Filters








6,718 Hits in 5.7 sec

Investigating Time Properties of Interrupt-Driven Programs [chapter]

Yanhong Huang, Yongxin Zhao, Jianqi Shi, Huibiao Zhu, Shengchao Qin
2012 Lecture Notes in Computer Science  
Time properties are generally determined by the behavior of the main program and the interrupt handling programs.  ...  In this paper, we present a small but expressive language for interrupt-driven programs and propose a timed operational semantics for it which can be used to explore various time properties.  ...  In an earlier work, we have developed a formal model of interrupt programs from a probabilistic perspective, designed the probabilistic operational semantics for interrupt program to capture the potential  ... 
doi:10.1007/978-3-642-33296-8_11 fatcat:w76ha4j2u5ehjhedswjxnfawue

Monte Carlo Action Programming [article]

Lenz Belzner
2017 arXiv   pre-print
It comprises formal syntax and semantics of a nondeterministic action programming language. The language is interpreted stochastically via Monte Carlo Tree Search.  ...  This paper proposes Monte Carlo Action Programming, a programming language framework for autonomous systems that act in large probabilistic state spaces with high branching factors.  ...  From the perspective of online planning, MCAP provides a formal nondeterministic action programming language that allows to specify plan sketches for autonomous systems.  ... 
arXiv:1702.08441v1 fatcat:vb4ibksuovbttadfd7uxqipzd4

Threat Modelling and Beyond-Novel Approaches to Cyber Secure the Smart Energy System

Heribert Vallant, Branka Stojanović, Josip Božić, Katharina Hofer-Schmitz
2021 Applied Sciences  
We propose a threat model and identify possible vulnerabilities in low-voltage distribution grids. Then, we calculate exploitation probabilities from realistic attack scenarios.  ...  Lastly, we apply formal verification to check the stochastic model against attack properties. The obtained results provide insight into potential threats and the likeliness of successful attacks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11115149 fatcat:ev4bw52o5nfs5aj5xuux6exxsi

Reasoning about reasoning by nested conditioning: Modeling theory of mind with probabilistic programs

A. Stuhlmüller, N.D. Goodman
2014 Cognitive Systems Research  
Much of human reasoning is about the beliefs, desires, and intentions of other people; we use probabilistic programs to formalize these inferences in a way that captures the flexibility and inherent uncertainty  ...  We describe how probabilistic programs can explicitly represent conditioning as part of a model. This enables us to describe reasoning about others' reasoning using nested conditioning.  ...  Acknowledgements We thank John McCoy, Thomas Icard, and Lewis Fishgold for comments; Daniel Roy and Timothy O'Donnell for contributions to early stages of work on the proposed algorithm; and ONR grant  ... 
doi:10.1016/j.cogsys.2013.07.003 fatcat:a6jkmf5ylbf2vckt46fyzfh2xy

Service oriented computing from a process algebraic perspective

Mario Bravetti, Gianluigi Zavattaro
2007 The Journal of Logic and Algebraic Programming  
Service oriented computing is emerging as a reference model for a new class of distributed computing technologies such as Web Services and the Grid.  ...  We also indicate some new issues, raising from the combination of these three aspects, that require the investigation of suitable new process algebra operators.  ...  The other processes are prefix forms μ.P , the parallel composition of two programs, the replication of a program, or an interruptible process P ← Q.  ... 
doi:10.1016/j.jlap.2006.05.002 fatcat:cfpz73mnznc45ilw635f3xzcua

Investigating System Survivability from a Probabilistic Perspective

Yongxin ZHAO, Yanhong HUANG, Qin LI, Huibiao ZHU, Jifeng HE, Jianwen LI, Xi WU
2014 IEICE transactions on information and systems  
A computable probabilistic model is proposed to specify the functions and services of a networked information system.  ...  This paper proposes a complete formal framework for specifying and verifying the concept of system survivability on the basis of Knight's research.  ...  Based on this perspective, we also formalize the system as two layers.  ... 
doi:10.1587/transinf.2013edp7339 fatcat:ct7dgp76q5b7xob7lbq7glbgay

Probabilistic Model Checking of DTMC Models of User Activity Patterns [chapter]

Oana Andrei, Muffy Calder, Matthew Higgs, Mark Girolami
2014 Lecture Notes in Computer Science  
We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage.  ...  In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from  ...  The authors thank all members of the project, and Gethin Norman for fruitful discussions.  ... 
doi:10.1007/978-3-319-10696-0_11 fatcat:k2ryssm455aqfh3wdtoffe2t3e

