Filters








518,019 Hits in 4.7 sec

Prioritization of disease microRNAs through a human phenome-microRNAome network

Qinghua Jiang, Yangyang Hao, Guohua Wang, Liran Juan, Tianjiao Zhang, Mingxiang Teng, Yunlong Liu, Yadong Wang
2010 BMC Systems Biology  
We tested the model on 270 known experimentally verified microRNA-disease associations and achieved an area under the ROC curve of 75.80%.  ...  Conclusions: We presented a network-based approach that can infer potential microRNA-disease associations and drive testable hypotheses for the experimental efforts to identify the roles of microRNAs in  ...  The blue curve represents the performance of the model to prioritize microRNAs for diseases with which no microRNAs have been experimentally verified to be associated.  ... 
doi:10.1186/1752-0509-4-s1-s2 pmid:20522252 pmcid:PMC2880408 fatcat:4ycz4tte6jadhap66gxx57cvzq

Verified systems by composition from verified components

Fei Xie, James C. Browne
2003 Software engineering notes  
This approach has been applied to improve reliability of instances of TinyOS, a component-based run-time system for networked sensors.  ...  The abstraction is constructed from environment assumptions of the component and verified properties of its sub-components. A general component model that enables component verification is defined.  ...  Acknowledgment We gratefully acknowledge contributions of Robert P. Kurshan to this research. We also acknowledge Don Batory, Thomas Graser, and Dewayne Perry for their valuable suggestions.  ... 
doi:10.1145/949952.940109 fatcat:r5ljhvnpzzdorbxsn4qbm6bk6m

Anquiro

Luca Mottola, Thiemo Voigt, Fredrik Österlind, Joakim Eriksson, Luciano Baresi, Carlo Ghezzi
2010 Proceedings of the 2010 ICSE Workshop on Software Engineering for Sensor Network Applications - SESENA '10  
We present ANQUIRO, a domain-specific model checker for statically verifying the correctness of sensor network software.  ...  We demonstrate the use of ANQUIRO in verifying the correctness of a widely used data dissemination protocol. This study allows us to identify issues that the protocol may overlook.  ...  The authors thank Adam Dunkels for the feedback received on early versions of this paper.  ... 
doi:10.1145/1809111.1809122 dblp:conf/icse/MottolaVOEBG10 fatcat:jeczrjuin5f7vd3w26cv5dcjx4

An Automatic Approach to Verify Sensor Network Systems

Man Chun Zheng
2010 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion  
We develop a lightweight framework for sensor network systems which automatically extracts realtime models from nesC implementations and verifies them against goals using model checking techniques.  ...  Formal verification techniques such as model checking have been successfully applied to assure the reliability and correctness of concurrent systems and real-time systems.  ...  This methodology includes a model generation method for nesC. The networked system is specified as a global model, which is the composition of models of nodes.  ... 
doi:10.1109/ssiri-c.2010.12 dblp:conf/ssiri/Zheng10 fatcat:sb2xypao7fex3fo5n6axqj2sju

Verified systems by composition from verified components

Fei Xie, James C. Browne
2003 Proceedings of the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE '03  
ACKNOWLEDGMENT We gratefully acknowledge the intellectual contribution of Robert P. Kurshan to this research. This research was partially supported by NSF grant 010-3725.  ...  A general component model, which provides a framework for representing components and their properties and for composing components, is defined.  ...  Application of model checking to software is an important method for improving reliability of software systems. Model checking provides exhaustive state space coverage for the systems being checked.  ... 
doi:10.1145/940108.940109 fatcat:h6d5nseiezcrbec3ggkrx4xi7a

Verified systems by composition from verified components

Fei Xie, James C. Browne
2003 Proceedings of the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE '03  
ACKNOWLEDGMENT We gratefully acknowledge the intellectual contribution of Robert P. Kurshan to this research. This research was partially supported by NSF grant 010-3725.  ...  A general component model, which provides a framework for representing components and their properties and for composing components, is defined.  ...  Application of model checking to software is an important method for improving reliability of software systems. Model checking provides exhaustive state space coverage for the systems being checked.  ... 
doi:10.1145/940071.940109 dblp:conf/sigsoft/XieB03 fatcat:lkhjncyanbaklpofcadynejhre

Automatic belief network modeling via policy inference for SDN fault localization

Yongning Tang, Guang Cheng, Zhiwei Xu, Feng Chen, Khalid Elmansor, Yangxuan Wu
2016 Journal of Internet Services and Applications  
Referring to the component causality graph templates derived from SDN reference model, the implementation view of the current running network services can be modeled as a belief network.  ...  MPI has been evaluated in both a simulation environment and a real network system for its accuracy and efficiency.  ...  We verify the system overhead by showing the model construction time under different scale of networks and policies, and its fault localization time.  ... 
doi:10.1186/s13174-016-0043-y fatcat:ny7oyp66vjdlrehwhs4hdpi7he

An Architectural Approach for Cost Effective Trustworthy Systems

Ihor Kuz, Liming Zhu, Len Bass, Mark Staples, Xiwei Xu
2012 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture  
We describe a research program on design techniques to enable the cost-effective construction of trustworthy systems.  ...  Such systems are designed as compositions of small trusted components and large untrusted components whose behaviour is constrained by an underlying formally verified OS kernel.  ...  OUR VISION OF HOW AN ARCHITECT WOULD CONSTRUCT A TRUSTED SYSTEM Our vision is that an architect should be able to design for formally verified trustworthiness properties just as they design for other properties  ... 
doi:10.1109/wicsa-ecsa.212.54 dblp:conf/wicsa/KuzZBSX12 fatcat:z7tovmnryjbhrjtc7sxp6pahmu

