A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Investigating Time Properties of Interrupt-Driven Programs
[chapter]
2012
Lecture Notes in Computer Science
Time properties are generally determined by the behavior of the main program and the interrupt handling programs. ...
In this paper, we present a small but expressive language for interrupt-driven programs and propose a timed operational semantics for it which can be used to explore various time properties. ...
In an earlier work, we have developed a formal model of interrupt programs from a probabilistic perspective, designed the probabilistic operational semantics for interrupt program to capture the potential ...
doi:10.1007/978-3-642-33296-8_11
fatcat:w76ha4j2u5ehjhedswjxnfawue
Monte Carlo Action Programming
[article]
2017
arXiv
pre-print
It comprises formal syntax and semantics of a nondeterministic action programming language. The language is interpreted stochastically via Monte Carlo Tree Search. ...
This paper proposes Monte Carlo Action Programming, a programming language framework for autonomous systems that act in large probabilistic state spaces with high branching factors. ...
From the perspective of online planning, MCAP provides a formal nondeterministic action programming language that allows to specify plan sketches for autonomous systems. ...
arXiv:1702.08441v1
fatcat:vb4ibksuovbttadfd7uxqipzd4
Threat Modelling and Beyond-Novel Approaches to Cyber Secure the Smart Energy System
2021
Applied Sciences
We propose a threat model and identify possible vulnerabilities in low-voltage distribution grids. Then, we calculate exploitation probabilities from realistic attack scenarios. ...
Lastly, we apply formal verification to check the stochastic model against attack properties. The obtained results provide insight into potential threats and the likeliness of successful attacks. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app11115149
fatcat:ev4bw52o5nfs5aj5xuux6exxsi
Reasoning about reasoning by nested conditioning: Modeling theory of mind with probabilistic programs
2014
Cognitive Systems Research
Much of human reasoning is about the beliefs, desires, and intentions of other people; we use probabilistic programs to formalize these inferences in a way that captures the flexibility and inherent uncertainty ...
We describe how probabilistic programs can explicitly represent conditioning as part of a model. This enables us to describe reasoning about others' reasoning using nested conditioning. ...
Acknowledgements We thank John McCoy, Thomas Icard, and Lewis Fishgold for comments; Daniel Roy and Timothy O'Donnell for contributions to early stages of work on the proposed algorithm; and ONR grant ...
doi:10.1016/j.cogsys.2013.07.003
fatcat:a6jkmf5ylbf2vckt46fyzfh2xy
Service oriented computing from a process algebraic perspective
2007
The Journal of Logic and Algebraic Programming
Service oriented computing is emerging as a reference model for a new class of distributed computing technologies such as Web Services and the Grid. ...
We also indicate some new issues, raising from the combination of these three aspects, that require the investigation of suitable new process algebra operators. ...
The other processes are prefix forms μ.P , the parallel composition of two programs, the replication of a program, or an interruptible process P ← Q. ...
doi:10.1016/j.jlap.2006.05.002
fatcat:cfpz73mnznc45ilw635f3xzcua
Investigating System Survivability from a Probabilistic Perspective
2014
IEICE transactions on information and systems
A computable probabilistic model is proposed to specify the functions and services of a networked information system. ...
This paper proposes a complete formal framework for specifying and verifying the concept of system survivability on the basis of Knight's research. ...
Based on this perspective, we also formalize the system as two layers. ...
doi:10.1587/transinf.2013edp7339
fatcat:ct7dgp76q5b7xob7lbq7glbgay
Probabilistic Model Checking of DTMC Models of User Activity Patterns
[chapter]
2014
Lecture Notes in Computer Science
We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage. ...
In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from ...
The authors thank all members of the project, and Gethin Norman for fruitful discussions. ...
doi:10.1007/978-3-319-10696-0_11
fatcat:k2ryssm455aqfh3wdtoffe2t3e
Deadline Analysis of AUTOSAR OS Periodic Tasks in the Presence of Interrupts
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we propose an abstract formal model to represent AUTOSAR OS programs with timing protection. ...
