6,138 Hits in 4.5 sec

Modeling and Efficient Verification of Broadcasting Actors [chapter]

Behnaz Yousefi, Fatemeh Ghassemi, Ramtin Khosravi
2015 Lecture Notes in Computer Science  
However, the actor model for concurrent and distributed systems does not directly support this kind of communication.  ...  This makes the model checking of systems possible without further considerations of symmetry. This approach is efficient for fully symmetric system like broadcasting environments.  ...  Preliminaries Rebeca Rebeca [31] is an actor-based modeling language which has been proposed for modeling and verification of concurrent and distributed systems.  ... 
doi:10.1007/978-3-319-24644-4_5 fatcat:jrhgl7v5kzfw7mubrnvnk6qz7q

VeriVANca: An Actor-Based Framework for Formal Verification of Warning Message Dissemination Schemes in VANETs [article]

Farnaz Yousefi, Ehsan Khamespanah, Mohammed Gharib, Marjan Sirjani, Ali Movaghar
2019 arXiv   pre-print
To this end, an actor-based modeling language, Rebeca, is used which is equipped with a variety of model checking engines.  ...  To illustrate the applicability of VeriVANca, modeling and analysis of two warning message dissemination schemes are presented.  ...  Acknowledgments The work on this paper has been supported in part by the project "Self-Adaptive Actors: SEADA" (163205-051) of the Icelandic Research Fund and DPAC Project (Dependable Platforms for Autonomous  ... 
arXiv:1905.01137v1 fatcat:zn7wprlrs5gpfftwpiodmdoggu

Bitcoin Trace-Net: Formal Contract Verification at Signing Time [article]

James Chiang
2020 arXiv   pre-print
A Trace-Net model consists of a Petri Net formalism enriched with a Dolev-Yao-like actor knowledge model.  ...  The explicit symbolic actor knowledge model supports the verification of contracts featuring cryptographic sub-protocols, which may not be observable on the blockchain.  ...  Finally, the author wishes to express his sincere gratitude to Professor Alberto Lluch Lafuente and Professor Andrea Vandin for graciously sharing their expertise in formal methods and model-checking methodology  ... 
arXiv:2007.07528v1 fatcat:o5oqxwperzbz3exx7jnkx72j5u

A Transactional Framework for Programming Wireless Sensor/Actor Networks

Murat Demirbas
2007 11th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS'07)  
By exploiting the properties of wireless broadcast communication, we outline a lightweight and fault-tolerant implementation of our transactional framework.  ...  Effectively managing concurrent execution is one of the biggest challenges for future wireless sensor/actor networks (WSANs): For safety reasons concurrency needs to be tamed to prevent unintentional nondeterministic  ...  In contrast to the CST model, TRANSACT uses pull-based communication, and hence it is more efficient and suitable for WSANs.  ... 
doi:10.1109/ftdcs.2007.8 dblp:conf/ftdcs/Demirbas07 fatcat:5yaj2os6lrezpmypqazc7by6nu

Secure Location-Aware Authentication and Communication for Intelligent Transportation Systems [article]

Nima Shoghi Ghalehshahi, Ramyad Hadidi, Lee Jaewon, Jun Chen, Arthur Siqueria, Rahul Rajan, Shaan Dhawan, Pooya Shoghi Ghalehshahi, Hyesoon Kim
2020 arXiv   pre-print
In such a dynamic and fast-changing network with high-speed agents, verifying the authenticity and integrity of messages while taking preventive action (e.g., applying brakes) within tens of milliseconds  ...  In such a brief moment after receiving a message, the agent not only must verify the integrity and authenticity of the received message but also needs to perform extra computations to localize the sender  ...  Attacks and Countermeasures − Network-Level Impersonations: In this attack, a bad actor sends messages on behalf of another actor.  ... 
arXiv:2011.08936v1 fatcat:zooce7vebndptax6bujd6wu75y

An Efficient Loop-free Version of AODVv2 [article]

Behnaz Yousefi, Fatemeh Ghassemi
2017 arXiv   pre-print
We demonstrate the loop freedom property violation of AODVv2-11, AODVv2-13, and AODVv2-16 through counterexamples.  ...  Due to the mobility of nodes, there exists many revisions as scenarios leading to the loop formation were found.  ...  Actor Model and the wRebeca Language The computational model of actors [3, 4] has been introduced for the purpose of modeling concurrent and distributed systems.  ... 
arXiv:1709.01786v2 fatcat:vhxsegtvyjdrrpgltyvlho5yiq

Specification of Embedded Control Systems Behaviour Using Actor Interface Automata [chapter]

Christo Angelov, Feng Zhou, Krzysztof Sierszecki
2010 Lecture Notes in Computer Science  
It has also implications for system analysis, since actor interface automata are essentially timed automata that can be used as analysis models in model checking tools and simulation environments.  ...  The paper presents an operational specification of DTM in terms of actor interface automata, whereby a distributed control system is modeled as a set of communicating interface automata executing distributed  ...  In particular, each actor is modelled as a pair of interface and functional automata, and actor interaction -as broadcast communication through shared data structures used by the corresponding interface  ... 
doi:10.1007/978-3-642-16256-5_17 fatcat:itrr2hzrizgv3lgeiqhux6eic4