Performance Analysis of Blockchain-based Access Control Model for Personal Health Record System with Architectural Modelling and Simulation

Thein Than Thwin, Sangsuree Vasupongayya
2020 International Journal of Networked and Distributed Computing (IJNDC)  
The proposed blockchain-based PHR system prototype is implemented and the architectural model for the blockchain-based PHR system is also constructed.  ...  The result of simulating the architectural model shows that the proposed blockchain-based PHR system can response within 4 min for 60,000 accesses each day.  ...  This work is the extension of our previous manuscript which is publishing in the open access journal, Security and Communication Networks.  ... 
doi:10.2991/ijndc.k.200515.002 fatcat:kuiwludpibap7m2lkqaa4yz3ym

Embedding the Stable Failures Model of CSP in PVS [chapter]

Kun Wei, James Heather
2005 Lecture Notes in Computer Science  
We have established some generic proof tactics for verification of properties of networks with many components.  ...  Our work, extending a previous embedding of the traces model of CSP in [6], provides a platform for the formal verification not only of safety specifications, but also of liveness specifications of concurrent  ...  CSP provides a rich notation for modelling these kinds of system, and the many laws of CSP can be used to verify specifications of such systems, thus enabling designers to check whether the systems meet  ... 
doi:10.1007/11589976_15 fatcat:2iiajjdpzffadi4tf4462ppomi

Instantaneous Modelling and Reverse Engineering of Data-Consistent Prime Models in Seconds!

Michael A. Idowu
2015 Procedia Computer Science  
formulation and construction of smart and intelligent ODE models of complex systems.  ...  This has resulted in the formulation and formalisation of new reverse engineering and dynamic methods for automated systems modelling of complex systems, including complex biological, financial, control  ...  Acknowledgements The author acknowledges the collaborative effort of Dr Hilal S.  ... 
doi:10.1016/j.procs.2015.09.163 fatcat:ewtoknn2ubcsvpmkfkezlei3p4

Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques

Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
We present a bounded model checking approach based on satisfiability Modulo theories (SMT) for OpenFlow software defined networks (SDNs).  ...  Isolation and diversity are key techniques of cyber resilience for creating built-in resistance in cyber networks against the lateral movement of multi-step Advanced Persistent Threats (APTs) and epidemic  ...  Any opinions, conclusions, or recommendations stated in this material are those of the authors and do not necessarily reflect the views of the funding sources.  ... 
doi:10.5220/0006868904120423 dblp:conf/icete/AlsalehAD18 fatcat:3y6eb5wu5nf7fb2tkx4illd6fu

A System Proposal for Information Management in Building Sector Based on BIM, SSI, IoT and Blockchain

Luisanna Cocco, Roberto Tonelli, Michele Marchesi
2022 Future Internet  
It is proposed as an innovative system and companies that adopt the Open Innovation paradigm might want to pursue it.  ...  This work presents a Self Sovereign Identity based system proposal to show how Blockchain, Building Information Modeling, Internet of Thing devices, and Self Sovereign Identity concepts can support the  ...  In more detail, the model proposal presents a decentralized system based on the Ethereum Blockchain, which manages the flow of information relating to buildings, such as blueprints, construction, maintenance  ... 
doi:10.3390/fi14050140 fatcat:oqtmzttafvctxmwgk7nrtlj5cy

Towards bug-free implementation for wireless sensor networks

Manchun Zheng, Jun Sun, David Sanán, Yang Liu, Jin Song Dong, Yu Gu
2011 Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems - SenSys '11  
The tool takes NesC programs as input, and automatically verifies WSNs against properties specified in the form of deadlock freeness, state reachability or linear temporal logic formulas.  ...  In this demonstration, a systematically domain-specific model checker, NesC@PAT, is presented.  ...  One representative existing model checking tool for NesC programs is T-Check [5] , which is built upon TOSSIM [4] and uses explicit state model checking to verify safety and liveness properties.  ... 
doi:10.1145/2070942.2071013 dblp:conf/sensys/ZhengSSLDG11 fatcat:hy7tg4rueralnp5wqfccho7ibe

Dynamic Dependability Analysis of Shuffle-exchange Networks using HOL Theorem Proving [article]

Yassmeen Elderhalli, Osman Hasan, Sofiene Tahar
2019 arXiv   pre-print
We verify generic expressions of probability of failure and reliability of these systems, which can be instantiated with any number of system components and failure rates to reason about the failure behavior  ...  Dynamic dependability models, such as dynamic fault trees (DFTs) and dynamic reliability block diagrams (DRBDs), are introduced to overcome the modeling limitations of traditional models.  ...  We use n-ary gates, which enable verifying expressions of the probability of failure for generic number of system components. Figure 4 shows the DFT model of the SEN system.  ... 
arXiv:1910.11203v1 fatcat:l4ofauexojgelbmoyapq7p4lh4
« Previous Showing results 1 — 15 out of 518,019 results