Filters








29,490 Hits in 4.2 sec

Performance analysis of probabilistic action systems

Stefan Hallerstede, Michael Butler
2004 Formal Aspects of Computing  
The behaviour of probabilistic action systems is described by traces of expected costs. A corresponding notion of refinement and simulation-based proof rules are introduced.  ...  We introduce the probabilistic action system formalism which combines refinement with performance. In our current study we measure performance in terms of long-run expected average-cost.  ...  Sequential composition P ; Q of probabilistic programs P and Q is defined in Appendix A.  ... 
doi:10.1007/s00165-004-0037-6 fatcat:mjyysgl2gje3zn6nbnvsca75se

Effects of defects in composite wind turbine blades – Part 3: A framework for treating defects as uncertainty variables for blade analysis

Trey W. Riddle, Jared W. Nelson, Douglas S. Cairns
2018 Wind Energy Science  
As such, defects were found to be best assessed as design parameters in a parametric probabilistic analysis allowing for establishment of a consistent framework to validate categorization and analysis.  ...  </strong> Given that wind turbine blades are large structures, the use of low-cost composite manufacturing processes and materials has been necessary for the industry to be cost competitive.  ...  In addition, the work and research presented herein could not have been performed without the assistance of the entire Montana State University Composites Group.  ... 
doi:10.5194/wes-3-107-2018 fatcat:uwx4gk657nhf7l2w46oiqsiupu

Proving Differential Privacy in Hoare Logic

Gilles Barthe, Marco Gaboardi, Emilio Jesus Gallego Arias, Justin Hsu, Cesar Kunz, Pierre-Yves Strub
2014 2014 IEEE 27th Computer Security Foundations Symposium  
Informally, a probabilistic program is differentially private if the participation of a single individual in the input database has a limited effect on the program's distribution on outputs.  ...  We prove that if the target program is correct with respect to a Hoare specification, then the original probabilistic program is differentially private.  ...  By a property of differential privacy, the privacy cost of the composition is upper bounded by the sum of the privacy costs of the individual operations.  ... 
doi:10.1109/csf.2014.36 dblp:conf/csfw/BartheGAHKS14 fatcat:dmndc3trtjhsrf75pmurslyjnm

New results in software model checking and analysis

Corina S. Păsăreanu
2010 International Journal on Software Tools for Technology Transfer (STTT)  
Using this technique, one can automatically generate an implementation of a (forward or backward) symbolic program execution at the cost of writing only the specification of the concrete program semanticsin  ...  Such formulae encode the expected behavior of the system in terms of safety and liveness, as well as timed, probabilistic or security properties.  ... 
doi:10.1007/s10009-010-0178-2 fatcat:p2l2dwydf5e5rf5h2ortmkstkq

Probabilistic Design of Wind Turbine Blades with Treatment of Manufacturing Defects as Uncertainty Variables in a Framework

Trey W. Riddle, Jared W. Nelson, Douglas S. Cairns
2017 Wind Energy Science Discussions  
As such, defects were found to best be assessed as design parameters in a parametric probabilistic analysis allowing for establishment of a consistent framework to validate categorization and analysis.  ...  Given that wind turbine blades are such large structures, the use of low-cost composite manufacturing processes and materials has been necessary for the industry to be cost competitive.  ...  The probability analysis needs to be incorporated into a comprehensive program, not just the assessment of a specific defect or probabilistic parameter.  ... 
doi:10.5194/wes-2017-14 fatcat:2jaow5tpj5g6njzn2y3miwvbw4

Assuring life in composite systems

Christos C. Chamis
2011 Science and Engineering of Composite Materials  
The combined use of composite mechanics, finite element computer codes, and probabilistic analysis enable the effective assessment of the dynamic buckling load of smart composite shells.  ...  The uncertainties in the electric field strength and smart material volume fraction have moderate effects and thereby in the assured life of the shell. SECURITY CLASSIFICATION OF: 17.  ...  This report is a formal draft or working paper, intended to solicit comments and ideas from a technical peer group.  ... 
doi:10.1515/secm.2011.046 fatcat:jqvpjqka6zai7liup5ta7vdjwe

From software verification to 'everyware' verification

Marta Kwiatkowska
2013 Computer Science - Research and Development  
costs.  ...  Model-based design and verification techniques have proved useful in supporting the design process by detecting and correcting flaws in a number of ubiquitous computing applications, but are limited by  ...  In the light of the statespace explosion problem, compositional frameworks that enable one to verify that the property holds for the composed system, based on an analysis of the components in isolation  ... 
doi:10.1007/s00450-013-0249-1 fatcat:yijv5tfqwjb5rlopsnmy6gpsf4

Probability-Based Modelling of Composites Manufacturing and Its Application to Optimal Process Design

