A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Rigorous Analysis of Emotion of Human Being using an Event-B Approach
2013
International Journal of Computer Applications
The Pro-B tool supports automatic consistency checking of B machines via model checking. ...
However for exhaustive model checking given sets of machine must be restricted to small finite sets and integer variables must be limited to small numeric ranges. ...
doi:10.5120/11918-8057
fatcat:zuencjxvf5hypdbatwim2n7hmy
Android Platform Modeling and Android App Verification in the ACL2 Theorem Prover
[chapter]
2016
Lecture Notes in Computer Science
By induction, we prove that an app satisfies an invariant, including the correctness properties of interest, for all possible sequences of events. ...
The proof methodology described in this paper, based on state machines and simulations, can verify a large class of app properties. ...
We would also like to extend our approach to support reasoning about multiple apps, including their communication via Android's 'intent' mechanism. ...
doi:10.1007/978-3-319-29613-5_11
fatcat:s7zqxdbnejhszjiyblwm4c5rpa
Using Event-B to construct instruction set architectures
2010
Formal Aspects of Computing
An abstract model may capture these generic properties and be subsequently refined to a particular machine, providing a reusable template for development of robust ISAs by the formal construction of all ...
The Instruction Set Architecture (ISA) of a computing machine is the definition of the binary instructions, registers, and memory space visible to an executable binary image. ...
ControlFlow refines this abstraction to a mechanism common to most computing machines: selection of the instruction from a fixed array instArray via a modifiable indexing variable instPtr, representing ...
doi:10.1007/s00165-009-0142-7
fatcat:rpcs7jbngfgkjjpcn7ehu6eks4
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code
[chapter]
2010
Lecture Notes in Computer Science
This paper discusses the obstacles that stand in the way of doing a good job of machine-code analysis. ...
The paper describes some of the challenges that arise when analyzing machine code, and what can be done about them. ...
Loginov -for their many contributions to our work on machine-code analysis and verification. ...
doi:10.1007/978-3-642-14295-6_6
fatcat:egmibmvt4rampbn6jeer7wgeam
Research and Development of a Cross-platform CNC Kernel for Multi-axis Machine Tool
2014
Procedia CIRP
An example of adapting cross-platform CNC kernel for multi-channel and multi-axis machine tool is illustrated. ...
Open architecture CNC system offers levels of abstraction in the kernel for implementing various HMIs, accepting different part program language versions and using different fieldbuses. ...
The considered solutions illustrate the invariance of the CNC system. ...
doi:10.1016/j.procir.2014.03.051
fatcat:oaivsbwdq5febfivfnsqetohiu
Gamifying Program Analysis
[chapter]
2015
Lecture Notes in Computer Science
By complementing machine learning with well-designed games, we enable program analysis to incorporate human insights that help improve their scalability and usability. ...
However, using abstract interpretation tools is not always simple. ...
Our main contribution is the program analysis and patching procedure that combines abstraction interpretation with machine learning and crowdsourcing via gamification. ...
doi:10.1007/978-3-662-48899-7_41
fatcat:vmnzu7l3vnb67ny3rehh6n7ij4
Code Generation for Event-B
[article]
2016
arXiv
pre-print
declare an abstract invariant I and a concrete machine can additionally declare an invariant J (also called "gluing" invariant since it relates the states between the concrete and abstract machines) that ...
Convergent events must decrease the numeric machine variant (or must remove elements of the set machine variant), and anticipated events must not increase the numeric machine variant (or must not add elements ...
Proof Obligation: it states that the guards of a concrete event that merges two abstract events are stronger that the disjunction abstract events' guards. ...
arXiv:1602.02004v1
fatcat:xxpeia2gpzc5rhckllafzispqm
The landing gear system in multi-machine Hybrid Event-B
2015
International Journal on Software Tools for Technology Transfer (STTT)
These aspects of the case study, vital in the development of realistic cyberphysical systems in general, have contributed significant improvements in the theoretical formulation of multi-machine Hybrid ...
The size of the case study, and in particular, the number of overtly independent subcomponents that the problem domain contains, both significantly exercise the multi-machine and coordination capabilities ...
occur in interfaces (to relate abstract and concrete interface variables) and in machines (to relate abstract and concrete machine variables). ...
doi:10.1007/s10009-015-0409-7
fatcat:ipsyub3czfgctgkmgmtud23eha
Verification and Synthesis of OCL Constraints Via Topology Analysis
[chapter]
2008
Lecture Notes in Computer Science
Considering a graph grammar semantics for a relevant fragment of UML, where a graph represents an object diagram, allows us to apply Topology Analysis, a particular abstract interpretation of graph grammars ...
