm.org\/~ichiro\">Ichiro Hasuo<\/a>. Symbolic Monitoring against Specifications Parametric in Time and Data<\/li><li><a href=\"http:\/\/group-mmm.org\/~zhenya\/\">Zhenya Zhang<\/a>,&nbsp;<a href=\"http:\/\/group-mmm.org\/~ichiro\">Ichiro Hasuo<\/a>&nbsp;and&nbsp;<a href=\"http:\/\/group-mmm.org\/~arcaini\/\">Paolo Arcaini<\/a>. Multi-Armed Bandits for Boolean Connectives in Hybrid System Falsification<\/li><\/ul>\n\n\n\n<p>International Conference on Computer-Aided Verification (CAV) \u306f\u5f62\u5f0f\u691c\u8a3c\u5206\u91ce\u306e\u30c8\u30c3\u30d7\u56fd\u969b\u4f1a\u8b70\u3067\u3059\uff0eCAV 2019 \u306f2019\u5e747\u6708\u306b\u7c73\u56fd\u30cb\u30e5\u30fc\u30e8\u30fc\u30af\u3067\u958b\u50ac\u3055\u308c\u307e\u3059\uff0e<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ERATO MMSD \u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306e\u7814\u7a76\u8005\u304c\u8457\u8005\u3068\u306a\u308b2\u5831\u306e\u8ad6\u6587\u304c\uff0cCAV 2019 \u2013 31st International Conference on Computer-Aided Verification \u306b\u63a1\u629e\u3055 &hellip; <a href=\"https:\/\/group-mmm.org\/eratommsd\/ja\/two-papers-authored-by-erato-mmsd-researchers-accepted-for-cav-2019-2\/\" class=\"more-link\">\u7d9a\u304d\u3092\u8aad\u3080 <span class=\"screen-reader-text\">2\u5831\u306e\u8ad6\u6587\u304c CAV 2019 \u306b\u63a1\u629e<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_locale":"ja","_original_post":"816","footnotes":""},"categories":[1],"tags":[],"class_list":["post-818","post","type-post","status-publish","format-standard","hentry","category-1","ja"],"_links":{"self":[{"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/posts\/818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/comments?post=818"}],"version-history":[{"count":1,"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/posts\/818\/revisions"}],"predecessor-version":[{"id":819,"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/posts\/818\/revisions\/819"}],"wp:attachment":[{"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/media?parent=818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/categories?post=818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/group-mmm.org\/eratommsd\/wp-json\/wp\/v2\/tags?post=818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}