Deadline Analysis of AUTOSAR OS Periodic Tasks in the Presence of Interrupts [chapter]

Yanhong Huang, João F. Ferreira, Guanhua He, Shengchao Qin, Jifeng He
2013 Lecture Notes in Computer Science  
In this paper, we propose an abstract formal model to represent AUTOSAR OS programs with timing protection.  ...  We implement our model in Mathematica and give a case study to illustrate the utility of our method.  ...  Acknowledgments The majority of the work reported in this paper was done while Yanhong Huang was a visiting researcher at Teesside University (funded by the Teesside University Research Fund).  ... 
doi:10.1007/978-3-642-41202-8_12 fatcat:p2kx4y6s25g4doqkvojfqnzttm

Automatically testing interactive applications using extended task trees

Laya Madani, Ioannis Parissis
2009 The Journal of Logic and Algebraic Programming  
The user behaviour is automatically extracted from such extended trees as a probabilistic finite input-output state machine, thanks to formal semantics defined for this purpose for the task tree operators  ...  The translation of the user interaction model into a Lutess description is explained and experimental results are reported.  ...  Extracting a formal model of the user behaviour To make possible the automatic test data generation from task trees with operational profiles, formal semantics must be associated with the extended CTT  ... 
doi:10.1016/j.jlap.2009.01.005 fatcat:hjmn7smyzbeqjmkhtuz5u5emjq

Page 1990 of Psychological Abstracts Vol. 82, Issue 5 [page]

1995 Psychological Abstracts  
“black box” starts with discussing the practical decision-making situation, first from an individual, and then . . . from an institutional perspective © following a description of the 2 approaches in relation  ...  [from the chapter] — [argues that] because of their different origins and structural nature a comparison between probabilistic planning and sce- nario planning can only be made by reference to their rel  ... 

Page 5689 of Mathematical Reviews Vol. , Issue 89J [page]

1989 Mathematical Reviews  
Bond (F-BORD) 89j:68017 68M20 60K25 90B22 Lavenberg, S.S. (1-IBM) A perspective on queueing models of computer performance.  ...  F. (4-CAMB-C) A technique for translating clausal specifications of numerical methods into efficient programs. J. Logic Programming 5 (1988), no. 3, 231-242.  ... 

Probabilistic Model Checking of DTMC Models of User Activity Patterns [article]

Oana Andrei, Muffy Calder, Matthew Higgs, Mark Girolami
2014 arXiv   pre-print
We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage.  ...  In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from  ...  The authors thank all members of the project, and Gethin Norman for fruitful discussions.  ... 
arXiv:1403.6678v1 fatcat:3ckigs54tfarxhggdvizzzp6qu

A Theoretical Computer Science Perspective on Consciousness [article]

Manuel Blum, Lenore Blum
2021 arXiv   pre-print
This paper studies consciousness from the perspective of theoretical computer science.  ...  We are not looking for a complex model of the brain nor of cognition but for a simple model of (the admittedly complex concept of) consciousness.  ...  We thank UniDT for their supporting grant of our work.  ... 
arXiv:2011.09850v4 fatcat:jrx2cryfb5eyvbe4o6bemb7beq

Formal models for automotive systems and vehicular networks: Benefits and challenges

Eduardo dos Santos, Dominik Schoop, Andrew Simpson
2016 2016 IEEE Vehicular Networking Conference (VNC)  
Formal models have seen widespread use in the development of safety-and security-critical systemsprimarily as a means of providing increased assurance.  ...  To achieve this we present a formal threat model of an idealised system. We use Predicate/Transition (PrT) Nets, a graphical mathematical formalism, to represent threats and plausible attacks.  ...  landscape from a more formal perspective -by which we mean a perspective from which the system and its environment (and consequent attacks) are modelled via mathematical formalisms.  ... 
doi:10.1109/vnc.2016.7835940 dblp:conf/vnc/SantosSS16 fatcat:hkhnug2o6vgt7fdpe3jyvg6wa4

What Use is Verified Software?

John Rushby
2007 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007)  
We examine the value of verified software and of verification technology in the systems context from two perspectives, one analytic, the other synthetic.  ...  We propose some research opportunities that could enhance the contribution of the verified software initiative to the practices of systems engineering and assurance.  ...  I am grateful to Robin Bloomfield and Bev Littlewood and their colleagues for educating me on safety cases and BBNs during a visit to CSR at City University in November 2006.  ... 
doi:10.1109/iceccs.2007.47 dblp:conf/iceccs/Rushby07a fatcat:ha4z4npbfnbnjhr4zaden7lfbu
« Previous Showing results 1 — 15 out of 6,718 results