Filters








746 Hits in 3.0 sec

Quantitative reactive modeling and verification

Thomas A. Henzinger
2013 Computer Science - Research and Development  
and abstraction refinement, model checking, and synthesis.  ...  In particular, we will use the quantitative reactive models and fitness measures developed in this project for testing hypotheses about the mechanisms behind data from biological experiments.  ...  They are useful, for example, to define the time to failure of a system.  ... 
doi:10.1007/s00450-013-0251-7 pmid:27069511 pmcid:PMC4811300 fatcat:cimfqu272beijj6dgqpvsz7koy

Advances and challenges of probabilistic model checking

Marta Kwiatkowska, Gethin Norman, David Parker
2010 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
Probabilistic model checking is a powerful technique for formally verifying quantitative properties of systems that exhibit stochastic behaviour.  ...  Such systems are found in many domains: probabilistic behaviour may arise, for example, due to failures of unreliable components, communication across lossy media, or through the use of randomisation in  ...  For this, it is essential to consider the inherently probabilistic nature of real systems: components in an embedded device may be prone to failure; or messages sent across communication networks may get  ... 
doi:10.1109/allerton.2010.5707120 fatcat:bauounyehvelpe4dwjrobeugfe

Automata-Based Software Reliability Model: The Key to Reliable Software

Ritika Wason, P. Ahmed, M. Qasim Rafiq
2013 International Journal of Software Engineering and Its Applications  
The section also makes some future predictions regarding the growth and acceptability of automata-based models as an absolute technique to model reliable systems.  ...  In this paper we propose and advocate an automata-based reliability model as an accurate reliability estimation tool for executable software systems.  ...  in Bowles 7 using probabilistic estimates.  ... 
doi:10.14257/ijseia.2013.7.6.10 fatcat:n7wb6wadmrh3vnosuctyvsassi

Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases

Radu Calinescu, Danny Weyns, Simos Gerasimou, Muhammad Usman Iftikhar, Ibrahim Habli, Tim Kelly
2017 IEEE Transactions on Software Engineering  
The experimental results show that ENTRUST can be used to engineer self-adaptive software systems in different application domains and to generate dynamic assurance cases for these systems.  ...  ENTRUST uses a combination of (1) design-time and runtime modelling and verification, and (2) industry-adopted assurance processes to develop trustworthy self-adaptive software and assurance cases arguing  ...  library for analysis of stochastic system and environment models Resilience to controller failures [24] Probabilistic model checking of resilience properties of synthesized Markov models of the managed  ... 
doi:10.1109/tse.2017.2738640 fatcat:zm2hp3c3g5bsxl72dvcrdl3eiq

Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases [article]

Radu Calinescu, M. Usman Iftikhar University of York, UK,
2018 arXiv   pre-print
The experimental results show that ENTRUST can be used to engineer self-adaptive software systems in different application domains and to generate dynamic assurance cases for these systems.  ...  ENTRUST uses a combination of (1) design-time and runtime modelling and verification, and (2) industry-adopted assurance processes to develop trustworthy self-adaptive software and assurance cases arguing  ...  controller and for UUV/FX deployment safety requirement Assurance probabilistic model probabilistic model evidence checking evidence for checking evidence for obtained throughput, resource use  ... 
arXiv:1703.06350v2 fatcat:puftbpq7bbfznb2x3ntq34n3le

Probabilistic Model-Checking Support for FMEA

Lars Grunske, Robert Colvin, Kirsten Winter
2007 Fourth International Conference on the Quantitative Evaluation of Systems (QEST 2007)  
In this paper we propose a method for FMEA which makes use of probabilistic fault injection and probabilistic model checking.  ...  The analysis is typically time intensive and informal, and for this reason FMEA has been extended with traditional model checking support.  ...  Consequently, the use of probabilistic model checking, as promoted in this paper, has significant advantages over the approaches that use standard model checking.  ... 
doi:10.1109/qest.2007.18 dblp:conf/qest/GrunskeCW07 fatcat:m74ddvvnn5gkfkvk7cvcatycoy

Dependability checking with StoCharts: is train radio reliable enough for trains?

D.N. Jansen, H. Hermanns
2004 First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings.  
Stochastic model checking with the model checker PROVER enables us to derive constraints under which the central quality requirements are satisfied by the STOCHART model.  ...  We model a part of the European Train Control System specification, focusing on the risks of wireless communication failures in future high-speed cross-European trains.  ...  We thank Yaroslav Usenko from Universiteit Twente, who helped us in finding an error in a preliminary version of the models.  ... 
doi:10.1109/qest.2004.1348039 dblp:conf/qest/JansenH04 fatcat:2ybztyojr5bqfkalpddiak32fq

Formal analysis techniques for gossiping protocols

Rena Bakhshi, Francois Bonnet, Wan Fokkink, Boudewijn Haverkort
2007 ACM SIGOPS Operating Systems Review  
We give a survey of formal verification techniques that can be used to corroborate existing experimental results for gossiping protocols in a rigorous manner.  ...  Case study [24] presents the modelling of a sensor network using approximate probabilistic model checking.  ...  Monte Carlo model checking [37] is based on a randomized algorithm for probabilistic model checking of safety properties for general LTL model checking; Monte Carlo model checking uses the optimal approximation  ... 
doi:10.1145/1317379.1317385 fatcat:ppg5garcsrbr3b7ugdijxvs3mu