Hong Li, Ricardo Foschi, Reza Vaziri, Göran Fernlund, Anoush Poursartip
2002 Journal of composite materials  
In the first study, a probabilistic description of the process-induced spring-in of a channel section is achieved and the effect of variability in material properties on the final channel angle is studied  ...  The control of process-induced deformations in composite structures is important for cost-effective manufacturing.  ...  ACKNOWLEDGEMENTS This work was supported by funding from the Natural Sciences and Engineering Research Council (NSERC) of Canada.  ... 
doi:10.1177/0021998302036016241 fatcat:nuzic2b5vveyzahdcqzznk3ufa

Quantitative reactive modeling and verification

Thomas A. Henzinger
2013 Computer Science - Research and Development  
We therefore propose to introduce quantitative fitness measures for programs, specifically for measuring the function, performance, and robustness of reactive programs such as concurrent processes.  ...  We suggest that the boolean partition of software into correct and incorrect programs falls short of the practical need to assess the behavior of software in a more nuanced fashion against multiple criteria  ...  Above all, the author thanks his many wonderful collaborators on the topic of this project.  ... 
doi:10.1007/s00450-013-0251-7 pmid:27069511 pmcid:PMC4811300 fatcat:cimfqu272beijj6dgqpvsz7koy

The Modest Toolset: An Integrated Environment for Quantitative Modelling and Verification [chapter]

Arnd Hartmanns, Holger Hermanns
2014 Lecture Notes in Computer Science  
languages; and to permit reuse of existing tools by integrating them in a unified modelling and analysis environment.  ...  Probabilities, real-time behaviour and continuous dynamics are the key ingredients of quantitative models enabling formal studies of non-functional properties such as dependability and performance.  ...  The following analysis backends are part of version 2.0 of the toolset: prohver Computes upper bounds on max. probabilities of probabilistic safety properties in SHA [12] .  ... 
doi:10.1007/978-3-642-54862-8_51 fatcat:2nrp4746brah5bf75kerqcekma

Page 708 of The Journal of the Operational Research Society Vol. 43, Issue 7 [page]

1992 The Journal of the Operational Research Society  
We have also developed a solution algorithm for each multiobjective non-linear programming model. For the deterministic model, our analytical algorithm is based on specific properties of the model.  ...  Multiobjective non-linear programming models are constructed, based on whether information is available on the marginal ordering and holding costs.  ... 

Converting from Service Level Agreement to Probabilistic Temporal Logic Specification

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
We focus on WS-Agreement language for SLA and probabilistic alternating-time temporal logic with rewards specification (rPATL) for the properties specification used in PRISM-games model checker tool.  ...  This paper aims to address the need to automatically capture non-functional requirements specified in the SLA, namely, Service Level Objectives (SLO) and converting them into a specific probabilistic temporal  ...  ACKNOWLEDGMENT Azlan Ismail acknowledges the support of the Fundamental Research Grant Scheme, 600-IRMI/FRGS 5/3 (214/2019), funded by Ministry of Education Malaysia.  ... 
doi:10.35940/ijitee.j9736.0881019 fatcat:h2o4kspqkrfrdlymlmxxzf3krq

Advances in Quantitative Verification for Ubiquitous Computing [chapter]

Marta Kwiatkowska
2013 Lecture Notes in Computer Science  
of quantitative models − graph-based analysis: reachability + qualitative verification − numerical solution, e.g. linear equations/linear programming − typically computationally more expensive than the  ...  deploy" {"crash"}{max} ] -"the maximum probability of an airbag failing to deploy within 0.02s, from any possible crash scenario" • Reward/cost-based properties − R {"time"}=?  ... 
doi:10.1007/978-3-642-39718-9_3 fatcat:emkb7jqcurg37nhkdyeel6icma

Towards Verified Artificial Intelligence [article]

Sanjit A. Seshia, Dorsa Sadigh, S. Shankar Sastry
2020 arXiv   pre-print
Verified artificial intelligence (AI) is the goal of designing AI-based systems that that have strong, ideally provable, assurances of correctness with respect to mathematically-specified requirements.  ...  We describe five challenges for achieving Verified AI, and five corresponding principles for addressing these challenges.  ...  Research Center, one of six centers supported by the STARnet phase of the Focus Center Research Program (FCRP) a Semiconductor Research Corporation program sponsored by MARCO and DARPA, by the DARPA BRASS  ... 
arXiv:1606.08514v4 fatcat:ozoldsdnzjghddhwz5xju6zqvu

APEX: An Analyzer for Open Probabilistic Programs [chapter]

Stefan Kiefer, Andrzej S. Murawski, Joël Ouaknine, Björn Wachter, James Worrell
2012 Lecture Notes in Computer Science  
In this way, APEX can verify a broad range of anonymity and termination properties of randomised protocols and other open programs, sometimes with an exponential speed-up over competing state-of-the-art  ...  The translation is compositional and effectively leverages state reduction techniques.  ...  Introduction APEX is an analysis tool for open probabilistic programs.  ... 
doi:10.1007/978-3-642-31424-7_51 fatcat:43x4hdge7rds5ix6tb7iggayna
« Previous Showing results 1 — 15 out of 29,490 results