A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
Time properties are generally determined by the behavior of the main program and the interrupt handling programs. ... In this paper, we present a small but expressive language for interrupt-driven programs and propose a timed operational semantics for it which can be used to explore various time properties. ... In an earlier work, we have developed a formal model of interrupt programs from a probabilistic perspective, designed the probabilistic operational semantics for interrupt program to capture the potential ...doi:10.1007/978-3-642-33296-8_11 fatcat:w76ha4j2u5ehjhedswjxnfawue
It comprises formal syntax and semantics of a nondeterministic action programming language. The language is interpreted stochastically via Monte Carlo Tree Search. ... This paper proposes Monte Carlo Action Programming, a programming language framework for autonomous systems that act in large probabilistic state spaces with high branching factors. ... From the perspective of online planning, MCAP provides a formal nondeterministic action programming language that allows to specify plan sketches for autonomous systems. ...arXiv:1702.08441v1 fatcat:vb4ibksuovbttadfd7uxqipzd4
We propose a threat model and identify possible vulnerabilities in low-voltage distribution grids. Then, we calculate exploitation probabilities from realistic attack scenarios. ... Lastly, we apply formal verification to check the stochastic model against attack properties. The obtained results provide insight into potential threats and the likeliness of successful attacks. ... Conflicts of Interest: The authors declare no conflict of interest. ...doi:10.3390/app11115149 fatcat:ev4bw52o5nfs5aj5xuux6exxsi
Much of human reasoning is about the beliefs, desires, and intentions of other people; we use probabilistic programs to formalize these inferences in a way that captures the flexibility and inherent uncertainty ... We describe how probabilistic programs can explicitly represent conditioning as part of a model. This enables us to describe reasoning about others' reasoning using nested conditioning. ... Acknowledgements We thank John McCoy, Thomas Icard, and Lewis Fishgold for comments; Daniel Roy and Timothy O'Donnell for contributions to early stages of work on the proposed algorithm; and ONR grant ...doi:10.1016/j.cogsys.2013.07.003 fatcat:a6jkmf5ylbf2vckt46fyzfh2xy
Service oriented computing is emerging as a reference model for a new class of distributed computing technologies such as Web Services and the Grid. ... We also indicate some new issues, raising from the combination of these three aspects, that require the investigation of suitable new process algebra operators. ... The other processes are prefix forms μ.P , the parallel composition of two programs, the replication of a program, or an interruptible process P ← Q. ...doi:10.1016/j.jlap.2006.05.002 fatcat:cfpz73mnznc45ilw635f3xzcua
A computable probabilistic model is proposed to specify the functions and services of a networked information system. ... This paper proposes a complete formal framework for specifying and verifying the concept of system survivability on the basis of Knight's research. ... Based on this perspective, we also formalize the system as two layers. ...doi:10.1587/transinf.2013edp7339 fatcat:ct7dgp76q5b7xob7lbq7glbgay
Lecture Notes in Computer Science
We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage. ... In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from ... The authors thank all members of the project, and Gethin Norman for fruitful discussions. ...doi:10.1007/978-3-319-10696-0_11 fatcat:k2ryssm455aqfh3wdtoffe2t3e
Lecture Notes in Computer Science
In this paper, we propose an abstract formal model to represent AUTOSAR OS programs with timing protection. ... We implement our model in Mathematica and give a case study to illustrate the utility of our method. ... Acknowledgments The majority of the work reported in this paper was done while Yanhong Huang was a visiting researcher at Teesside University (funded by the Teesside University Research Fund). ...doi:10.1007/978-3-642-41202-8_12 fatcat:p2kx4y6s25g4doqkvojfqnzttm
The user behaviour is automatically extracted from such extended trees as a probabilistic finite input-output state machine, thanks to formal semantics defined for this purpose for the task tree operators ... The translation of the user interaction model into a Lutess description is explained and experimental results are reported. ... Extracting a formal model of the user behaviour To make possible the automatic test data generation from task trees with operational profiles, formal semantics must be associated with the extended CTT ...doi:10.1016/j.jlap.2009.01.005 fatcat:hjmn7smyzbeqjmkhtuz5u5emjq
“black box” starts with discussing the practical decision-making situation, first from an individual, and then . . . from an institutional perspective © following a description of the 2 approaches in relation ... [from the chapter] — [argues that] because of their different origins and structural nature a comparison between probabilistic planning and sce- nario planning can only be made by reference to their rel ...
Bond (F-BORD) 89j:68017 68M20 60K25 90B22 Lavenberg, S.S. (1-IBM) A perspective on queueing models of computer performance. ... F. (4-CAMB-C) A technique for translating clausal specifications of numerical methods into efficient programs. J. Logic Programming 5 (1988), no. 3, 231-242. ...
We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage. ... In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from ... The authors thank all members of the project, and Gethin Norman for fruitful discussions. ...arXiv:1403.6678v1 fatcat:3ckigs54tfarxhggdvizzzp6qu
This paper studies consciousness from the perspective of theoretical computer science. ... We are not looking for a complex model of the brain nor of cognition but for a simple model of (the admittedly complex concept of) consciousness. ... We thank UniDT for their supporting grant of our work. ...arXiv:2011.09850v4 fatcat:jrx2cryfb5eyvbe4o6bemb7beq
Formal models have seen widespread use in the development of safety-and security-critical systemsprimarily as a means of providing increased assurance. ... To achieve this we present a formal threat model of an idealised system. We use Predicate/Transition (PrT) Nets, a graphical mathematical formalism, to represent threats and plausible attacks. ... landscape from a more formal perspective -by which we mean a perspective from which the system and its environment (and consequent attacks) are modelled via mathematical formalisms. ...doi:10.1109/vnc.2016.7835940 dblp:conf/vnc/SantosSS16 fatcat:hkhnug2o6vgt7fdpe3jyvg6wa4
We examine the value of verified software and of verification technology in the systems context from two perspectives, one analytic, the other synthetic. ... We propose some research opportunities that could enhance the contribution of the verified software initiative to the practices of systems engineering and assurance. ... I am grateful to Robin Bloomfield and Bev Littlewood and their colleagues for educating me on safety cases and BBNs during a visit to CSR at City University in November 2006. ...doi:10.1109/iceccs.2007.47 dblp:conf/iceccs/Rushby07a fatcat:ha4z4npbfnbnjhr4zaden7lfbu
« Previous Showing results 1 — 15 out of 6,718 results