Model-Based Programming of Fault-Aware Systems

Brian C. Williams, Michel D. Ingham, Seung Chung, Paul Elliott, Michael W. Hofbaur, Gregory T. Sullivan
2004 The AI Magazine  
The program's executive automatically coordinates system interactions to achieve these states, entertaining known and potential failures, using models of its constituents and environment.  ...  ■ A wide range of sensor-rich, networked embedded systems are being created that must operate robustly for years in the face of novel failures by managing complex autonomic processes.  ...  We would particularly like to thank the rest of the Model-based Embedded and Robotic Systems team for their extensive insights and efforts in the creation of  ... 
doi:10.1609/aimag.v24i4.1731 dblp:journals/aim/WilliamsICEHS04 fatcat:gjybu3orbjgytdp6reg3shorxi

Model-Based Programming: Controlling Embedded Systems by Reasoning About Hidden State [chapter]

Brian C. Williams, Michel D. Ingham
2002 Lecture Notes in Computer Science  
To execute a control strategy, model-based executives reason about the models "on the fly", to track system state, diagnose faults and perform reconfigurations.  ...  This is a time-consuming and error-prone process. Furthermore, the resulting code generally lacks modularity and robustness.  ...  The plant model is specified as a concurrent transition system, composed of probabilistic component automata [2] .  ... 
doi:10.1007/3-540-46135-3_34 fatcat:zw7zyj5m6zctfecx2n33qku4ya

Tutorial: Parameterized Verification with Byzantine Model Checker [chapter]

Igor Konnov, Marijana Lazić, Ilina Stoilkovska, Josef Widder
2020 Lecture Notes in Computer Science  
In this tutorial, we give an overview of the techniques implemented in Byzantine Model Checker (ByMC).  ...  Nowadays, they are implemented in distributed systems that involve hundreds or thousands of processes.  ...  In [51, 55] , we have shown that the counter systems of (asynchronous) threshold automata have computable bounded diameters, which gave us a way to use bounded model checking as a complete verification  ... 
doi:10.1007/978-3-030-50086-3_11 fatcat:u7ivnerr6jfj5nzt56vue7xkyu

A formal approach for change impact analysis of long term composed services using Probabilistic Cellular Automata

M. Thirumaran, M. Jannani, N. Sivakumar
2016 Journal of King Saud University: Computer and Information Sciences  
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).  ...  standard methodologies for evaluation -finite state automaton for verifying the runtime compatibilities and change evaluation and probabilistic cellular automaton for impact analysis and prediction.  ...  Change impact analysis of LCS using Probabilistic Cellular Automata In this section, we present our change impact analysis framework for managing changes in LCS using Probabilistic Cellular Automata.  ... 
doi:10.1016/j.jksuci.2014.10.009 fatcat:3yc2hnl7ufgjlkwxjldmn5tfum

Model-based programming of intelligent embedded systems and robotic space explorers

B.C. Williams, M.D. Ingham, S.H. Chung, P.H. Elliott
2003 Proceedings of the IEEE  
Model-based programming addresses these limitations, allowing engineers to program reactive systems by specifying high-level control strategies and by assembling commonsense models of the system hardware  ...  Titan executes an RMPL program using extensive component-based declarative models of the plant to track states, analyze anomalous situations, and generate novel control sequences.  ...  Probabilistic transitions are used to model the stochastic behavior of components, such as failure and intermittency.  ... 
doi:10.1109/jproc.2002.805828 fatcat:3kbm3akdmve2rcntn35a4jkwu4

Discrete control for safe execution of IT automation workflows

Yin Wang, Terence Kelly, Stéphane Lafortune
2007 ACM SIGOPS Operating Systems Review  
We have implemented a discrete control module for a real IT automation system.  ...  Although static analysis tools are available, fixing defects remains manual and error-prone. This paper applies discrete control theory to IT automation workflows.  ...  We thank Arif Merchant, Kimberly Keeton and Brian Noble for comments that helped us improve the paper. We also thank the reviewers for their useful comments and suggestions.  ... 
doi:10.1145/1272998.1273028 fatcat:ix7lqspxljegfibpcqzj2yq424

Discrete control for safe execution of IT automation workflows

Yin Wang, Terence Kelly, Stéphane Lafortune
2007 Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007 - EuroSys '07  
We have implemented a discrete control module for a real IT automation system.  ...  Although static analysis tools are available, fixing defects remains manual and error-prone. This paper applies discrete control theory to IT automation workflows.  ...  We thank Arif Merchant, Kimberly Keeton and Brian Noble for comments that helped us improve the paper. We also thank the reviewers for their useful comments and suggestions.  ... 
doi:10.1145/1272996.1273028 dblp:conf/eurosys/WangKL07 fatcat:2dk57vfdjbhdfhhr4uat7f3l4q
« Previous Showing results 1 — 15 out of 746 results