We implement our model in Mathematica and give a case study to illustrate the utility of our method. ...
Acknowledgments The majority of the work reported in this paper was done while Yanhong Huang was a visiting researcher at Teesside University (funded by the Teesside University Research Fund). ...
doi:10.1007/978-3-642-41202-8_12
fatcat:p2kx4y6s25g4doqkvojfqnzttm
Automatically testing interactive applications using extended task trees
2009
The Journal of Logic and Algebraic Programming
The user behaviour is automatically extracted from such extended trees as a probabilistic finite input-output state machine, thanks to formal semantics defined for this purpose for the task tree operators ...
The translation of the user interaction model into a Lutess description is explained and experimental results are reported. ...
Extracting a formal model of the user behaviour To make possible the automatic test data generation from task trees with operational profiles, formal semantics must be associated with the extended CTT ...
doi:10.1016/j.jlap.2009.01.005
fatcat:hjmn7smyzbeqjmkhtuz5u5emjq
Page 1990 of Psychological Abstracts Vol. 82, Issue 5
[page]
1995
Psychological Abstracts
“black box” starts with discussing the practical decision-making situation, first from an individual, and then . . . from an institutional perspective © following a description of the 2 approaches in relation ...
[from the chapter]
— [argues that] because of their different origins and structural nature a comparison between probabilistic planning and sce- nario planning can only be made by reference to their rel ...
Page 5689 of Mathematical Reviews Vol. , Issue 89J
[page]
1989
Mathematical Reviews
Bond (F-BORD)
89j:68017 68M20 60K25 90B22 Lavenberg, S.S. (1-IBM) A perspective on queueing models of computer performance. ...
F. (4-CAMB-C)
A technique for translating clausal specifications of numerical methods into efficient programs.
J. Logic Programming 5 (1988), no. 3, 231-242. ...
Probabilistic Model Checking of DTMC Models of User Activity Patterns
[article]
2014
arXiv
pre-print
We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage. ...
In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from ...
The authors thank all members of the project, and Gethin Norman for fruitful discussions. ...
arXiv:1403.6678v1
fatcat:3ckigs54tfarxhggdvizzzp6qu
A Theoretical Computer Science Perspective on Consciousness
[article]
2021
arXiv
pre-print
This paper studies consciousness from the perspective of theoretical computer science. ...
We are not looking for a complex model of the brain nor of cognition but for a simple model of (the admittedly complex concept of) consciousness. ...
We thank UniDT for their supporting grant of our work. ...
arXiv:2011.09850v4
fatcat:jrx2cryfb5eyvbe4o6bemb7beq
Formal models for automotive systems and vehicular networks: Benefits and challenges
2016
2016 IEEE Vehicular Networking Conference (VNC)
Formal models have seen widespread use in the development of safety-and security-critical systemsprimarily as a means of providing increased assurance. ...
To achieve this we present a formal threat model of an idealised system. We use Predicate/Transition (PrT) Nets, a graphical mathematical formalism, to represent threats and plausible attacks. ...
landscape from a more formal perspective -by which we mean a perspective from which the system and its environment (and consequent attacks) are modelled via mathematical formalisms. ...
doi:10.1109/vnc.2016.7835940
dblp:conf/vnc/SantosSS16
fatcat:hkhnug2o6vgt7fdpe3jyvg6wa4
What Use is Verified Software?
2007
12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007)
We examine the value of verified software and of verification technology in the systems context from two perspectives, one analytic, the other synthetic. ...
We propose some research opportunities that could enhance the contribution of the verified software initiative to the practices of systems engineering and assurance. ...
I am grateful to Robin Bloomfield and Bev Littlewood and their colleagues for educating me on safety cases and BBNs during a visit to CSR at City University in November 2006. ...
doi:10.1109/iceccs.2007.47
dblp:conf/iceccs/Rushby07a
fatcat:ha4z4npbfnbnjhr4zaden7lfbu
« Previous
Showing results 1 — 15 out of 6,718 results