35,665 Hits in 3.3 sec

A Rigorous Analysis of Emotion of Human Being using an Event-B Approach

Nilima Salankar, Prasun Chakrabarti
2013 International Journal of Computer Applications  
The Pro-B tool supports automatic consistency checking of B machines via model checking.  ...  However for exhaustive model checking given sets of machine must be restricted to small finite sets and integer variables must be limited to small numeric ranges.  ... 
doi:10.5120/11918-8057 fatcat:zuencjxvf5hypdbatwim2n7hmy

Android Platform Modeling and Android App Verification in the ACL2 Theorem Prover [chapter]

Eric Smith, Alessandro Coglio
2016 Lecture Notes in Computer Science  
By induction, we prove that an app satisfies an invariant, including the correctness properties of interest, for all possible sequences of events.  ...  The proof methodology described in this paper, based on state machines and simulations, can verify a large class of app properties.  ...  We would also like to extend our approach to support reasoning about multiple apps, including their communication via Android's 'intent' mechanism.  ... 
doi:10.1007/978-3-319-29613-5_11 fatcat:s7zqxdbnejhszjiyblwm4c5rpa

Using Event-B to construct instruction set architectures

Stephen Wright, Kerstin Eder
2010 Formal Aspects of Computing  
An abstract model may capture these generic properties and be subsequently refined to a particular machine, providing a reusable template for development of robust ISAs by the formal construction of all  ...  The Instruction Set Architecture (ISA) of a computing machine is the definition of the binary instructions, registers, and memory space visible to an executable binary image.  ...  ControlFlow refines this abstraction to a mechanism common to most computing machines: selection of the instruction from a fixed array instArray via a modifiable indexing variable instPtr, representing  ... 
doi:10.1007/s00165-009-0142-7 fatcat:rpcs7jbngfgkjjpcn7ehu6eks4

There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code [chapter]

Thomas Reps, Junghee Lim, Aditya Thakur, Gogul Balakrishnan, Akash Lal
2010 Lecture Notes in Computer Science  
This paper discusses the obstacles that stand in the way of doing a good job of machine-code analysis.  ...  The paper describes some of the challenges that arise when analyzing machine code, and what can be done about them.  ...  Loginov -for their many contributions to our work on machine-code analysis and verification.  ... 
doi:10.1007/978-3-642-14295-6_6 fatcat:egmibmvt4rampbn6jeer7wgeam

Research and Development of a Cross-platform CNC Kernel for Multi-axis Machine Tool

Sergej N. Grigoriev, Georgi M. Martinov
2014 Procedia CIRP  
An example of adapting cross-platform CNC kernel for multi-channel and multi-axis machine tool is illustrated.  ...  Open architecture CNC system offers levels of abstraction in the kernel for implementing various HMIs, accepting different part program language versions and using different fieldbuses.  ...  The considered solutions illustrate the invariance of the CNC system.  ... 
doi:10.1016/j.procir.2014.03.051 fatcat:oaivsbwdq5febfivfnsqetohiu

Gamifying Program Analysis [chapter]

Daniel Fava, Julien Signoles, Matthieu Lemerre, Martin Schäf, Ashish Tiwari
2015 Lecture Notes in Computer Science  
By complementing machine learning with well-designed games, we enable program analysis to incorporate human insights that help improve their scalability and usability.  ...  However, using abstract interpretation tools is not always simple.  ...  Our main contribution is the program analysis and patching procedure that combines abstraction interpretation with machine learning and crowdsourcing via gamification.  ... 
doi:10.1007/978-3-662-48899-7_41 fatcat:vmnzu7l3vnb67ny3rehh6n7ij4

Code Generation for Event-B [article]

Victor Rivera
2016 arXiv   pre-print
declare an abstract invariant I and a concrete machine can additionally declare an invariant J (also called "gluing" invariant since it relates the states between the concrete and abstract machines) that  ...  Convergent events must decrease the numeric machine variant (or must remove elements of the set machine variant), and anticipated events must not increase the numeric machine variant (or must not add elements  ...  Proof Obligation: it states that the guards of a concrete event that merges two abstract events are stronger that the disjunction abstract events' guards.  ... 
arXiv:1602.02004v1 fatcat:xxpeia2gpzc5rhckllafzispqm

The landing gear system in multi-machine Hybrid Event-B

Richard Banach
2015 International Journal on Software Tools for Technology Transfer (STTT)  
These aspects of the case study, vital in the development of realistic cyberphysical systems in general, have contributed significant improvements in the theoretical formulation of multi-machine Hybrid  ...  The size of the case study, and in particular, the number of overtly independent subcomponents that the problem domain contains, both significantly exercise the multi-machine and coordination capabilities  ...  occur in interfaces (to relate abstract and concrete interface variables) and in machines (to relate abstract and concrete machine variables).  ... 
doi:10.1007/s10009-015-0409-7 fatcat:ipsyub3czfgctgkmgmtud23eha

