A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Evaluation of redundancy-based system: a model checking approach
2018
Science China Information Sciences
Evaluation of redundancy-based system: a model checking approach. Sci China Inf Sci, 2018, 61(6): 069101, https://doi. ...
Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. 61472240, 61672340, 61472238). ...
In this article, we proposed an evaluation method for a redundancy-based system using probabilistic model checking. ...
doi:10.1007/s11432-016-9220-5
fatcat:d5sj4kgrwng5lfry32cfppu5ja
SLA Compliance Checking and System Runtime Reconfiguration — A Model Based Approach
2019
Journal of Software
We perform a preliminary evaluation of the approach. ...
All SLA models are transformed into an SLA compliance model which is used at runtime to check SLA compliance and generate triggers when a dynamic reconfiguration is required. ...
Validation and Trigger Generation Performance Evaluation CASES
Number of Model
Elements
Number of Constraint
Checks Performed
Number of
Generated
Triggers
Execution
Time (ms)
CASE 1
13 ...
doi:10.17706/jsw.14.11.488-518
fatcat:42n7v44iovg4vdz34de6odzxjy
Evaluation the Redundancy of the IoT System Based on Individual Sensing Probability
2020
IEICE transactions on information and systems
To evaluate the safety of the system, it is important to estimate the achievement probability of the function based on the sensing probability. ...
In this research, we proposed a method to automatically generate a PRISM model from the sensor configuration of the target system and calculate and verify the function achievement probability in the assumed ...
Model Checker PRISM Model checking is a method for describing the system behavior formally and checking the correctness of the opera-tion algorithmically. ...
doi:10.1587/transinf.2019fop0001
fatcat:6ynuzreasvgcbflhulvti5byse
Verifying OSEK/VDX Applications: A Sequentialization-Based Model Checking Approach
2015
IEICE transactions on information and systems
The value of our approach is that it can be considered as a front-end translator for enabling existing model checkers to verify OSEK/VDX applications. ...
To ensure the reliability of developed applications, model checking as an exhaustive technique can be applied to discover subtle errors in the development process. ...
We also evaluated our approach based on a series of experiments. ...
doi:10.1587/transinf.2015edp7043
fatcat:eaxq6272a5ci7ls4xkof5dlmze
Model Checking a Model Checker: A Code Contract Combined Approach
[chapter]
2010
Lecture Notes in Computer Science
In this work, we propose a code contract combined approach for checking model checkers and apply it to a home-grown model checker PAT. ...
Then, interface models of complicated data structures and graphical user interfaces (GUI) are built and model checked. ...
We experiment the approach in checking the correctness of the PAT model checker. Through the experiments, we discovered multiple bugs, and gained more confidence of PAT. ...
doi:10.1007/978-3-642-16901-4_34
fatcat:ekgkwg6q2janfbevrg2a63l3yy
Beware of Insufficient Redundancy
2022
Transactions on Cryptographic Hardware and Embedded Systems
a 40nm ASIC to experimentally evaluate their resistance to Laser Fault Injection (LFI) attacks. ...
Thus, we caution against limiting the redundancy in code-based FI countermeasures to less than the number of bits per word, especially in nanometer technologies, and point out that less-complex countermeasures ...
The n × (n −k) matrix H that checks if an element of F n 2 is a possible codeword is called the signature check matrix
Target Based on the principles given in Section 2.1.2, the authors of [AMR + 20] ...
doi:10.46586/tches.v2022.i3.438-462
fatcat:uovltmacl5fw3nrvyoocxkc2zm
A Probabilistic Model Checking Approach to Analysing Reliability, Availability, and Maintainability of a Single Satellite System
2013
2013 European Modelling Symposium
Satellites now form a core component for space based systems such as GPS and GLONAS which provide location and timing information for a variety of uses. ...
In this paper, we present formal modelling of a single satellite and logical specification of its reliability, availability and maintainability properties. ...
Model checking is a formal verification technique that involves defining a model of a system from a formal specification. The model is then used to check desired properties of the system. ...
doi:10.1109/ems.2013.102
dblp:conf/ems/PengLMJZ13
fatcat:2nklhbphuzg23bvefgvtiwsozq
A circuit approach to LTL model checking
2013
2013 Formal Methods in Computer-Aided Design
of industrial model checking tools. ...
