Filters








194,674 Hits in 9.2 sec

Evaluation of redundancy-based system: a model checking approach

Ling Fang, Chunyan Mu, Zhuo Cheng, Guoqiang Li
2018 Science China Information Sciences  
Evaluation of redundancy-based system: a model checking approach. Sci China Inf Sci, 2018, 61(6): 069101, https://doi.  ...  Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. 61472240, 61672340, 61472238).  ...  In this article, we proposed an evaluation method for a redundancy-based system using probabilistic model checking.  ... 
doi:10.1007/s11432-016-9220-5 fatcat:d5sj4kgrwng5lfry32cfppu5ja

SLA Compliance Checking and System Runtime Reconfiguration — A Model Based Approach

Mahin Abbasipour, Electrical and Computer Engineering, Concordia University, Montreal, Canada., Ferhat Khendek, Maria Toeroe
2019 Journal of Software  
We perform a preliminary evaluation of the approach.  ...  All SLA models are transformed into an SLA compliance model which is used at runtime to check SLA compliance and generate triggers when a dynamic reconfiguration is required.  ...  Validation and Trigger Generation Performance Evaluation CASES Number of Model Elements Number of Constraint Checks Performed Number of Generated Triggers Execution Time (ms) CASE 1 13  ... 
doi:10.17706/jsw.14.11.488-518 fatcat:42n7v44iovg4vdz34de6odzxjy

Evaluation the Redundancy of the IoT System Based on Individual Sensing Probability

Ryuichi TAKAHASHI
2020 IEICE transactions on information and systems  
To evaluate the safety of the system, it is important to estimate the achievement probability of the function based on the sensing probability.  ...  In this research, we proposed a method to automatically generate a PRISM model from the sensor configuration of the target system and calculate and verify the function achievement probability in the assumed  ...  Model Checker PRISM Model checking is a method for describing the system behavior formally and checking the correctness of the opera-tion algorithmically.  ... 
doi:10.1587/transinf.2019fop0001 fatcat:6ynuzreasvgcbflhulvti5byse

Verifying OSEK/VDX Applications: A Sequentialization-Based Model Checking Approach

Haitao ZHANG, Toshiaki AOKI, Yuki CHIBA
2015 IEICE transactions on information and systems  
The value of our approach is that it can be considered as a front-end translator for enabling existing model checkers to verify OSEK/VDX applications.  ...  To ensure the reliability of developed applications, model checking as an exhaustive technique can be applied to discover subtle errors in the development process.  ...  We also evaluated our approach based on a series of experiments.  ... 
doi:10.1587/transinf.2015edp7043 fatcat:eaxq6272a5ci7ls4xkof5dlmze

Model Checking a Model Checker: A Code Contract Combined Approach [chapter]

Jun Sun, Yang Liu, Bin Cheng
2010 Lecture Notes in Computer Science  
In this work, we propose a code contract combined approach for checking model checkers and apply it to a home-grown model checker PAT.  ...  Then, interface models of complicated data structures and graphical user interfaces (GUI) are built and model checked.  ...  We experiment the approach in checking the correctness of the PAT model checker. Through the experiments, we discovered multiple bugs, and gained more confidence of PAT.  ... 
doi:10.1007/978-3-642-16901-4_34 fatcat:ekgkwg6q2janfbevrg2a63l3yy

Beware of Insufficient Redundancy

Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg
2022 Transactions on Cryptographic Hardware and Embedded Systems  
a 40nm ASIC to experimentally evaluate their resistance to Laser Fault Injection (LFI) attacks.  ...  Thus, we caution against limiting the redundancy in code-based FI countermeasures to less than the number of bits per word, especially in nanometer technologies, and point out that less-complex countermeasures  ...  The n × (n −k) matrix H that checks if an element of F n 2 is a possible codeword is called the signature check matrix Target Based on the principles given in Section 2.1.2, the authors of [AMR + 20]  ... 
doi:10.46586/tches.v2022.i3.438-462 fatcat:uovltmacl5fw3nrvyoocxkc2zm

A Probabilistic Model Checking Approach to Analysing Reliability, Availability, and Maintainability of a Single Satellite System

Zhaoguang Peng, Yu Lu, Alice Miller, Chris Johnson, Tingdi Zhao
2013 2013 European Modelling Symposium  
Satellites now form a core component for space based systems such as GPS and GLONAS which provide location and timing information for a variety of uses.  ...  In this paper, we present formal modelling of a single satellite and logical specification of its reliability, availability and maintainability properties.  ...  Model checking is a formal verification technique that involves defining a model of a system from a formal specification. The model is then used to check desired properties of the system.  ... 
doi:10.1109/ems.2013.102 dblp:conf/ems/PengLMJZ13 fatcat:2nklhbphuzg23bvefgvtiwsozq