Verification and Synthesis of OCL Constraints Via Topology Analysis [chapter]

Jörg Bauer, Werner Damm, Tobe Toben, Bernd Westphal
2008 Lecture Notes in Computer Science  
Considering a graph grammar semantics for a relevant fragment of UML, where a graph represents an object diagram, allows us to apply Topology Analysis, a particular abstract interpretation of graph grammars  ...  On the basis of a case-study, we demonstrate the usefulness of topology invariants for model-driven systems development.  ...  For convenience, we assume that states of state machines are disjoint, that is, S(M (c 1 ))∩S(M (c 2 )) = ∅ for classes c 1 = c 2 , which is easily established for any UML model via renaming.  ... 
doi:10.1007/978-3-540-89020-1_25 fatcat:nd5slrvb7vb2zp2e3ecp3hif64

Scalable Open Cross-Platform Kernel of PCNC System for Multi-Axis Machine Tool

Sergej N. Grigoriev, Georgi M. Martinov
2012 Procedia CIRP  
Creating the basis of numerical control is demanded by ensuring the invariance of the applied solution, reducing the development cycle and preserving investments made in software development through cross-platform  ...  The paper illustrates the approach of the invariant CNC kernel layout and the scaling of the control channels inside the pipeline data processing, according to the multi-axis machine requirements.  ...  The remote terminal connected via TCP/IP allows the operator to monitor the machine tool using a simplified HMI.  ... 
doi:10.1016/j.procir.2012.04.043 fatcat:vt3gmlleojep5eegwzosotc4eq

Guest Editorial: Special issue on "Topological methods in robotics"

Subhrajit Bhattacharya, Florian T. Pokorny, Howie Choset
2021 Autonomous Robots  
One such method uses topological invariants and topological abstractions to reason about shapes of configuration spaces and for dimensionality reduction, while preserving some topological properties.  ...  Invariants have also been used to develop algorithms for classifying and computing optimal solutions in distinct topological classes in configuration spaces.  ...  The next article, "Partial caging: a clearance-based definition, datasets, and deep learning" by Welle et al., also uses machine learning techniques in conjunction with topological reprsentations and abstractions  ... 
doi:10.1007/s10514-021-09989-2 fatcat:vylcouyngfc73f5j352wzdwrrm

Regenerative delay, parametric forcing and machine tool chatter: A review

Tamas Insperger, David Lehotzky, Gabor Stepan
2015 IFAC-PapersOnLine  
Abstract: Two intrinsic component of machine tool chatter modeling is regenerative time delay and parametric forcing.  ...  Abstract: Two intrinsic component of machine tool chatter modeling is regenerative time delay and parametric forcing.  ...  NUMERICAL METHODS In this section, we list several numerical techniques used for the stability prediction of machining processes.  ... 
doi:10.1016/j.ifacol.2015.09.398 fatcat:5fhxa7as2fbj7gimk443jhyrf4

Hippocratic binary instrumentation: First do no harm

Meera Sridhar, Richard Wartell, Kevin W. Hamlen
2014 Science of Computer Programming  
This paper shows how recent approaches for machine-verifying the policycompliance (soundness) of IRMs can be extended to also formally verify IRM preservation of policy-compliant behaviors (transparency  ...  Numerous past works have developed powerful technologies for formally machine-verifying the soundness of IRMs [7, 8, [25] [26] [27] [28] [29] [30] .  ...  Concrete and Abstract Machines Concrete and symbolic interpretation of programs are expressed as the small-step operational semantics of a concrete and an abstract machine, respectively.  ... 
doi:10.1016/j.scico.2014.02.024 fatcat:tdrsx7wurrgwln5un43axr6wly

Self-Recovering Sensor-Actor Networks

Maryam Kamali, Linas Laibinis, Luigia Petre, Kaisa Sere
2010 Electronic Proceedings in Theoretical Computer Science  
We prove via refinement that the recovery is terminating in a finite number of steps and is distributed, thus self-performed by the actors.  ...  In this paper we formalize a recently introduced algorithm that recovers failed actor communication links via the existing sensor infrastructure.  ...  In this case, an event of an abstract machine can be refined by several corresponding events in a refined machine.  ... 
doi:10.4204/eptcs.30.4 fatcat:xnjlvgvw3bfjnl3xpsv2gk6n6i

Pliant Modalities in Hybrid Event-B [chapter]

Richard Banach
2013 Lecture Notes in Computer Science  
to specify hybrid behaviour in the usual way, using differential equations or continuous assignments for the continuous parts of the behaviour, looser ways of specifying behaviour at higher levels of abstraction  ...  The NucMon machine models the behaviour just described at an abstract level.  ...  Such modalities may occur in two places in a Hybrid Event-B machine. One possibility is in the INVARIANTs of the machine.  ... 
doi:10.1007/978-3-642-39698-4_3 fatcat:ncxvcffmmrhhrfivy2njocm3ly
« Previous Showing results 1 — 15 out of 35,665 results