This paper presents a method for translating formulas written in assertion languages such as LTL into a monitor circuit suitable for model checking. ...
model checking tools. ...
doi:10.1109/fmcad.2013.6679391
fatcat:a5nb7ufaxfa2pd2hhu625u74eu
A New Approach to Stateless Model Checking of LTL Properties
[article]
2016
arXiv
pre-print
This paper proposes a novel encoding of one of the recent LTL semantics on finite paths into an actor-based system. ...
We take a truly parallel approach without saving any program states or traces, which not only addresses important problems in runtime verification, but can also be applied to stateless model checking. ...
Acknowledgement We are grateful to Iran National Science Foundation (INSF) for financial support of this research. ...
arXiv:1603.03535v1
fatcat:vsh7kkdfnjdkhb4j4v53vrhpwy
A Model-Checking Approach to Analyse Temporal Failure Propagation with AltaRica
[chapter]
2017
Lecture Notes in Computer Science
Model-Checking approach to analyse temporal failure propagation with altaRica. ...
Our approach is based on an extension of the AltaRica language where we can associate timing constraints with events and relies on a translation into a realtime modelchecking toolset. ...
We define a model-based process to check simultaneously safety and temporal conditions on systems. ...
doi:10.1007/978-3-319-64119-5_10
fatcat:ce7s3hcsrjgdzmasgmiknq5lsi
An evaluation of lazy fault detection based on Adaptive Redundant Multithreading
2014
2014 IEEE High Performance Extreme Computing Conference (HPEC)
In this paper, we present a framework that provides application level fault detection based on redundant multithreading. ...
In previous work, we demonstrated an adaptive approach based on a language level directive. The computation contained in the programmer directive is executed by duplicate threads. ...
Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. ...
doi:10.1109/hpec.2014.7040999
dblp:conf/hpec/HukerikarTDL14
fatcat:iepgbfyqnrcfzkbnjiu36gcrwm
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach
2009
Information and Software Technology
Tree Temporal Logic) model checking and (iii) for evaluating the need of candidate security requirements. ...
Our approach lies on the use of Colored Petri Nets and the CPN Tools environment (i) for editing and analyzing protocol models, (ii) for proving the required transaction guarantees by CTL-based (Computation ...
Acknowledgments We acknowledge the CPN Tools team at Aarhus University, Denmark for kindly providing us the license of use of the valuable CP-net toolset. ...
doi:10.1016/j.infsof.2008.01.005
fatcat:lqmt4dxbprbllj7ghrnujhx34a
Fairness Modulo Theory: A New Approach to LTL Software Model Checking
[chapter]
2015
Lecture Notes in Computer Science
We present a new approach to LTL software model checking (i.e., to statically analyze a program and verify a temporal property from the full class of LTL including general liveness properties) which aims ...
We have implemented a tool which demonstrates the practical potential of the approach. ...
The model checking algorithm. We use an automata-based approach that collects generalizations of infeasible traces in a Büchi automaton AD. ...
doi:10.1007/978-3-319-21690-4_4
fatcat:fbisyn7olve6rj76nbcfdtgjzu
Smartphone Addiction and Checking Behaviors Predict Aggression: A Structural Equation Modeling Approach
2021
International Journal of Environmental Research and Public Health
Using structural equation modeling, we found that smartphone checking and addictive smartphone use predicted only hostility. ...
In a cross-sectional study, we administered a series of questionnaires assessing aggressive tendencies (i.e., The Aggression Questionnaire) and various aspects of smartphone use (N = 253, Mage = 21.8 years ...
Structural Equation Modeling
Approach. ...
doi:10.3390/ijerph182413020
pmid:34948631
pmcid:PMC8700868
fatcat:taf2t73bg5g37dpm3rnvan5y6u
Evaluating the Maximum Directional Kinematic Capability of a Redundant Manipulator Based on Allowable Velocity and Force
2021
IEEE Access
In this study, a new concept of allowable velocity and force is proposed to precisely evaluate the maximum directional kinematic capability of a redundant manipulator. ...
(a spatial manipulator with 6 degrees of freedom). ...
However, the greater the redundancy of a manipulator, the greater the difficulty of precisely evaluating the maximum capability of a manipulator (velocity and force in this study). ...
doi:10.1109/access.2021.3090180
fatcat:4mox3ficavdrnhp6yusmht2hvq
« Previous
Showing results 1 — 15 out of 194,674 results