The Gamma statechart composition framework

Vince Molnár, Bence Graics, András Vörös, István Majzik, Dániel Varró
2018 Proceedings of the 40th International Conference on Software Engineering Companion Proceeedings - ICSE '18  
Tool demonstration video: CCS CONCEPTS • Theory of computation → Verification by model checking; • Software and its engineering → System modeling languages; Formal software  ...  Gamma automatically synthesizes executable Java code extending the output of existing statechart-based code generators with composition related parts, and it supports formal verification by mapping composite  ...  ACKNOWLEDGMENTS This paper was partially supported by the ÚNKP-17-2-I and ÚNKP-17-3-I New National Excellence Programs of the Ministry of Human Capacities.  ... 
doi:10.1145/3183440.3183489 dblp:conf/icse/MolnarGVMV18 fatcat:ajonndsqavhjra46e4ibq3s2dq

Power is Overrated, Go for Friendliness! Expressiveness, Faithfulness, and Usability in Modeling: The Actor Experience [chapter]

Marjan Sirjani
2018 Lecture Notes in Computer Science  
I show how we used the actor-based language Rebeca in modeling different applications, where it is friendly, and where it is not; and how the features of the language and its friendliness may help in analysis  ...  of the model, and synthesis of the system based on the model.  ...  Acknowledgements My work is supported in part by DPAC Project (Dependable Platforms for Autonomous Systems and Control) at Mälardalen University, Sweden, and by the project Self-Adaptive Actors: SEADA  ... 
doi:10.1007/978-3-319-95246-8_25 fatcat:fucnil25s5cepm4sy5kwsy3adu

A Survey of Active Object Languages

Frank De Boer, Kiko Fernandez-Reyes, Albert Mingkun Yang, Vlad Serbanescu, Reiner Hähnle, Ludovic Henrio, Justine Rochas, Crystal Chang Din, Einar Broch Johnsen, Marjan Sirjani, Ehsan Khamespanah
2017 ACM Computing Surveys  
Broadcasting Rebeca [94] and Wireless Rebeca [95] focus on modeling and verifying of network protocols, and provide broadcasting and multi-casting message passing, respectively.  ...  It has a formal semantics and allows efficient compositional verification based on model checking [86, 87] with state space reduction techniques [60] .  ... 
doi:10.1145/3122848 fatcat:ovdeu5o3mbanlectgc6r7kv5he

Modeling and Efficient Verification of Wireless Ad hoc Networks [article]

Behnaz Yousefi, Fatemeh Ghassemi, Ramtin Khosravi
2017 arXiv   pre-print
We address main challenges of modeling wireless ad hoc networks such as local broadcast, underlying topology, and its changes, and discuss how they can be efficiently modeled at the semantic level to make  ...  Therefore, it is desirable to have them modeled and verified using formal methods. In this paper, we present an actor-based modeling language with the aim to model MANETs.  ...  on the paper, Wan Fokkink and Bas Luttik for their helpful comments on the paper.  ... 
arXiv:1604.07179v2 fatcat:rbr6kvuuqrhazk6mh7lt75hvuq

Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

Zhi Chen, Ya Peng, Wenjing Yue
2015 Journal of Sensors  
Accurate and reliable routing protocols with Quality of Service (QoS) support determine the mission-critical application efficiency in WSNs.  ...  QoS verification properties.  ...  Akbaş and Turgut [17] presented a routing protocol with QoS support for wireless sensor and actor networks and carried out a series of simulations in OPNET modeler to analyze the performance of the protocol  ... 
doi:10.1155/2015/716561 fatcat:zokxrsrsx5bprlsskygp6vryaq

ARTICONF: Towards a Smart Social Media Ecosystem in a Blockchain Federated Environment

Radu Prodan, Nishant Saurabh, Zhiming Zhao, Kate Orton-Johnson, Antorweep Chakravorty, Aleksandar Karadimce, Alexandre Ulisses
2019 Zenodo  
edge-based infrastructure meeting application runtime requirements; and (4) enhance monetary inclusion in collaborative models through cognition and knowledge supply chains.  ...  The ARTICONF project funded by the European Horizon 2020 program addresses issues of trust, time-criticality and democratisation for a new generation of federated infrastructure, to fulfil the privacy,  ...  Such human-agent models face two challenges: lack of intelligent techniques to identify the behavioural convergence of the prosumer decisions over a specific smart appliance, and lack of efficient data  ... 
doi:10.5281/zenodo.3580716 fatcat:rep63fbjdjaclchcbqcydocm6e

Thinkey: A Scalable Blockchain Architecture [article]

Shan Chen, Weiguo Dai, Yuanxi Dai, Hao Fu, Yang Gao, Jianqi Guo, Haoqing He, Yuhong Liu
2019 arXiv   pre-print
Thinkey also uses a novel account model which is based on Actor Model to support the complex logic in the multi-chain structure.  ...  This paper presents Thinkey, an efficient, secure, infinitely scalable and decentralized blockchain architecture. It ensures system correctness and liveness by a multi-layer structure.  ...  Additionally, committee selection and cross-chain verification are key protocols proposed by our system, ensuring the efficiency and security of systems.  ... 
arXiv:1904.04560v2 fatcat:5ettvim23jcttpz4b37esnft5m

Flow: Separating Consensus and Compute – Block Formation and Execution [article]

Alexander Hentschel, Yahya Hassanzadeh-Nazarabadi, Ramtin Seraj, Dieter Shirley, Layne Lafrance
2020 arXiv   pre-print
Instead, Verification Nodes report observed faulty executions to the Consensus Nodes, which adjudicate the received challenges and slash malicious actors.  ...  , Consensus, Execution, and Verification.  ...  Acknowledgments 41 Acknowledgments Karim Helmy for his continued support and feedback on our technical papers.  ... 
arXiv:2002.07403v1 fatcat:gegdfbbmjbdovblvpfmx7qsh3a
« Previous Showing results 1 — 15 out of 6,138 results