On the basis of a case-study, we demonstrate the usefulness of topology invariants for model-driven systems development. ...
For convenience, we assume that states of state machines are disjoint, that is, S(M (c 1 ))∩S(M (c 2 )) = ∅ for classes c 1 = c 2 , which is easily established for any UML model via renaming. ...
doi:10.1007/978-3-540-89020-1_25
fatcat:nd5slrvb7vb2zp2e3ecp3hif64
Scalable Open Cross-Platform Kernel of PCNC System for Multi-Axis Machine Tool
2012
Procedia CIRP
Creating the basis of numerical control is demanded by ensuring the invariance of the applied solution, reducing the development cycle and preserving investments made in software development through cross-platform ...
The paper illustrates the approach of the invariant CNC kernel layout and the scaling of the control channels inside the pipeline data processing, according to the multi-axis machine requirements. ...
The remote terminal connected via TCP/IP allows the operator to monitor the machine tool using a simplified HMI. ...
doi:10.1016/j.procir.2012.04.043
fatcat:vt3gmlleojep5eegwzosotc4eq
Guest Editorial: Special issue on "Topological methods in robotics"
2021
Autonomous Robots
One such method uses topological invariants and topological abstractions to reason about shapes of configuration spaces and for dimensionality reduction, while preserving some topological properties. ...
Invariants have also been used to develop algorithms for classifying and computing optimal solutions in distinct topological classes in configuration spaces. ...
The next article, "Partial caging: a clearance-based definition, datasets, and deep learning" by Welle et al., also uses machine learning techniques in conjunction with topological reprsentations and abstractions ...
doi:10.1007/s10514-021-09989-2
fatcat:vylcouyngfc73f5j352wzdwrrm
Regenerative delay, parametric forcing and machine tool chatter: A review
2015
IFAC-PapersOnLine
Abstract: Two intrinsic component of machine tool chatter modeling is regenerative time delay and parametric forcing. ...
Abstract: Two intrinsic component of machine tool chatter modeling is regenerative time delay and parametric forcing. ...
NUMERICAL METHODS In this section, we list several numerical techniques used for the stability prediction of machining processes. ...
doi:10.1016/j.ifacol.2015.09.398
fatcat:5fhxa7as2fbj7gimk443jhyrf4
Hippocratic binary instrumentation: First do no harm
2014
Science of Computer Programming
This paper shows how recent approaches for machine-verifying the policycompliance (soundness) of IRMs can be extended to also formally verify IRM preservation of policy-compliant behaviors (transparency ...
Numerous past works have developed powerful technologies for formally machine-verifying the soundness of IRMs [7, 8, [25] [26] [27] [28] [29] [30] . ...
Concrete and Abstract Machines Concrete and symbolic interpretation of programs are expressed as the small-step operational semantics of a concrete and an abstract machine, respectively. ...
doi:10.1016/j.scico.2014.02.024
fatcat:tdrsx7wurrgwln5un43axr6wly
Self-Recovering Sensor-Actor Networks
2010
Electronic Proceedings in Theoretical Computer Science
We prove via refinement that the recovery is terminating in a finite number of steps and is distributed, thus self-performed by the actors. ...
In this paper we formalize a recently introduced algorithm that recovers failed actor communication links via the existing sensor infrastructure. ...
In this case, an event of an abstract machine can be refined by several corresponding events in a refined machine. ...
doi:10.4204/eptcs.30.4
fatcat:xnjlvgvw3bfjnl3xpsv2gk6n6i
Pliant Modalities in Hybrid Event-B
[chapter]
2013
Lecture Notes in Computer Science
to specify hybrid behaviour in the usual way, using differential equations or continuous assignments for the continuous parts of the behaviour, looser ways of specifying behaviour at higher levels of abstraction ...
The NucMon machine models the behaviour just described at an abstract level. ...
Such modalities may occur in two places in a Hybrid Event-B machine. One possibility is in the INVARIANTs of the machine. ...
doi:10.1007/978-3-642-39698-4_3
fatcat:ncxvcffmmrhhrfivy2njocm3ly
« Previous
Showing results 1 — 15 out of 35,665 results