A circuit approach to LTL model checking

Koen Claessen, Niklas Een, Baruch Sterin
2013 2013 Formal Methods in Computer-Aided Design  
of industrial model checking tools.  ...  This paper presents a method for translating formulas written in assertion languages such as LTL into a monitor circuit suitable for model checking.  ...  model checking tools.  ... 
doi:10.1109/fmcad.2013.6679391 fatcat:a5nb7ufaxfa2pd2hhu625u74eu

A New Approach to Stateless Model Checking of LTL Properties [article]

Elaheh Ghassabani, Mohammad Abdollahi Azgomi
2016 arXiv   pre-print
This paper proposes a novel encoding of one of the recent LTL semantics on finite paths into an actor-based system.  ...  We take a truly parallel approach without saving any program states or traces, which not only addresses important problems in runtime verification, but can also be applied to stateless model checking.  ...  Acknowledgement We are grateful to Iran National Science Foundation (INSF) for financial support of this research.  ... 
arXiv:1603.03535v1 fatcat:vsh7kkdfnjdkhb4j4v53vrhpwy

A Model-Checking Approach to Analyse Temporal Failure Propagation with AltaRica [chapter]

Alexandre Albore, Silvano Dal Zilio, Guillaume Infantes, Christel Seguin, Pierre Virelizier
2017 Lecture Notes in Computer Science  
Model-Checking approach to analyse temporal failure propagation with altaRica.  ...  Our approach is based on an extension of the AltaRica language where we can associate timing constraints with events and relies on a translation into a realtime modelchecking toolset.  ...  We define a model-based process to check simultaneously safety and temporal conditions on systems.  ... 
doi:10.1007/978-3-319-64119-5_10 fatcat:ce7s3hcsrjgdzmasgmiknq5lsi

An evaluation of lazy fault detection based on Adaptive Redundant Multithreading

Saurabh Hukerikar, Keita Teranishi, Pedro C. Diniz, Robert F. Lucas
2014 2014 IEEE High Performance Extreme Computing Conference (HPEC)  
In this paper, we present a framework that provides application level fault detection based on redundant multithreading.  ...  In previous work, we demonstrated an adaptive approach based on a language level directive. The computation contained in the programmer directive is executed by duplicate threads.  ...  Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S.  ... 
doi:10.1109/hpec.2014.7040999 dblp:conf/hpec/HukerikarTDL14 fatcat:iepgbfyqnrcfzkbnjiu36gcrwm

A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach

Panagiotis Katsaros
2009 Information and Software Technology  
Tree Temporal Logic) model checking and (iii) for evaluating the need of candidate security requirements.  ...  Our approach lies on the use of Colored Petri Nets and the CPN Tools environment (i) for editing and analyzing protocol models, (ii) for proving the required transaction guarantees by CTL-based (Computation  ...  Acknowledgments We acknowledge the CPN Tools team at Aarhus University, Denmark for kindly providing us the license of use of the valuable CP-net toolset.  ... 
doi:10.1016/j.infsof.2008.01.005 fatcat:lqmt4dxbprbllj7ghrnujhx34a

Fairness Modulo Theory: A New Approach to LTL Software Model Checking [chapter]

Daniel Dietsch, Matthias Heizmann, Vincent Langenfeld, Andreas Podelski
2015 Lecture Notes in Computer Science  
We present a new approach to LTL software model checking (i.e., to statically analyze a program and verify a temporal property from the full class of LTL including general liveness properties) which aims  ...  We have implemented a tool which demonstrates the practical potential of the approach.  ...  The model checking algorithm. We use an automata-based approach that collects generalizations of infeasible traces in a Büchi automaton AD.  ... 
doi:10.1007/978-3-319-21690-4_4 fatcat:fbisyn7olve6rj76nbcfdtgjzu

Smartphone Addiction and Checking Behaviors Predict Aggression: A Structural Equation Modeling Approach

Shuna Shiann Khoo, Hwajin Yang
2021 International Journal of Environmental Research and Public Health  
Using structural equation modeling, we found that smartphone checking and addictive smartphone use predicted only hostility.  ...  In a cross-sectional study, we administered a series of questionnaires assessing aggressive tendencies (i.e., The Aggression Questionnaire) and various aspects of smartphone use (N = 253, Mage = 21.8 years  ...  Structural Equation Modeling Approach.  ... 
doi:10.3390/ijerph182413020 pmid:34948631 pmcid:PMC8700868 fatcat:taf2t73bg5g37dpm3rnvan5y6u

Evaluating the Maximum Directional Kinematic Capability of a Redundant Manipulator Based on Allowable Velocity and Force

Jong Ho Kim, Young June Shin, In Gwun Jang
2021 IEEE Access  
In this study, a new concept of allowable velocity and force is proposed to precisely evaluate the maximum directional kinematic capability of a redundant manipulator.  ...  (a spatial manipulator with 6 degrees of freedom).  ...  However, the greater the redundancy of a manipulator, the greater the difficulty of precisely evaluating the maximum capability of a manipulator (velocity and force in this study).  ... 
doi:10.1109/access.2021.3090180 fatcat:4mox3ficavdrnhp6yusmht2hvq
« Previous Showing results 1 — 15 out of 194,674 results